Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (311)
  • Open Access

    ARTICLE

    Production of Light Fraction-Based Pyrolytic Fuel from Spirulina platensis Microalgae Using Various Low-Cost Natural Catalysts and Insertion

    Indra Mamad Gandidi1,2,*, Sukarni Sukarni3,4, Avita Ayu Permanasari3, Purnami Purnami5, Tuan Amran Tuan Abdullah6, Anwar Johari6, Nugroho Agung Pambudi7,*

    Energy Engineering, Vol.121, No.12, pp. 3635-3648, 2024, DOI:10.32604/ee.2024.054943 - 22 November 2024

    Abstract The use of catalysts has significantly enhanced the yield and quality of in-situ pyrolysis products. However, there is a lack of understanding regarding pyrolysis approaches that utilize several low-cost natural catalysts (LCC) and their placement within the reactor. Therefore, this study aims to examine the effects of various LCC on the in-situ pyrolysis of spirulina platensis microalgae (SPM) and investigate the impact of different types of catalysts. We employed LCC such as zeolite, dolomite, kaolin, and activated carbon, with both layered and uniformly mixed LCC-SPM placements. Each experiment was conducted at a constant temperature of 500°C… More > Graphic Abstract

    Production of Light Fraction-Based Pyrolytic Fuel from <i>Spirulina platensis</i> Microalgae Using Various Low-Cost Natural Catalysts and Insertion

  • Open Access

    ARTICLE

    Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography

    Zainatul Yushaniza Mohamed Yusoff1, Mohamad Khairi Ishak2,*, Lukman A. B. Rahim3, Mohd Shahrimie Mohd Asaari1

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1669-1697, 2024, DOI:10.32604/csse.2024.056741 - 22 November 2024

    Abstract The rapid adoption of Internet of Things (IoT) technologies has introduced significant security challenges across the physical, network, and application layers, particularly with the widespread use of the Message Queue Telemetry Transport (MQTT) protocol, which, while efficient in bandwidth consumption, lacks inherent security features, making it vulnerable to various cyber threats. This research addresses these challenges by presenting a secure, lightweight communication proxy that enhances the scalability and security of MQTT-based Internet of Things (IoT) networks. The proposed solution builds upon the Dang-Scheme, a mutual authentication protocol designed explicitly for resource-constrained environments and enhances it… More >

  • Open Access

    ARTICLE

    SAR-LtYOLOv8: A Lightweight YOLOv8 Model for Small Object Detection in SAR Ship Images

    Conghao Niu1,*, Dezhi Han1, Bing Han2, Zhongdai Wu2

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1723-1748, 2024, DOI:10.32604/csse.2024.056736 - 22 November 2024

    Abstract The high coverage and all-weather capabilities of Synthetic Aperture Radar (SAR) image ship detection make it a widely accepted method for maritime ship positioning and identification. However, SAR ship detection faces challenges such as indistinct ship contours, low resolution, multi-scale features, noise, and complex background interference. This paper proposes a lightweight YOLOv8 model for small object detection in SAR ship images, incorporating key structures to enhance performance. The YOLOv8 backbone is replaced by the Slim Backbone (SB), and the Delete Medium-sized Detection Head (DMDH) structure is eliminated to concentrate on shallow features. Dynamically adjusting the… More >

  • Open Access

    ARTICLE

    GL-YOLOv5: An Improved Lightweight Non-Dimensional Attention Algorithm Based on YOLOv5

    Yuefan Liu, Ducheng Zhang, Chen Guo*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3281-3299, 2024, DOI:10.32604/cmc.2024.057294 - 18 November 2024

    Abstract Craniocerebral injuries represent the primary cause of fatalities among riders involved in two-wheeler accidents; nevertheless, the prevalence of helmet usage among these riders remains alarmingly low. Consequently, the accurate identification of riders who are wearing safety helmets is of paramount importance. Current detection algorithms exhibit several limitations, including inadequate accuracy, substantial model size, and suboptimal performance in complex environments with small targets. To address these challenges, we propose a novel lightweight detection algorithm, termed GL-YOLOv5, which is an enhancement of the You Only Look Once version 5 (YOLOv5) framework. This model incorporates a Global DualPooling… More >

  • Open Access

    ARTICLE

    A Lightweight UAV Visual Obstacle Avoidance Algorithm Based on Improved YOLOv8

    Zongdong Du1,2, Xuefeng Feng3, Feng Li3, Qinglong Xian3, Zhenhong Jia1,2,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2607-2627, 2024, DOI:10.32604/cmc.2024.056616 - 18 November 2024

