Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,886)
  • Open Access

    ARTICLE

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

    Yu Zhang*, Lianmin Li, Zhongxiang Liu, Yuhu Wu

    Energy Engineering, Vol.121, No.5, pp. 1209-1221, 2024, DOI:10.32604/ee.2024.046141

    Abstract With the development of renewable energy technologies such as photovoltaics and wind power, it has become a research hotspot to improve the consumption rate of new energy and reduce energy costs through the deployment of energy storage. To solve the problem of the interests of different subjects in the operation of the energy storage power stations (ESS) and the integrated energy multi-microgrid alliance (IEMA), this paper proposes the optimization operation method of the energy storage power station and the IEMA based on the Stackelberg game. In the upper layer, ESS optimizes charging and discharging decisions through a dynamic pricing mechanism.… More > Graphic Abstract

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

  • Open Access

    ARTICLE

    Desired Dynamic Equation for Primary Frequency Modulation Control of Gas Turbines

    Aimin Gao1, Xiaobo Cui2,*, Guoqiang Yu1, Jianjun Shu1, Tianhai Zhang1

    Energy Engineering, Vol.121, No.5, pp. 1347-1361, 2024, DOI:10.32604/ee.2023.045805

    Abstract Gas turbines play core roles in clean energy supply and the construction of comprehensive energy systems. The control performance of primary frequency modulation of gas turbines has a great impact on the frequency control of the power grid. However, there are some control difficulties in the primary frequency modulation control of gas turbines, such as the coupling effect of the fuel control loop and speed control loop, slow tracking speed, and so on. To relieve the abovementioned difficulties, a control strategy based on the desired dynamic equation proportional integral (DDE-PI) is proposed in this paper. Based on the parameter stability… More >

  • Open Access

    ARTICLE

    A Hybrid Level Set Optimization Design Method of Functionally Graded Cellular Structures Considering Connectivity

    Yan Dong1,2, Kang Zhao1, Liang Gao1, Hao Li1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1-18, 2024, DOI:10.32604/cmc.2024.048870

    Abstract With the continuous advancement in topology optimization and additive manufacturing (AM) technology, the capability to fabricate functionally graded materials and intricate cellular structures with spatially varying microstructures has grown significantly. However, a critical challenge is encountered in the design of these structures–the absence of robust interface connections between adjacent microstructures, potentially resulting in diminished efficiency or macroscopic failure. A Hybrid Level Set Method (HLSM) is proposed, specifically designed to enhance connectivity among non-uniform microstructures, contributing to the design of functionally graded cellular structures. The HLSM introduces a pioneering algorithm for effectively blending heterogeneous microstructure interfaces. Initially, an interpolation algorithm is… More >

  • Open Access

    ARTICLE

    Efficient Unsupervised Image Stitching Using Attention Mechanism with Deep Homography Estimation

    Chunbin Qin*, Xiaotian Ran

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1319-1334, 2024, DOI:10.32604/cmc.2024.048850

    Abstract Traditional feature-based image stitching techniques often encounter obstacles when dealing with images lacking unique attributes or suffering from quality degradation. The scarcity of annotated datasets in real-life scenes severely undermines the reliability of supervised learning methods in image stitching. Furthermore, existing deep learning architectures designed for image stitching are often too bulky to be deployed on mobile and peripheral computing devices. To address these challenges, this study proposes a novel unsupervised image stitching method based on the YOLOv8 (You Only Look Once version 8) framework that introduces deep homography networks and attention mechanisms. The methodology is partitioned into three distinct… More >

  • Open Access

    ARTICLE

    Alternative Method of Constructing Granular Neural Networks

    Yushan Yin1, Witold Pedrycz1,2, Zhiwu Li1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 623-650, 2024, DOI:10.32604/cmc.2024.048787

    Abstract Utilizing granular computing to enhance artificial neural network architecture, a new type of network emerges—the granular neural network (GNN). GNNs offer distinct advantages over their traditional counterparts: The ability to process both numerical and granular data, leading to improved interpretability. This paper proposes a novel design method for constructing GNNs, drawing inspiration from existing interval-valued neural networks built upon NNNs. However, unlike the proposed algorithm in this work, which employs interval values or triangular fuzzy numbers for connections, existing methods rely on a pre-defined numerical network. This new method utilizes a uniform distribution of information granularity to granulate connections with… More >

