Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (47)
  • Open Access

    ARTICLE

    Solar Photovoltaic System as a Sustainable Solution for Electric Load Shortage in Baghdad: A Design and Economic Study

    Fadhil M. Oleiwi1, Jaber O. Dahloos2, Amer Resen Kalash3, Hasanain A. Abdul Wahhab3, Miqdam T. Chaichan1,4,*

    Energy Engineering, Vol.123, No.2, 2026, DOI:10.32604/ee.2025.073313 - 27 January 2026

    Abstract In the present study, researchers examined a solar off-grid-connected photovoltaic system for a family house in the city of Baghdad. The design was created with the help of the “How to Design PV Program” and the “Renewable Energy Investment Calculator (REICAL)” software (Version 1.1). In Iraq, the national grid provides around 71% of the overall electricity demand, though this drops to nearly 50% during extremely hot and cold months, where the supply alternates between four hours on and four hours off. During the off periods, power is generated by local generators at high costs. To… More >

  • Open Access

    REVIEW

    A Comparative Review of the Experimental Mitigation Methods of the S-Shaped Diffusers in the Aeroengine Intakes

    Hussain H. Al-Kayiem1,*, Safaa M. Ali2, Sundus S. Al-Azawiey3, Raed A. Jessam3

    Energy Engineering, Vol.123, No.2, 2026, DOI:10.32604/ee.2025.073303 - 27 January 2026

    Abstract Gas Turbines are among the most important energy systems for aviation and thermal-based power generation. The performance of gas turbine intakes with S-shaped diffusers is vulnerable to flow separation, reversal flow, and pressure distortion, mainly in aggressive S-shaped diffusers. Several methods, including vortex generators and energy promoters, have been proposed and investigated both experimentally and numerically. This paper compiles a review of experimental investigations that have been performed and reported to mitigate flow separation and restore system performance. The operational principles, classifications, design geometries, and performance parameters of S-shaped diffusers are presented to facilitate the… More > Graphic Abstract

    A Comparative Review of the Experimental Mitigation Methods of the S-Shaped Diffusers in the Aeroengine Intakes

  • Open Access

    ARTICLE

    Dynamic Boundary Optimization via IDBO-VMD: A Novel Power Allocation Strategy for Hybrid Energy Storage with Enhanced Grid Stability

    Zujun Ding, Qi Xiang, Chengyi Li, Mengyu Ma, Chutong Zhang, Xinfa Gu, Jiaming Shi, Hui Huang, Aoyun Xia, Wenjie Wang, Wan Chen, Ziluo Yu, Jie Ji*

    Energy Engineering, Vol.123, No.1, 2026, DOI:10.32604/ee.2025.070442 - 27 December 2025

    Abstract In order to address environmental pollution and resource depletion caused by traditional power generation, this paper proposes an adaptive iterative dynamic-balance optimization algorithm that integrates the Improved Dung Beetle Optimizer (IDBO) with Variational Mode Decomposition (VMD). The IDBO-VMD method is designed to enhance the accuracy and efficiency of wind-speed time-series decomposition and to effectively smooth photovoltaic power fluctuations. This study innovatively improves the traditional variational mode decomposition (VMD) algorithm, and significantly improves the accuracy and adaptive ability of signal decomposition by IDBO self-optimization of key parameters K and a. On this basis, Fourier transform technology… More >

  • Open Access

    ARTICLE

    Machine Learning-Based GPS Spoofing Detection and Mitigation for UAVs

    Charlotte Olivia Namagembe, Mohamad Ibrahim, Md Arafatur Rahman*, Prashant Pillai

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.070316 - 09 December 2025

    Abstract The rapid proliferation of commercial unmanned aerial vehicles (UAVs) has revolutionized fields such as precision agriculture and disaster response. However, their heavy reliance on GPS navigation leaves them highly vulnerable to spoofing attacks, with potentially severe consequences. To mitigate this threat, we present a machine learning-driven framework for real-time GPS spoofing detection, designed with a balance of detection accuracy and computational efficiency. Our work is distinguished by the creation of a comprehensive dataset of 10,000 instances that integrates both simulated and real-world data, enabling robust and generalizable model development. A comprehensive evaluation of multiple classification More >

  • Open Access

    ARTICLE

    Cognitive Erasure-Coded Data Update and Repair for Mitigating I/O Overhead

    Bing Wei, Ming Zhong, Qian Chen, Yi Wu*, Yubin Li

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.069910 - 09 December 2025

    Abstract In erasure-coded storage systems, updating data requires parity maintenance, which often leads to significant I/O amplification due to “write-after-read” operations. Furthermore, scattered parity placement increases disk seek overhead during repair, resulting in degraded system performance. To address these challenges, this paper proposes a Cognitive Update and Repair Method (CURM) that leverages machine learning to classify files into write-only, read-only, and read-write categories, enabling tailored update and repair strategies. For write-only and read-write files, CURM employs a data-difference mechanism combined with fine-grained I/O scheduling to minimize redundant read operations and mitigate I/O amplification. For read-write files,… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction

