Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (56)
  • Open Access

    ARTICLE

    Efficient Resource Allocation Algorithm in Uplink OFDM-Based Cognitive Radio Networks

    Omar Abdulghafoor1, Musbah Shaat2, Ibraheem Shayea3, Ahmad Hamood1, Abdelzahir Abdelmaboud4, Ashraf Osman Ibrahim5, Fadhil Mukhlif6,*, Herish Badal1, Norafida Ithnin6, Ali Khadim Lwas7

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3045-3064, 2023, DOI:10.32604/cmc.2023.033888

    Abstract The computational complexity of resource allocation processes, in cognitive radio networks (CRNs), is a major issue to be managed. Furthermore, the complicated solution of the optimal algorithm for handling resource allocation in CRNs makes it unsuitable to adopt in real-world applications where both cognitive users, CRs, and primary users, PUs, exist in the identical geographical area. Hence, this work offers a primarily price-based power algorithm to reduce computational complexity in uplink scenarios while limiting interference to PUs to allowable threshold. Hence, this paper, compared to other frameworks proposed in the literature, proposes a two-step approach to reduce the complexity of… More >

  • Open Access

    ARTICLE

    An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing

    Ratih Hikmah Puspita1, Jehad Ali1,*, Byeong-hee Roh2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4611-4631, 2023, DOI:10.32604/cmc.2023.033598

    Abstract 5G use cases, for example enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and an ultra-reliable low latency communication (URLLC), need a network architecture capable of sustaining stringent latency and bandwidth requirements; thus, it should be extremely flexible and dynamic. Slicing enables service providers to develop various network slice architectures. As users travel from one coverage region to another area, the call must be routed to a slice that meets the same or different expectations. This research aims to develop and evaluate an algorithm to make handover decisions appearing in 5G sliced networks. Rules of thumb which indicates the accuracy… More >

  • Open Access

    ARTICLE

    Research on the Change of Airfoil Geometric Parameters of Horizontal Axis Wind Turbine Blades Caused by Atmospheric Icing

    Xiyang Li1, Yuhao Jia2, Hui Zhang1,*, Bin Cheng1

    Energy Engineering, Vol.119, No.6, pp. 2549-2567, 2022, DOI:10.32604/ee.2022.020854

    Abstract Icing can significantly change the geometric parameters of wind turbine blades, which in turn, can reduce the aerodynamic characteristics of the airfoil. In-depth research is conducted in this study to identify the reasons for the decline of wind power equipment performance through the icing process. An accurate experimental test method is proposed in a natural environment that examines the growth and distribution of ice formation over the airfoil profile. The mathematical models of the airfoil chord length, camber, and thickness are established in order to investigate the variation of geometric airfoil parameters under different icing states. The results show that… More >

  • Open Access

    ARTICLE

    Detecting Icing on the Blades of a Wind Turbine Using a Deep Neural Network

    Tingshun Li1, Jiaohui Xu1,*, Zesan Liu2, Dadi Wang2, Wen Tan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 767-782, 2023, DOI:10.32604/cmes.2022.020702

    Abstract The blades of wind turbines located at high latitudes are often covered with ice in late autumn and winter, where this affects their capacity for power generation as well as their safety. Accurately identifying the icing of the blades of wind turbines in remote areas is thus important, and a general model is needed to this end. This paper proposes a universal model based on a Deep Neural Network (DNN) that uses data from the Supervisory Control and Data Acquisition (SCADA) system. Two datasets from SCADA are first preprocessed through undersampling, that is, they are labeled, normalized, and balanced. The… More >

  • Open Access

    ARTICLE

    Study on Quantum Finance Algorithm: Quantum Monte Carlo Algorithm based on European Option Pricing

    Jian-Guo Hu1,*, Shao-Yi Wu1,*, Yi Yang1, Qin-Sheng Zhu1, Xiao-Yu Li1, Shan Yang2

    Journal of Quantum Computing, Vol.4, No.1, pp. 53-61, 2022, DOI:10.32604/jqc.2022.027683

    Abstract As one of the major methods for the simulation of option pricing, Monte Carlo method assumes random fluctuations in the distribution of asset prices. Under certain uncertainties process, different evolution paths could be simulated so as to finally yield the expectation value of the asset price, which requires a lot of simulations to ensure the accuracy based on huge and expensive calculations. In order to solve the above computational problem, quantum Monte Carlo (QMC) has been established and applied in the relevant systems such as European call options. In this work, both MC and QM methods are adopted to simulate… More >

