Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,093)
  • Open Access

    ARTICLE

    Research on Grid-Connected Control Strategy of Distributed Generator Based on Improved Linear Active Disturbance Rejection Control

    Xin Mao*, Hongsheng Su, Jingxiu Li

    Energy Engineering, Vol.121, No.12, pp. 3929-3951, 2024, DOI:10.32604/ee.2024.057106 - 22 November 2024

    Abstract The virtual synchronous generator (VSG) technology has been proposed to address the problem of system frequency and active power oscillation caused by grid-connected new energy power sources. However, the traditional voltage-current double-closed-loop control used in VSG has the disadvantages of poor disturbance immunity and insufficient dynamic response. In light of the issues above, a virtual synchronous generator voltage outer-loop control strategy based on improved linear autonomous disturbance rejection control (ILADRC) is put forth for consideration. Firstly, an improved first-order linear self-immunity control structure is established for the characteristics of the voltage outer loop; then, the… More >

  • Open Access

    REVIEW

    A Comprehensive Overview and Comparative Analysis on Deep Learning Models

    Farhad Mortezapour Shiri*, Thinagaran Perumal, Norwati Mustapha, Raihani Mohamed

    Journal on Artificial Intelligence, Vol.6, pp. 301-360, 2024, DOI:10.32604/jai.2024.054314 - 20 November 2024

    Abstract Deep learning (DL) has emerged as a powerful subset of machine learning (ML) and artificial intelligence (AI), outperforming traditional ML methods, especially in handling unstructured and large datasets. Its impact spans across various domains, including speech recognition, healthcare, autonomous vehicles, cybersecurity, predictive analytics, and more. However, the complexity and dynamic nature of real-world problems present challenges in designing effective deep learning models. Consequently, several deep learning models have been developed to address different problems and applications. In this article, we conduct a comprehensive survey of various deep learning models, including Convolutional Neural Network (CNN), Recurrent… More >

  • Open Access

    ARTICLE

    A Secure Blockchain-Based Vehicular Collision Avoidance Protocol: Detecting and Preventing Blackhole Attacks

    Mosab Manaseer1, Maram Bani Younes2,*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1699-1721, 2024, DOI:10.32604/csse.2024.055128 - 22 November 2024

    Abstract This work aims to examine the vulnerabilities and threats in the applications of intelligent transport systems, especially collision avoidance protocols. It focuses on achieving the availability of network communication among traveling vehicles. Finally, it aims to find a secure solution to prevent blackhole attacks on vehicular network communications. The proposed solution relies on authenticating vehicles by joining a blockchain network. This technology provides identification information and receives cryptography keys. Moreover, the ad hoc on-demand distance vector (AODV) protocol is used for route discovery and ensuring reliable node communication. The system activates an adaptive mode for monitoring More >

  • Open Access

    ARTICLE

    An Expert System to Detect Political Arabic Articles Orientation Using CatBoost Classifier Boosted by Multi-Level Features

    Saad M. Darwish1,*, Abdul Rahman M. Sabri2, Dhafar Hamed Abd2, Adel A. Elzoghabi1

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1595-1624, 2024, DOI:10.32604/csse.2024.054615 - 22 November 2024

    Abstract The number of blogs and other forms of opinionated online content has increased dramatically in recent years. Many fields, including academia and national security, place an emphasis on automated political article orientation detection. Political articles (especially in the Arab world) are different from other articles due to their subjectivity, in which the author’s beliefs and political affiliation might have a significant influence on a political article. With categories representing the main political ideologies, this problem may be thought of as a subset of the text categorization (classification). In general, the performance of machine learning models… More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning Approach for Green Energy Forecasting in Asian Countries

    Tao Yan1, Javed Rashid2,3, Muhammad Shoaib Saleem3,4, Sajjad Ahmad4, Muhammad Faheem5,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2685-2708, 2024, DOI:10.32604/cmc.2024.058186 - 18 November 2024

    Abstract Electricity is essential for keeping power networks balanced between supply and demand, especially since it costs a lot to store. The article talks about different deep learning methods that are used to guess how much green energy different Asian countries will produce. The main goal is to make reliable and accurate predictions that can help with the planning of new power plants to meet rising demand. There is a new deep learning model called the Green-electrical Production Ensemble (GP-Ensemble). It combines three types of neural networks: convolutional neural networks (CNNs), gated recurrent units (GRUs), and… More >

