Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,701)
  • Open Access

    ARTICLE

    Diagnosis of Disc Space Variation Fault Degree of Transformer Winding Based on K-Nearest Neighbor Algorithm

    Song Wang1,*, Fei Xie1, Fengye Yang1, Shengxuan Qiu1, Chuang Liu2, Tong Li3

    Energy Engineering, Vol.120, No.10, pp. 2273-2285, 2023, DOI:10.32604/ee.2023.030107

    Abstract Winding is one of the most important components in power transformers. Ensuring the health state of the winding is of great importance to the stable operation of the power system. To efficiently and accurately diagnose the disc space variation (DSV) fault degree of transformer winding, this paper presents a diagnostic method of winding fault based on the K-Nearest Neighbor (KNN) algorithm and the frequency response analysis (FRA) method. First, a laboratory winding model is used, and DSV faults with four different degrees are achieved by changing disc space of the discs in the winding. Then, a series of FRA tests… More > Graphic Abstract

    Diagnosis of Disc Space Variation Fault Degree of Transformer Winding Based on K-Nearest Neighbor Algorithm

  • Open Access

    ARTICLE

    Conductor Arrangement and Phase Sequence Optimization Scheme for 500 kV Four-Circuit Transmission Lines on Same Tower

    Deng Lu1, Xujun Lang1, Bo Yang1, Ziyang Li1, Hang Geng2,*

    Energy Engineering, Vol.120, No.10, pp. 2287-2306, 2023, DOI:10.32604/ee.2023.029140

    Abstract The four-circuit parallel line on the same tower effectively solves the problems faced by the line reconstruction and construction under the condition of the increasing shortage of transmission corridors. Optimizing the conductor and phase sequence arrangement of multiple transmission lines is conducive to improving electromagnetic and electrostatic coupling caused by electromagnetic problems. This paper uses the ATP-EMTP simulation software to build a 500 kV multi-circuit transmission line on the same tower. It stimulates the induced voltage and current values of different line lengths, tower spacing, vertical and horizontal spacing between different circuits, phase sequence arrangement, and nominal tower height. Moreover,… More >

  • Open Access

    ARTICLE

    Calculation of Mass Concrete Temperature Containing Cooling Water Pipe Based on Substructure and Iteration Algorithm

    Heng Zhang1,2, Chao Su2,*, Zhizhong Song1, Zhenzhong Shen1,2, Huiguang Lei3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 813-826, 2024, DOI:10.32604/cmes.2023.030055

    Abstract Mathematical physics equations are often utilized to describe physical phenomena in various fields of science and engineering. One such equation is the Fourier equation, which is a commonly used and effective method for evaluating the effectiveness of temperature control measures for mass concrete. One important measure for temperature control in mass concrete is the use of cooling water pipes. However, the mismatch of grids between large-scale concrete models and small-scale cooling pipe models can result in a significant waste of calculation time when using the finite element method. Moreover, the temperature of the water in the cooling pipe needs to… More >

  • Open Access

    ARTICLE

    LSDA-APF: A Local Obstacle Avoidance Algorithm for Unmanned Surface Vehicles Based on 5G Communication Environment

    Xiaoli Li, Tongtong Jiao#, Jinfeng Ma, Dongxing Duan, Shengbin Liang#,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 595-617, 2024, DOI:10.32604/cmes.2023.029367

    Abstract In view of the complex marine environment of navigation, especially in the case of multiple static and dynamic obstacles, the traditional obstacle avoidance algorithms applied to unmanned surface vehicles (USV) are prone to fall into the trap of local optimization. Therefore, this paper proposes an improved artificial potential field (APF) algorithm, which uses 5G communication technology to communicate between the USV and the control center. The algorithm introduces the USV discrimination mechanism to avoid the USV falling into local optimization when the USV encounter different obstacles in different scenarios. Considering the various scenarios between the USV and other dynamic obstacles… More > Graphic Abstract

    LSDA-APF: A Local Obstacle Avoidance Algorithm for Unmanned Surface Vehicles Based on 5G Communication Environment

  • Open Access

    ARTICLE

    Research and Application of a Multi-Field Co-Simulation Data Extraction Method Based on Adaptive Infinitesimal Element

    Changfu Wan1,2, Wenqiang Li1,2,*, Sitong Ling1,2, Yingdong Liu1,2, Jiahao Chen1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 321-348, 2024, DOI:10.32604/cmes.2023.029053

