Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (403)
  • Open Access

    ARTICLE

    Thermo-Physical Potential of Recycled Banana Fibers for Improving the Thermal and Mechanical Properties of Biosourced Gypsum-Based Materials

    Youssef Maaloufa1,2,3,*, Soumia Mounir1,2,3, Sara Ibnelhaj2, Fatima Zohra El Wardi6, Asma Souidi3, Yakubu Aminu Dodo4,5, Malika Atigui3, Mina Amazal3, Abelhamid Khabbazi2, Hassan Demrati3, Ahmed Aharoune3

    Journal of Renewable Materials, Vol.12, No.4, pp. 843-867, 2024, DOI:10.32604/jrm.2024.049942

    Abstract The development of bio-sourced materials is essential to ensuring sustainable construction; it is considered a locomotive of the green economy. Furthermore, it is an abundant material in our country, to which very little attention is being given. This work aims to valorize the waste of the trunks of banana trees to be used in construction. Firstly, the physicochemical properties of the fiber, such as the percentage of crystallization and its morphology, have been determined by X-ray diffraction tests and scanning electron microscopy to confirm the potential and the impact of the mode of drying on… More >

  • Open Access

    REVIEW

    Market Operation of Energy Storage System in Smart Grid: A Review

    Li Deng1, Jiafei Huan1, Wei Wang1, Weitao Zhang1, Liangbin Xie2, Lun Dong2, Jingrong Guo2, Zhongping Li2, Yuan Huang2,*, Yue Xiang2

    Energy Engineering, Vol.121, No.6, pp. 1403-1437, 2024, DOI:10.32604/ee.2024.046393

    Abstract As a flexible resource, energy storage plays an increasingly significant role in stabilizing and supporting the power system, while providing auxiliary services. Still, the current high demand for energy storage contrasts with the fuzzy lack of market-oriented mechanisms for energy storage, the principle of market-oriented operation has not been embodied, and there is no unified and systematic analytical framework for the business model. However, the dispatch management model of energy storage in actual power system operation is not clear. Still, the specific scheduling process and energy storage strategy on the source-load-network side could be more… More >

  • Open Access

    REVIEW

    A Systematic Literature Review on Task Allocation and Performance Management Techniques in Cloud Data Center

    Nidhika Chauhan1, Navneet Kaur2, Kamaljit Singh Saini2, Sahil Verma3, Abdulatif Alabdulatif4, Ruba Abu Khurma5,7, Maribel Garcia-Arenas6, Pedro A. Castillo6,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 571-608, 2024, DOI:10.32604/csse.2024.042690

    Abstract As cloud computing usage grows, cloud data centers play an increasingly important role. To maximize resource utilization, ensure service quality, and enhance system performance, it is crucial to allocate tasks and manage performance effectively. The purpose of this study is to provide an extensive analysis of task allocation and performance management techniques employed in cloud data centers. The aim is to systematically categorize and organize previous research by identifying the cloud computing methodologies, categories, and gaps. A literature review was conducted, which included the analysis of 463 task allocations and 480 performance management papers. The… More >

  • Open Access

    REVIEW

    Treatment and Clinical Management of Chronic Thromboembolic Pulmonary Hypertension: An Update of Literature Review

    Yuan Ren1, Yingxian Sun1, Zhiguang Yang2, Yanli Chen1,*

    Congenital Heart Disease, Vol.19, No.2, pp. 157-176, 2024, DOI:10.32604/chd.2024.047930

    Abstract Chronic thromboembolic pulmonary hypertension (CTEPH) is a chronic, progressive, debilitating, and life-threatening complication of pulmonary embolism (PE). Recent technological advances have permitted various treatment options for the treatment of CTEPH, including surgery, angioplasty, and medical treatment, depending on the location and characteristics of lesions. Pulmonary endarterectomy (PEA) is the treatment of choice for CTEPH, as it offers excellent long-term outcomes and a high probability of recovery. Moreover, various medical and interventional therapies are currently being developed for patients with inoperable CTEPH. This review mainly summarizes the current treatment approaches of CTEPH, offering more options for More >

  • Open Access

    ARTICLE

    Blockchain-Based Key Management Scheme Using Rational Secret Sharing

    Xingfan Zhao1, Changgen Peng1,2,*, Weijie Tan2, Kun Niu1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 307-328, 2024, DOI:10.32604/cmc.2024.047975

