Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,036)
  • Open Access

    ARTICLE

    Pore-Scale Simulations to Enhance Development Strategies in Offshore Weak Water-Drive Reservoirs

    Xianke He1, Yuansheng Li1, Hengjie Liao1, Zhehao Jiang1, Meixue Shi1, Zhe Hu2,3, Yaowei Huang2,3, Keliu Wu2,3,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.22, No.1, 2026, DOI:10.32604/fdmp.2026.074990 - 06 February 2026

    Abstract Weak water-drive offshore reservoirs with complex pore architecture and strong permeability heterogeneity present major challenges, including rapid depletion of formation energy, low waterflood efficiency, and significant lateral and vertical variability in crude oil properties, all of which contribute to limited recovery. To support more effective field development, alternative strategies and a deeper understanding of pore-scale flow behavior are urgently needed. In this work, CT imaging and digital image processing were used to construct a digital rock model representative of the target reservoir. A pore-scale flow model was then developed, and the Volume of Fluid (VOF)… More > Graphic Abstract

    Pore-Scale Simulations to Enhance Development Strategies in Offshore Weak Water-Drive Reservoirs

  • Open Access

    ARTICLE

    Selection of Conservation Practices in Different Vineyards Impacts Soil, Vines and Grapes Quality Attributes

    Antonios Chrysargyris1,*, Demetris Antoniou2, Timos Boyias2, Nikolaos Tzortzakis1,*

    Phyton-International Journal of Experimental Botany, Vol.95, No.1, 2026, DOI:10.32604/phyton.2026.076565 - 30 January 2026

    Abstract Cyprus has an extensive record in grape production and winemaking. Grapevine is essential for the economic and environmental sustainability of the agricultural sector, as it is in other Mediterranean regions. Intensive agriculture can overuse and exhaust natural resources, including soil and water. The current study evaluated how conservation strategies, including no tillage and semi-tillage (as a variation of strip tillage), affected grapevine growth and grape quality when compared to conventional tillage application. Two cultivars were used: Chardonnay and Maratheftiko (indigenous). Soil pH decreased, and EC increased after tillage applications, in both vineyards. Tillage lowered soil… More >

  • Open Access

    ARTICLE

    Multipoint Deformation Prediction Model Based on Clustering Partition of Extra High-Arch Dams

    Bin Ou1,2,3,4, Haoquan Chi1,3, Xu’an Qian1,3, Shuyan Fu1,3, Zhirui Miao1,3, Dingzhu Zhao1,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.1, 2026, DOI:10.32604/cmes.2026.074757 - 29 January 2026

    Abstract Deformation prediction for extra-high arch dams is highly important for ensuring their safe operation. To address the challenges of complex monitoring data, the uneven spatial distribution of deformation, and the construction and optimization of a prediction model for deformation prediction, a multipoint ultrahigh arch dam deformation prediction model, namely, the CEEMDAN-KPCA-GSWOA-KELM, which is based on a clustering partition, is proposed. First, the monitoring data are preprocessed via variational mode decomposition (VMD) and wavelet denoising (WT), which effectively filters out noise and improves the signal-to-noise ratio of the data, providing high-quality input data for subsequent prediction… More > Graphic Abstract

    Multipoint Deformation Prediction Model Based on Clustering Partition of Extra High-Arch Dams

  • Open Access

    ARTICLE

    Analysis and Defense of Attack Risks under High Penetration of Distributed Energy

    Boda Zhang1,*, Fuhua Luo1, Yunhao Yu1, Chameiling Di1, Ruibin Wen1, Fei Chen2

    Energy Engineering, Vol.123, No.2, 2026, DOI:10.32604/ee.2025.069323 - 27 January 2026

    Abstract The increasing intelligence of power systems is transforming distribution networks into Cyber-Physical Distribution Systems (CPDS). While enabling advanced functionalities, the tight interdependence between cyber and physical layers introduces significant security challenges and amplifies operational risks. To address these critical issues, this paper proposes a comprehensive risk assessment framework that explicitly incorporates the physical dependence of information systems. A Bayesian attack graph is employed to quantitatively evaluate the likelihood of successful cyber attacks. By analyzing the critical scenario of fault current path misjudgment, we define novel system-level and node-level risk coupling indices to precisely measure the… More >

  • Open Access

    ARTICLE

    Dual Layer Source Grid Load Storage Collaborative Planning Model Based on Benders Decomposition: Distribution Network Optimization Considering Low-Carbon and Economy

    Jun Guo1,*, Maoyuan Chen1, Yuyang Li1, Sibo Feng2,3, Guangyu Fu3

    Energy Engineering, Vol.123, No.2, 2026, DOI:10.32604/ee.2025.068894 - 27 January 2026

