Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,182)
  • Open Access

    ARTICLE

    A Compact UHF Antenna Based on Hilbert Fractal Elements and a Serpentine Arrangement for Detecting Partial Discharge

    Xiang Lin1,*, Jian Fang1, Ming Zhang1, Kuang Yin1, Yan Tian1, Yingfei Guo2, Qianggang Wang2

    Energy Engineering, Vol.121, No.5, pp. 1127-1141, 2024, DOI:10.32604/ee.2024.046861

    Abstract Efforts to protect electric power systems from faults have commonly relied on the use of ultra-high frequency (UHF) antennas for detecting partial discharge (PD) as a common precursor to faults. However, the effectiveness of existing UHF antennas suffers from a number of challenges such as limited bandwidth, relatively large physical size, and low detection sensitivity. The present study addresses these issues by proposing a compact microstrip patch antenna with fixed dimensions of 100 mm × 100 mm × 1.6 mm. The results of computations yield an optimized antenna design consisting of 2nd-order Hilbert fractal units positioned within a four-layer serpentine… More > Graphic Abstract

    A Compact UHF Antenna Based on Hilbert Fractal Elements and a Serpentine Arrangement for Detecting Partial Discharge

  • Open Access

    ARTICLE

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

    Yu Zhang*, Lianmin Li, Zhongxiang Liu, Yuhu Wu

    Energy Engineering, Vol.121, No.5, pp. 1209-1221, 2024, DOI:10.32604/ee.2024.046141

    Abstract With the development of renewable energy technologies such as photovoltaics and wind power, it has become a research hotspot to improve the consumption rate of new energy and reduce energy costs through the deployment of energy storage. To solve the problem of the interests of different subjects in the operation of the energy storage power stations (ESS) and the integrated energy multi-microgrid alliance (IEMA), this paper proposes the optimization operation method of the energy storage power station and the IEMA based on the Stackelberg game. In the upper layer, ESS optimizes charging and discharging decisions through a dynamic pricing mechanism.… More > Graphic Abstract

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

  • Open Access

    ARTICLE

    Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier

    Khaled Soliman1,*, Mohamed Sobh2, Ayman M. Bahaa-Eldin2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1419-1439, 2024, DOI:10.32604/cmc.2024.048883

    Abstract The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leads to wide losses for various organizations. These dangers have proven that signature-based approaches are insufficient to prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious Executable Detection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE) files in hosts using Windows operating systems through collecting PE headers and applying machine learning mechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031 benign files and 179,071 malware samples from diverse sources to ensure the efficiency… More >

  • Open Access

    REVIEW

    Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges

    Shafi Ullah1, Sibghat Ullah Bazai1,*, Mohammad Imran2, Qazi Mudassar Ilyas3,*, Abid Mehmood4, Muhammad Asim Saleem5, Muhmmad Aasim Rafique3, Arsalan Haider6, Ilyas Khan7, Sajid Iqbal3, Yonis Gulzar4, Kauser Hameed3

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 93-115, 2024, DOI:10.32604/cmc.2024.048796

    Abstract Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine-type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the data and devices becomes challenging… More >

  • Open Access

    ARTICLE

    Alternative Method of Constructing Granular Neural Networks

    Yushan Yin1, Witold Pedrycz1,2, Zhiwu Li1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 623-650, 2024, DOI:10.32604/cmc.2024.048787

    Abstract Utilizing granular computing to enhance artificial neural network architecture, a new type of network emerges—the granular neural network (GNN). GNNs offer distinct advantages over their traditional counterparts: The ability to process both numerical and granular data, leading to improved interpretability. This paper proposes a novel design method for constructing GNNs, drawing inspiration from existing interval-valued neural networks built upon NNNs. However, unlike the proposed algorithm in this work, which employs interval values or triangular fuzzy numbers for connections, existing methods rely on a pre-defined numerical network. This new method utilizes a uniform distribution of information granularity to granulate connections with… More >

  • Open Access

    ARTICLE

    Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble

    Amardeep Singh1, Hamad Ali Abosaq2, Saad Arif3, Zohaib Mushtaq4,*, Muhammad Irfan5, Ghulam Abbas6, Arshad Ali7, Alanoud Al Mazroa8

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 857-873, 2024, DOI:10.32604/cmc.2024.048036

