Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (223)
  • Open Access

    ARTICLE

    Optimization of Blade Geometry of Savonius Hydrokinetic Turbine Based on Genetic Algorithm

    Jiahao Lu1, Fangfang Zhang1, Weilong Guang1, Yanzhao Wu1, Ran Tao1,2,*, Xiaoqin Li1,2, Ruofu Xiao1,2

    Energy Engineering, Vol.120, No.12, pp. 2819-2837, 2023, DOI:10.32604/ee.2023.042287

    Abstract Savonius hydrokinetic turbine is a kind of turbine set which is suitable for low-velocity conditions. Unlike conventional turbines, Savonius turbines employ S-shaped blades and have simple internal structures. Therefore, there is a large space for optimizing the blade geometry. In this study, computational fluid dynamics (CFD) numerical simulation and genetic algorithm (GA) were used for the optimal design. The optimization strategies and methods were determined by comparing the results calculated by CFD with the experimental results. The weighted objective function was constructed with the maximum power coefficient Cp and the high-power coefficient range R under multiple working conditions. GA helps… More >

  • Open Access

    ARTICLE

    Distribution Network Optimization Model of Industrial Park with Distributed Energy Resources under the Carbon Neutral Targets

    Xiaobao Yu*, Kang Yang

    Energy Engineering, Vol.120, No.12, pp. 2741-2760, 2023, DOI:10.32604/ee.2023.028041

    Abstract Taking an industrial park as an example, this study aims to analyze the characteristics of a distribution network that incorporates distributed energy resources (DERs). The study begins by summarizing the key features of a distribution network with DERs based on recent power usage data. To predict and analyze the load growth of the industrial park, an improved back-propagation algorithm is employed. Furthermore, the study classifies users within the industrial park according to their specific power consumption and supply requirements. This user segmentation allows for the introduction of three constraints: node voltage, wire current, and capacity of DERs. By incorporating these… More >

  • Open Access

    ARTICLE

    Conductor Arrangement and Phase Sequence Optimization Scheme for 500 kV Four-Circuit Transmission Lines on Same Tower

    Deng Lu1, Xujun Lang1, Bo Yang1, Ziyang Li1, Hang Geng2,*

    Energy Engineering, Vol.120, No.10, pp. 2287-2306, 2023, DOI:10.32604/ee.2023.029140

    Abstract The four-circuit parallel line on the same tower effectively solves the problems faced by the line reconstruction and construction under the condition of the increasing shortage of transmission corridors. Optimizing the conductor and phase sequence arrangement of multiple transmission lines is conducive to improving electromagnetic and electrostatic coupling caused by electromagnetic problems. This paper uses the ATP-EMTP simulation software to build a 500 kV multi-circuit transmission line on the same tower. It stimulates the induced voltage and current values of different line lengths, tower spacing, vertical and horizontal spacing between different circuits, phase sequence arrangement, and nominal tower height. Moreover,… More >

  • Open Access

    ARTICLE

    Optimization of Cognitive Radio System Using Enhanced Firefly Algorithm

    Nitin Mittal1, Rohit Salgotra2,3, Abhishek Sharma4, Sandeep Kaur5, S. S. Askar6, Mohamed Abouhawwash7,8,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3159-3177, 2023, DOI:10.32604/iasc.2023.041059

    Abstract The optimization of cognitive radio (CR) system using an enhanced firefly algorithm (EFA) is presented in this work. The Firefly algorithm (FA) is a nature-inspired algorithm based on the unique light-flashing behavior of fireflies. It has already proved its competence in various optimization problems, but it suffers from slow convergence issues. To improve the convergence performance of FA, a new variant named EFA is proposed. The effectiveness of EFA as a good optimizer is demonstrated by optimizing benchmark functions, and simulation results show its superior performance compared to biogeography-based optimization (BBO), bat algorithm, artificial bee colony, and FA. As an… More >

  • Open Access

    ARTICLE

    A Novel Attack on Complex APUFs Using the Evolutionary Deep Convolutional Neural Network

    Ali Ahmadi Shahrakht1, Parisa Hajirahimi2, Omid Rostami3, Diego Martín4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3059-3081, 2023, DOI:10.32604/iasc.2023.040502

    Abstract As the internet of things (IoT) continues to expand rapidly, the significance of its security concerns has grown in recent years. To address these concerns, physical unclonable functions (PUFs) have emerged as valuable tools for enhancing IoT security. PUFs leverage the inherent randomness found in the embedded hardware of IoT devices. However, it has been shown that some PUFs can be modeled by attackers using machine-learning-based approaches. In this paper, a new deep learning (DL)-based modeling attack is introduced to break the resistance of complex XAPUFs. Because training DL models is a problem that falls under the category of NP-hard… More >

