Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,809)
  • Open Access

    ARTICLE

    Mitigating Carbon Emissions: A Comprehensive Analysis of Transitioning to Hydrogen-Powered Plants in Japan’s Energy Landscape Post-Fukushima

    Nugroho Agung Pambudi1,2,4,*, Andrew Chapman, Alfan Sarifudin1,3, Desita Kamila Ulfa4, Iksan Riva Nanda5

    Energy Engineering, Vol.121, No.5, pp. 1143-1159, 2024, DOI:10.32604/ee.2024.047555

    Abstract One of the impacts of the Fukushima disaster was the shutdown of all nuclear power plants in Japan, reaching zero production in 2015. In response, the country started importing more fossil energy including coal, oil, and natural gas to fill the energy gap. However, this led to a significant increase in carbon emissions, hindering the efforts to reduce its carbon footprint. In the current situation, Japan is actively working to balance its energy requirements with environmental considerations, including the utilization of hydrogen fuel. Therefore, this paper aims to explore the feasibility and implications of using hydrogen power plants as a… More >

  • Open Access

    ARTICLE

    A Compact UHF Antenna Based on Hilbert Fractal Elements and a Serpentine Arrangement for Detecting Partial Discharge

    Xiang Lin1,*, Jian Fang1, Ming Zhang1, Kuang Yin1, Yan Tian1, Yingfei Guo2, Qianggang Wang2

    Energy Engineering, Vol.121, No.5, pp. 1127-1141, 2024, DOI:10.32604/ee.2024.046861

    Abstract Efforts to protect electric power systems from faults have commonly relied on the use of ultra-high frequency (UHF) antennas for detecting partial discharge (PD) as a common precursor to faults. However, the effectiveness of existing UHF antennas suffers from a number of challenges such as limited bandwidth, relatively large physical size, and low detection sensitivity. The present study addresses these issues by proposing a compact microstrip patch antenna with fixed dimensions of 100 mm × 100 mm × 1.6 mm. The results of computations yield an optimized antenna design consisting of 2nd-order Hilbert fractal units positioned within a four-layer serpentine… More > Graphic Abstract

    A Compact UHF Antenna Based on Hilbert Fractal Elements and a Serpentine Arrangement for Detecting Partial Discharge

  • Open Access

    ARTICLE

    Weather-Driven Solar Power Forecasting Using D-Informer: Enhancing Predictions with Climate Variables

    Chenglian Ma1, Rui Han1, Zhao An2,*, Tianyu Hu2, Meizhu Jin2

    Energy Engineering, Vol.121, No.5, pp. 1245-1261, 2024, DOI:10.32604/ee.2024.046644

    Abstract Precise forecasting of solar power is crucial for the development of sustainable energy systems. Contemporary forecasting approaches often fail to adequately consider the crucial role of weather factors in photovoltaic (PV) power generation and encounter issues such as gradient explosion or disappearance when dealing with extensive time-series data. To overcome these challenges, this research presents a cutting-edge, multi-stage forecasting method called D-Informer. This method skillfully merges the differential transformation algorithm with the Informer model, leveraging a detailed array of meteorological variables and historical PV power generation records. The D-Informer model exhibits remarkable superiority over competing models across multiple performance metrics,… More > Graphic Abstract

    Weather-Driven Solar Power Forecasting Using D-Informer: Enhancing Predictions with Climate Variables

  • Open Access

    ARTICLE

    Research on the Method of Heat Preservation and Heating for the Drilling System of Polar Offshore Drilling Platform

    Yingkai Dong1,2, Chaohe Chen2,*, Guangyan Jia2, Lidai Wang3, Jian Bai1

    Energy Engineering, Vol.121, No.5, pp. 1173-1193, 2024, DOI:10.32604/ee.2024.046432

    Abstract This study investigates the heat dissipation mechanism of the insulation layer and other plane insulation layers in the polar drilling rig system. Combining the basic theory of heat transfer with the environmental requirements of polar drilling operations and the characteristics of polar drilling processes, we analyze the factors that affect the insulation effect of the drilling rig system. These factors include the thermal conductivity of the insulation material, the thickness of the insulation layer, ambient temperature, and wind speed. We optimize the thermal insulation material of the polar drilling rig system using a steady-state method to measure solid thermal conductivity.… More >

  • Open Access

    ARTICLE

    Perpendicular-Cutdepth: Perpendicular Direction Depth Cutting Data Augmentation Method

