Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (434)
  • Open Access

    ARTICLE

    Adaptive Predefined-Time Backstepping Control for Grid Connected Photovoltaic Inverter

    Jiarui Zhang1, Dan Liu2,*, Kan Cao2, Ping Xiong2, Xiaotong Ji3, Yanze Xu1, Yunfei Mu1

    Energy Engineering, Vol.121, No.8, pp. 2065-2083, 2024, DOI:10.32604/ee.2024.050342

    Abstract The system performance of grid-connected photovoltaic (PV) has a serious impact on the grid stability. To improve the control performance and shorten the convergence time, a predefined-time controller based on backstepping technology and dynamic surface control is formulated for the inverter in the grid-connected photovoltaic. The time-varying tuning functions are introduced into state-tracking errors to realize the predefined-time control effect. To address the “computational explosion problem” in the design process of backstepping control, dynamic surface control is adopted to avoid the analytical calculations of virtual control. The disturbances of the PV system are estimated and More >

  • Open Access

    ARTICLE

    AFBNet: A Lightweight Adaptive Feature Fusion Module for Super-Resolution Algorithms

    Lirong Yin1, Lei Wang1, Siyu Lu2,*, Ruiyang Wang2, Haitao Ren2, Ahmed AlSanad3, Salman A. AlQahtani3, Zhengtong Yin4, Xiaolu Li5, Wenfeng Zheng3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2315-2347, 2024, DOI:10.32604/cmes.2024.050853

    Abstract At present, super-resolution algorithms are employed to tackle the challenge of low image resolution, but it is difficult to extract differentiated feature details based on various inputs, resulting in poor generalization ability. Given this situation, this study first analyzes the features of some feature extraction modules of the current super-resolution algorithm and then proposes an adaptive feature fusion block (AFB) for feature extraction. This module mainly comprises dynamic convolution, attention mechanism, and pixel-based gating mechanism. Combined with dynamic convolution with scale information, the network can extract more differentiated feature information. The introduction of a channel More >

  • Open Access

    ARTICLE

    A Data Intrusion Tolerance Model Based on an Improved Evolutionary Game Theory for the Energy Internet

    Song Deng1,*, Yiming Yuan2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3679-3697, 2024, DOI:10.32604/cmc.2024.052008

    Abstract Malicious attacks against data are unavoidable in the interconnected, open and shared Energy Internet (EI), Intrusion tolerant techniques are critical to the data security of EI. Existing intrusion tolerant techniques suffered from problems such as low adaptability, policy lag, and difficulty in determining the degree of tolerance. To address these issues, we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas: 1) it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights; and 2) it combines a tournament competition More >

  • Open Access

    ARTICLE

    Solar Radiation Estimation Based on a New Combined Approach of Artificial Neural Networks (ANN) and Genetic Algorithms (GA) in South Algeria

    Djeldjli Halima1,*, Benatiallah Djelloul1, Ghasri Mehdi2, Tanougast Camel3, Benatiallah Ali4, Benabdelkrim Bouchra1

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4725-4740, 2024, DOI:10.32604/cmc.2024.051002

    Abstract When designing solar systems and assessing the effectiveness of their many uses, estimating sun irradiance is a crucial first step. This study examined three approaches (ANN, GA-ANN, and ANFIS) for estimating daily global solar radiation (GSR) in the south of Algeria: Adrar, Ouargla, and Bechar. The proposed hybrid GA-ANN model, based on genetic algorithm-based optimization, was developed to improve the ANN model. The GA-ANN and ANFIS models performed better than the standalone ANN-based model, with GA-ANN being better suited for forecasting in all sites, and it performed the best with the best values in the… More > Graphic Abstract

    Solar Radiation Estimation Based on a New Combined Approach of Artificial Neural Networks (ANN) and Genetic Algorithms (GA) in South Algeria

  • Open Access

    ARTICLE

    GCAGA: A Gini Coefficient-Based Optimization Strategy for Computation Offloading in Multi-User-Multi-Edge MEC System

    Junqing Bai1, Qiuchao Dai1,*, Yingying Li2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5083-5103, 2024, DOI:10.32604/cmc.2024.050921

    Abstract To support the explosive growth of Information and Communications Technology (ICT), Mobile Edge Computing (MEC) provides users with low latency and high bandwidth service by offloading computational tasks to the network’s edge. However, resource-constrained mobile devices still suffer from a capacity mismatch when faced with latency-sensitive and compute-intensive emerging applications. To address the difficulty of running computationally intensive applications on resource-constrained clients, a model of the computation offloading problem in a network consisting of multiple mobile users and edge cloud servers is studied in this paper. Then a user benefit function EoU (Experience of Users) is… More >

