Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (553)
  • Open Access

    ARTICLE

    Optimization of CNC Turning Machining Parameters Based on Bp-DWMOPSO Algorithm

    Jiang Li, Jiutao Zhao, Qinhui Liu*, Laizheng Zhu, Jinyi Guo, Weijiu Zhang

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 223-244, 2023, DOI:10.32604/cmc.2023.042429

    Abstract Cutting parameters have a significant impact on the machining effect. In order to reduce the machining time and improve the machining quality, this paper proposes an optimization algorithm based on Bp neural network-Improved Multi-Objective Particle Swarm (Bp-DWMOPSO). Firstly, this paper analyzes the existing problems in the traditional multi-objective particle swarm algorithm. Secondly, the Bp neural network model and the dynamic weight multi-objective particle swarm algorithm model are established. Finally, the Bp-DWMOPSO algorithm is designed based on the established models. In order to verify the effectiveness of the algorithm, this paper obtains the required data through equal probability orthogonal experiments on… More >

  • Open Access

    ARTICLE

    Research on Equivalent Modeling Method of AC-DC Power Networks Integrating with Renewable Energy Generation

    Weigang Jin1, Lei Chen2,*, Yifei Li2, Shencong Zheng2, Yuqi Jiang2, Hongkun Chen2

    Energy Engineering, Vol.120, No.11, pp. 2469-2487, 2023, DOI:10.32604/ee.2023.043021

    Abstract Along with the increasing integration of renewable energy generation in AC-DC power networks, investigating the dynamic behaviors of this complex system with a proper equivalent model is significant. This paper presents an equivalent modeling method for the AC-DC power networks with doubly-fed induction generator (DFIG) based wind farms to decrease the simulation scale and computational burden. For the AC-DC power networks, the equivalent modeling strategy in accordance with the physical structure simplification is stated. Regarding the DFIG-based wind farms, the equivalent modeling based on the sequential identification of multi-machine parameters using the improved chaotic cuckoo search algorithm (ICCSA) is conducted.… More >

  • Open Access

    ARTICLE

    A Spider Monkey Optimization Algorithm Combining Opposition-Based Learning and Orthogonal Experimental Design

    Weizhi Liao1, Xiaoyun Xia1,3, Xiaojun Jia1, Shigen Shen2,*, Helin Zhuang4,*, Xianchao Zhang1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3297-3323, 2023, DOI:10.32604/cmc.2023.040967

    Abstract As a new bionic algorithm, Spider Monkey Optimization (SMO) has been widely used in various complex optimization problems in recent years. However, the new space exploration power of SMO is limited and the diversity of the population in SMO is not abundant. Thus, this paper focuses on how to reconstruct SMO to improve its performance, and a novel spider monkey optimization algorithm with opposition-based learning and orthogonal experimental design (SMO3) is developed. A position updating method based on the historical optimal domain and particle swarm for Local Leader Phase (LLP) and Global Leader Phase (GLP) is presented to improve the… More >

  • Open Access

    ARTICLE

    Efficient Remote Identification for Drone Swarms

    Kang-Moon Seo1, Jane Kim1, Soojin Lee1, Jun-Woo Kwon1, Seung-Hyun Seo1,2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2937-2958, 2023, DOI:10.32604/cmc.2023.039459

    Abstract With the advancement of unmanned aerial vehicle (UAV) technology, the market for drones and the cooperation of many drones are expanding. Drone swarms move together in multiple regions to perform their tasks. A Ground Control Server (GCS) located in each region identifies drone swarm members to prevent unauthorized drones from trespassing. Studies on drone identification have been actively conducted, but existing studies did not consider multiple drone identification environments. Thus, developing a secure and effective identification mechanism for drone swarms is necessary. We suggested a novel approach for the remote identification of drone swarms. For an efficient identification process between… More >

  • Open Access

    ARTICLE

    Self-Awakened Particle Swarm Optimization BN Structure Learning Algorithm Based on Search Space Constraint

    Kun Liu1,2, Peiran Li3, Yu Zhang1,*, Jia Ren1, Xianyu Wang2, Uzair Aslam Bhatti1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3257-3274, 2023, DOI:10.32604/cmc.2023.039430

    Abstract To obtain the optimal Bayesian network (BN) structure, researchers often use the hybrid learning algorithm that combines the constraint-based (CB) method and the score-and-search (SS) method. This hybrid method has the problem that the search efficiency could be improved due to the ample search space. The search process quickly falls into the local optimal solution, unable to obtain the global optimal. Based on this, the Particle Swarm Optimization (PSO) algorithm based on the search space constraint process is proposed. In the first stage, the method uses dynamic adjustment factors to constrain the structure search space and enrich the diversity of… More >

  • Open Access

    ARTICLE

    Ensemble of Population-Based Metaheuristic Algorithms

    Hao Li, Jun Tang*, Qingtao Pan, Jianjun Zhan, Songyang Lao

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2835-2859, 2023, DOI:10.32604/cmc.2023.038670

