Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (60)
  • Open Access

    ARTICLE

    CoopAI-Route: DRL Empowered Multi-Agent Cooperative System for Efficient QoS-Aware Routing for Network Slicing in Multi-Domain SDN

    Meignanamoorthi Dhandapani*, V. Vetriselvi, R. Aishwarya

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2449-2486, 2024, DOI:10.32604/cmes.2024.050986

    Abstract The emergence of beyond 5G networks has the potential for seamless and intelligent connectivity on a global scale. Network slicing is crucial in delivering services for different, demanding vertical applications in this context. Next-generation applications have time-sensitive requirements and depend on the most efficient routing path to ensure packets reach their intended destinations. However, the existing IP (Internet Protocol) over a multi-domain network faces challenges in enforcing network slicing due to minimal collaboration and information sharing among network operators. Conventional inter-domain routing methods, like Border Gateway Protocol (BGP), cannot make routing decisions based on performance,… More >

  • Open Access

    ARTICLE

    Research on the Icing Diagnosis of Wind Turbine Blades Based on FS–XGBoost–EWMA

    Jicai Guo1,2, Xiaowen Song1,2,*, Chang Liu1,2, Yanfeng Zhang1,2, Shijie Guo1,2, Jianxin Wu1,2, Chang Cai3, Qing’an Li3,*

    Energy Engineering, Vol.121, No.7, pp. 1739-1758, 2024, DOI:10.32604/ee.2024.048854

    Abstract In winter, wind turbines are susceptible to blade icing, which results in a series of energy losses and safe operation problems. Therefore, blade icing detection has become a top priority. Conventional methods primarily rely on sensor monitoring, which is expensive and has limited applications. Data-driven blade icing detection methods have become feasible with the development of artificial intelligence. However, the data-driven method is plagued by limited training samples and icing samples; therefore, this paper proposes an icing warning strategy based on the combination of feature selection (FS), eXtreme Gradient Boosting (XGBoost) algorithm, and exponentially weighted… More >

  • Open Access

    ARTICLE

    Study of Flow and Heat Transfer in an Ejector-Driven Swirl Anti-Icing Chamber

    Yi Tu1,*, Yuan Wu2, Yu Zeng3

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.5, pp. 989-1014, 2024, DOI:10.32604/fdmp.2024.045624

    Abstract The formation of ice on the leading edge of aircraft engines is a serious issue, as it can have catastrophic consequences. The Swirl Anti-Icing (SAI) system, driven by ejection, circulates hot fluid within a 360° annular chamber to heat the engine inlet lip surface and prevent icing. This study employs a validated Computational Fluid Dynamics (CFD) approach to study the impact of key geometric parameters of this system on flow and heat transfer characteristics within the anti-icing chamber. Additionally, the entropy generation rate and exergy efficiency are analyzed to assess the energy utilization in the… More >

  • Open Access

    ARTICLE

    A Distributionally Robust Optimization Scheduling Model for Regional Integrated Energy Systems Considering Hot Dry Rock Co-Generation

    Hao Qi1, Mohamed Sharaf2, Andres Annuk3, Adrian Ilinca4, Mohamed A. Mohamed5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1387-1404, 2024, DOI:10.32604/cmes.2024.048672

    Abstract Hot dry rock (HDR) is rich in reserve, widely distributed, green, low-carbon, and has broad development potential and prospects. In this paper, a distributionally robust optimization (DRO) scheduling model for a regionally integrated energy system (RIES) considering HDR co-generation is proposed. First, the HDR-enhanced geothermal system (HDR-EGS) is introduced into the RIES. HDR-EGS realizes the thermoelectric decoupling of combined heat and power (CHP) through coordinated operation with the regional power grid and the regional heat grid, which enhances the system wind power (WP) feed-in space. Secondly, peak-hour loads are shifted using price demand response guidance More >

  • Open Access

    ARTICLE

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

    Yu Zhang*, Lianmin Li, Zhongxiang Liu, Yuhu Wu

    Energy Engineering, Vol.121, No.5, pp. 1209-1221, 2024, DOI:10.32604/ee.2024.046141

