Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    Application of DSAPSO Algorithm in Distribution Network Reconfiguration with Distributed Generation

    Caixia Tao, Shize Yang*, Taiguo Li

    Energy Engineering, Vol.121, No.1, pp. 187-201, 2024, DOI:10.32604/ee.2023.042421

    Abstract With the current integration of distributed energy resources into the grid, the structure of distribution networks is becoming more complex. This complexity significantly expands the solution space in the optimization process for network reconstruction using intelligent algorithms. Consequently, traditional intelligent algorithms frequently encounter insufficient search accuracy and become trapped in local optima. To tackle this issue, a more advanced particle swarm optimization algorithm is proposed. To address the varying emphases at different stages of the optimization process, a dynamic strategy is implemented to regulate the social and self-learning factors. The Metropolis criterion is introduced into the simulated annealing algorithm to… More >

  • Open Access

    ARTICLE

    Accelerating Falcon Post-Quantum Digital Signature Algorithm on Graphic Processing Units

    Seog Chung Seo1, Sang Woo An2, Dooho Choi3,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1963-1980, 2023, DOI:10.32604/cmc.2023.033910

    Abstract Since 2016, the National Institute of Standards and Technology (NIST) has been performing a competition to standardize post-quantum cryptography (PQC). Although Falcon has been selected in the competition as one of the standard PQC algorithms because of its advantages in short key and signature sizes, its performance overhead is larger than that of other lattice-based cryptosystems. This study presents multiple methodologies to accelerate the performance of Falcon using graphics processing units (GPUs) for server-side use. Direct GPU porting significantly degrades performance because the Falcon reference codes require recursive functions in its sampling process. Thus, an iterative sampling approach for efficient… More >

  • Open Access

    ARTICLE

    Smart Techniques for LULC Micro Class Classification Using Landsat8 Imagery

    Mutiullah Jamil1, Hafeez ul Rehman1, SaleemUllah1, Imran Ashraf2,*, Saqib Ubaid1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5545-5557, 2023, DOI:10.32604/cmc.2023.033449

    Abstract Wheat species play important role in the price of products and wheat production estimation. There are several mathematical models used for the estimation of the wheat crop but these models are implemented without considering the wheat species which is an important independent variable. The task of wheat species identification is challenging both for human experts as well as for computer vision-based solutions. With the use of satellite remote sensing, it is possible to identify and monitor wheat species on a large scale at any stage of the crop life cycle. In this work, nine popular wheat species are identified by… More >

  • Open Access

    ARTICLE

    DSAFF-Net: A Backbone Network Based on Mask R-CNN for Small Object Detection

    Jian Peng1,2, Yifang Zhao1,2, Dengyong Zhang1,2,*, Feng Li1,2, Arun Kumar Sangaiah3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3405-3419, 2023, DOI:10.32604/cmc.2023.027627

    Abstract Recently, object detection based on convolutional neural networks (CNNs) has developed rapidly. The backbone networks for basic feature extraction are an important component of the whole detection task. Therefore, we present a new feature extraction strategy in this paper, which name is DSAFF-Net. In this strategy, we design: 1) a sandwich attention feature fusion module (SAFF module). Its purpose is to enhance the semantic information of shallow features and resolution of deep features, which is beneficial to small object detection after feature fusion. 2) to add a new stage called D-block to alleviate the disadvantages of decreasing spatial resolution when… More >

  • Open Access

    ARTICLE

    Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

    S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690

    Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured… More >

  • Open Access

    ARTICLE

    A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

    Mouna Bedoui1,*, Belgacem Bouallegue1,2, Abdelmoty M. Ahmed2, Belgacem Hamdi1,3, Mohsen Machhout1, Mahmoud1, M. Khattab2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2177-2193, 2023, DOI:10.32604/csse.2023.026516

    Abstract Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against… More >

  • Open Access

    ARTICLE

    Cache Memory Design for Single Bit Architecture with Different Sense Amplifiers

    Reeya Agrawal1,*, Anjan Kumar1, Salman A. AlQahtani2, Mashael Maashi3, Osamah Ibrahim Khalaf4, Theyazn H. H. Aldhyani5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2313-2331, 2022, DOI:10.32604/cmc.2022.029019

    Abstract Most modern microprocessors have one or two levels of on-chip caches to make things run faster, but this is not always the case. Most of the time, these caches are made of static random access memory cells. They take up a lot of space on the chip and use a lot of electricity. A lot of the time, low power is more important than several aspects. This is true for phones and tablets. Cache memory design for single bit architecture consists of six transistors static random access memory cell, a circuit of write driver, and sense amplifiers (such as voltage… More >

  • Open Access

    ARTICLE

    Preserving Data Confidentiality in Association Rule Mining Using Data Share Allocator Algorithm

    D. Dhinakaran1,*, P. M. Joe Prathap2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1877-1892, 2022, DOI:10.32604/iasc.2022.024509

    Abstract These days, investigations of information are becoming essential for various associations all over the globe. By and large, different associations need to perform information examinations on their joined data sets. Privacy and security have become a relentless concern wherein business experts do not desire to contribute their classified transaction data. Therefore, there is a requirement to build a proficient methodology that can process the broad mixture of data and convert those data into meaningful knowledge to the user without forfeiting the security and privacy of individuals’ crude information. We devised two unique protocols for frequent mining itemsets in horizontally partitioned… More >

  • Open Access

    ARTICLE

    Better Match, Better Career: Comparing the Mediating Effects of DemandsAbilities Fit and Needs-Supplies Fit between Career Exploration and Career Satisfaction

    Lu Xin1, Mengyi Li2,*, Fangcheng Tang1, Wenxi Wang3, Ying Zhao4, Xiaotong Zheng5

    International Journal of Mental Health Promotion, Vol.21, No.2, pp. 59-68, 2019, DOI:10.32604/IJMHP.2019.010832

    Abstract In the boundaryless career era, employees tend to focus on their own needs and what they can obtain from jobs to make wise career choices and achieve a high level of career satisfaction. Using a sample of 230 Chinese employees, this study investigated the mediating effect of demands-abilities fit and needs-supplies fit in the relationship between career exploration and career satisfaction and compared the mediating effects of these two types of person-job fit. This study found that: 1) employees could achieve a higher level of career satisfaction by conducting more career exploration behaviors; 2) both demands-abilities fit and needs-supplies fit… More >

  • Open Access

    ARTICLE

    Numerical Simulation of the Aeroacoustic Performance of the DSA380 High-Speed Pantograph Under the Influence of a Crosswind

    Yadong Zhang1, *, Jiye Zhang2

    FDMP-Fluid Dynamics & Materials Processing, Vol.16, No.1, pp. 105-120, 2020, DOI:10.32604/fdmp.2020.07959

    Abstract The object of research of this paper is the DSA380 high-speed pantograph. The near-field unsteady flow around the pantograph was investigated using large eddy simulation (LES) while the far-field aerodynamic noise was analysed in the frame of the Ffowcs Williams-Hawkings (FW-H) acoustic analogy. According to the results, the contact strip, base frame and knuckle are the main aerodynamic noise sources, with vortex shedding, flow separation and recombination around the pantograph being related key physical factors. The aerodynamic noise radiates outwards in the form of spherical waves when the distance of the noise receiving point is farther than 8 m. The… More >

Displaying 1-10 on page 1 of 11. Per Page