  • Open Access

    ARTICLE

    Accelerated Particle Swarm Optimization Algorithm for Efficient Cluster Head Selection in WSN

    Imtiaz Ahmad1, Tariq Hussain2, Babar Shah3, Altaf Hussain4, Iqtidar Ali1, Farman Ali5,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3585-3629, 2024, DOI:10.32604/cmc.2024.050596

    Abstract Numerous wireless networks have emerged that can be used for short communication ranges where the infrastructure-based networks may fail because of their installation and cost. One of them is a sensor network with embedded sensors working as the primary nodes, termed Wireless Sensor Networks (WSNs), in which numerous sensors are connected to at least one Base Station (BS). These sensors gather information from the environment and transmit it to a BS or gathering location. WSNs have several challenges, including throughput, energy usage, and network lifetime concerns. Different strategies have been applied to get over these… More >

  • Open Access

    ARTICLE

    Coupling Analysis of Multiple Machine Learning Models for Human Activity Recognition

    Yi-Chun Lai1, Shu-Yin Chiang2, Yao-Chiang Kan3, Hsueh-Chun Lin4,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3783-3803, 2024, DOI:10.32604/cmc.2024.050376

    Abstract Artificial intelligence (AI) technology has become integral in the realm of medicine and healthcare, particularly in human activity recognition (HAR) applications such as fitness and rehabilitation tracking. This study introduces a robust coupling analysis framework that integrates four AI-enabled models, combining both machine learning (ML) and deep learning (DL) approaches to evaluate their effectiveness in HAR. The analytical dataset comprises 561 features sourced from the UCI-HAR database, forming the foundation for training the models. Additionally, the MHEALTH database is employed to replicate the modeling process for comparative purposes, while inclusion of the WISDM database, renowned… More > Graphic Abstract

    Coupling Analysis of Multiple Machine Learning Models for Human Activity Recognition

  • Open Access

    ARTICLE

    Scientific Elegance in NIDS: Unveiling Cardinality Reduction, Box-Cox Transformation, and ADASYN for Enhanced Intrusion Detection

    Amerah Alabrah*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3897-3912, 2024, DOI:10.32604/cmc.2024.048528

    Abstract The emergence of digital networks and the wide adoption of information on internet platforms have given rise to threats against users’ private information. Many intruders actively seek such private data either for sale or other inappropriate purposes. Similarly, national and international organizations have country-level and company-level private information that could be accessed by different network attacks. Therefore, the need for a Network Intruder Detection System (NIDS) becomes essential for protecting these networks and organizations. In the evolution of NIDS, Artificial Intelligence (AI) assisted tools and methods have been widely adopted to provide effective solutions. However,… More >

  • Open Access

    ARTICLE

    A Power Data Anomaly Detection Model Based on Deep Learning with Adaptive Feature Fusion

    Xiu Liu, Liang Gu*, Xin Gong, Long An, Xurui Gao, Juying Wu

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4045-4061, 2024, DOI:10.32604/cmc.2024.048442

    Abstract With the popularisation of intelligent power, power devices have different shapes, numbers and specifications. This means that the power data has distributional variability, the model learning process cannot achieve sufficient extraction of data features, which seriously affects the accuracy and performance of anomaly detection. Therefore, this paper proposes a deep learning-based anomaly detection model for power data, which integrates a data alignment enhancement technique based on random sampling and an adaptive feature fusion method leveraging dimension reduction. Aiming at the distribution variability of power data, this paper developed a sliding window-based data adjustment method for… More >

  • Open Access

    ARTICLE

    Adaptive Cloud Intrusion Detection System Based on Pruned Exact Linear Time Technique

    Widad Elbakri1, Maheyzah Md. Siraj1,*, Bander Ali Saleh Al-rimy1, Sultan Noman Qasem2, Tawfik Al-Hadhrami3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3725-3756, 2024, DOI:10.32604/cmc.2024.048105

    Abstract Cloud computing environments, characterized by dynamic scaling, distributed architectures, and complex workloads, are increasingly targeted by malicious actors. These threats encompass unauthorized access, data breaches, denial-of-service attacks, and evolving malware variants. Traditional security solutions often struggle with the dynamic nature of cloud environments, highlighting the need for robust Adaptive Cloud Intrusion Detection Systems (CIDS). Existing adaptive CIDS solutions, while offering improved detection capabilities, often face limitations such as reliance on approximations for change point detection, hindering their precision in identifying anomalies. This can lead to missed attacks or an abundance of false alarms, impacting overall… More >

Displaying 1-10 on page 1 of 434. Per Page