Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Seed Priming and Foliar Supplementation with β-aminobutyric Acid Alleviates Drought Stress through Mitigation of Oxidative Stress and Enhancement of Antioxidant Defense in Linseed (Linum usitatissimum L.)

    Tauqeer Ahmad Yasir1,2, Muhammad Ateeq1,3, Allah Wasaya1,2,*, Mubshar Hussain2, Naeem Sarwar2, Khuram Mubeen4, Mudassir Aziz4, Muhammad Aamir Iqbal5, Chukwuma C. Ogbaga6, Ibrahim Al-Ashkar7, Md Atikur Rahman8, Ayman El Sabagh9,10,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.11, pp. 3113-3131, 2023, DOI:10.32604/phyton.2023.029502

    Abstract Drought is one of the critical limitations to agricultural soils and crop plants. Scarcity of water is increasing due to climate change that lead to increasing threats to global food security. Therefore, ecofriendly and cost effective strategies are highly desirable for mitigating drought stress along with sustainable and smart agricultural production. The aim of the study was to mitigate DS using seed priming and exogenous supplementation of β-aminobutyric acid (BABA) in linseed (Linum usitatissimum L.). Different doses (0, 50, 100 and 150 µM) of BABA were used for seed priming agent and foliar spraying under three soil moisture levels viz.,… More >

  • Open Access

    ARTICLE

    A Novel IoT Architecture, Assessment of Threats and Their Classification with Machine Learning Solutions

    Oliva Debnath1, Saptarshi Debnath1, Sreyashi Karmakar2, MD Tausif Mallick3, Himadri Nath Saha4,*

    Journal on Internet of Things, Vol.5, pp. 13-43, 2023, DOI:10.32604/jiot.2023.039391

    Abstract The Internet of Things (IoT) will significantly impact our social and economic lives in the near future. Many Internet of Things (IoT) applications aim to automate multiple tasks so inactive physical objects can behave independently of others. IoT devices, however, are also vulnerable, mostly because they lack the essential built-in security to thwart attackers. It is essential to perform the necessary adjustments in the structure of the IoT systems in order to create an end-to-end secure IoT environment. As a result, the IoT designs that are now in use do not completely support all of the advancements that have been… More >

  • Open Access

    PROCEEDINGS

    Evaluation of Blast Mitigation Effects of Cylindrical Explosion Containment Vessels Based on Foam

    Lei Yang1, Guangyan Huang1,2,*, Tao Wang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.4, pp. 1-2, 2023, DOI:10.32604/icces.2023.09759

    Abstract In order to evaluate the blast mitigation effect of polyurethane foam in cylindrical explosion containment vessels (CECVs), a three-dimensional numerical simulation model was established. The Structured Arbitrary Lagrange-Euler (S-ALE) algorithm was applied in current simulations to define the coupling contact between TNT and Lagrange algorithm. The numerical model was verified by comparing the dynamic deformation and permanent deformation of the experiments. Based on the numerical simulation model after verification, the influence of polyurethane foam filling inside CECVs on the mitigation effect was investigated. The results revealed that compared with the ALE algorithm, the numerical simulations based on the S-ALE algorithm… More >

  • Open Access

    ARTICLE

    Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model

    U. Sakthivelu, C. N. S. Vinoth Kumar*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3691-3707, 2023, DOI:10.32604/iasc.2023.036946

    Abstract The detection of cyber threats has recently been a crucial research domain as the internet and data drive people’s livelihood. Several cyber-attacks lead to the compromise of data security. The proposed system offers complete data protection from Advanced Persistent Threat (APT) attacks with attack detection and defence mechanisms. The modified lateral movement detection algorithm detects the APT attacks, while the defence is achieved by the Dynamic Deception system that makes use of the belief update algorithm. Before termination, every cyber-attack undergoes multiple stages, with the most prominent stage being Lateral Movement (LM). The LM uses a Remote Desktop protocol (RDP)… More >

  • Open Access

    ARTICLE

    Modelling and Optimization of Clean and Affordable Electricity Solution for Small-Scale Savings and Credit Cooperatives (SACCOs)

    Xiaomei Lin1, Samuel Bimenyimana2,*, Chen Wang2, Godwin Norense Osarumwensa Asemota3,4, Jeanne Paula Ihirwe5, Aphrodis Nduwamungu3, Etienne Ntagwirumugara6, Athanase Gace6, Changfu Yuan7, Yaowen Chen7, Changtai Li8, Shilpi Bora9, YiYi Mo10, Jiyu Lai11, Mabao Wu7, Yong Tang12, Merit M. Huang13

    Energy Engineering, Vol.120, No.4, pp. 791-810, 2023, DOI:10.32604/ee.2023.026746