    Abstract With the development of renewable energy technologies such as photovoltaics and wind power, it has become a research hotspot to improve the consumption rate of new energy and reduce energy costs through the deployment of energy storage. To solve the problem of the interests of different subjects in the operation of the energy storage power stations (ESS) and the integrated energy multi-microgrid alliance (IEMA), this paper proposes the optimization operation method of the energy storage power station and the IEMA based on the Stackelberg game. In the upper layer, ESS optimizes charging and discharging decisions More > Graphic Abstract

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

  • Open Access

    ARTICLE

    A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts

    Xiaohui Yang, Kun Zhang*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1843-1859, 2024, DOI:10.32604/cmc.2023.047660

    Abstract Data is regarded as a valuable asset, and sharing data is a prerequisite for fully exploiting the value of data. However, the current medical data sharing scheme lacks a fair incentive mechanism, and the authenticity of data cannot be guaranteed, resulting in low enthusiasm of participants. A fair and trusted medical data trading scheme based on smart contracts is proposed, which aims to encourage participants to be honest and improve their enthusiasm for participation. The scheme uses zero-knowledge range proof for trusted verification, verifies the authenticity of the patient’s data and the specific attributes of… More >

  • Open Access

    ARTICLE

    Lightweight Malicious Code Classification Method Based on Improved SqueezeNet

    Li Li*, Youran Kong, Qing Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 551-567, 2024, DOI:10.32604/cmc.2023.045512

    Abstract With the growth of the Internet, more and more business is being done online, for example, online offices, online education and so on. While this makes people’s lives more convenient, it also increases the risk of the network being attacked by malicious code. Therefore, it is important to identify malicious codes on computer systems efficiently. However, most of the existing malicious code detection methods have two problems: (1) The ability of the model to extract features is weak, resulting in poor model performance. (2) The large scale of model data leads to difficulties deploying on… More >

  • Open Access

    ARTICLE

    Image Splicing Forgery Detection Using Feature-Based of Sonine Functions and Deep Features

    Ala’a R. Al-Shamasneh1, Rabha W. Ibrahim2,3,4,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 795-810, 2024, DOI:10.32604/cmc.2023.042755

    Abstract The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research topic. One of the most popular methods for manipulating digital images is image splicing, which involves copying a specific area from one image and pasting it into another. Attempts were made to mitigate the effects of image splicing, which continues to be a significant research challenge. This study proposes a new splicing detection model, combining Sonine functions-derived convex-based features and deep features. Two stages make up the proposed method. The first step entails feature extraction, then… More >

  • Open Access

    ARTICLE

    Weber Law Based Approach for Multi-Class Image Forgery Detection

    Arslan Akram1,3, Javed Rashid2,3,4, Arfan Jaffar1, Fahima Hajjej5, Waseem Iqbal6, Nadeem Sarwar7,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 145-166, 2024, DOI:10.32604/cmc.2023.041074

    Abstract Today’s forensic science introduces a new research area for digital image analysis for multimedia security. So, Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or create misleading publicity by using tempered images. Exiting forgery detection methods can classify only one of the most widely used Copy-Move and splicing forgeries. However, an image can contain one or more types of forgeries. This study has proposed a hybrid method for classifying Copy-Move and splicing images using texture information of images in the spatial domain. Firstly, More >

  • Open Access

    ARTICLE

    Transformer 2β regulates the alternative splicing of cell cycle regulatory genes to promote the malignant phenotype of ovarian cancer

    TING ZHOU1,#, PEIYING FU1,#, DONG CHEN2, RONGHUA LIU1,*

    Oncology Research, Vol.31, No.5, pp. 769-785, 2023, DOI:10.32604/or.2023.030166

    Abstract Late-stage ovarian cancer (OC) has a poor prognosis and a high metastasis rate, but the underlying molecular mechanism is unclear. RNA binding proteins (RBPs) play important roles in posttranscriptional regulation in the contexts of neoplasia and tumor metastasis. In this study, we explored the molecular functions of a canonical RBP, Transformer 2β homolog (TRA2B), in cancer cells. TRA2B knockdown in HeLa cells and subsequent whole-transcriptome RNA sequencing (RNA-seq) analysis revealed the TRA2B-regulated alternative splicing (AS) profile. We disrupted TRA2B expression in epithelial OC cells and performed a series of experiments to confirm the resulting effects… More >

Displaying 1-10 on page 1 of 60. Per Page