Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (43)
  • Open Access

    ARTICLE

    Physics-Constrained Robustness Enhancement for Tree Ensembles Applied in Smart Grid

    Zhibo Yang, Xiaohan Huang, Bingdong Wang, Bin Hu, Zhenyong Zhang*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3001-3019, 2024, DOI:10.32604/cmc.2024.053369 - 15 August 2024

    Abstract With the widespread use of machine learning (ML) technology, the operational efficiency and responsiveness of power grids have been significantly enhanced, allowing smart grids to achieve high levels of automation and intelligence. However, tree ensemble models commonly used in smart grids are vulnerable to adversarial attacks, making it urgent to enhance their robustness. To address this, we propose a robustness enhancement method that incorporates physical constraints into the node-splitting decisions of tree ensembles. Our algorithm improves robustness by developing a dataset of adversarial examples that comply with physical laws, ensuring training data accurately reflects possible More >

  • Open Access

    ARTICLE

    A Constrained Local Neighborhood Approach for Efficient Markov Blanket Discovery in Undirected Independent Graphs

    Kun Liu1,2, Peiran Li3, Yu Zhang1,*, Jia Ren1, Ming Li4, Xianyu Wang2, Cong Li2

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2535-2555, 2024, DOI:10.32604/cmc.2024.052166 - 15 August 2024

    Abstract When learning the structure of a Bayesian network, the search space expands significantly as the network size and the number of nodes increase, leading to a noticeable decrease in algorithm efficiency. Traditional constraint-based methods typically rely on the results of conditional independence tests. However, excessive reliance on these test results can lead to a series of problems, including increased computational complexity and inaccurate results, especially when dealing with large-scale networks where performance bottlenecks are particularly evident. To overcome these challenges, we propose a Markov blanket discovery algorithm based on constrained local neighborhoods for constructing undirected… More >

  • Open Access

    ARTICLE

    Transient Stability Preventive Control of Wind Farm Connected Power System Considering the Uncertainty

    Yuping Bian*, Xiu Wan, Xiaoyu Zhou

    Energy Engineering, Vol.121, No.6, pp. 1637-1656, 2024, DOI:10.32604/ee.2024.047678 - 21 May 2024

    Abstract To address uncertainty as well as transient stability constraints simultaneously in the preventive control of wind farm systems, a novel three-stage optimization strategy is established in this paper. In the first stage, the probabilistic multi-objective particle swarm optimization based on the point estimate method is employed to cope with the stochastic factors. The transient security region of the system is accurately ensured by the interior point method in the second stage. Finally, the verification of the final optimal objectives and satisfied constraints are enforced in the last stage. Furthermore, the proposed strategy is a general More >

  • Open Access

    ARTICLE

    Safety-Constrained Multi-Agent Reinforcement Learning for Power Quality Control in Distributed Renewable Energy Networks

    Yongjiang Zhao, Haoyi Zhong, Chang Cyoon Lim*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 449-471, 2024, DOI:10.32604/cmc.2024.048771 - 25 April 2024

    Abstract This paper examines the difficulties of managing distributed power systems, notably due to the increasing use of renewable energy sources, and focuses on voltage control challenges exacerbated by their variable nature in modern power grids. To tackle the unique challenges of voltage control in distributed renewable energy networks, researchers are increasingly turning towards multi-agent reinforcement learning (MARL). However, MARL raises safety concerns due to the unpredictability in agent actions during their exploration phase. This unpredictability can lead to unsafe control measures. To mitigate these safety concerns in MARL-based voltage control, our study introduces a novel… More >

  • Open Access

    ARTICLE

    Adaptive Segmentation for Unconstrained Iris Recognition

    Mustafa AlRifaee1, Sally Almanasra2,*, Adnan Hnaif3, Ahmad Althunibat3, Mohammad Abdallah3, Thamer Alrawashdeh3

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1591-1609, 2024, DOI:10.32604/cmc.2023.043520 - 27 February 2024

    Abstract In standard iris recognition systems, a cooperative imaging framework is employed that includes a light source with a near-infrared wavelength to reveal iris texture, look-and-stare constraints, and a close distance requirement to the capture device. When these conditions are relaxed, the system’s performance significantly deteriorates due to segmentation and feature extraction problems. Herein, a novel segmentation algorithm is proposed to correctly detect the pupil and limbus boundaries of iris images captured in unconstrained environments. First, the algorithm scans the whole iris image in the Hue Saturation Value (HSV) color space for local maxima to detect… More >