    Abstract The importance of unmanned aerial vehicle (UAV) obstacle avoidance algorithms lies in their ability to ensure flight safety and collision avoidance, thereby protecting people and property. We propose UAD-YOLOv8, a lightweight YOLOv8-based obstacle detection algorithm optimized for UAV obstacle avoidance. The algorithm enhances the detection capability for small and irregular obstacles by removing the P5 feature layer and introducing deformable convolution v2 (DCNv2) to optimize the cross stage partial bottleneck with 2 convolutions and fusion (C2f) module. Additionally, it reduces the model’s parameter count and computational load by constructing the unite ghost and depth-wise separable… More >

  • Open Access

    ARTICLE

    A Novel YOLOv5s-Based Lightweight Model for Detecting Fish’s Unhealthy States in Aquaculture

    Bing Shi1,*, Jianhua Zhao1, Bin Ma1, Juan Huan2, Yueping Sun3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2437-2456, 2024, DOI:10.32604/cmc.2024.056377 - 18 November 2024

    Abstract Real-time detection of unhealthy fish remains a significant challenge in intensive recirculating aquaculture. Early recognition of unhealthy fish and the implementation of appropriate treatment measures are crucial for preventing the spread of diseases and minimizing economic losses. To address this issue, an improved algorithm based on the You Only Look Once v5s (YOLOv5s) lightweight model has been proposed. This enhanced model incorporates a faster lightweight structure and a new Convolutional Block Attention Module (CBAM) to achieve high recognition accuracy. Furthermore, the model introduces the α-SIoU loss function, which combines the α-Intersection over Union (α-IoU) and… More >

  • Open Access

    ARTICLE

    Enhanced Growth Optimizer and Its Application to Multispectral Image Fusion

    Jeng-Shyang Pan1,2, Wenda Li1, Shu-Chuan Chu1,*, Xiao Sui1, Junzo Watada3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3033-3062, 2024, DOI:10.32604/cmc.2024.056310 - 18 November 2024

    Abstract The growth optimizer (GO) is an innovative and robust metaheuristic optimization algorithm designed to simulate the learning and reflective processes experienced by individuals as they mature within the social environment. However, the original GO algorithm is constrained by two significant limitations: slow convergence and high memory requirements. This restricts its application to large-scale and complex problems. To address these problems, this paper proposes an innovative enhanced growth optimizer (eGO). In contrast to conventional population-based optimization algorithms, the eGO algorithm utilizes a probabilistic model, designated as the virtual population, which is capable of accurately replicating the… More >

  • Open Access

    ARTICLE

    TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection

    Isha Sood*, Varsha Sharma

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2791-2818, 2024, DOI:10.32604/cmc.2024.055463 - 18 November 2024

    Abstract Ransomware has emerged as a critical cybersecurity threat, characterized by its ability to encrypt user data or lock devices, demanding ransom for their release. Traditional ransomware detection methods face limitations due to their assumption of similar data distributions between training and testing phases, rendering them less effective against evolving ransomware families. This paper introduces TLERAD (Transfer Learning for Enhanced Ransomware Attack Detection), a novel approach that leverages unsupervised transfer learning and co-clustering techniques to bridge the gap between source and target domains, enabling robust detection of both known and unknown ransomware variants. The proposed method More >

  • Open Access

    PROCEEDINGS

    Challenges and Advances in Spot Joining Processes of Automotive Bodies

    Yongbing Li1,*, Yunwu Ma1, Yujun Xia1, Ming Lou1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.4, pp. 1-1, 2024, DOI:10.32604/icces.2024.012602

    Abstract The implementation of lightweight materials and structures in automotive body manufacturing is a strategic approach to improve fuel efficiency of energy-efficient vehicles and driving range of new energy vehicles. However, high specific strength low-ductility light metals (like 7xxx aluminum, magnesium and cast aluminum), ultra-high strength steels, high-stiffness profile structures and their mixed use poses a big challenge to existing commercial spot joining processes, such as resistance spot welding and self-piercing riveting. In this talk, the challenges which new lightweight materials and structures pose to spot joining process will be presented, the bottleneck of the existing More >

  • Open Access

    PROCEEDINGS

    Fragment Penetration Damage Characteristics of Typical Composite Armor

    Yuan Li1,3,*, Zhiqiang Fan1,2, Tao Suo1,3

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.3, pp. 1-2, 2024, DOI:10.32604/icces.2024.013336

    Abstract Light armored vehicles, as the primary means of force transport on contemporary battlefields, require not only high mobility but also better protection to meet the complex battlefield environment and mission requirements. Composite armor is widely used in the design of light armored vehicles due to its lightweight and excellent defensible performance. In this paper, the damage law of the composite armor of an infantry fighting vehicle, when penetrated by fragment-simulated projectiles (FSP), is studied by numerical simulation, and the homogeneous equivalent targets surrogating a combination of local protective armor and vulnerable parts are constructed based More >

Displaying 1-10 on page 1 of 311. Per Page