    Abstract No optimization algorithm can obtain satisfactory results in all optimization tasks. Thus, it is an effective way to deal with the problem by an ensemble of multiple algorithms. This paper proposes an ensemble of population-based metaheuristics (EPM) to solve single-objective optimization problems. The design of the EPM framework includes three stages: the initial stage, the update stage, and the final stage. The framework applies the transformation of the real and virtual population to balance the problem of exploration and exploitation at the population level and uses an elite strategy to communicate among virtual populations. The experiment tested two benchmark function… More >

  • Open Access

    ARTICLE

    Fang-Xia-Dihuang decoction inhibits breast cancer progression induced by psychological stress via down-regulation of PI3K/AKT and JAK2/STAT3 pathways: An in vivo and a network pharmacology assessment

    LINGYAN LV1,2,#, JING ZHAO1,2,#, XUAN WANG1,2, LIUYAN XU1,2, YINGYI FAN2, CHUNHUI WANG3, HONGQIAO FAN4,5,*, XIAOHUA PEI5,*

    BIOCELL, Vol.47, No.9, pp. 1977-1994, 2023, DOI:10.32604/biocell.2023.030742

    Abstract Background: The development and prognosis of breast cancer are intricately linked to psychological stress. In addition, depression is the most common psychological comorbidity among breast cancer survivors, and reportedly, Fang-Xia-Dihuang decoction (FXDH) can effectively manage depression in such patients. However, its pharmacological and molecular mechanisms remain obscure. Methods: Public databases were used for obtaining active components and related targets. Main active components were further verified by ultra-high-performance liquid chromatography-high-resolution mass spectrometry (UPLC-HRMS). Protein–protein interaction and enrichment analyses were taken to predict potential hub targets and related pathways. Molecule docking was used to understand the interactions between main compounds and hub… More >

  • Open Access

    ARTICLE

    Initial steps on the analysis of the underlying pharmacological mechanisms of Wendan decoction on sudden deafness using network pharmacology and molecular docking

    SHIMING YE1,2,#, YUFENG ZHANG3,#, TING LIU4, CONG WANG3, ZHENG YAN5, WANDONG SHE2,*, HAIBING HUA4,*

    BIOCELL, Vol.47, No.9, pp. 1947-1964, 2023, DOI:10.32604/biocell.2023.029333

    Abstract Background: Despite its widespread therapeutic use and effectiveness, the underlying pharmacologic mechanisms of Wendan decoction (WDD) and how it works to treat sudden deafness (SD) remain unclear. In this study, the pharmacological mechanisms of WDD underlying SD were analyzed using network pharmacology and molecular docking. Methods: The Traditional Chinese Medicine Systems Pharmacology Database and Analysis Platform (TCMSP) was employed to identify the active compounds and target genes of WDD, and genes associated with SD were screened on five databases. RGUI conducted Gene Ontology (GO) functional and the Kyoto Encyclopedia of Genes and Genomes (KEGG) enrichment analyses. A compound-target network was… More >

  • Open Access

    ARTICLE

    Conductor Arrangement and Phase Sequence Optimization Scheme for 500 kV Four-Circuit Transmission Lines on Same Tower

    Deng Lu1, Xujun Lang1, Bo Yang1, Ziyang Li1, Hang Geng2,*

    Energy Engineering, Vol.120, No.10, pp. 2287-2306, 2023, DOI:10.32604/ee.2023.029140

    Abstract The four-circuit parallel line on the same tower effectively solves the problems faced by the line reconstruction and construction under the condition of the increasing shortage of transmission corridors. Optimizing the conductor and phase sequence arrangement of multiple transmission lines is conducive to improving electromagnetic and electrostatic coupling caused by electromagnetic problems. This paper uses the ATP-EMTP simulation software to build a 500 kV multi-circuit transmission line on the same tower. It stimulates the induced voltage and current values of different line lengths, tower spacing, vertical and horizontal spacing between different circuits, phase sequence arrangement, and nominal tower height. Moreover,… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics with Machine Learning Enabled Cyberattack Detection Model

    Ahmed S. Almasoud*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2849-2863, 2023, DOI:10.32604/iasc.2023.039718

    Abstract The Internet of Things (IoT) is considered the next-gen connection network and is ubiquitous since it is based on the Internet. Intrusion Detection System (IDS) determines the intrusion performance of terminal equipment and IoT communication procedures from IoT environments after taking equivalent defence measures based on the identified behaviour. In this background, the current study develops an Enhanced Metaheuristics with Machine Learning enabled Cyberattack Detection and Classification (EMML-CADC) model in an IoT environment. The aim of the presented EMML-CADC model is to detect cyberattacks in IoT environments with enhanced efficiency. To attain this, the EMML-CADC model primarily employs a data… More >

Displaying 31-40 on page 4 of 553. Per Page