  • Open Access

    ARTICLE

    Genetic Algorithm Combined with the K-Means Algorithm: A Hybrid Technique for Unsupervised Feature Selection

    Hachemi Bennaceur, Meznah Almutairy, Norah Alhussain*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2687-2706, 2023, DOI:10.32604/iasc.2023.038723

    Abstract The dimensionality of data is increasing very rapidly, which creates challenges for most of the current mining and learning algorithms, such as large memory requirements and high computational costs. The literature includes much research on feature selection for supervised learning. However, feature selection for unsupervised learning has only recently been studied. Finding the subset of features in unsupervised learning that enhances the performance is challenging since the clusters are indeterminate. This work proposes a hybrid technique for unsupervised feature selection called GAk-MEANS, which combines the genetic algorithm (GA) approach with the classical k-Means algorithm. In the proposed algorithm, a new… More >

  • Open Access

    ARTICLE

    Research on Optimization of Dual-Resource Batch Scheduling in Flexible Job Shop

    Qinhui Liu, Zhijie Gao, Jiang Li*, Shuo Li, Laizheng Zhu

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2503-2530, 2023, DOI:10.32604/cmc.2023.040505

    Abstract With the rapid development of intelligent manufacturing and the changes in market demand, the current manufacturing industry presents the characteristics of multi-varieties, small batches, customization, and a short production cycle, with the whole production process having certain flexibility. In this paper, a mathematical model is established with the minimum production cycle as the optimization objective for the dual-resource batch scheduling of the flexible job shop, and an improved nested optimization algorithm is designed to solve the problem. The outer layer batch optimization problem is solved by the improved simulated annealing algorithm. The inner double resource scheduling problem is solved by… More >

  • Open Access

    ARTICLE

    A Hybrid Heuristic Service Caching and Task Offloading Method for Mobile Edge Computing

    Yongxuan Sang, Jiangpo Wei*, Zhifeng Zhang, Bo Wang

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2483-2502, 2023, DOI:10.32604/cmc.2023.040485

    Abstract Computing-intensive and latency-sensitive user requests pose significant challenges to traditional cloud computing. In response to these challenges, mobile edge computing (MEC) has emerged as a new paradigm that extends the computational, caching, and communication capabilities of cloud computing. By caching certain services on edge nodes, computational support can be provided for requests that are offloaded to the edges. However, previous studies on task offloading have generally not considered the impact of caching mechanisms and the cache space occupied by services. This oversight can lead to problems, such as high delays in task executions and invalidation of offloading decisions. To optimize… More >

  • Open Access

    ARTICLE

    An Improved Soft Subspace Clustering Algorithm for Brain MR Image Segmentation

    Lei Ling1, Lijun Huang2, Jie Wang2, Li Zhang2, Yue Wu2, Yizhang Jiang1, Kaijian Xia2,3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.3, pp. 2353-2379, 2023, DOI:10.32604/cmes.2023.028828

    Abstract In recent years, the soft subspace clustering algorithm has shown good results for high-dimensional data, which can assign different weights to each cluster class and use weights to measure the contribution of each dimension in various features. The enhanced soft subspace clustering algorithm combines interclass separation and intraclass tightness information, which has strong results for image segmentation, but the clustering algorithm is vulnerable to noisy data and dependence on the initialized clustering center. However, the clustering algorithm is susceptible to the influence of noisy data and reliance on initialized clustering centers and falls into a local optimum; the clustering effect… More >

  • Open Access

    ARTICLE

    Optimizing Region of Interest Selection for Effective Embedding in Video Steganography Based on Genetic Algorithms

    Nizheen A. Ali1, Ramadhan J. Mstafa2,3,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1451-1469, 2023, DOI:10.32604/csse.2023.039957

    Abstract With the widespread use of the internet, there is an increasing need to ensure the security and privacy of transmitted data. This has led to an intensified focus on the study of video steganography, which is a technique that hides data within a video cover to avoid detection. The effectiveness of any steganography method depends on its ability to embed data without altering the original video’s quality while maintaining high efficiency. This paper proposes a new method to video steganography, which involves utilizing a Genetic Algorithm (GA) for identifying the Region of Interest (ROI) in the cover video. The ROI… More >

Displaying 1-10 on page 1 of 223. Per Page