Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,765)
  • Open Access

    ARTICLE

    A New Flower Pollination Algorithm Strategy for MPPT of Partially Shaded Photovoltaic Arrays

    Muhannad J. Alshareef*

    Intelligent Automation & Soft Computing, Vol., , DOI:10.32604/iasc.2023.046722

    Abstract Photovoltaic (PV) systems utilize maximum power point tracking (MPPT) controllers to optimize power output amidst varying environmental conditions. However, the presence of multiple peaks resulting from partial shading poses a challenge to the tracking operation. Under partial shade conditions, the global maximum power point (GMPP) may be missed by most traditional maximum power point tracker. The flower pollination algorithm (FPA) and particle swarm optimization (PSO) are two examples of metaheuristic techniques that can be used to solve the issue of failing to track the GMPP. This paper discusses and resolves all issues associated with using the standard FPA method as… More >

  • Open Access

    ARTICLE

    A Study of the Effect of the Miller Cycle on the Combustion of a Supercharged Marine Diesel Engine

    Lingjie Zhao, Cong Li*

    Energy Engineering, Vol., , DOI:10.32604/ee.2024.046918

    Abstract The Miller cycle is a program that effectively reduces NOx emissions from marine diesel engines by lowering the maximum combustion temperature in the cylinder, thereby reducing NOx emissions. To effectively investigate the impact of Miller cycle optimum combustion performance and emission capability under high load conditions, this study will perform a one-dimensional simulation of the performance of a marine diesel engine, as well as a threedimensional simulation of the combustion in the cylinder. A 6-cylinder four-stroke single-stage supercharged diesel engine is taken as the research object. The chassis dynamometer and other related equipment are used to build the test system,… More >

  • Open Access

    ARTICLE

    Weather-Driven Solar Power Forecasting Using D-Informer: Enhancing Predictions with Climate Variables

    Chenglian Ma1, Rui Han1, Zhao An2,*, Tianyu Hu2, Meizhu Jin2

    Energy Engineering, Vol., , DOI:10.32604/ee.2024.046644

    Abstract Precise forecasting of solar power is crucial for the development of sustainable energy systems. Contemporary forecasting approaches often fail to adequately consider the crucial role of weather factors in photovoltaic (PV) power generation and encounter issues such as gradient explosion or disappearance when dealing with extensive time-series data. To overcome these challenges, this research presents a cutting-edge, multi-stage forecasting method called D-Informer. This method skillfully merges the differential transformation algorithm with the Informer model, leveraging a detailed array of meteorological variables and historical PV power generation records. The D-Informer model exhibits remarkable superiority over competing models across multiple performance metrics,… More > Graphic Abstract

    Weather-Driven Solar Power Forecasting Using D-Informer: Enhancing Predictions with Climate Variables

  • Open Access

    ARTICLE

    A Compact UHF Antenna Based on Hilbert Fractal Elements and a Serpentine Arrangement for Detecting Partial Discharge

    Xiang Lin1,*, Jian Fang1, Ming Zhang1, Kuang Yin1, Yan Tian1, Yingfei Guo2, Qianggang Wang2

    Energy Engineering, Vol., , DOI:10.32604/ee.2024.046861

    Abstract Efforts to protect electric power systems from faults have commonly relied on the use of ultra-high frequency (UHF) antennas for detecting partial discharge (PD) as a common precursor to faults. However, the effectiveness of existing UHF antennas suffers from a number of challenges such as limited bandwidth, relatively large physical size, and low detection sensitivity. The present study addresses these issues by proposing a compact microstrip patch antenna with fixed dimensions of 100 mm × 100 mm × 1.6 mm. The results of computations yield an optimized antenna design consisting of 2nd-order Hilbert fractal units positioned within a four-layer serpentine… More > Graphic Abstract

    A Compact UHF Antenna Based on Hilbert Fractal Elements and a Serpentine Arrangement for Detecting Partial Discharge

