Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A New Flower Pollination Algorithm Strategy for MPPT of Partially Shaded Photovoltaic Arrays

    Muhannad J. Alshareef*

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 297-313, 2023, DOI:10.32604/iasc.2023.046722 - 27 February 2024

    Abstract Photovoltaic (PV) systems utilize maximum power point tracking (MPPT) controllers to optimize power output amidst varying environmental conditions. However, the presence of multiple peaks resulting from partial shading poses a challenge to the tracking operation. Under partial shade conditions, the global maximum power point (GMPP) may be missed by most traditional maximum power point tracker. The flower pollination algorithm (FPA) and particle swarm optimization (PSO) are two examples of metaheuristic techniques that can be used to solve the issue of failing to track the GMPP. This paper discusses and resolves all issues associated with using… More >

  • Open Access

    ARTICLE

    Improved Monarchy Butterfly Optimization Algorithm (IMBO): Intrusion Detection Using Mapreduce Framework Based Optimized ANU-Net

    Kunda Suresh Babu, Yamarthi Narasimha Rao*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5887-5909, 2023, DOI:10.32604/cmc.2023.037486 - 29 April 2023

    Abstract The demand for cybersecurity is rising recently due to the rapid improvement of network technologies. As a primary defense mechanism, an intrusion detection system (IDS) was anticipated to adapt and secure computing infrastructures from the constantly evolving, sophisticated threat landscape. Recently, various deep learning methods have been put forth; however, these methods struggle to recognize all forms of assaults, especially infrequent attacks, because of network traffic imbalances and a shortage of aberrant traffic samples for model training. This work introduces deep learning (DL) based Attention based Nested U-Net (ANU-Net) for intrusion detection to address these… More >

Displaying 1-10 on page 1 of 2. Per Page