Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (261)
  • Open Access

    ARTICLE

    The Effects of the Geometry of a Current Collector with an Equal Open Ratio on Output Power of a Direct Methanol Fuel Cell

    Yingli Zhu1,*, Jiachi Xie1, Mingwei Zhu1, Jun Zhang2, Miaomiao Li3

    Energy Engineering, Vol.121, No.5, pp. 1161-1172, 2024, DOI:10.32604/ee.2024.041205 - 30 April 2024

    Abstract The open ratio of a current collector has a great impact on direct methanol fuel cell (DMFC) performance. Although a number of studies have investigated the influence of the open ratio of DMFC current collectors, far too little attention has been given to how geometry (including the shape and feature size of the flow field) affects a current collector with an equal open ratio. In this paper, perforated and parallel current collectors with an equal open ratio of 50% and different feature sizes are designed, and the corresponding experimental results are shown to explain the… More >

  • Open Access

    ARTICLE

    Sentiment Analysis of Low-Resource Language Literature Using Data Processing and Deep Learning

    Aizaz Ali1, Maqbool Khan1,2, Khalil Khan3, Rehan Ullah Khan4, Abdulrahman Aloraini4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 713-733, 2024, DOI:10.32604/cmc.2024.048712 - 25 April 2024

    Abstract Sentiment analysis, a crucial task in discerning emotional tones within the text, plays a pivotal role in understanding public opinion and user sentiment across diverse languages. While numerous scholars conduct sentiment analysis in widely spoken languages such as English, Chinese, Arabic, Roman Arabic, and more, we come to grappling with resource-poor languages like Urdu literature which becomes a challenge. Urdu is a uniquely crafted language, characterized by a script that amalgamates elements from diverse languages, including Arabic, Parsi, Pashtu, Turkish, Punjabi, Saraiki, and more. As Urdu literature, characterized by distinct character sets and linguistic features,… More >

  • Open Access

    ARTICLE

    BSTFNet: An Encrypted Malicious Traffic Classification Method Integrating Global Semantic and Spatiotemporal Features

    Hong Huang1, Xingxing Zhang1,*, Ye Lu1, Ze Li1, Shaohua Zhou2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3929-3951, 2024, DOI:10.32604/cmc.2024.047918 - 26 March 2024

    Abstract While encryption technology safeguards the security of network communications, malicious traffic also uses encryption protocols to obscure its malicious behavior. To address the issues of traditional machine learning methods relying on expert experience and the insufficient representation capabilities of existing deep learning methods for encrypted malicious traffic, we propose an encrypted malicious traffic classification method that integrates global semantic features with local spatiotemporal features, called BERT-based Spatio-Temporal Features Network (BSTFNet). At the packet-level granularity, the model captures the global semantic features of packets through the attention mechanism of the Bidirectional Encoder Representations from Transformers (BERT)… More >

  • Open Access

    ARTICLE

    Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network

    Mohammad Mehdi Sharifi Nevisi1, Elnaz Bashir2, Diego Martín3,*, Seyedkian Rezvanjou4, Farzaneh Shoushtari5, Ehsan Ghafourian2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3971-3991, 2024, DOI:10.32604/cmc.2024.047875 - 26 March 2024

    Abstract This paper focuses on wireless-powered communication systems, which are increasingly relevant in the Internet of Things (IoT) due to their ability to extend the operational lifetime of devices with limited energy. The main contribution of the paper is a novel approach to minimize the secrecy outage probability (SOP) in these systems. Minimizing SOP is crucial for maintaining the confidentiality and integrity of data, especially in situations where the transmission of sensitive data is critical. Our proposed method harnesses the power of an improved biogeography-based optimization (IBBO) to effectively train a recurrent neural network (RNN). The… More >

  • Open Access

    ARTICLE

    Automated Machine Learning Algorithm Using Recurrent Neural Network to Perform Long-Term Time Series Forecasting

    Ying Su1, Morgan C. Wang1, Shuai Liu2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3529-3549, 2024, DOI:10.32604/cmc.2024.047189 - 26 March 2024

