Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    PROCEEDINGS

    Source-Sink Matching Model Focusing on the Feasibility of CO2 Pipeline Transport

    Yubo Jiao1, Wei Wang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.3, pp. 1-1, 2024, DOI:10.32604/icces.2024.011157

    Abstract The source-sink matching optimization problem is one of the more important aspects of carbon capture and storage (CCS) system planning studies, and a large number of studies have been conducted using mathematical modeling to assess the feasibility of deployment in the planning region, thus providing important decision support. A framework of optimization system applicable to source-sink matching analysis was constructed based on the structural relationship between directly connected sources and sinks, taking into account multiple factors (transport characteristics, CO2 injection rate and connection period, etc.), which can ensure the feasibility of CO2 pipeline transportation operation and… More >

  • Open Access

    ARTICLE

    Ethical Decision-Making Framework Based on Incremental ILP Considering Conflicts

    Xuemin Wang, Qiaochen Li, Xuguang Bao*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3619-3643, 2024, DOI:10.32604/cmc.2024.047586 - 26 March 2024

    Abstract Humans are experiencing the inclusion of artificial agents in their lives, such as unmanned vehicles, service robots, voice assistants, and intelligent medical care. If the artificial agents cannot align with social values or make ethical decisions, they may not meet the expectations of humans. Traditionally, an ethical decision-making framework is constructed by rule-based or statistical approaches. In this paper, we propose an ethical decision-making framework based on incremental ILP (Inductive Logic Programming), which can overcome the brittleness of rule-based approaches and little interpretability of statistical approaches. As the current incremental ILP makes it difficult to… More >

  • Open Access

    ARTICLE

    Knowledge-Based Efficient N-1 Analysis Calculation Method for Urban Distribution Networks with CIM File Data

    Lingyu Liang1, Xiangyu Zhao1,*, Wenqi Huang1, Liming Sun2,3, Ziyao Wang3, Yaosen Zhan2

    Energy Engineering, Vol.120, No.12, pp. 2839-2856, 2023, DOI:10.32604/ee.2023.042042 - 29 November 2023

    Abstract The N-1 criterion is a critical factor for ensuring the reliable and resilient operation of electric power distribution networks. However, the increasing complexity of distribution networks and the associated growth in data size have created a significant challenge for distribution network planners. To address this issue, we propose a fast N-1 verification procedure for urban distribution networks that combines CIM file data analysis with MILP-based mathematical modeling. Our proposed method leverages the principles of CIM file analysis for distribution network N-1 analysis. We develop a mathematical model of distribution networks based on CIM data and… More >

  • Open Access

    ARTICLE

    Energy-Efficient UAVs Coverage Path Planning Approach

    Gamil Ahmed1, Tarek Sheltami1,*, Ashraf Mahmoud1, Ansar Yasar2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 3239-3263, 2023, DOI:10.32604/cmes.2023.022860 - 09 March 2023

    Abstract Unmanned aerial vehicles (UAVs), commonly known as drones, have drawn significant consideration thanks to their agility, mobility, and flexibility features. They play a crucial role in modern reconnaissance, inspection, intelligence, and surveillance missions. Coverage path planning (CPP) which is one of the crucial aspects that determines an intelligent system’s quality seeks an optimal trajectory to fully cover the region of interest (ROI). However, the flight time of the UAV is limited due to a battery limitation and may not cover the whole region, especially in large region. Therefore, energy consumption is one of the most… More >

  • Open Access

    ARTICLE

    Energy Management of Networked Smart Railway Stations Considering Regenerative Braking, Energy Storage System, and Photovoltaic Units

    Saeed Akbari1, Seyed Saeed Fazel1,*, Hamed Hashemi-Dezaki2,3

    Energy Engineering, Vol.120, No.1, pp. 69-86, 2023, DOI:10.32604/ee.2022.024121 - 27 October 2022

    Abstract The networking of microgrids has received significant attention in the form of a smart grid. In this paper, a set of smart railway stations, which is assumed as microgrids, is connected together. It has been tried to manage the energy exchanged between the networked microgrids to reduce received energy from the utility grid. Also, the operational costs of stations under various conditions decrease by applying the proposed method. The smart railway stations are studied in the presence of photovoltaic (PV) units, energy storage systems (ESSs), and regenerative braking strategies. Studying regenerative braking is one of… More > Graphic Abstract

    Energy Management of Networked Smart Railway Stations Considering Regenerative Braking, Energy Storage System, and Photovoltaic Units

  • Open Access

    ARTICLE

    Randomized MILP framework for Securing Virtual Machines from Malware Attacks

    R. Mangalagowri1,*, Revathi Venkataraman2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1565-1580, 2023, DOI:10.32604/iasc.2023.026360 - 19 July 2022