  • Open Access

    REVIEW

    Saddlepoint Approximation Method in Reliability Analysis: A Review

    Debiao Meng1,2,*, Yipeng Guo1,2, Yihe Xu3, Shiyuan Yang1,2,*, Yongqiang Guo4, Lidong Pan4, Xinkai Guo2

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.047507

    Abstract The escalating need for reliability analysis (RA) and reliability-based design optimization (RBDO) within engineering challenges has prompted the advancement of saddlepoint approximation methods (SAM) tailored for such problems. This article offers a detailed overview of the general SAM and summarizes the method characteristics first. Subsequently, recent enhancements in the SAM theoretical framework are assessed. Notably, the mean value first-order saddlepoint approximation (MVFOSA) bears resemblance to the conceptual framework of the mean value second-order saddlepoint approximation (MVSOSA); the latter serves as an auxiliary approach to the former. Their distinction is rooted in the varying expansion orders of the performance function as… More >

  • Open Access

    ARTICLE

    An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection

    Younghoon Ban, Myeonghyun Kim, Haehyun Cho*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.046658

    Abstract Antivirus vendors and the research community employ Machine Learning (ML) or Deep Learning (DL)-based static analysis techniques for efficient identification of new threats, given the continual emergence of novel malware variants. On the other hand, numerous researchers have reported that Adversarial Examples (AEs), generated by manipulating previously detected malware, can successfully evade ML/DL-based classifiers. Commercial antivirus systems, in particular, have been identified as vulnerable to such AEs. This paper firstly focuses on conducting black-box attacks to circumvent ML/DL-based malware classifiers. Our attack method utilizes seven different perturbations, including Overlay Append, Section Append, and Break Checksum, capitalizing on the ambiguities present… More >

  • Open Access

    REVIEW

    A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions

    Shahriar Md Arman1, Tao Yang1,*, Shahadat Shahed2, Alanoud Al Mazroa3, Afraa Attiah4, Linda Mohaisen4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047870

    Abstract The rapid growth of smart technologies and services has intensified the challenges surrounding identity authentication techniques. Biometric credentials are increasingly being used for verification due to their advantages over traditional methods, making it crucial to safeguard the privacy of people’s biometric data in various scenarios. This paper offers an in-depth exploration for privacy-preserving techniques and potential threats to biometric systems. It proposes a noble and thorough taxonomy survey for privacy-preserving techniques, as well as a systematic framework for categorizing the field’s existing literature. We review the state-of-the-art methods and address their advantages and limitations in the context of various biometric… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047387

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have been deployed and have demonstrated… More >

  • Open Access

    ARTICLE

    A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT

    Xiao Feng1,2,3,*, Zheng Yuan1

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.047243

    Abstract First, we propose a cross-domain authentication architecture based on trust evaluation mechanism, including registration, certificate issuance, and cross-domain authentication processes. A direct trust evaluation mechanism based on the time decay factor is proposed, taking into account the influence of historical interaction records. We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data. We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record. Then we propose an autoencoder-based trust clustering algorithm. We perform feature… More >

  • Open Access

    ARTICLE

    RRT Autonomous Detection Algorithm Based on Multiple Pilot Point Bias Strategy and Karto SLAM Algorithm

    Lieping Zhang1,2, Xiaoxu Shi1,2, Liu Tang1,2, Yilin Wang3, Jiansheng Peng4, Jianchu Zou4,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047235

    Abstract A Rapid-exploration Random Tree (RRT) autonomous detection algorithm based on the multi-guide-node deflection strategy and Karto Simultaneous Localization and Mapping (SLAM) algorithm was proposed to solve the problems of low efficiency of detecting frontier boundary points and drift distortion in the process of map building in the traditional RRT algorithm in the autonomous detection strategy of mobile robot. Firstly, an RRT global frontier boundary point detection algorithm based on the multi-guide-node deflection strategy was put forward, which introduces the reference value of guide nodes’ deflection probability into the random sampling function so that the global search tree can detect frontier… More >

Displaying 581-590 on page 59 of 2765. Per Page