  • Open Access

    ARTICLE

    An Investigation of Frequency-Domain Pruning Algorithms for Accelerating Human Activity Recognition Tasks Based on Sensor Data

    Jian Su1, Haijian Shao1,2,*, Xing Deng1, Yingtao Jiang2

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2219-2242, 2024, DOI:10.32604/cmc.2024.057604 - 18 November 2024

    Abstract The rapidly advancing Convolutional Neural Networks (CNNs) have brought about a paradigm shift in various computer vision tasks, while also garnering increasing interest and application in sensor-based Human Activity Recognition (HAR) efforts. However, the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained systems. This paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain, which reduces the model’s depth and accelerates activity inference. Unlike traditional pruning methods that focus on the spatial domain and the importance of filters, this… More >

  • Open Access

    REVIEW

    AI-Powered Innovations in High-Tech Research and Development: From Theory to Practice

    Mitra Madanchian1,*, Hamed Taherdoost1,2,3,4

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2133-2159, 2024, DOI:10.32604/cmc.2024.057094 - 18 November 2024

    Abstract This comparative review explores the dynamic and evolving landscape of artificial intelligence (AI)-powered innovations within high-tech research and development (R&D). It delves into both theoretical models and practical applications across a broad range of industries, including biotechnology, automotive, aerospace, and telecommunications. By examining critical advancements in AI algorithms, machine learning, deep learning models, simulations, and predictive analytics, the review underscores the transformative role AI has played in advancing theoretical research and shaping cutting-edge technologies. The review integrates both qualitative and quantitative data derived from academic studies, industry reports, and real-world case studies to showcase the… More >

  • Open Access

    ARTICLE

    Integrated Energy-Efficient Distributed Link Stability Algorithm for UAV Networks

    Altaf Hussain1, Shuaiyong Li2, Tariq Hussain3, Razaz Waheeb Attar4, Farman Ali5,*, Ahmed Alhomoud6, Babar Shah7

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2357-2394, 2024, DOI:10.32604/cmc.2024.056694 - 18 November 2024

    Abstract Ad hoc networks offer promising applications due to their ease of use, installation, and deployment, as they do not require a centralized control entity. In these networks, nodes function as senders, receivers, and routers. One such network is the Flying Ad hoc Network (FANET), where nodes operate in three dimensions (3D) using Unmanned Aerial Vehicles (UAVs) that are remotely controlled. With the integration of the Internet of Things (IoT), these nodes form an IoT-enabled network called the Internet of UAVs (IoU). However, the airborne nodes in FANET consume high energy due to their payloads and… More >

  • Open Access

    REVIEW

    Computing Challenges of UAV Networks: A Comprehensive Survey

    Altaf Hussain1, Shuaiyong Li2, Tariq Hussain3, Xianxuan Lin4,*, Farman Ali5,*, Ahmad Ali AlZubi6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1999-2051, 2024, DOI:10.32604/cmc.2024.056183 - 18 November 2024

    Abstract Devices and networks constantly upgrade, leading to rapid technological evolution. Three-dimensional (3D) point cloud transmission plays a crucial role in aerial computing terminology, facilitating information exchange. Various network types, including sensor networks and 5G mobile networks, support this transmission. Notably, Flying Ad hoc Networks (FANETs) utilize Unmanned Aerial Vehicles (UAVs) as nodes, operating in a 3D environment with Six Degrees of Freedom (6DoF). This study comprehensively surveys UAV networks, focusing on models for Light Detection and Ranging (LiDAR) 3D point cloud compression/transmission. Key topics covered include autonomous navigation, challenges in video streaming infrastructure, motivations for More >

  • Open Access

    REVIEW

    A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions

    Monirah Al-Ajlan*, Mourad Ykhlef

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2053-2076, 2024, DOI:10.32604/cmc.2024.055891 - 18 November 2024

    Abstract The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems (IDSs). IDSs have become a research hotspot and have seen remarkable performance improvements. Generative adversarial networks (GANs) have also garnered increasing research interest recently due to their remarkable ability to generate data. This paper investigates the application of (GANs) in (IDS) and explores their current use within this research field. We delve into the adoption of GANs within signature-based, anomaly-based, and hybrid IDSs, focusing on their objectives, methodologies, and advantages. Overall, GANs have been widely employed, mainly focused on solving the More >

Displaying 1-10 on page 1 of 1093. Per Page