    Abstract Cloud computing involves remote server deployments with public network infrastructures that allow clients to access computational resources. Virtual Machines (VMs) are supplied on requests and launched without interactions from service providers. Intruders can target these servers and establish malicious connections on VMs for carrying out attacks on other clustered VMs. The existing system has issues with execution time and false-positive rates. Hence, the overall system performance is degraded considerably. The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target… More >

  • Open Access

    ARTICLE

    Efficient Heuristic for Optimal MILP-LoRa Adaptive Resource Allocation for Aquaculture

    M. Iniyan Arasu1,*, S. Subha Rani1, G. Raswin Geoffery2

    Intelligent Automation & Soft Computing, Vol.33, No.2, pp. 729-742, 2022, DOI:10.32604/iasc.2022.021973 - 08 February 2022

    Abstract LoRa is well-known for its extensive communication range, inexpensive efficiency, and reduced or less power consumption in end devices. End-device energy consumption in LoRa networks is ludicrous because some end-devices use massive dissemination variables to reach the remote doorway. Furthermore, the batteries in these end devices deplete very quickly, reducing network life significantly. To address this issue, an optimal mixed-integer linear programming long-range technique (OMILP-LoRa) was used in this study. The primary goal of this research is to enable adaptive resource allocation using the unique OMILP-LoRa protocol. The ACCURATE heuristic and the OMILP model for More >

  • Open Access

    ARTICLE

    Multifunction Battery Energy Storage System for Distribution Networks

    Omar H. Abdalla1,*, Gamal Abdel-Salam2, Azza A. A. Mostafa3

    Energy Engineering, Vol.119, No.2, pp. 569-589, 2022, DOI:10.32604/ee.2022.018693 - 24 January 2022

    Abstract Battery Energy Storage System (BESS) is one of the potential solutions to increase energy system flexibility, as BESS is well suited to solve many challenges in transmission and distribution networks. Examples of distribution network’s challenges, which affect network performance, are: (i) Load disconnection or technical constraints violation, which may happen during reconfiguration after fault, (ii) Unpredictable power generation change due to Photovoltaic (PV) penetration, (iii) Undesirable PV reverse power, and (iv) Low Load Factor (LF) which may affect electricity price. In this paper, the BESS is used to support distribution networks in reconfiguration after a… More >

  • Open Access

    ARTICLE

    Knowledge Mapping of Opuntia Milpa Alta Since 1998: A Scientometric Analysis

    Meixiang Chen1, Hong Yang1, Zhengda Song1, Yonghua Gu1,#,*, Yuhong Zheng1,2, Jiangwei Zhu3, Aiwu Wang4, Li Fu5,#,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.5, pp. 1507-1518, 2021, DOI:10.32604/phyton.2021.015723 - 27 May 2021

    Abstract Opuntia Milpa Alta is a cactus cultivated, domesticated, hybridized and selected from the plant Opuntia ficus-indica by Mexican agricultural experts, which can be used as fruit and vegetable. Opuntia Milpa Alta leaves and fruit are superior to wild varieties and suitable for storage and transportation. In 1998, Opuntia Milpa Alta was introduced to China from Mexico by the Quality Product Development Center of the Ministry of Agriculture of China. Up to now, the Opuntia Milpa Alta has been cultivated on a certain scale in China. This study aims to identify the research progress and development trends… More >

  • Open Access

    ARTICLE

    Automated Controller Placement for Software-Defined Networks to Resist DDoS Attacks

    Muhammad Reazul Haque1, Saw Chin Tan1, Zulfadzli Yusoff2,*, Kashif Nisar3,5,6, Lee Ching Kwang2,7, Rizaludin Kaspin4, Bhawani Shankar Chowdhry5, Rajkumar Buyya8, Satya Prasad Majumder9, Manoj Gupta10, Shuaib Memon11

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3147-3165, 2021, DOI:10.32604/cmc.2021.016591 - 06 May 2021

    Abstract In software-defined networks (SDNs), controller placement is a critical factor in the design and planning for the future Internet of Things (IoT), telecommunication, and satellite communication systems. Existing research has concentrated largely on factors such as reliability, latency, controller capacity, propagation delay, and energy consumption. However, SDNs are vulnerable to distributed denial of service (DDoS) attacks that interfere with legitimate use of the network. The ever-increasing frequency of DDoS attacks has made it necessary to consider them in network design, especially in critical applications such as military, health care, and financial services networks requiring high… More >

Displaying 1-10 on page 1 of 14. Per Page