    Abstract Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries, especially in light of the growing number of cybersecurity threats. A major and ever-present threat is Ransomware-as-a-Service (RaaS) assaults, which enable even individuals with minimal technical knowledge to conduct ransomware operations. This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models. For this purpose, the network intrusion detection dataset “UNSW-NB15” from the Intelligent Security Group of the University of New South Wales, Australia is analyzed. In the initial phase, the rectified linear… More >

  • Open Access

    ARTICLE

    ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things

    Yan Xiang1,2, Daofeng Li1,2,*, Xinyi Meng1,2, Chengfeng Dong1,2, Guanglin Qin1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1005-1023, 2024, DOI:10.32604/cmc.2024.047143

    Abstract The rapid expansion of Internet of Things (IoT) devices across various sectors is driven by steadily increasing demands for interconnected and smart technologies. Nevertheless, the surge in the number of IoT device has caught the attention of cyber hackers, as it provides them with expanded avenues to access valuable data. This has resulted in a myriad of security challenges, including information leakage, malware propagation, and financial loss, among others. Consequently, developing an intrusion detection system to identify both active and potential intrusion traffic in IoT networks is of paramount importance. In this paper, we propose ResNeSt-biGRU, a practical intrusion detection… More >

  • Open Access

    ARTICLE

    A Hybrid Cybersecurity Algorithm for Digital Image Transmission over Advanced Communication Channel Models

    Naglaa F. Soliman1, Fatma E. Fadl-Allah2, Walid El-Shafai3,4,*, Mahmoud I. Aly2, Maali Alabdulhafith1, Fathi E. Abd El-Samie1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 201-241, 2024, DOI:10.32604/cmc.2024.046757

    Abstract The efficient transmission of images, which plays a large role in wireless communication systems, poses a significant challenge in the growth of multimedia technology. High-quality images require well-tuned communication standards. The Single Carrier Frequency Division Multiple Access (SC-FDMA) is adopted for broadband wireless communications, because of its low sensitivity to carrier frequency offsets and low Peak-to-Average Power Ratio (PAPR). Data transmission through open-channel networks requires much concentration on security, reliability, and integrity. The data need a space away from unauthorized access, modification, or deletion. These requirements are to be fulfilled by digital image watermarking and encryption. This paper is mainly… More >

  • Open Access

    ARTICLE

    The Lambert-G Family: Properties, Inference, and Applications

    Jamal N. Al Abbasi1, Ahmed Z. Afify2,*, Badr Alnssyan3,*, Mustafa S. Shama4,5

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 513-536, 2024, DOI:10.32604/cmes.2024.046533

    Abstract This study proposes a new flexible family of distributions called the Lambert-G family. The Lambert family is very flexible and exhibits desirable properties. Its three-parameter special sub-models provide all significant monotonic and non-monotonic failure rates. A special sub-model of the Lambert family called the Lambert-Lomax (LL) distribution is investigated. General expressions for the LL statistical properties are established. Characterizations of the LL distribution are addressed mathematically based on its hazard function. The estimation of the LL parameters is discussed using six estimation methods. The performance of this estimation method is explored through simulation experiments. The usefulness and flexibility of the… More >

  • Open Access

    ARTICLE

    Matrix Assisted Laser Desorption Ionization Time of Flight (MALDI-TOF)-Mass Spectrometry and 13C-NMR-Identified New Compounds in Paraberlinia bifoliolata (Ekop-Beli) Bark Tannins

    Liliane Nga1, Benoit Ndiwe1,2, Achille Bernard Biwolé1, Antonio Pizzi3,*, Jean Jalin Eyinga Biwole1, Joseph Zobo Mfomo1

    Journal of Renewable Materials, Vol.12, No.3, pp. 553-568, 2024, DOI:10.32604/jrm.2023.046568

    Abstract Extracts of plant origin, particularly tannins, are attracting growing interest for the sustainable development of materials in the industrial sector. The discovery of new tannins is therefore necessary. The aim of this work was to contribute to the understanding of the properties of Paraberlinia bifoliolata tannin by Matrix Assisted Laser Desorption Ionization Time of Flight Mass Spectroscopy MALDI-TOF/MS and Carbon 13 Nuclear Magnetic Resonance (13C NMR). The chemical composition of tannin extracted from Paraberlinia bifoliolata bark was determined, as was the mechanical strength of the resin hardened with Acacia nilotica extracts. Yield by successive water extraction was 35%. MALDI-TOF/MS analysis… More >

Displaying 1-10 on page 1 of 1182. Per Page