Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (139)
  • Open Access

    ARTICLE

    Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, Syeda Wajiha Zahra1, Shahab S. Band3, Amir Mosavi4,5,6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2625-2640, 2023, DOI:10.32604/cmc.2023.030899 - 31 October 2022

    Abstract Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud… More >

  • Open Access

    ARTICLE

    Coordinated Rotor-Side Control Strategy for Doubly-Fed Wind Turbine under Symmetrical and Asymmetrical Grid Faults

    Quanchun Yan1,2,*, Chao Yuan1, Wen Gu1, Yanan Liu1, Yiming Tang1

    Energy Engineering, Vol.120, No.1, pp. 49-68, 2023, DOI:10.32604/ee.2022.018555 - 27 October 2022

    Abstract In order to solve the problems of rotor overvoltage, overcurrent and DC side voltage rise caused by grid voltage drops, a coordinated control strategy based on symmetrical and asymmetrical low voltage ride through of rotor side converter of the doubly-fed generator is proposed. When the power grid voltage drops symmetrically, the generator approximate equation under steady-state conditions is no longer applicable. Considering the dynamic process of stator current excitation, according to the change of stator flux and the depth of voltage drop, the system can dynamically provide reactive power support for parallel nodes and suppress… More >

  • Open Access

    ARTICLE

    Robust Frequency Estimation Under Additive Symmetric α-Stable Gaussian Mixture Noise

    Peng Wang1, Yulu Tian2, Bolong Men1,*, Hailong Song1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 83-95, 2023, DOI:10.32604/iasc.2023.027602 - 29 September 2022

    Abstract Here the estimating problem of a single sinusoidal signal in the additive symmetric α-stable Gaussian (ASαSG) noise is investigated. The ASαSG noise here is expressed as the additive of a Gaussian noise and a symmetric α-stable distributed variable. As the probability density function (PDF) of the ASαSG is complicated, traditional estimators cannot provide optimum estimates. Based on the Metropolis-Hastings (M-H) sampling scheme, a robust frequency estimator is proposed for ASαSG noise. Moreover, to accelerate the convergence rate of the developed algorithm, a new criterion of reconstructing the proposal covariance is derived, whose main idea is More >

  • Open Access

    ARTICLE

    Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm

    Awny Sayed1,2, Maha Mahrous3, Enas Elgeldawi1,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1723-1734, 2023, DOI:10.32604/cmc.2023.032838 - 22 September 2022

    Abstract Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern. A robust data security system should protect the information assets of any organization against cybercriminal activities. The Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid convergence. But when it comes to security, it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better security. Many applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the… More >

  • Open Access

    ARTICLE

    Stability Scrutinization of Agrawal Axisymmetric Flow of Nanofluid through a Permeable Moving Disk Due to Renewable Solar Radiation with Smoluchowski Temperature and Maxwell Velocity Slip Boundary Conditions

    Umair Khan1,2, Aurang Zaib3, Anuar Ishak1, Iskandar Waini4, El-Sayed M. Sherif5, Dumitru Baleanu6,7,8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 1371-1392, 2023, DOI:10.32604/cmes.2022.020911 - 31 August 2022

    Abstract The utilization of solar energy is essential to all living things since the beginning of time. In addition to being a constant source of energy, solar energy (SE) can also be used to generate heat and electricity. Recent technology enables to convert the solar energy into electricity by using thermal solar heat. Solar energy is perhaps the most easily accessible and plentiful source of sustainable energy. Copper-based nanofluid has been considered as a method to improve solar collector performance by absorbing incoming solar energy directly. The goal of this research is to explore theoretically the… More >

  • Open Access

    ARTICLE

    Numerical Study of Natural Convective Heat Transfer in an Air Filled Square Cavity Heated from Below and Symmetrically Cooled from the Sides with a Partition in the Hot Wall

    Farah Zemani-Kaci*, Amina Sabeur-Bendhina

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.2, pp. 513-539, 2023, DOI:10.32604/fdmp.2022.021974 - 29 August 2022

    Abstract A two-dimensional numerical study of laminar natural convection in a square enclosure filled with air with a wall partially heated on the bottom is presented. The heat source is located on the lower wall with different heated widths varied from 20 to 80%(ε = 0.2–0.8) of the total width of the lower wall and different heights h = H/4 and H/2 of the partition. The effect of the partition height on the main system dynamics is investigated through solution of the two-dimensional Navier–Stokes equations and the energy equation by means of a finite volume method More > Graphic Abstract

