Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (264)
  • Open Access

    ARTICLE

    Maximum Power Point Tracking Based on Improved Kepler Optimization Algorithm and Optimized Perturb & Observe under Partial Shading Conditions

    Zhaoqiang Wang1, Fuyin Ni2,*

    Energy Engineering, Vol.121, No.12, pp. 3779-3799, 2024, DOI:10.32604/ee.2024.055535 - 22 November 2024

    Abstract Under the partial shading conditions (PSC) of Photovoltaic (PV) modules in a PV hybrid system, the power output curve exhibits multiple peaks. This often causes traditional maximum power point tracking (MPPT) methods to fall into local optima and fail to find the global optimum. To address this issue, a composite MPPT algorithm is proposed. It combines the improved kepler optimization algorithm (IKOA) with the optimized variable-step perturb and observe (OIP&O). The update probabilities, planetary velocity and position step coefficients of IKOA are nonlinearly and adaptively optimized. This adaptation meets the varying needs of the initial… More > Graphic Abstract

    Maximum Power Point Tracking Based on Improved Kepler Optimization Algorithm and Optimized Perturb & Observe under Partial Shading Conditions

  • Open Access

    ARTICLE

    DC-FIPD: Fraudulent IP Identification Method Based on Homology Detection

    Yuanyuan Ma1, Ang Chen1, Cunzhi Hou1, Ruixia Jin2, Jinghui Zhang1, Ruixiang Li3,4,*

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3301-3323, 2024, DOI:10.32604/cmc.2024.056854 - 18 November 2024

    Abstract Currently, telecom fraud is expanding from the traditional telephone network to the Internet, and identifying fraudulent IPs is of great significance for reducing Internet telecom fraud and protecting consumer rights. However, existing telecom fraud identification methods based on blacklists, reputation, content and behavioral characteristics have good identification performance in the telephone network, but it is difficult to apply to the Internet where IP (Internet Protocol) addresses change dynamically. To address this issue, we propose a fraudulent IP identification method based on homology detection and DBSCAN(Density-Based Spatial Clustering of Applications with Noise) clustering (DC-FIPD). First, we… More >

  • Open Access

    ARTICLE

    Improved IChOA-Based Reinforcement Learning for Secrecy Rate Optimization in Smart Grid Communications

    Mehrdad Shoeibi1, Mohammad Mehdi Sharifi Nevisi2, Sarvenaz Sadat Khatami3, Diego Martín2,*, Sepehr Soltani4, Sina Aghakhani5

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2819-2843, 2024, DOI:10.32604/cmc.2024.056823 - 18 November 2024

    Abstract In the evolving landscape of the smart grid (SG), the integration of non-organic multiple access (NOMA) technology has emerged as a pivotal strategy for enhancing spectral efficiency and energy management. However, the open nature of wireless channels in SG raises significant concerns regarding the confidentiality of critical control messages, especially when broadcasted from a neighborhood gateway (NG) to smart meters (SMs). This paper introduces a novel approach based on reinforcement learning (RL) to fortify the performance of secrecy. Motivated by the need for efficient and effective training of the fully connected layers in the RL… More >

  • Open Access

    ARTICLE

    Using the Novel Wolverine Optimization Algorithm for Solving Engineering Applications

    Tareq Hamadneh1, Belal Batiha2, Omar Alsayyed3, Frank Werner4,*, Zeinab Monrazeri5, Mohammad Dehghani5,*, Kei Eguchi6

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2253-2323, 2024, DOI:10.32604/cmes.2024.055171 - 31 October 2024

    Abstract This paper introduces the Wolverine Optimization Algorithm (WoOA), a biomimetic method inspired by the foraging behaviors of wolverines in their natural habitats. WoOA innovatively integrates two primary strategies: scavenging and hunting, mirroring the wolverine’s adeptness in locating carrion and pursuing live prey. The algorithm’s uniqueness lies in its faithful simulation of these dual strategies, which are mathematically structured to optimize various types of problems effectively. The effectiveness of WoOA is rigorously evaluated using the Congress on Evolutionary Computation (CEC) 2017 test suite across dimensions of 10, 30, 50, and 100. The results showcase WoOA’s robust… More >

  • Open Access

    ARTICLE

    A Novel Bi-Level VSC-DC Transmission Expansion Planning Method of VSC-DC for Power System Flexibility and Stability Enhancement

    Weigang Jin1, Lei Chen2,*, Shencong Zheng2, Yuqi Jiang2, Yifei Li2, Hongkun Chen2

    Energy Engineering, Vol.121, No.11, pp. 3161-3179, 2024, DOI:10.32604/ee.2024.054068 - 21 October 2024

    Abstract Investigating flexibility and stability boosting transmission expansion planning (TEP) methods can increase the renewable energy (RE) consumption of the power systems. In this study, we propose a bi-level TEP method for voltage-source-converter-based direct current (VSC-DC), focusing on flexibility and stability enhancement. First, we established the TEP framework of VSC-DC, by introducing the evaluation indices to quantify the power system flexibility and stability. Subsequently, we propose a bi-level VSC-DC TEP model: the upper-level model acquires the optimal VSC-DC planning scheme by using the improved moth flame optimization (IMFO) algorithm, and the lower-level model evaluates the flexibility More >

