Energy modeling and saving potential analysis using a novel extreme learning fuzzy logic network: A case study of ethylene industry

2018 ◽  
Vol 213 ◽  
pp. 322-333 ◽  
Author(s):  
Qun-Xiong Zhu ◽  
Chen Zhang ◽  
Yan-Lin He ◽  
Yuan Xu
Author(s):  
Abeer A. Amer ◽  
Soha M. Ismail

The following article has been withdrawn on the request of the author of the journal Recent Advances in Computer Science and Communications (Recent Patents on Computer Science): Title: Diabetes Mellitus Prognosis Using Fuzzy Logic and Neural Networks Case Study: Alexandria Vascular Center (AVC) Authors: Abeer A. Amer and Soha M. Ismail* Bentham Science apologizes to the readers of the journal for any inconvenience this may cause BENTHAM SCIENCE DISCLAIMER: It is a condition of publication that manuscripts submitted to this journal have not been published and will not be simultaneously submitted or published elsewhere. Furthermore, any data, illustration, structure or table that has been published elsewhere must be reported, and copyright permission for reproduction must be obtained. Plagiarism is strictly forbidden, and by submitting the article for publication the authors agree that the publishers have the legal right to take appropriate action against the authors, if plagiarism or fabricated information is discovered. By submitting a manuscript, the authors agree that the copyright of their article is transferred to the publishers if and when the article is accepted for publication.


Water ◽  
2021 ◽  
Vol 13 (9) ◽  
pp. 1288
Author(s):  
Husam Musa Baalousha ◽  
Bassam Tawabini ◽  
Thomas D. Seers

Vulnerability maps are useful for groundwater protection, water resources development, and land use management. The literature contains various approaches for intrinsic vulnerability assessment, and they mainly depend on hydrogeological settings and anthropogenic impacts. Most methods assign certain ratings and weights to each contributing factor to groundwater vulnerability. Fuzzy logic (FL) is an alternative artificial intelligence tool for overlay analysis, where spatial properties are fuzzified. Unlike the specific rating used in the weighted overlay-based vulnerability mapping methods, FL allows more flexibility through assigning a degree of contribution without specific boundaries for various classes. This study compares the results of DRASTIC vulnerability approach with the FL approach, applying both on Qatar aquifers. The comparison was checked and validated against a numerical model developed for the same study area, and the actual anthropogenic contamination load. Results show some similarities and differences between both approaches. While the coastal areas fall in the same category of high vulnerability in both cases, the FL approach shows greater variability than the DRASTIC approach and better matches with model results and contamination load. FL is probably better suited for vulnerability assessment than the weighted overlay methods.


2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Shah Nazir ◽  
Sara Shahzad ◽  
Sher Afzal Khan ◽  
Norma Binti Alias ◽  
Sajid Anwar

Software birthmark is a unique quality of software to detect software theft. Comparing birthmarks of software can tell us whether a program or software is a copy of another. Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. The estimation of birthmark can play a key role in understanding the effectiveness of a birthmark. In this paper, a new technique is presented to evaluate and estimate software birthmark based on the two most sought-after properties of birthmarks, that is, credibility and resilience. For this purpose, the concept of soft computing such as probabilistic and fuzzy computing has been taken into account and fuzzy logic is used to estimate properties of birthmark. The proposed fuzzy rule based technique is validated through a case study and the results show that the technique is successful in assessing the specified properties of the birthmark, its resilience and credibility. This, in turn, shows how much effort will be required to detect the originality of the software based on its birthmark.


Energies ◽  
2021 ◽  
Vol 14 (4) ◽  
pp. 1049
Author(s):  
Zhang Deng ◽  
Yixing Chen ◽  
Xiao Pan ◽  
Zhiwen Peng ◽  
Jingjing Yang

Urban building energy modeling (UBEM) is arousing interest in building energy modeling, which requires a large building dataset as an input. Building use is a critical parameter to infer archetype buildings for UBEM. This paper presented a case study to determine building use for city-scale buildings by integrating the Geographic Information System (GIS) based point-of-interest (POI) and community boundary datasets. A total of 68,966 building footprints, 281,767 POI data, and 3367 community boundaries were collected for Changsha, China. The primary building use was determined when a building was inside a community boundary (i.e., hospital or residential boundary) or the building contained POI data with main attributes (i.e., hotel or office building). Clustering analysis was used to divide buildings into sub-types for better energy performance evaluation. The method successfully identified building uses for 47,428 buildings among 68,966 building footprints, including 34,401 residential buildings, 1039 office buildings, 141 shopping malls, and 932 hotels. A validation process was carried out for 7895 buildings in the downtown area, which showed an overall accuracy rate of 86%. A UBEM case study for 243 office buildings in the downtown area was developed with the information identified from the POI and community boundary datasets. The proposed building use determination method can be easily applied to other cities. We will integrate the historical aerial imagery to determine the year of construction for a large scale of buildings in the future.


Sign in / Sign up

Export Citation Format

Share Document