  • Open Access

    ARTICLE

    On Multi-Granulation Rough Sets with Its Applications

    Radwan Abu-Gdairi1, R. Mareay2,*, M. Badr3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1025-1038, 2024, DOI:10.32604/cmc.2024.048647

    Abstract Recently, much interest has been given to multi-granulation rough sets (MGRS), and various types of MGRS models have been developed from different viewpoints. In this paper, we introduce two techniques for the classification of MGRS. Firstly, we generate multi-topologies from multi-relations defined in the universe. Hence, a novel approximation space is established by leveraging the underlying topological structure. The characteristics of the newly proposed approximation space are discussed. We introduce an algorithm for the reduction of multi-relations. Secondly, a new approach for the classification of MGRS based on neighborhood concepts is introduced. Finally, a real-life application from medical records is… More >

  • Open Access

    ARTICLE

    Anomaly Detection Algorithm of Power System Based on Graph Structure and Anomaly Attention

    Yifan Gao*, Jieming Zhang, Zhanchen Chen, Xianchao Chen

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 493-507, 2024, DOI:10.32604/cmc.2024.048615

    Abstract In this paper, we propose a novel anomaly detection method for data centers based on a combination of graph structure and abnormal attention mechanism. The method leverages the sensor monitoring data from target power substations to construct multidimensional time series. These time series are subsequently transformed into graph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matrices and additional weights associated with the graph structure, an aggregation matrix is derived. The aggregation matrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features. Moreover, both the multidimensional time series segments and… More >

  • Open Access

    ARTICLE

    HCSP-Net: A Novel Model of Age-Related Macular Degeneration Classification Based on Color Fundus Photography

    Cheng Wan1, Jiani Zhao1, Xiangqian Hong2, Weihua Yang2,*, Shaochong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 391-407, 2024, DOI:10.32604/cmc.2024.048307

    Abstract Age-related macular degeneration (AMD) ranks third among the most common causes of blindness. As the most conventional and direct method for identifying AMD, color fundus photography has become prominent owing to its consistency, ease of use, and good quality in extensive clinical practice. In this study, a convolutional neural network (CSPDarknet53) was combined with a transformer to construct a new hybrid model, HCSP-Net. This hybrid model was employed to tri-classify color fundus photography into the normal macula (NM), dry macular degeneration (DMD), and wet macular degeneration (WMD) based on clinical classification manifestations, thus identifying and resolving AMD as early as… More >

  • Open Access

    ARTICLE

    Intelligent Machine Learning Based Brain Tumor Segmentation through Multi-Layer Hybrid U-Net with CNN Feature Integration

    Sharaf J. Malebary*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1301-1317, 2024, DOI:10.32604/cmc.2024.047917

    Abstract Brain tumors are a pressing public health concern, characterized by their high mortality and morbidity rates. Nevertheless, the manual segmentation of brain tumors remains a laborious and error-prone task, necessitating the development of more precise and efficient methodologies. To address this formidable challenge, we propose an advanced approach for segmenting brain tumor Magnetic Resonance Imaging (MRI) images that harnesses the formidable capabilities of deep learning and convolutional neural networks (CNNs). While CNN-based methods have displayed promise in the realm of brain tumor segmentation, the intricate nature of these tumors, marked by irregular shapes, varying sizes, uneven distribution, and limited available… More >

  • Open Access

    REVIEW

    Internet of Things Authentication Protocols: Comparative Study

    Souhayla Dargaoui1, Mourade Azrour1,*, Ahmad El Allaoui1, Azidine Guezzaz2, Abdulatif Alabdulatif3, Abdullah Alnajim4

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 65-91, 2024, DOI:10.32604/cmc.2024.047625

    Abstract Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still the biggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures, data, and devices. Authentication, as the first line of defense against security threats, becomes the priority of everyone. It can either grant or deny users access to resources according… More >

Displaying 1-10 on page 1 of 2886. Per Page