  • Open Access

    ARTICLE

    Deep Learning Based Image Forgery Detection Methods

    Liang Xiu-jian1,2,*, Sun He2

    Journal of Cyber Security, Vol.4, No.2, pp. 119-133, 2022, DOI:10.32604/jcs.2022.032915

    Abstract Increasingly advanced image processing technology has made digital image editing easier and easier. With image processing software at one’s fingertips, one can easily alter the content of an image, and the altered image is so realistic that it is illegible to the naked eye. These tampered images have posed a serious threat to personal privacy, social order, and national security. Therefore, detecting and locating tampered areas in images has important practical significance, and has become an important research topic in the field of multimedia information security. In recent years, deep learning technology has been widely used in image tampering localization,… More >

  • Open Access

    ARTICLE

    Medical Image Demosaicing Based Design of Newton Gregory Interpolation Algorithm

    E. P. Kannan1,*, S. S. Vinsley2, T. V. Chithra3

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1675-1691, 2022, DOI:10.32604/iasc.2022.022707

    Abstract In this paper, Field-Programmable Gate Array (FPGA) implementation-based image demosaicing is carried out. The Newton Gregory interpolation algorithm is designed based on FPGA frame work. Interpolation is the method of assessing the value of a function for any in-between value of self-regulating variable, whereas the method of computing the value of the function outside the specified range is named extrapolation. The natural images are collected from Kodak image database and medical images are collected from UPOL (University of Phoenix Online) database. The proposed algorithm is executed on using Xilinx ISE (Integrated Synthesis Environment) Design Suite 14.2 and is confirmed on… More >

  • Open Access

    ARTICLE

    How Load Aggregators Avoid Risks in Spot Electricity Market: In the Framework of Power Consumption Right Option Contracts

    Jiacheng Yang1, Xiaohe Zhai1, Zhongfu Tan1,2,*, Zhenghao He1

    Energy Engineering, Vol.119, No.3, pp. 883-906, 2022, DOI:10.32604/ee.2022.018033

    Abstract There is uncertainty in the electricity price of spot electricity market, which makes load aggregators undertake price risks for their agent users. In order to allow load aggregators to reduce the spot market price risk, scholars have proposed many solutions, such as improving the declaration decision-making model, signing power mutual insurance contracts, and adding energy storage and mobilizing demand-side resources to respond. In terms of demand side, calling flexible demand-side resources can be considered as a key solution. The user's power consumption rights (PCRs) are core contents of the demand-side resources. However, there have been few studies on the pricing… More >

  • Open Access

    ARTICLE

    Slicing-Based Enhanced Method for Privacy-Preserving in Publishing Big Data

    Mohammed BinJubier1, Mohd Arfian Ismail1, Abdulghani Ali Ahmed2,*, Ali Safaa Sadiq3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3665-3686, 2022, DOI:10.32604/cmc.2022.024663

    Abstract Publishing big data and making it accessible to researchers is important for knowledge building as it helps in applying highly efficient methods to plan, conduct, and assess scientific research. However, publishing and processing big data poses a privacy concern related to protecting individuals’ sensitive information while maintaining the usability of the published data. Several anonymization methods, such as slicing and merging, have been designed as solutions to the privacy concerns for publishing big data. However, the major drawback of merging and slicing is the random permutation procedure, which does not always guarantee complete protection against attribute or membership disclosure. Moreover,… More >

  • Open Access

    ARTICLE

    Indoor Scene Splicing Based on Genetic Algorithm and ORB

    Tao Zhang1,*, Yi Cao2

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1677-1685, 2022, DOI:10.32604/iasc.2022.027082

    Abstract The images generated by the image stitching algorithm have false shadow and poor real-time performance, and are difficult to maintain visual consistency. For this reason, a panoramic image stitching algorithm based on genetic algorithm is proposed. First, the oriented fast and rotated brief (ORB) algorithm is used to quickly perform detection and description of feature, then the initial feature point pairs are extracted according to the Euclidean distance for feature point rough matching, the parallelism of genetic algorithm is used to optimize the feature point matching performance. Finally, the PROSAC algorithm is used to remove mismatched point pairs and get… More >

Displaying 11-20 on page 2 of 56. Per Page