    Abstract The author proposes a dual layer source grid load storage collaborative planning model based on Benders decomposition to optimize the low-carbon and economic performance of the distribution network. The model plans the configuration of photovoltaic (3.8 MW), wind power (2.5 MW), energy storage (2.2 MWh), and SVC (1.2 Mvar) through interaction between upper and lower layers, and modifies lines 2–3, 8–9, etc. to improve transmission capacity and voltage stability. The author uses normal distribution and Monte Carlo method to model load uncertainty, and combines Weibull distribution to describe wind speed characteristics. Compared to the traditional… More >

  • Open Access

    ARTICLE

    Impact of Window Layers on Selenium Distribution and Photovoltaic Performance in CdSexTe1−x/CdTe Solar Cells

    Junyan Tian1, Qingyuan Zhang1, Lili Wu1,2,*, Xia Hao1,2, Guanggen Zeng1, Wenwu Wang1, Jingquan Zhang1,2

    Chalcogenide Letters, Vol.23, No.1, 2026, DOI:10.32604/cl.2026.076362 - 26 January 2026

    Abstract The incorporation of the Se element in CdTe solar cells is critical, while the low bandgap CdSexTe1−x, formed by the interdiffusion of CdTe and CdSe during device preparation, can promote the carrier lifetime. Different window layers formed by CdSe w/o MZO or CdS have different Se distributions. This paper systematically evaluates the influence of four types of window layers (CdSe, CdS/CdSe, MZO/CdSe and MZO/CdS/CdSe) on the performance of CdTe solar cells, and focuses on the correlation between the window layers and the Se distribution characteristic, carrier recombination mechanism, and device efficiency. The results show that CdSe… More >

  • Open Access

    ARTICLE

    LUAR: Lightweight and Universal Attribute Revocation Mechanism with SGX Assistance towards Applicable ABE Systems

    Fei Tang1,*, Ping Wang1, Jiang Yu1, Huihui Zhu1, Mengxue Qin1, Ling Yang2

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073423 - 12 January 2026

    Abstract Attribute-Based Encryption (ABE) has emerged as a fundamental access control mechanism in data sharing, enabling data owners to define flexible access policies. A critical aspect of ABE is key revocation, which plays a pivotal role in maintaining security. However, existing key revocation mechanisms face two major challenges: (1) High overhead due to ciphertext and key updates, primarily stemming from the reliance on revocation lists during attribute revocation, which increases computation and communication costs. (2) Limited universality, as many attribute revocation mechanisms are tailored to specific ABE constructions, restricting their broader applicability. To address these challenges,… More >

  • Open Access

    ARTICLE

    FedCCM: Communication-Efficient Federated Learning via Clustered Client Momentum in Non-IID Settings

    Hang Wen1,2, Kai Zeng1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072909 - 12 January 2026

    Abstract Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity. This problem becomes more severe when edge participation rate is low, as the information collected from different edge devices varies significantly. As a result, communication overhead increases, which further slows down the convergence process. To address this challenge, we propose a simple yet effective federated learning framework that improves consistency among edge devices. The core idea is clusters the lookahead gradients collected from edge devices on the cloud server to obtain personalized momentum for steering local updates. In parallel, a global momentum… More > Graphic Abstract

    FedCCM: Communication-Efficient Federated Learning via Clustered Client Momentum in Non-IID Settings

  • Open Access

    ARTICLE

    Mitigating Attribute Inference in Split Learning via Channel Pruning and Adversarial Training

    Afnan Alhindi*, Saad Al-Ahmadi, Mohamed Maher Ben Ismail

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072625 - 12 January 2026

    Abstract Split Learning (SL) has been promoted as a promising collaborative machine learning technique designed to address data privacy and resource efficiency. Specifically, neural networks are divided into client and server sub-networks in order to mitigate the exposure of sensitive data and reduce the overhead on client devices, thereby making SL particularly suitable for resource-constrained devices. Although SL prevents the direct transmission of raw data, it does not alleviate entirely the risk of privacy breaches. In fact, the data intermediately transmitted to the server sub-model may include patterns or information that could reveal sensitive data. Moreover,… More >

  • Open Access

    ARTICLE

    FRF-BiLSTM: Recognising and Mitigating DDoS Attacks through a Secure Decentralized Feature Optimized Federated Learning Approach

    Sushruta Mishra1, Sunil Kumar Mohapatra2, Kshira Sagar Sahoo3, Anand Nayyar4, Tae-Kyung Kim5,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072493 - 12 January 2026

    Abstract With an increase in internet-connected devices and a dependency on online services, the threat of Distributed Denial of Service (DDoS) attacks has become a significant concern in cybersecurity. The proposed system follows a multi-step process, beginning with the collection of datasets from different edge devices and network nodes. To verify its effectiveness, experiments were conducted using the CICDoS2017, NSL-KDD, and CICIDS benchmark datasets alongside other existing models. Recursive feature elimination (RFE) with random forest is used to select features from the CICDDoS2019 dataset, on which a BiLSTM model is trained on local nodes. Local models… More >

Displaying 1-10 on page 1 of 1036. Per Page