Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (12,373)
  • Open Access

    ARTICLE

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

    Yu Zhang*, Lianmin Li, Zhongxiang Liu, Yuhu Wu

    Energy Engineering, Vol.121, No.5, pp. 1209-1221, 2024, DOI:10.32604/ee.2024.046141

    Abstract With the development of renewable energy technologies such as photovoltaics and wind power, it has become a research hotspot to improve the consumption rate of new energy and reduce energy costs through the deployment of energy storage. To solve the problem of the interests of different subjects in the operation of the energy storage power stations (ESS) and the integrated energy multi-microgrid alliance (IEMA), this paper proposes the optimization operation method of the energy storage power station and the IEMA based on the Stackelberg game. In the upper layer, ESS optimizes charging and discharging decisions through a dynamic pricing mechanism.… More > Graphic Abstract

    Research on Operation Optimization of Energy Storage Power Station and Integrated Energy Microgrid Alliance Based on Stackelberg Game

  • Open Access

    ARTICLE

    A Novel Defender-Attacker-Defender Model for Resilient Distributed Generator Planning with Network Reconfiguration and Demand Response

    Wenlu Ji*, Teng Tu, Nan Ma

    Energy Engineering, Vol.121, No.5, pp. 1223-1243, 2024, DOI:10.32604/ee.2024.046112

    Abstract To improve the resilience of a distribution system against extreme weather, a fuel-based distributed generator (DG) allocation model is proposed in this study. In this model, the DGs are placed at the planning stage. When an extreme event occurs, the controllable generators form temporary microgrids (MGs) to restore the load maximally. Simultaneously, a demand response program (DRP) mitigates the imbalance between the power supply and demand during extreme events. To cope with the fault uncertainty, a robust optimization (RO) method is applied to reduce the long-term investment and short-term operation costs. The optimization is formulated as a tri-level defender-attacker-defender (DAD)… More >

  • Open Access

    ARTICLE

    Research on Quantitative Identification of Three-Dimensional Connectivity of Fractured-Vuggy Reservoirs

    Xingliang Deng1, Peng Cao2,*, Yintao Zhang1, Yuhui Zhou3, Xiao Luo1, Liang Wang3

    Energy Engineering, Vol.121, No.5, pp. 1195-1207, 2024, DOI:10.32604/ee.2023.045870

    Abstract The fractured-vuggy carbonate oil resources in the western basin of China are extremely rich. The connectivity of carbonate reservoirs is complex, and there is still a lack of clear understanding of the development and topological structure of the pore space in fractured-vuggy reservoirs. Thus, effective prediction of fractured-vuggy reservoirs is difficult. In view of this, this work employs adaptive point cloud technology to reproduce the shape and capture the characteristics of a fractured-vuggy reservoir. To identify the complex connectivity among pores, fractures, and vugs, a simplified one-dimensional connectivity model is established by using the meshless connection element method (CEM). Considering… More >

  • Open Access

    ARTICLE

    Desired Dynamic Equation for Primary Frequency Modulation Control of Gas Turbines

    Aimin Gao1, Xiaobo Cui2,*, Guoqiang Yu1, Jianjun Shu1, Tianhai Zhang1

    Energy Engineering, Vol.121, No.5, pp. 1347-1361, 2024, DOI:10.32604/ee.2023.045805

    Abstract Gas turbines play core roles in clean energy supply and the construction of comprehensive energy systems. The control performance of primary frequency modulation of gas turbines has a great impact on the frequency control of the power grid. However, there are some control difficulties in the primary frequency modulation control of gas turbines, such as the coupling effect of the fuel control loop and speed control loop, slow tracking speed, and so on. To relieve the abovementioned difficulties, a control strategy based on the desired dynamic equation proportional integral (DDE-PI) is proposed in this paper. Based on the parameter stability… More >

  • Open Access

    ARTICLE

    Side-Channel Leakage Analysis of Inner Product Masking

    Yuyuan Li1,2, Lang Li1,2,*, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1245-1262, 2024, DOI:10.32604/cmc.2024.049882

    Abstract The Inner Product Masking (IPM) scheme has been shown to provide higher theoretical security guarantees than the Boolean Masking (BM). This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security. Some previous work unfolds when certain (adversarial and implementation) conditions are met, and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour. In this paper, we investigate the security characteristics of IPM under different conditions. In adversarial condition, the security properties of first-order IPMs obtained through parametric characterization are preserved in the face… More >