    Le Zou1, Linsong Hu1, Yifan Wang1, Zhize Wu2, Xiaofeng Wang1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 927-941, 2024, DOI:10.32604/cmc.2024.048889

    Abstract Depth estimation is an important task in computer vision. Collecting data at scale for monocular depth estimation is challenging, as this task requires simultaneously capturing RGB images and depth information. Therefore, data augmentation is crucial for this task. Existing data augmentation methods often employ pixel-wise transformations, which may inadvertently disrupt edge features. In this paper, we propose a data augmentation method for monocular depth estimation, which we refer to as the Perpendicular-Cutdepth method. This method involves cutting real-world depth maps along perpendicular directions and pasting them onto input images, thereby diversifying the data without compromising edge features. To validate the… More >

  • Open Access

    ARTICLE

    Alternative Method of Constructing Granular Neural Networks

    Yushan Yin1, Witold Pedrycz1,2, Zhiwu Li1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 623-650, 2024, DOI:10.32604/cmc.2024.048787

    Abstract Utilizing granular computing to enhance artificial neural network architecture, a new type of network emerges—the granular neural network (GNN). GNNs offer distinct advantages over their traditional counterparts: The ability to process both numerical and granular data, leading to improved interpretability. This paper proposes a novel design method for constructing GNNs, drawing inspiration from existing interval-valued neural networks built upon NNNs. However, unlike the proposed algorithm in this work, which employs interval values or triangular fuzzy numbers for connections, existing methods rely on a pre-defined numerical network. This new method utilizes a uniform distribution of information granularity to granulate connections with… More >

  • Open Access

    ARTICLE

    Sepsis Prediction Using CNNBDLSTM and Temporal Derivatives Feature Extraction in the IoT Medical Environment

    Sapiah Sakri1, Shakila Basheer1, Zuhaira Muhammad Zain1, Nurul Halimatul Asmak Ismail2,*, Dua’ Abdellatef Nassar1, Manal Abdullah Alohali1, Mais Ayman Alharaki1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1157-1185, 2024, DOI:10.32604/cmc.2024.048051

    Abstract Background: Sepsis, a potentially fatal inflammatory disease triggered by infection, carries significant health implications worldwide. Timely detection is crucial as sepsis can rapidly escalate if left undetected. Recent advancements in deep learning (DL) offer powerful tools to address this challenge. Aim: Thus, this study proposed a hybrid CNNBDLSTM, a combination of a convolutional neural network (CNN) with a bi-directional long short-term memory (BDLSTM) model to predict sepsis onset. Implementing the proposed model provides a robust framework that capitalizes on the complementary strengths of both architectures, resulting in more accurate and timelier predictions. Method: The sepsis prediction method proposed here utilizes… More >

  • Open Access

    ARTICLE

    Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble

    Amardeep Singh1, Hamad Ali Abosaq2, Saad Arif3, Zohaib Mushtaq4,*, Muhammad Irfan5, Ghulam Abbas6, Arshad Ali7, Alanoud Al Mazroa8

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 857-873, 2024, DOI:10.32604/cmc.2024.048036

    Abstract Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries, especially in light of the growing number of cybersecurity threats. A major and ever-present threat is Ransomware-as-a-Service (RaaS) assaults, which enable even individuals with minimal technical knowledge to conduct ransomware operations. This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models. For this purpose, the network intrusion detection dataset “UNSW-NB15” from the Intelligent Security Group of the University of New South Wales, Australia is analyzed. In the initial phase, the rectified linear… More >

  • Open Access

    ARTICLE

    Smartphone-Based Wi-Fi Analysis for Bus Passenger Counting

    Mohammed Alatiyyah*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 875-907, 2024, DOI:10.32604/cmc.2024.047790

    Abstract In the contemporary era of technological advancement, smartphones have become an indispensable part of individuals’ daily lives, exerting a pervasive influence. This paper presents an innovative approach to passenger counting on buses through the analysis of Wi-Fi signals emanating from passengers’ mobile devices. The study seeks to scrutinize the reliability of digital Wi-Fi environments in predicting bus occupancy levels, thereby addressing a crucial aspect of public transportation. The proposed system comprises three crucial elements: Signal capture, data filtration, and the calculation and estimation of passenger numbers. The pivotal findings reveal that the system demonstrates commendable accuracy in estimating passenger counts… More >

  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This means that while attempting to… More >

Displaying 1-10 on page 1 of 3809. Per Page