Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    PROCEEDINGS

    Source-Sink Matching Model Focusing on the Feasibility of CO2 Pipeline Transport

    Yubo Jiao1, Wei Wang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.3, pp. 1-1, 2024, DOI:10.32604/icces.2024.011157

    Abstract The source-sink matching optimization problem is one of the more important aspects of carbon capture and storage (CCS) system planning studies, and a large number of studies have been conducted using mathematical modeling to assess the feasibility of deployment in the planning region, thus providing important decision support. A framework of optimization system applicable to source-sink matching analysis was constructed based on the structural relationship between directly connected sources and sinks, taking into account multiple factors (transport characteristics, CO2 injection rate and connection period, etc.), which can ensure the feasibility of CO2 pipeline transportation operation and… More >

  • Open Access

    ARTICLE

    Randomized MILP framework for Securing Virtual Machines from Malware Attacks

    R. Mangalagowri1,*, Revathi Venkataraman2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1565-1580, 2023, DOI:10.32604/iasc.2023.026360 - 19 July 2022

    Abstract Cloud computing involves remote server deployments with public network infrastructures that allow clients to access computational resources. Virtual Machines (VMs) are supplied on requests and launched without interactions from service providers. Intruders can target these servers and establish malicious connections on VMs for carrying out attacks on other clustered VMs. The existing system has issues with execution time and false-positive rates. Hence, the overall system performance is degraded considerably. The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target… More >

Displaying 1-10 on page 1 of 2. Per Page