  • Open Access

    ARTICLE

    A Multi-Constraint Path Optimization Scheme Based on Information Fusion in Software Defined Network

    Jinlin Xu1,2, Wansu Pan1,*, Longle Cheng1,2, Haibo Tan1,2, Munan Yuan1,*, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1399-1418, 2024, DOI:10.32604/cmc.2024.049622

    Abstract The existing multipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is a lack of cooperation between the terminal and network sides, making it difficult to achieve dynamic adaptation of service requirements and network resources. To address these issues, we propose a multi-constraint path optimization scheme based on information fusion in SDN. The proposed scheme collects network topology and network state information on the network side and computes disjoint paths between end hosts. It uses the Fuzzy Analytic Hierarchy Process (FAHP) to calculate the weight coefficients of multiple constrained parameters and constructs a composite quality… More >

  • Open Access

    ARTICLE

    Complementary-Label Adversarial Domain Adaptation Fault Diagnosis Network under Time-Varying Rotational Speed and Weakly-Supervised Conditions

    Siyuan Liu1,*, Jinying Huang2, Jiancheng Ma1, Licheng Jing2, Yuxuan Wang2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 761-777, 2024, DOI:10.32604/cmc.2024.049484

    Abstract Recent research in cross-domain intelligence fault diagnosis of machinery still has some problems, such as relatively ideal speed conditions and sample conditions. In engineering practice, the rotational speed of the machine is often transient and time-varying, which makes the sample annotation increasingly expensive. Meanwhile, the number of samples collected from different health states is often unbalanced. To deal with the above challenges, a complementary-label (CL) adversarial domain adaptation fault diagnosis network (CLADAN) is proposed under time-varying rotational speed and weakly-supervised conditions. In the weakly supervised learning condition, machine prior information is used for sample annotation via cost-friendly complementary label learning.… More >

  • Open Access

    ARTICLE

    CrossFormer Embedding DeepLabv3+ for Remote Sensing Images Semantic Segmentation

    Qixiang Tong, Zhipeng Zhu, Min Zhang, Kerui Cao, Haihua Xing*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1353-1375, 2024, DOI:10.32604/cmc.2024.049187

    Abstract High-resolution remote sensing image segmentation is a challenging task. In urban remote sensing, the presence of occlusions and shadows often results in blurred or invisible object boundaries, thereby increasing the difficulty of segmentation. In this paper, an improved network with a cross-region self-attention mechanism for multi-scale features based on DeepLabv3+ is designed to address the difficulties of small object segmentation and blurred target edge segmentation. First, we use CrossFormer as the backbone feature extraction network to achieve the interaction between large- and small-scale features, and establish self-attention associations between features at both large and small scales to capture global contextual… More >

  • Open Access

    ARTICLE

    Automatic Road Tunnel Crack Inspection Based on Crack Area Sensing and Multiscale Semantic Segmentation

    Dingping Chen1, Zhiheng Zhu2, Jinyang Fu1,3, Jilin He1,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1679-1703, 2024, DOI:10.32604/cmc.2024.049048

    Abstract The detection of crack defects on the walls of road tunnels is a crucial step in the process of ensuring travel safety and performing routine tunnel maintenance. The automatic and accurate detection of cracks on the surface of road tunnels is the key to improving the maintenance efficiency of road tunnels. Machine vision technology combined with a deep neural network model is an effective means to realize the localization and identification of crack defects on the surface of road tunnels. We propose a complete set of automatic inspection methods for identifying cracks on the walls of road tunnels as a… More >

  • Open Access

    ARTICLE

    Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure

    Aodi Liu, Na Wang*, Xuehui Du, Dibin Shan, Xiangyu Wu, Wenjuan Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1705-1726, 2024, DOI:10.32604/cmc.2024.049011

    Abstract Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access control mechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy management efficiency and difficulty in accurately describing the access control policy. To overcome these problems, this paper proposes a big data access control mechanism based on a two-layer permission decision structure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes are introduced in the ABAC model as business constraints between entities. The proposed mechanism implements a two-layer permission decision structure composed of the inherent attributes of… More >

Displaying 11-20 on page 2 of 12373. Per Page