Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (403)
  • Open Access

    ARTICLE

    Optimal Design of Porous Media in Solar Vapor Generators by Carbon Fiber Bundles

    Mohammad Yaghoub Abdollahzadeh Jamalabadi, Jinxiang Xi*

    Frontiers in Heat and Mass Transfer, Vol.21, pp. 65-79, 2023, DOI:10.32604/fhmt.2023.042613

    Abstract As a means of harvesting solar energy for water treatment, solar-driven vapor generation is becoming more appealing. Due to their entangled fibrous networks and high surface area, fibers can be used as building blocks to generate water vapor. In this paper, using a two-dimensional fiber bundle model, we studied the generation of solar vapor based on the fiber height, distance between fibers, and input sun radiation. The performance of solar absorption system was also evaluated by evaluating thermal and water management. Results showed a constant increase in solar vapor generation with an increasing fiber height… More > Graphic Abstract

    Optimal Design of Porous Media in Solar Vapor Generators by Carbon Fiber Bundles

  • Open Access

    ARTICLE

    Emergency Energy Management of Microgrid in Industrial Park Based on Robust Optimization

    Haoliang Yang*, Yonggang Dong, Zhifang Yang

    Energy Engineering, Vol.120, No.12, pp. 2917-2931, 2023, DOI:10.32604/ee.2023.029167

    Abstract Reducing the impact of power outages and maintaining the power supply duration must be considered in implementing emergency energy dispatching in micro-networks. This paper studies a new emergency energy treatment method based on the robust optimal method and the industrial park micro-network with the optical energy storage system. After controlling the load input, a control strategy of adjusting and removing is proposed. Rolling optimal theory is applied to emergency energy scheduling based on a robust optimal mathematical model. A weighting factor is introduced into the optimal model to balance the importance of reducing and retaining More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    ARTICLE

    Entropy Based Feature Fusion Using Deep Learning for Waste Object Detection and Classification Model

    Ehab Bahaudien Ashary1, Sahar Jambi2, Rehab B. Ashari2, Mahmoud Ragab3,4,*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2953-2969, 2023, DOI:10.32604/csse.2023.041523

    Abstract Object Detection is the task of localization and classification of objects in a video or image. In recent times, because of its widespread applications, it has obtained more importance. In the modern world, waste pollution is one significant environmental problem. The prominence of recycling is known very well for both ecological and economic reasons, and the industry needs higher efficiency. Waste object detection utilizing deep learning (DL) involves training a machine-learning method to classify and detect various types of waste in videos or images. This technology is utilized for several purposes recycling and sorting waste,… More >

  • Open Access

    ARTICLE

    Real-Time Remote-Mentored Echocardiography in Management of Newborns with Critical Congenital Heart Defects

    Håvard Bjerkeseth Solvin1,2,5,*, Simone Goa Diab1,4, Ole Jakob Elle2,3, Henrik Holmstrøm1,4, Henrik Brun2,4,*

    Congenital Heart Disease, Vol.18, No.5, pp. 551-559, 2023, DOI:10.32604/chd.2023.031537

    Abstract Background: The management of suspected critical congenital heart defects (CCHD) relies on timely echocardiographic diagnosis. The availability of experienced echocardiographers is limited or even non-existent in many hospitals with obstetric units. This study evaluates remote-mentored echocardiography performed by physicians without experience in imaging of congenital heart defects (CHD). Methods: The setup included a pediatric cardiologist in a separate room, guiding a physician without experience in echocardiographic imaging of CHD in the examination of a symptomatic newborn. This remote-mentoring pair was blinded to the diagnosis of the newborn and presented with a simplified patient history. The echocardiographic… More > Graphic Abstract

    Real-Time Remote-Mentored Echocardiography in Management of Newborns with Critical Congenital Heart Defects

  • Open Access

    ARTICLE

    NPBMT: A Novel and Proficient Buffer Management Technique for Internet of Vehicle-Based DTNs

    Sikandar Khan1, Khalid Saeed1, Muhammad Faran Majeed2,*, Salman A. AlQahtani3, Khursheed Aurangzeb3, Muhammad Shahid Anwar4,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1303-1323, 2023, DOI:10.32604/cmc.2023.039697

