Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (662)
  • Open Access


    Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network

    Wei Wu, Liang Yu, Liping Yang*, Yadong Zhang, Peng Wang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 587-603, 2024, DOI:10.32604/cmc.2024.052655

    Abstract As an open network architecture, Wireless Computing Power Networks (WCPN) pose new challenges for achieving efficient and secure resource management in networks, because of issues such as insecure communication channels and untrusted device terminals. Blockchain, as a shared, immutable distributed ledger, provides a secure resource management solution for WCPN. However, integrating blockchain into WCPN faces challenges like device heterogeneity, monitoring communication states, and dynamic network nature. Whereas Digital Twins (DT) can accurately maintain digital models of physical entities through real-time data updates and self-learning, enabling continuous optimization of WCPN, improving synchronization performance, ensuring real-time accuracy, More >

  • Open Access


    Novel Fractal-Based Features for Low-Power Appliances in Non-Intrusive Load Monitoring

    Anam Mughees1,2,*, Muhammad Kamran1,3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 507-526, 2024, DOI:10.32604/cmc.2024.051820

    Abstract Non-intrusive load monitoring is a method that disaggregates the overall energy consumption of a building to estimate the electric power usage and operating status of each appliance individually. Prior studies have mostly concentrated on the identification of high-power appliances like HVAC systems while overlooking the existence of low-power appliances. Low-power consumer appliances have comparable power consumption patterns, which can complicate the detection task and can be mistaken as noise. This research tackles the problem of classification of low-power appliances and uses turn-on current transients to extract novel features and develop unique appliance signatures. A hybrid… More >

  • Open Access


    Cloud-Edge Collaborative Federated GAN Based Data Processing for IoT-Empowered Multi-Flow Integrated Energy Aggregation Dispatch

    Zhan Shi*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 973-994, 2024, DOI:10.32604/cmc.2024.051530

    Abstract The convergence of Internet of Things (IoT), 5G, and cloud collaboration offers tailored solutions to the rigorous demands of multi-flow integrated energy aggregation dispatch data processing. While generative adversarial networks (GANs) are instrumental in resource scheduling, their application in this domain is impeded by challenges such as convergence speed, inferior optimality searching capability, and the inability to learn from failed decision making feedbacks. Therefore, a cloud-edge collaborative federated GAN-based communication and computing resource scheduling algorithm with long-term constraint violation sensitiveness is proposed to address these challenges. The proposed algorithm facilitates real-time, energy-efficient data processing by More >

  • Open Access


    Thermodynamic Performance Analysis of Geothermal Power Plant Based on Organic Rankine Cycle (ORC) Using Mixture of Pure Working Fluids

    Abdul Sattar Laghari1, Mohammad Waqas Chandio1, Laveet Kumar2,*, Mamdouh El Haj Assad3

    Energy Engineering, Vol.121, No.8, pp. 2023-2038, 2024, DOI:10.32604/ee.2024.051082

    Abstract The selection of working fluid significantly impacts the geothermal ORC’s Efficiency. Using a mixture as a working fluid is a strategy to improve the output of geothermal ORC. In the current study, modelling and thermodynamic analysis of ORC, using geothermal as a heat source, is carried out at fixed operating conditions. The model is simulated in the Engineering Equation Solver (EES). An environment-friendly mixture of fluids, i.e., R245fa/R600a, with a suitable mole fraction, is used as the operating fluid. The mixture provided the most convenient results compared to the pure working fluid under fixed operating More >

  • Open Access


    Maximum Power Point Tracking Technology for PV Systems: Current Status and Perspectives

    Bo Yang1,2, Rui Xie1, Zhengxun Guo3,4,*

    Energy Engineering, Vol.121, No.8, pp. 2009-2022, 2024, DOI:10.32604/ee.2024.049423

    Abstract Maximum power point tracking (MPPT) technology plays a key role in improving the energy conversion efficiency of photovoltaic (PV) systems, especially when multiple local maximum power points (LMPPs) occur under partial shading conditions (PSC). It is necessary to modify the operating point efficiently and accurately with the help of MPPT technology to maximize the collected power. Even though a lot of research has been carried out and impressive progress achieved for MPPT technology, it still faces some challenges and dilemmas. Firstly, the mathematical model established for PV cells is not precise enough. Second, the existing… More > Graphic Abstract

    Maximum Power Point Tracking Technology for PV Systems: Current Status and Perspectives