  • Open Access

    ARTICLE

    Optimizing Internet of Things Device Security with a Globalized Firefly Optimization Algorithm for Attack Detection

    Arkan Kh Shakr Sabonchi*

    Journal on Artificial Intelligence, Vol.6, pp. 261-282, 2024, DOI:10.32604/jai.2024.056552 - 18 October 2024

    Abstract The phenomenal increase in device connectivity is making the signaling and resource-based operational integrity of networks at the node level increasingly prone to distributed denial of service (DDoS) attacks. The current growth rate in the number of Internet of Things (IoT) attacks executed at the time of exchanging data over the Internet represents massive security hazards to IoT devices. In this regard, the present study proposes a new hybrid optimization technique that combines the firefly optimization algorithm with global searches for use in attack detection on IoT devices. We preprocessed two datasets, CICIDS and UNSW-NB15,… More >

  • Open Access

    ARTICLE

    Short-Term Wind Power Prediction Based on WVMD and Spatio-Temporal Dual-Stream Network

    Yingnan Zhao*, Yuyuan Ruan, Zhen Peng

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 549-566, 2024, DOI:10.32604/cmc.2024.056240 - 15 October 2024

    Abstract As the penetration ratio of wind power in active distribution networks continues to increase, the system exhibits some characteristics such as randomness and volatility. Fast and accurate short-term wind power prediction is essential for algorithms like scheduling and optimization control. Based on the spatio-temporal features of Numerical Weather Prediction (NWP) data, it proposes the WVMD_DSN (Whale Optimization Algorithm, Variational Mode Decomposition, Dual Stream Network) model. The model first applies Pearson correlation coefficient (PCC) to choose some NWP features with strong correlation to wind power to form the feature set. Then, it decomposes the feature set More >

  • Open Access

    ARTICLE

    Multi-Label Feature Selection Based on Improved Ant Colony Optimization Algorithm with Dynamic Redundancy and Label Dependence

    Ting Cai1, Chun Ye1, Zhiwei Ye1,*, Ziyuan Chen1, Mengqing Mei1, Haichao Zhang1, Wanfang Bai2, Peng Zhang3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1157-1175, 2024, DOI:10.32604/cmc.2024.055080 - 15 October 2024

    Abstract The world produces vast quantities of high-dimensional multi-semantic data. However, extracting valuable information from such a large amount of high-dimensional and multi-label data is undoubtedly arduous and challenging. Feature selection aims to mitigate the adverse impacts of high dimensionality in multi-label data by eliminating redundant and irrelevant features. The ant colony optimization algorithm has demonstrated encouraging outcomes in multi-label feature selection, because of its simplicity, efficiency, and similarity to reinforcement learning. Nevertheless, existing methods do not consider crucial correlation information, such as dynamic redundancy and label correlation. To tackle these concerns, the paper proposes a More >

  • Open Access

    ARTICLE

    African Bison Optimization Algorithm: A New Bio-Inspired Optimizer with Engineering Applications

    Jian Zhao1,2,*, Kang Wang1,2, Jiacun Wang3,*, Xiwang Guo4, Liang Qi5

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 603-623, 2024, DOI:10.32604/cmc.2024.050523 - 15 October 2024

    Abstract This paper introduces the African Bison Optimization (ABO) algorithm, which is based on biological population. ABO is inspired by the survival behaviors of the African bison, including foraging, bathing, jousting, mating, and eliminating. The foraging behavior prompts the bison to seek a richer food source for survival. When bison find a food source, they stick around for a while by bathing behavior. The jousting behavior makes bison stand out in the population, then the winner gets the chance to produce offspring in the mating behavior. The eliminating behavior causes the old or injured bison to More >

  • Open Access

    ARTICLE

    An Improved Artificial Rabbits Optimization Algorithm with Chaotic Local Search and Opposition-Based Learning for Engineering Problems and Its Applications in Breast Cancer Problem

    Feyza Altunbey Özbay1, Erdal Özbay2, Farhad Soleimanian Gharehchopogh3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1067-1110, 2024, DOI:10.32604/cmes.2024.054334 - 27 September 2024

    Abstract Artificial rabbits optimization (ARO) is a recently proposed biology-based optimization algorithm inspired by the detour foraging and random hiding behavior of rabbits in nature. However, for solving optimization problems, the ARO algorithm shows slow convergence speed and can fall into local minima. To overcome these drawbacks, this paper proposes chaotic opposition-based learning ARO (COARO), an improved version of the ARO algorithm that incorporates opposition-based learning (OBL) and chaotic local search (CLS) techniques. By adding OBL to ARO, the convergence speed of the algorithm increases and it explores the search space better. Chaotic maps in CLS… More > Graphic Abstract

    An Improved Artificial Rabbits Optimization Algorithm with Chaotic Local Search and Opposition-Based Learning for Engineering Problems and Its Applications in Breast Cancer Problem

Displaying 1-10 on page 1 of 264. Per Page