    Abstract Traditional blockchain key management schemes store private keys in the same location, which can easily lead to security issues such as a single point of failure. Therefore, decentralized threshold key management schemes have become a research focus for blockchain private key protection. The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security. The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress, but these schemes do not consider participants’ self-interested behavior, and require trusted nodes to keep private key… More >

  • Open Access

    REVIEW

    Survey and Prospect for Applying Knowledge Graph in Enterprise Risk Management

    Pengjun Li1, Qixin Zhao1, Yingmin Liu1, Chao Zhong1, Jinlong Wang1,*, Zhihan Lyu2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3825-3865, 2024, DOI:10.32604/cmc.2024.046851

    Abstract Enterprise risk management holds significant importance in fostering sustainable growth of businesses and in serving as a critical element for regulatory bodies to uphold market order. Amidst the challenges posed by intricate and unpredictable risk factors, knowledge graph technology is effectively driving risk management, leveraging its ability to associate and infer knowledge from diverse sources. This review aims to comprehensively summarize the construction techniques of enterprise risk knowledge graphs and their prominent applications across various business scenarios. Firstly, employing bibliometric methods, the aim is to uncover the developmental trends and current research hotspots within the… More >

  • Open Access

    ARTICLE

    Optimal Bidding Strategies of Microgrid with Demand Side Management for Economic Emission Dispatch Incorporating Uncertainty and Outage of Renewable Energy Sources

    Mousumi Basu1, Chitralekha Jena2, Baseem Khan3,4,*, Ahmed Ali4

    Energy Engineering, Vol.121, No.4, pp. 849-867, 2024, DOI:10.32604/ee.2024.043294

    Abstract In the restructured electricity market, microgrid (MG), with the incorporation of smart grid technologies, distributed energy resources (DERs), a pumped-storage-hydraulic (PSH) unit, and a demand response program (DRP), is a smarter and more reliable electricity provider. DER consists of gas turbines and renewable energy sources such as photovoltaic systems and wind turbines. Better bidding strategies, prepared by MG operators, decrease the electricity cost and emissions from upstream grid and conventional and renewable energy sources (RES). But it is inefficient due to the very high sporadic characteristics of RES and the very high outage rate. To More >

  • Open Access

    ARTICLE

    Flow Patterns and Heat Transfer Characteristics of a Polymer Pulsating Heat Pipe Filled with Hydrofluoroether

    Nobuhito Nagasato1, Zhengyuan Pei1, Yasushi Koito2,*

    Frontiers in Heat and Mass Transfer, Vol.22, No.1, pp. 49-63, 2024, DOI:10.32604/fhmt.2024.047502

    Abstract Visualization experiments were conducted to clarify the operational characteristics of a polymer pulsating heat pipe (PHP). Hydrofluoroether (HFE)-7100 was used as a working fluid, and its filling ratio was 50% of the entire PHP channel. A semi-transparent PHP was fabricated using a transparent polycarbonate sheet and a plastic 3D printer, and the movements of liquid slugs and vapor plugs of the working fluid were captured with a high-speed camera. The video images were then analyzed to obtain the flow patterns in the PHP. The heat transfer characteristics of the PHP were discussed based on the… More >

  • Open Access

    ARTICLE

    Numerical Investigation on Thermal Performance of Two-Phase Immersion Cooling Method for High-Power Electronics

    Liqun Zhou1,*, Weilin Yang1, Chaojie Li2, Shi Lin3

    Frontiers in Heat and Mass Transfer, Vol.22, No.1, pp. 157-173, 2024, DOI:10.32604/fhmt.2023.045135

    Abstract The power density of electronic components grows continuously, and the subsequent heat accumulation and temperature increase inevitably affect electronic equipment’s stability, reliability and service life. Therefore, achieving efficient cooling in limited space has become a key problem in updating electronic devices with high performance and high integration. Two-phase immersion is a novel cooling method. The computational fluid dynamics (CFD) method is used to investigate the cooling performance of two-phase immersion cooling on high-power electronics. The two-dimensional CFD model is utilized by the volume of fluid (VOF) method and Reynolds Stress Model. Lee’s model was employed… More > Graphic Abstract

    Numerical Investigation on Thermal Performance of Two-Phase Immersion Cooling Method for High-Power Electronics

  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and… More >

Displaying 11-20 on page 2 of 403. Per Page