    Abeer Alnuaim*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-33, 2026, DOI:10.32604/cmc.2025.069110 - 10 November 2025

    Abstract The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats. In the evolving landscape of cybersecurity, the efficacy of Intrusion Detection Systems (IDS) is increasingly measured by technical performance, operational usability, and adaptability. This study introduces and rigorously evaluates a Human-Computer Interaction (HCI)-Integrated IDS with the utilization of Convolutional Neural Network (CNN), CNN-Long Short Term Memory (LSTM), and Random Forest (RF) against both a Baseline Machine Learning (ML) and a Traditional IDS model, through an extensive experimental framework encompassing many performance metrics, including detection latency, accuracy, alert prioritization, classification… More >

  • Open Access

    REVIEW

    Next-Generation Lightweight Explainable AI for Cybersecurity: A Review on Transparency and Real-Time Threat Mitigation

    Khulud Salem Alshudukhi1,*, Sijjad Ali2, Mamoona Humayun3,*, Omar Alruwaili4

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.3, pp. 3029-3085, 2025, DOI:10.32604/cmes.2025.073705 - 23 December 2025

    Abstract Problem: The integration of Artificial Intelligence (AI) into cybersecurity, while enhancing threat detection, is hampered by the “black box” nature of complex models, eroding trust, accountability, and regulatory compliance. Explainable AI (XAI) aims to resolve this opacity but introduces a critical new vulnerability: the adversarial exploitation of model explanations themselves. Gap: Current research lacks a comprehensive synthesis of this dual role of XAI in cybersecurity—as both a tool for transparency and a potential attack vector. There is a pressing need to systematically analyze the trade-offs between interpretability and security, evaluate defense mechanisms, and outline a… More >

  • Open Access

    REVIEW

    A Review of Modern Strategies for Enhancing Power Quality and Hosting Capacity in Renewable-Integrated Grids: From Conventional Devices to AI-Based Solutions

    Adel A.Abou El-Ela1, Ragab A. El-Sehiemy2,3,4,*, Abdallah Nazih1, Asmaa A. Mubarak5, Eman S. Ali1

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 1349-1388, 2025, DOI:10.32604/cmes.2025.069507 - 26 November 2025

    Abstract Distribution systems face significant challenges in maintaining power quality issues and maximizing renewable energy hosting capacity due to the increased level of photovoltaic (PV) systems integration associated with varying loading and climate conditions. This paper provides a comprehensive overview on the exit strategies to enhance distribution system operation, with a focus on harmonic mitigation, voltage regulation, power factor correction, and optimization techniques. The impact of passive and active filters, custom power devices such as dynamic voltage restorers (DVRs) and static synchronous compensators (STATCOMs), and grid modernization technologies on power quality is examined. Additionally, this paper… More >

  • Open Access

    ARTICLE

    Deep Learning-Driven Intrusion Detection and Defense Mechanisms: A Novel Approach to Mitigating Cyber Attacks

    Junzhe Cheng*

    Journal of Cyber Security, Vol.7, pp. 343-357, 2025, DOI:10.32604/jcs.2025.067979 - 22 September 2025

    Abstract We present a novel Transformer-based network intrusion detection system (IDS) that automatically learns complex feature relationships from raw traffic. Our architecture embeds both categorical (e.g., protocol, flag) and numerical (e.g., packet count, duration) inputs into a unified latent space with positional encodings, and processes them through multi-layer multi-head self-attention blocks. The Transformer’s global attention enables the IDS to capture subtle, long-range correlations in the data (e.g., coordinated multi-step attacks) without manual feature engineering. We complement the model with extensive data augmentation (SMOTE, GANs) to mitigate class imbalance and improve robustness. In evaluation on benchmark datasets… More >

  • Open Access

    ARTICLE

    Mechanisms and Mitigation of Heavy Oil Invasion into Drilling Fluids in Carbonate Reservoirs

    Yang Yu1,2, Sheng Fan1,2, Zhonglin Li1,2, Zhong He1,2, Jingwei Liu3,*, Peng Xu3,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.21, No.8, pp. 1875-1894, 2025, DOI:10.32604/fdmp.2025.066404 - 12 September 2025

    Abstract Drilling operations in carbonate rock heavy oil blocks (e.g., in the Tahe Oilfield) are challenged by the intrusion of high-viscosity, temperature-sensitive formation heavy oil into the drilling fluid. This phenomenon often results in wellbore blockage, reduced penetration rates, and compromised well control, thereby significantly limiting drilling efficiency and operational safety. To address this issue, this study conducts a comprehensive investigation into the mechanisms governing heavy oil invasion using a combination of laboratory experiments and field data analysis. Findings indicate that the reservoir exhibits strong heterogeneity and that the heavy oil possesses distinctive physical properties. The… More >

Displaying 1-10 on page 1 of 47. Per Page