    Abstract Regarding the spatial profile extraction method of a multi-field co-simulation dataset, different extraction directions, locations, and numbers of profiles will greatly affect the representativeness and integrity of data. In this study, a multi-field co-simulation data extraction method based on adaptive infinitesimal elements is proposed. The multi-field co-simulation dataset based on related infinitesimal elements is constructed, and the candidate directions of data profile extraction undergo dimension reduction by principal component analysis to determine the direction of data extraction. Based on the fireworks algorithm, the data profile with optimal representativeness is searched adaptively in different data extraction intervals to realize the adaptive… More > Graphic Abstract

    Research and Application of a Multi-Field Co-Simulation Data Extraction Method Based on Adaptive Infinitesimal Element

  • Open Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang1,2, Xiang Liu2, Lei Liu2, Shangchao Wang2, Baichuan Shao3, Yang Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895

    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This scheme boasts strong key insulation… More >

  • Open Access

    ARTICLE

    Optimization of Cognitive Radio System Using Enhanced Firefly Algorithm

    Nitin Mittal1, Rohit Salgotra2,3, Abhishek Sharma4, Sandeep Kaur5, S. S. Askar6, Mohamed Abouhawwash7,8,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3159-3177, 2023, DOI:10.32604/iasc.2023.041059

    Abstract The optimization of cognitive radio (CR) system using an enhanced firefly algorithm (EFA) is presented in this work. The Firefly algorithm (FA) is a nature-inspired algorithm based on the unique light-flashing behavior of fireflies. It has already proved its competence in various optimization problems, but it suffers from slow convergence issues. To improve the convergence performance of FA, a new variant named EFA is proposed. The effectiveness of EFA as a good optimizer is demonstrated by optimizing benchmark functions, and simulation results show its superior performance compared to biogeography-based optimization (BBO), bat algorithm, artificial bee colony, and FA. As an… More >

  • Open Access

    ARTICLE

    A Novel Attack on Complex APUFs Using the Evolutionary Deep Convolutional Neural Network

    Ali Ahmadi Shahrakht1, Parisa Hajirahimi2, Omid Rostami3, Diego Martín4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3059-3081, 2023, DOI:10.32604/iasc.2023.040502

    Abstract As the internet of things (IoT) continues to expand rapidly, the significance of its security concerns has grown in recent years. To address these concerns, physical unclonable functions (PUFs) have emerged as valuable tools for enhancing IoT security. PUFs leverage the inherent randomness found in the embedded hardware of IoT devices. However, it has been shown that some PUFs can be modeled by attackers using machine-learning-based approaches. In this paper, a new deep learning (DL)-based modeling attack is introduced to break the resistance of complex XAPUFs. Because training DL models is a problem that falls under the category of NP-hard… More >

  • Open Access

    ARTICLE

    State Accurate Representation and Performance Prediction Algorithm Optimization for Industrial Equipment Based on Digital Twin

    Ying Bai1,*, Xiaoti Ren2, Hong Li1

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2999-3018, 2023, DOI:10.32604/iasc.2023.040124

    Abstract The combination of the Industrial Internet of Things (IIoT) and digital twin (DT) technology makes it possible for the DT model to realize the dynamic perception of equipment status and performance. However, conventional digital modeling is weak in the fusion and adjustment ability between virtual and real information. The performance prediction based on experience greatly reduces the inclusiveness and accuracy of the model. In this paper, a DT-IIoT optimization model is proposed to improve the real-time representation and prediction ability of the key equipment state. Firstly, a global real-time feedback and the dynamic adjustment mechanism is established by combining DT-IIoT… More >

  • Open Access

    ARTICLE

    Advanced Guided Whale Optimization Algorithm for Feature Selection in BlazePose Action Recognition

    Motasem S. Alsawadi1,*, El-Sayed M. El-kenawy2, Miguel Rio1

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2767-2782, 2023, DOI:10.32604/iasc.2023.039440

    Abstract The BlazePose, which models human body skeletons as spatiotemporal graphs, has achieved fantastic performance in skeleton-based action identification. Skeleton extraction from photos for mobile devices has been made possible by the BlazePose system. A Spatial-Temporal Graph Convolutional Network (STGCN) can then forecast the actions. The Spatial-Temporal Graph Convolutional Network (STGCN) can be improved by simply replacing the skeleton input data with a different set of joints that provide more information about the activity of interest. On the other hand, existing approaches require the user to manually set the graph’s topology and then fix it across all input layers and samples.… More >

Displaying 1-10 on page 1 of 1701. Per Page