Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6,702)
  • Open Access

    ARTICLE

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

    Yu Zhang*, Lianmin Li, Zhongxiang Liu, Yuhu Wu

    Energy Engineering, Vol.121, No.5, pp. 1209-1221, 2024, DOI:10.32604/ee.2024.046141

    Abstract With the development of renewable energy technologies such as photovoltaics and wind power, it has become a research hotspot to improve the consumption rate of new energy and reduce energy costs through the deployment of energy storage. To solve the problem of the interests of different subjects in the operation of the energy storage power stations (ESS) and the integrated energy multi-microgrid alliance (IEMA), this paper proposes the optimization operation method of the energy storage power station and the IEMA based on the Stackelberg game. In the upper layer, ESS optimizes charging and discharging decisions through a dynamic pricing mechanism.… More > Graphic Abstract

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

  • Open Access

    ARTICLE

    Combo Packet: An Encryption Traffic Classification Method Based on Contextual Information

    Yuancong Chai, Yuefei Zhu*, Wei Lin, Ding Li

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1223-1243, 2024, DOI:10.32604/cmc.2024.049904

    Abstract With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has become a core key technology in network supervision. In recent years, many different solutions have emerged in this field. Most methods identify and classify traffic by extracting spatiotemporal characteristics of data flows or byte-level features of packets. However, due to changes in data transmission mediums, such as fiber optics and satellites, temporal features can exhibit significant variations due to changes in communication links and transmission quality. Additionally, partial spatial features can change due to reasons like data reordering and retransmission. Faced with these challenges, identifying… More >

  • Open Access

    ARTICLE

    A Multi-Constraint Path Optimization Scheme Based on Information Fusion in Software Defined Network

    Jinlin Xu1,2, Wansu Pan1,*, Longle Cheng1,2, Haibo Tan1,2, Munan Yuan1,*, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1399-1418, 2024, DOI:10.32604/cmc.2024.049622

    Abstract The existing multipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is a lack of cooperation between the terminal and network sides, making it difficult to achieve dynamic adaptation of service requirements and network resources. To address these issues, we propose a multi-constraint path optimization scheme based on information fusion in SDN. The proposed scheme collects network topology and network state information on the network side and computes disjoint paths between end hosts. It uses the Fuzzy Analytic Hierarchy Process (FAHP) to calculate the weight coefficients of multiple constrained parameters and constructs a composite quality… More >

  • Open Access

    ARTICLE

    An Elite-Class Teaching-Learning-Based Optimization for Reentrant Hybrid Flow Shop Scheduling with Bottleneck Stage

    Deming Lei, Surui Duan, Mingbo Li*, Jing Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 47-63, 2024, DOI:10.32604/cmc.2024.049481

    Abstract Bottleneck stage and reentrance often exist in real-life manufacturing processes; however, the previous research rarely addresses these two processing conditions in a scheduling problem. In this study, a reentrant hybrid flow shop scheduling problem (RHFSP) with a bottleneck stage is considered, and an elite-class teaching-learning-based optimization (ETLBO) algorithm is proposed to minimize maximum completion time. To produce high-quality solutions, teachers are divided into formal ones and substitute ones, and multiple classes are formed. The teacher phase is composed of teacher competition and teacher teaching. The learner phase is replaced with a reinforcement search of the elite class. Adaptive adjustment on… More >

  • Open Access

    ARTICLE

    Automatic Road Tunnel Crack Inspection Based on Crack Area Sensing and Multiscale Semantic Segmentation

    Dingping Chen1, Zhiheng Zhu2, Jinyang Fu1,3, Jilin He1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1679-1703, 2024, DOI:10.32604/cmc.2024.049048

    Abstract The detection of crack defects on the walls of road tunnels is a crucial step in the process of ensuring travel safety and performing routine tunnel maintenance. The automatic and accurate detection of cracks on the surface of road tunnels is the key to improving the maintenance efficiency of road tunnels. Machine vision technology combined with a deep neural network model is an effective means to realize the localization and identification of crack defects on the surface of road tunnels. We propose a complete set of automatic inspection methods for identifying cracks on the walls of road tunnels as a… More >

