Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (221)
  • Open Access

    ARTICLE

    Deep-Ensemble Learning Method for Solar Resource Assessment of Complex Terrain Landscapes

    Lifeng Li1, Zaimin Yang1, Xiongping Yang1, Jiaming Li2, Qianyufan Zhou3,*, Ping Yang3

    Energy Engineering, Vol.121, No.5, pp. 1329-1346, 2024, DOI:10.32604/ee.2023.046447

    Abstract As the global demand for renewable energy grows, solar energy is gaining attention as a clean, sustainable energy source. Accurate assessment of solar energy resources is crucial for the siting and design of photovoltaic power plants. This study proposes an integrated deep learning-based photovoltaic resource assessment method. Ensemble learning and deep learning methods are fused for photovoltaic resource assessment for the first time. The proposed method combines the random forest, gated recurrent unit, and long short-term memory to effectively improve the accuracy and reliability of photovoltaic resource assessment. The proposed method has strong adaptability and high accuracy even in the… More >

  • Open Access

    ARTICLE

    The Effects of the Geometry of a Current Collector with an Equal Open Ratio on Output Power of a Direct Methanol Fuel Cell

    Yingli Zhu1,*, Jiachi Xie1, Mingwei Zhu1, Jun Zhang2, Miaomiao Li3

    Energy Engineering, Vol.121, No.5, pp. 1161-1172, 2024, DOI:10.32604/ee.2024.041205

    Abstract The open ratio of a current collector has a great impact on direct methanol fuel cell (DMFC) performance. Although a number of studies have investigated the influence of the open ratio of DMFC current collectors, far too little attention has been given to how geometry (including the shape and feature size of the flow field) affects a current collector with an equal open ratio. In this paper, perforated and parallel current collectors with an equal open ratio of 50% and different feature sizes are designed, and the corresponding experimental results are shown to explain the geometry effects on the output… More >

  • Open Access

    ARTICLE

    Sentiment Analysis of Low-Resource Language Literature Using Data Processing and Deep Learning

    Aizaz Ali1, Maqbool Khan1,2, Khalil Khan3, Rehan Ullah Khan4, Abdulrahman Aloraini4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 713-733, 2024, DOI:10.32604/cmc.2024.048712

    Abstract Sentiment analysis, a crucial task in discerning emotional tones within the text, plays a pivotal role in understanding public opinion and user sentiment across diverse languages. While numerous scholars conduct sentiment analysis in widely spoken languages such as English, Chinese, Arabic, Roman Arabic, and more, we come to grappling with resource-poor languages like Urdu literature which becomes a challenge. Urdu is a uniquely crafted language, characterized by a script that amalgamates elements from diverse languages, including Arabic, Parsi, Pashtu, Turkish, Punjabi, Saraiki, and more. As Urdu literature, characterized by distinct character sets and linguistic features, presents an additional hurdle due… More >

  • Open Access

    ARTICLE

    Mathematical Modelling and Simulations of Active Direct Methanol Fuel Cell

    RABIRANJAN MURMUa,b, DEBASHIS ROYa, HAREKRUSHNA SUTARb

    Journal of Polymer Materials, Vol.40, No.3-4, pp. 125-139, 2023, DOI:10.32381/JPM.2023.40.3-4.1

    Abstract A one dimensional isothermal model is proposed by modelling the kinetics of methanol transport at anode flow channel (AFC), membrane and cathode catalyst layer of direct methanol fuel cell (DMFC). Analytical model is proposed to predict methanol cross-over rate through the electrolyte membrane and cell performance. The model presented in this paper considered methanol diffusion and electrochemical oxidation at the anode and cathode channels. The analytical solution of the proposed model was simulated in a MATLAB environment to obtain the polarization curve and leakage current. The effect of methanol concentration on cell voltage and leakage current is studied. The methanol… More >