    Abstract Long-term time series forecasting stands as a crucial research domain within the realm of automated machine learning (AutoML). At present, forecasting, whether rooted in machine learning or statistical learning, typically relies on expert input and necessitates substantial manual involvement. This manual effort spans model development, feature engineering, hyper-parameter tuning, and the intricate construction of time series models. The complexity of these tasks renders complete automation unfeasible, as they inherently demand human intervention at multiple junctures. To surmount these challenges, this article proposes leveraging Long Short-Term Memory, which is the variant of Recurrent Neural Networks, harnessing… More >

  • Open Access

    ARTICLE

    A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM

    Navaneetha Krishnan Muthunambu1, Senthil Prabakaran2, Balasubramanian Prabhu Kavin3, Kishore Senthil Siruvangur4, Kavitha Chinnadurai1, Jehad Ali5,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3089-3127, 2024, DOI:10.32604/cmc.2023.043172 - 26 March 2024

    Abstract The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the Internet. Regrettably, this development has expanded the potential targets that hackers might exploit. Without adequate safeguards, data transmitted on the internet is significantly more susceptible to unauthorized access, theft, or alteration. The identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious attacks. This research paper introduces a novel intrusion detection framework that utilizes Recurrent… More >

  • Open Access

    ARTICLE

    IndRT-GCNets: Knowledge Reasoning with Independent Recurrent Temporal Graph Convolutional Representations

    Yajing Ma1,2,3, Gulila Altenbek1,2,3,*, Yingxia Yu1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 695-712, 2024, DOI:10.32604/cmc.2023.045486 - 30 January 2024

    Abstract Due to the structural dependencies among concurrent events in the knowledge graph and the substantial amount of sequential correlation information carried by temporally adjacent events, we propose an Independent Recurrent Temporal Graph Convolution Networks (IndRT-GCNets) framework to efficiently and accurately capture event attribute information. The framework models the knowledge graph sequences to learn the evolutionary representations of entities and relations within each period. Firstly, by utilizing the temporal graph convolution module in the evolutionary representation unit, the framework captures the structural dependency relationships within the knowledge graph in each period. Meanwhile, to achieve better event… More >

  • Open Access

    ARTICLE

    Distribution Line Longitudinal Protection Method Based on Virtual Measurement Current Restraint

    Wei Wang1, Yang Yu1, Simin Luo2,*, Wenlin Liu2, Wei Tang1, Yuanbo Ye1

    Energy Engineering, Vol.121, No.2, pp. 315-337, 2024, DOI:10.32604/ee.2023.042082 - 25 January 2024

    Abstract As an effective approach to achieve the “dual-carbon” goal, the grid-connected capacity of renewable energy increases constantly. Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions. However, the inherent randomness, intermittency, and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics. Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources. Therefore, a longitudinal protection method based on virtual measurement of current restraint is proposed More >

  • Open Access

    ARTICLE

    Wave Reflection by Rectangular Breakwaters for Coastal Protection

    Hasna Akarni*, Hamza Mabchour, Laila El Aarabi, Soumia Mordane

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.3, pp. 579-593, 2024, DOI:10.32604/fdmp.2023.043080 - 12 January 2024

    Abstract In this study, we focus on the numerical modelling of the interaction between waves and submerged structures in the presence of a uniform flow current. Both the same and opposite senses of wave propagation are considered. The main objective is an understanding of the effect of the current and various geometrical parameters on the reflection coefficient. The wave used in the study is based on potential theory, and the submerged structures consist of two rectangular breakwaters positioned at a fixed distance from each other and attached to the bottom of a wave flume. The numerical More >

  • Open Access

    ARTICLE

    Development and Application of a Power Law Constitutive Model for Eddy Current Dampers

    Longteng Liang1,2,3, Zhouquan Feng2,4,*, Hongyi Zhang2,4, Zhengqing Chen2,4, Changzhao Qian1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2403-2419, 2024, DOI:10.32604/cmes.2023.031260 - 15 December 2023

    Abstract Eddy current dampers (ECDs) have emerged as highly desirable solutions for vibration control due to their exceptional damping performance and durability. However, the existing constitutive models present challenges to the widespread implementation of ECD technology, and there is limited availability of finite element analysis (FEA) software capable of accurately modeling the behavior of ECDs. This study addresses these issues by developing a new constitutive model that is both easily understandable and user-friendly for FEA software. By utilizing numerical results obtained from electromagnetic FEA, a novel power law constitutive model is proposed to capture the nonlinear More >

Displaying 41-50 on page 5 of 261. Per Page