  • Open Access


    Analyzing the Wind-Dominant Electricity Market under Coexistence of Regulated and Deregulated Power Trading

    Yirui Li1, Dongliang Xiao1,3,*, Haoyong Chen1, Weijun Cai1, Josue Campos do Prado2

    Energy Engineering, Vol.121, No.8, pp. 2093-2127, 2024, DOI:10.32604/ee.2024.049232

    Abstract Currently, both regulated and deregulated power trading exist in China’s power system, which has caused imbalanced funds in the electricity market. In this paper, a simulation analysis of the electricity market with wind energy resources is conducted, and the calculation methods of unbalanced funds are investigated systematically. In detail, the calculation formulas of unbalanced funds are illustrated based on their definition, and a two-track electricity market clearing model is established. Firstly, the concept of the dual-track system is explained, and the specific calculation formulas of various types of unbalanced funds are provided. Next, considering the More >

  • Open Access


    Ladder Time Stepwise Inertia Coordinated Control Method of Multiple Wind Farms to Suppress System Frequency Secondary Drop

    He Li1, Xianchao Liu2,*, Jidong Li1, Yuchen Qiu2

    Energy Engineering, Vol.121, No.8, pp. 2293-2311, 2024, DOI:10.32604/ee.2024.048752

    Abstract When employing stepwise inertial control (SIC), wind power generation can offer significant frequency support to the power system, concurrently mitigating energy shortages and suppressing secondary frequency drop. Nonetheless, further investigation is imperative for implementing stepped inertia control due to variations in frequency regulation capabilities and operational safety among diverse wind farm groups. Consequently, this paper advocates a multi-wind farm ladder timing SIC method designed to alleviate secondary drops in system frequency. Initially, the paper introduces the fundamental principles of stepped inertia control for a doubly-fed induction generator (DFIG) and deduces the relationship between support energy,… More >

  • Open Access


    A Disturbance Localization Method for Power System Based on Group Sparse Representation and Entropy Weight Method

    Zeyi Wang1, Mingxi Jiao1, Daliang Wang1, Minxu Liu1, Minglei Jiang2, He Wang3, Shiqiang Li3,*

    Energy Engineering, Vol.121, No.8, pp. 2275-2291, 2024, DOI:10.32604/ee.2024.028223

    Abstract This paper addresses the problem of complex and challenging disturbance localization in the current power system operation environment by proposing a disturbance localization method for power systems based on group sparse representation and entropy weight method. Three different electrical quantities are selected as observations in the compressed sensing algorithm. The entropy weighting method is employed to calculate the weights of different observations based on their relative disturbance levels. Subsequently, by leveraging the topological information of the power system and pre-designing an overcomplete dictionary of disturbances based on the corresponding system parameter variations caused by disturbances,… More >

  • Open Access


    CoopAI-Route: DRL Empowered Multi-Agent Cooperative System for Efficient QoS-Aware Routing for Network Slicing in Multi-Domain SDN

    Meignanamoorthi Dhandapani*, V. Vetriselvi, R. Aishwarya

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2449-2486, 2024, DOI:10.32604/cmes.2024.050986

    Abstract The emergence of beyond 5G networks has the potential for seamless and intelligent connectivity on a global scale. Network slicing is crucial in delivering services for different, demanding vertical applications in this context. Next-generation applications have time-sensitive requirements and depend on the most efficient routing path to ensure packets reach their intended destinations. However, the existing IP (Internet Protocol) over a multi-domain network faces challenges in enforcing network slicing due to minimal collaboration and information sharing among network operators. Conventional inter-domain routing methods, like Border Gateway Protocol (BGP), cannot make routing decisions based on performance,… More >

  • Open Access


    SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm

    Jiahui Liu1,2, Lang Li1,2,*, Di Li1,2, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4641-4657, 2024, DOI:10.32604/cmc.2024.051613

    Abstract Correlation power analysis (CPA) combined with genetic algorithms (GA) now achieves greater attack efficiency and can recover all subkeys simultaneously. However, two issues in GA-based CPA still need to be addressed: key degeneration and slow evolution within populations. These challenges significantly hinder key recovery efforts. This paper proposes a screening correlation power analysis framework combined with a genetic algorithm, named SFGA-CPA, to address these issues. SFGA-CPA introduces three operations designed to exploit CPA characteristics: propagative operation, constrained crossover, and constrained mutation. Firstly, the propagative operation accelerates population evolution by maximizing the number of correct bytes… More >

Displaying 1-10 on page 1 of 662. Per Page