  • Open Access

    REVIEW

    A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices

    Sunil Kumar1, Dilip Kumar1, Ramraj Dangi2, Gaurav Choudhary3, Nicola Dragoni4, Ilsun You5,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 31-63, 2024, DOI:10.32604/cmc.2023.047084 - 30 January 2024

    Abstract The widespread and growing interest in the Internet of Things (IoT) may be attributed to its usefulness in many different fields. Physical settings are probed for data, which is then transferred via linked networks. There are several hurdles to overcome when putting IoT into practice, from managing server infrastructure to coordinating the use of tiny sensors. When it comes to deploying IoT, everyone agrees that security is the biggest issue. This is due to the fact that a large number of IoT devices exist in the physical world and that many of them have constrained More >

  • Open Access

    ARTICLE

    Rules Mining-Based Gene Expression Programming for the Multi-Skill Resource Constrained Project Scheduling Problem

    Min Hu1,2,3, Zhimin Chen4, Yuan Xia4, Liping Zhang1,2,3,*, Qiuhua Tang1,2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2815-2840, 2023, DOI:10.32604/cmes.2023.027146 - 09 March 2023

    Abstract The multi-skill resource-constrained project scheduling problem (MS-RCPSP) is a significant management science problem that extends from the resource-constrained project scheduling problem (RCPSP) and is integrated with a real project and production environment. To solve MS-RCPSP, it is an efficient method to use dispatching rules combined with a parallel scheduling mechanism to generate a scheduling scheme. This paper proposes an improved gene expression programming (IGEP) approach to explore newly dispatching rules that can broadly solve MS-RCPSP. A new backward traversal decoding mechanism, and several neighborhood operators are applied in IGEP. The backward traversal decoding mechanism dramatically More > Graphic Abstract

    Rules Mining-Based Gene Expression Programming for the Multi-Skill Resource Constrained Project Scheduling Problem

  • Open Access

    ARTICLE

    An Enhanced Adaptive Differential Evolution Approach for Constrained Optimization Problems

    Wenchao Yi, Zhilei Lin, Yong Chen, Zhi Pei*, Jiansha Lu

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2841-2860, 2023, DOI:10.32604/cmes.2023.027055 - 09 March 2023

    Abstract Effective constrained optimization algorithms have been proposed for engineering problems recently. It is common to consider constraint violation and optimization algorithm as two separate parts. In this study, a pbest selection mechanism is proposed to integrate the current mutation strategy in constrained optimization problems. Based on the improved pbest selection method, an adaptive differential evolution approach is proposed, which helps the population jump out of the infeasible region. If all the individuals are infeasible, the top 5% of infeasible individuals are selected. In addition, a modified truncated ε-level method is proposed to avoid trapping in infeasible More > Graphic Abstract

    An Enhanced Adaptive Differential Evolution Approach for Constrained Optimization Problems

  • Open Access

    ARTICLE

    Optimal Configuration Method for the Installed Capacity of the Solar-Thermal Power Stations

    Yan Wang1, Zhicheng Ma2, Jinping Zhang2, Qiang Zhou2, Ruiping Zhang1, Haiying Dong1,*

    Energy Engineering, Vol.120, No.4, pp. 949-963, 2023, DOI:10.32604/ee.2023.025668 - 13 February 2023

    Abstract Because of the randomness of wind power and photovoltaic (PV) output of new energy bases, the problem of peak regulation capability and voltage stability of ultra-high voltage direct current (UHVDC) transmission lines, we proposed an optimum allocation method of installed capacity of the solar-thermal power station based on chance constrained programming in this work. Firstly, we established the uncertainty model of wind power and PV based on the chance constrained planning theory. Then we used the K-medoids clustering method to cluster the scenarios considering the actual operation scenarios throughout the year. Secondly, we established the… More >

  • Open Access

    ARTICLE

    A Machine Learning Approach for Artifact Removal from Brain Signal

    Sandhyalati Behera, Mihir Narayan Mohanty*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1455-1467, 2023, DOI:10.32604/csse.2023.029649 - 03 November 2022

    Abstract Electroencephalography (EEG), helps to analyze the neuronal activity of a human brain in the form of electrical signals with high temporal resolution in the millisecond range. To extract clean clinical information from EEG signals, it is essential to remove unwanted artifacts that are due to different causes including at the time of acquisition. In this piece of work, the authors considered the EEG signal contaminated with Electrocardiogram (ECG) artifacts that occurs mostly in cardiac patients. The clean EEG is taken from the openly available Mendeley database whereas the ECG signal is collected from the Physionet… More >

Displaying 1-10 on page 1 of 43. Per Page