    Abstract Delay Tolerant Networks (DTNs) have the major problem of message delay in the network due to a lack of end-to-end connectivity between the nodes, especially when the nodes are mobile. The nodes in DTNs have limited buffer storage for storing delayed messages. This instantaneous sharing of data creates a low buffer/shortage problem. Consequently, buffer congestion would occur and there would be no more space available in the buffer for the upcoming messages. To address this problem a buffer management policy is proposed named “A Novel and Proficient Buffer Management Technique (NPBMT) for the Internet of… More >

  • Open Access

    ARTICLE

    Adaptive Momentum-Backpropagation Algorithm for Flood Prediction and Management in the Internet of Things

    Jayaraj Thankappan1, Delphin Raj Kesari Mary2, Dong Jin Yoon3, Soo-Hyun Park4,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1053-1079, 2023, DOI:10.32604/cmc.2023.038437

    Abstract Flooding is a hazardous natural calamity that causes significant damage to lives and infrastructure in the real world. Therefore, timely and accurate decision-making is essential for mitigating flood-related damages. The traditional flood prediction techniques often encounter challenges in accuracy, timeliness, complexity in handling dynamic flood patterns and leading to substandard flood management strategies. To address these challenges, there is a need for advanced machine learning models that can effectively analyze Internet of Things (IoT)-generated flood data and provide timely and accurate flood predictions. This paper proposes a novel approach-the Adaptive Momentum and Backpropagation (AM-BP) algorithm-for… More >

  • Open Access

    ARTICLE

    Binary Oriented Feature Selection for Valid Product Derivation in Software Product Line

    Muhammad Fezan Afzal1, Imran Khan1, Javed Rashid1,2,3, Mubbashar Saddique4,*, Heba G. Mohamed5

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3653-3670, 2023, DOI:10.32604/cmc.2023.041627

    Abstract Software Product Line (SPL) is a group of software-intensive systems that share common and variable resources for developing a particular system. The feature model is a tree-type structure used to manage SPL’s common and variable features with their different relations and problem of Crosstree Constraints (CTC). CTC problems exist in groups of common and variable features among the sub-tree of feature models more diverse in Internet of Things (IoT) devices because different Internet devices and protocols are communicated. Therefore, managing the CTC problem to achieve valid product configuration in IoT-based SPL is more complex, time-consuming,… More >

  • Open Access

    ARTICLE

    Research on Multi-Blockchain Electronic Archives Sharing Model

    Fang Yu1, Wenbin Bi2, Ning Cao3,*, Jun Luo4, Diantang An5, Liqiang Ding4, Russell Higgs6

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3921-3931, 2023, DOI:10.32604/cmc.2023.028330

    Abstract The purpose of introducing blockchain into electronic archives sharing and utilization is to break the information barrier between electronic archives sharing departments by relying on technologies such as smart contract and asymmetric encryption. Aiming at the problem of dynamic permission management in common access control methods, a new access control method based on smart contract under blockchain is proposed, which improves the intelligence level under blockchain technology. Firstly, the Internet attribute access control model based on smart contract is established. For the dynamic access of heterogeneous devices, the management contract, permission judgment contract and access… More >

  • Open Access

    ARTICLE

    A Secure Device Management Scheme with Audio-Based Location Distinction in IoT

    Haifeng Lin1,2, Xiangfeng Liu2, Chen Chen2, Zhibo Liu2, Dexin Zhao3, Yiwen Zhang4, Weizhuang Li4, Mingsheng Cao5,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 939-956, 2024, DOI:10.32604/cmes.2023.028656

    Abstract Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things (IoT). In this paper, a device management system is proposed to track the devices by using audio-based location distinction techniques. In the proposed scheme, traditional cryptographic techniques, such as symmetric encryption algorithm, RSA-based signcryption scheme, and audio-based secure transmission, are utilized to provide authentication, non-repudiation, and confidentiality in the information interaction of the management system. Moreover, an audio-based location distinction method is designed to detect the position change of the devices. Specifically, the audio… More >

Displaying 31-40 on page 4 of 403. Per Page