    Numerical Study of Natural Convective Heat Transfer in an Air Filled Square Cavity Heated from Below and Symmetrically Cooled from the Sides with a Partition in the Hot Wall

  • Open Access

    ARTICLE

    Experimental Investigation of Regular or Wavy Two-Phase Flow in a Manifold

    Xiaowei Nie1, Lihui Ma2,*, Yiqiu Xu3, Dong Sun2, Weibo Zheng2, Liang Zhou2, Xiaodong Wang2, Xiaohan Zhang2, Weijia Dong2, Yunfei Li2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.1, pp. 37-50, 2023, DOI:10.32604/fdmp.2023.021118 - 02 August 2022

    Abstract An experimental study was conducted to investigate the properties of stratified regular or wavy two-phase flow in two parallel separators located after a manifold. A total of 103 experiments with various gas and liquid velocity combinations in three inlet pipes were conducted, including 77 groups of outlet pipe resistance symmetry and 26 groups of outlet pipe resistance asymmetry trials. The experimental results have revealed that when the gas-liquid flow rate is low, the degree of uneven splitting is high, and “extreme” conditions are attained. When the superficial gas velocity is greater than that established in More >

  • Open Access

    ARTICLE

    Modelling a Learning-Based Dynamic Tree Routing Model for Wireless Mesh Access Networks

    N. Krishnammal1,*, C. Kalaiarasan2, A. Bharathi3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1531-1549, 2023, DOI:10.32604/csse.2023.024251 - 15 June 2022

    Abstract Link asymmetry in wireless mesh access networks (WMAN) of Mobile ad-hoc Networks (MANETs) is due mesh routers’ transmission range. It is depicted as significant research challenges that pose during the design of network protocol in wireless networks. Based on the extensive review, it is noted that the substantial link percentage is symmetric, i.e., many links are unidirectional. It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message. Therefore, the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asymmetric links. It paves the way to exploit… More >

  • Open Access

    ARTICLE

    Main Melody Configuration and Chord Algorithm for Relaxing Music Generation

    Chih-Fang Huang1,*, Ai-Hsien Fan2, Jin-Huang Huang3, Hsing-Cheng Huang3

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 661-673, 2023, DOI:10.32604/iasc.2023.027165 - 06 June 2022

    Abstract This study applies the diatonic chord in music theory, utilization rate, and the close relationship between the main chord system, the dominant chord system, and the subordinate chord system. From the perspective of music theory, the computer can automatically and quickly analyze the music, and establish a set of algorithms for configuring the chord accompaniment for the main melody, called the symmetrical circle of fifths algorithm, SCFA (Symmetrical Circle of Fifths Algorithm). SCFA can immediately confirm the key, perform harmony analysis, configure chord accompaniment for the main melody, and effectively and correctly complete any given More >

  • Open Access

    ARTICLE

    Fault Ride-Through (FRT) Behavior in VSC-HVDC as Key Enabler of Transmission Systems Using SCADA Viewer Software

    Samuel Bimenyimana1, Chen Wang1,*, Godwin Norense Osarumwense Asemota2, Aphrodis Nduwamungu2, Francis Mulolani6, Jean De Dieu Niyonteze8, Shilpi Bora1,7, Chun-Ling Ho1, Noel Hagumimana3, Theobald Habineza4, Waqar Bashir5, Yiyi Mo1

    Energy Engineering, Vol.119, No.6, pp. 2369-2406, 2022, DOI:10.32604/ee.2022.019257 - 14 September 2022

    Abstract The world’s energy consumption and power generation demand will continue to rise. Furthermore, the bulk of the energy resources needed to satisfy the rising demand is far from the load centers. The aforementioned requires long-distance transmission systems and one way to accomplish this is to use high voltage direct current (HVDC) transmission systems. The main technical issues for HVDC transmission systems are loss of synchronism, variation of quadrature currents, amplitude, the inability of station 1 (rectifier), and station 2 (inverter) to either inject, or absorb active, or reactive power in the network in any circumstances… More >

Displaying 31-40 on page 4 of 139. Per Page