  • Open Access

    ARTICLE

    BSTFNet: An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features

    Hong Huang1, Xingxing Zhang1,*, Ye Lu1, Ze Li1, Shaohua Zhou2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3929-3951, 2024, DOI:10.32604/cmc.2024.047918

    Abstract While encryption technology safeguards the security of network communications, malicious traffic also uses encryption protocols to obscure its malicious behavior. To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic, we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features, called BERT-based Spatio-Temporal Features Network (BSTFNet). At the packet-level granularity, the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers (BERT) model. At the byte-level granularity,… More >

  • Open Access

    ARTICLE

    Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network

    Mohammad Mehdi Sharifi Nevisi1, Elnaz Bashir2, Diego Martín3,*, Seyedkian Rezvanjou4, Farzaneh Shoushtari5, Ehsan Ghafourian2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3971-3991, 2024, DOI:10.32604/cmc.2024.047875

    Abstract This paper focuses on wireless-powered communication systems, which are increasingly relevant in the Internet of Things (IoT) due to their ability to extend the operational lifetime of devices with limited energy. The main contribution of the paper is a novel approach to minimize the secrecy outage probability (SOP) in these systems. Minimizing SOP is crucial for maintaining the confidentiality and integrity of data, especially in situations where the transmission of sensitive data is critical. Our proposed method harnesses the power of an improved biogeography-based optimization (IBBO) to effectively train a recurrent neural network (RNN). The proposed IBBO introduces an innovative… More >

  • Open Access

    ARTICLE

    Automated Machine Learning Algorithm Using Recurrent Neural Network to Perform Long-Term Time Series Forecasting

    Ying Su1, Morgan C. Wang1, Shuai Liu2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3529-3549, 2024, DOI:10.32604/cmc.2024.047189

    Abstract Long-term time series forecasting stands as a crucial research domain within the realm of automated machine learning (AutoML). At present, forecasting, whether rooted in machine learning or statistical learning, typically relies on expert input and necessitates substantial manual involvement. This manual effort spans model development, feature engineering, hyper-parameter tuning, and the intricate construction of time series models. The complexity of these tasks renders complete automation unfeasible, as they inherently demand human intervention at multiple junctures. To surmount these challenges, this article proposes leveraging Long Short-Term Memory, which is the variant of Recurrent Neural Networks, harnessing memory cells and gating mechanisms… More >

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks (RNN) integrated with… More >

  • Open Access

    ARTICLE

    IndRT-GCNets: Knowledge Reasoning with Independent Recurrent Temporal Graph Convolutional Representations

    Yajing Ma1,2,3, Gulila Altenbek1,2,3,*, Yingxia Yu1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 695-712, 2024, DOI:10.32604/cmc.2023.045486

    Abstract Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events, we propose an Independent Recurrent Temporal Graph Convolution Networks (IndRT-GCNets) framework to efficiently and accurately capture event attribute information. The framework models the knowledge graph sequences to learn the evolutionary representations of entities and relations within each period. Firstly, by utilizing the temporal graph convolution module in the evolutionary representation unit, the framework captures the structural dependency relationships within the knowledge graph in each period. Meanwhile, to achieve better event representation and establish effective correlations,… More >

  • Open Access

    ARTICLE

    Distribution Line Longitudinal Protection Method Based on Virtual Measurement Current Restraint

    Wei Wang1, Yang Yu1, Simin Luo2,*, Wenlin Liu2, Wei Tang1, Yuanbo Ye1

    Energy Engineering, Vol.121, No.2, pp. 315-337, 2024, DOI:10.32604/ee.2023.042082

    Abstract As an effective approach to achieve the “dual-carbon” goal, the grid-connected capacity of renewable energy increases constantly. Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions. However, the inherent randomness, intermittency, and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics. Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources. Therefore, a longitudinal protection method based on virtual measurement of current restraint is proposed in this paper. The positive… More >

Displaying 1-10 on page 1 of 221. Per Page