    Abstract Renewable energy exploitation is among the development strategies set by the government of Rwanda on the roadmap to 2023/2024 universal electricity access and the United Nations plans by 2030. Numerous previous studies on clean energy technologies in Rwanda have mostly focused on households’ usage but there are currently no studies describing the feasibility of clean energy technologies for financial institutions. The skepticism on renewable energy in Africa was previously reported by some personnel. Having realized that most SACCOs (Savings and Credit Co-Operatives) in Rwanda use diesel technology for backup/emergency electricity supply, taking consideration of abundant solar resources in Rwanda, having… More >

  • Open Access

    ARTICLE

    Optimized Model Based Controller with Model Plant Mismatch for NMP Mitigation in Boost Converter

    R. Prasanna1,*, Uma Govindarajan1, N. S. Bhuvaneswari2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1961-1979, 2023, DOI:10.32604/csse.2023.032424

    Abstract In this paper, an optimized Genetic Algorithm (GA) based internal model controller-proportional integral derivative (IMC-PID) controller has been designed for the control variable to output variable transfer function of dc-dc boost converter to mitigate the effect of non-minimum phase (NMP) behavior due to the presence of a right-half plane zero (RHPZ). This RHPZ limits the dynamic performance of the converter and leads to internal instability. The IMC PID is a streamlined counterpart of the standard feedback controller and easily achieves optimal set point and load change performance with a single filter tuning parameter λ. Also, this paper addresses the influences… More >

  • Open Access

    ARTICLE

    RMCARTAM For DDoS Attack Mitigation in SDN Using Machine Learning

    M. Revathi, V. V. Ramalingam*, B. Amutha

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3023-3036, 2023, DOI:10.32604/csse.2023.033600

    Abstract The impact of a Distributed Denial of Service (DDoS) attack on Software Defined Networks (SDN) is briefly analyzed. Many approaches to detecting DDoS attacks exist, varying on the feature being considered and the method used. Still, the methods have a deficiency in the performance of detecting DDoS attacks and mitigating them. To improve the performance of SDN, an efficient Real-time Multi-Constrained Adaptive Replication and Traffic Approximation Model (RMCARTAM) is sketched in this article. The RMCARTAM considers different parameters or constraints in running different controllers responsible for handling incoming packets. The model is designed with multiple controllers to handle network traffic… More >

  • Open Access

    ARTICLE

    NDN Content Poisoning Mitigation Using Bird Swarm Optimization and Trust Value

    S. V. Vijaya Karthik*, J. Arputha Vijaya Selvi

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 833-847, 2023, DOI:10.32604/iasc.2023.025404

    Abstract Information-Centric Networking (ICN) is considered a viable strategy for regulating Internet consumption using the Internet’s underlying architecture. Although Named Data Networking (NDN) and its reference-based implementation, the NDN Forwarding Daemon (NFD), are the most established ICN solutions, their vulnerability to the Content Poisoning Attack (CPA) is regarded as a severe threat that might dramatically impact this architecture. Content Poisoning can significantly minimize the impact of NDN’s universal data caching. Using verification signatures to protect against content poisoning attacks may be impractical due to the associated costs and the volume of messages sent across the network, resulting in high computational costs.… More >

  • Open Access

    ARTICLE

    Research on the Effects of the Most Used Market Power Mitigation Mechanisms Considering Different Market Environments

    Yangsheng Sun1, Zhihua Wang1, Gaoqin Wang2, Beibei Wang3,*

    Energy Engineering, Vol.119, No.6, pp. 2193-2210, 2022, DOI:10.32604/ee.2022.020943

    Abstract The market power mitigation method of the supply-side has become one of the key points affecting the stability of the electricity spot market. Different mitigation mechanisms are used in the current mature electricity markets of the world. However, the same market power mitigation mechanism shows different effects in different market environments. Every market operator in the world needs the most efficient way to mitigate market power. Considering that there is no relevant literature discussing the market power effects of different mitigation methods in detail, the mitigation effects need to be discussed and further researched. So, we analyze the effects of… More >

  • Open Access

    ARTICLE

    Harmonics Mitigation Using MMC Based UPFC and Particle Swarm Optimization

    C. Gnana Thilaka*, M. Mary Linda

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3429-3445, 2023, DOI:10.32604/iasc.2023.024028

    Abstract The application of non-linear loads in the power electronic device causes serious harmonic issues in the power system since it has the intrinsic property of retrieving harmonic current and reactive power from Alternating Current (AC) supply that leads to voltage instability. To maintain a reliable power flow in the power system, an innovative Unified Power Flow Converter (UPFC) is utilized in this proposed approach. The conventional series converter is replaced with the Modular Multilevel Converter (MMC) that improves the power handling capability and achieves higher modular level with minimized distortions. The shunt compensator assists in minimizing the voltage fluctuations and… More >

Displaying 1-10 on page 1 of 26. Per Page