  • Open Access

    ARTICLE

    Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure

    Aodi Liu, Na Wang*, Xuehui Du, Dibin Shan, Xiangyu Wu, Wenjuan Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1705-1726, 2024, DOI:10.32604/cmc.2024.049011

    Abstract Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access control mechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy management efficiency and difficulty in accurately describing the access control policy. To overcome these problems, this paper proposes a big data access control mechanism based on a two-layer permission decision structure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes are introduced in the ABAC model as business constraints between entities. The proposed mechanism implements a two-layer permission decision structure composed of the inherent attributes of… More >

  • Open Access

    ARTICLE

    Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier

    Khaled Soliman1,*, Mohamed Sobh2, Ayman M. Bahaa-Eldin2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1419-1439, 2024, DOI:10.32604/cmc.2024.048883

    Abstract The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leads to wide losses for various organizations. These dangers have proven that signature-based approaches are insufficient to prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious Executable Detection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE) files in hosts using Windows operating systems through collecting PE headers and applying machine learning mechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031 benign files and 179,071 malware samples from diverse sources to ensure the efficiency… More >

  • Open Access

    ARTICLE

    A Novel Foreign Object Detection Method in Transmission Lines Based on Improved YOLOv8n

    Yakui Liu1,2,3,*, Xing Jiang1, Ruikang Xu1, Yihao Cui1, Chenhui Yu1, Jingqi Yang1, Jishuai Zhou1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1263-1279, 2024, DOI:10.32604/cmc.2024.048864

    Abstract The rapid pace of urban development has resulted in the widespread presence of construction equipment and increasingly complex conditions in transmission corridors. These conditions pose a serious threat to the safe operation of the power grid. Machine vision technology, particularly object recognition technology, has been widely employed to identify foreign objects in transmission line images. Despite its wide application, the technique faces limitations due to the complex environmental background and other auxiliary factors. To address these challenges, this study introduces an improved YOLOv8n. The traditional stepwise convolution and pooling layers are replaced with a spatial-depth convolution (SPD-Conv) module, aiming to… More >

  • Open Access

    ARTICLE

    Research on Driver’s Fatigue Detection Based on Information Fusion

    Meiyan Zhang1, Boqi Zhao1, Jipu Li2, Qisong Wang1,*, Dan Liu1, Jinwei Sun1, Jingxiao Liao1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1039-1061, 2024, DOI:10.32604/cmc.2024.048643

    Abstract Driving fatigue is a physiological phenomenon that often occurs during driving. After the driver enters a fatigued state, the attention is lax, the response is slow, and the ability to deal with emergencies is significantly reduced, which can easily cause traffic accidents. Therefore, studying driver fatigue detection methods is significant in ensuring safe driving. However, the fatigue state of actual drivers is easily interfered with by the external environment (glasses and light), which leads to many problems, such as weak reliability of fatigue driving detection. Moreover, fatigue is a slow process, first manifested in physiological signals and then reflected in… More >

  • Open Access

    ARTICLE

    Anomaly Detection Algorithm of Power System Based on Graph Structure and Anomaly Attention

    Yifan Gao*, Jieming Zhang, Zhanchen Chen, Xianchao Chen

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 493-507, 2024, DOI:10.32604/cmc.2024.048615

    Abstract In this paper, we propose a novel anomaly detection method for data centers based on a combination of graph structure and abnormal attention mechanism. The method leverages the sensor monitoring data from target power substations to construct multidimensional time series. These time series are subsequently transformed into graph structures, and corresponding adjacency matrices are obtained. By incorporating the adjacency matrices and additional weights associated with the graph structure, an aggregation matrix is derived. The aggregation matrix is then fed into a pre-trained graph convolutional neural network (GCN) to extract graph structure features. Moreover, both the multidimensional time series segments and… More >

Displaying 11-20 on page 2 of 6702. Per Page