Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Peer-to-Peer Energy Trading Method of Multi-Virtual Power Plants Based on Non-Cooperative Game

    Jingjing Bai*, Hongyi Zhou, Zheng Xu, Yu Zhong

    Energy Engineering, Vol.120, No.5, pp. 1163-1183, 2023, DOI:10.32604/ee.2023.025553 - 20 February 2023

    Abstract The current electricity market fails to consider the energy consumption characteristics of transaction subjects such as virtual power plants. Besides, the game relationship between transaction subjects needs to be further explored. This paper proposes a Peer-to-Peer energy trading method for multi-virtual power plants based on a non-cooperative game. Firstly, a coordinated control model of public buildings is incorporated into the scheduling framework of the virtual power plant, considering the energy consumption characteristics of users. Secondly, the utility functions of multiple virtual power plants are analyzed, and a non-cooperative game model is established to explore the… More >

  • Open Access

    ARTICLE

    Integrated Privacy Preserving Healthcare System Using Posture-Based Classifier in Cloud

    C. Santhosh Kumar1, K. Vishnu Kumar2,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2893-2907, 2023, DOI:10.32604/iasc.2023.029669 - 17 August 2022

    Abstract Privacy-preserving online disease prediction and diagnosis are critical issues in the emerging edge-cloud-based healthcare system. Online patient data processing from remote places may lead to severe privacy problems. Moreover, the existing cloud-based healthcare system takes more latency and energy consumption during diagnosis due to offloading of live patient data to remote cloud servers. Solve the privacy problem. The proposed research introduces the edge-cloud enabled privacy-preserving healthcare system by exploiting additive homomorphic encryption schemes. It can help maintain the privacy preservation and confidentiality of patients’ medical data during diagnosis of Parkinson’s disease. In addition, the energy More >

  • Open Access

    ARTICLE

    Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks

    Saima Kauser1, Tauqeer Safdar Malik1,*, Mohd Hilmi Hasan2, Emelia Akashah P. Akhir2, Syed Muhammad Husnain Kazmi3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1251-1273, 2022, DOI:10.32604/cmc.2022.022475 - 24 February 2022

    Abstract A web browser is the most basic tool for accessing the internet from any of the machines/equipment. Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors. Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack. These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment. Continuous surveillance of IoT devices and forensic tools are required to overcome the issues… More >

  • Open Access

    ARTICLE

    Machine Learning-based Stable P2P IPTV Overlay

    Muhammad Javid Iqbal1,2, Ihsan Ullah2,*, Muhammad Ali2, Atiq Ahmed2, Waheed Noor2, Abdul Basit2

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5381-5397, 2022, DOI:10.32604/cmc.2022.024116 - 14 January 2022

    Abstract Live video streaming is one of the newly emerged services over the Internet that has attracted immense interest of the service providers. Since Internet was not designed for such services during its inception, such a service poses some serious challenges including cost and scalability. Peer-to-Peer (P2P) Internet Protocol Television (IPTV) is an application-level distributed paradigm to offer live video contents. In terms of ease of deployment, it has emerged as a serious alternative to client server, Content Delivery Network (CDN) and IP multicast solutions. Nevertheless, P2P approach has struggled to provide the desired streaming quality… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Predictive Model for P2P Energy Trading in TEM

    Pudi Sekhar1, T. J. Benedict Jose2, Velmurugan Subbiah Parvathy3, E. Laxmi Lydia4, Seifedine Kadry5, Kuntha Pin6, Yunyoung Nam7,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1473-1487, 2022, DOI:10.32604/cmc.2022.022110 - 03 November 2021

    Abstract With the incorporation of distributed energy systems in the electric grid, transactive energy market (TEM) has become popular in balancing the demand as well as supply adaptively over the grid. The classical grid can be updated to the smart grid by the integration of Information and Communication Technology (ICT) over the grids. The TEM allows the Peer-to-Peer (P2P) energy trading in the grid that effectually connects the consumer and prosumer to trade energy among them. At the same time, there is a need to predict the load for effectual P2P energy trading and can be… More >

  • Open Access

    ARTICLE

    Optimal Load Forecasting Model for Peer-to-Peer Energy Trading in Smart Grids

    Lijo Jacob Varghese1, K. Dhayalini2, Suma Sira Jacob3, Ihsan Ali4,*, Abdelzahir Abdelmaboud5, Taiseer Abdalla Elfadil Eisa6

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1053-1067, 2022, DOI:10.32604/cmc.2022.019435 - 07 September 2021

    Abstract Peer-to-Peer (P2P) electricity trading is a significant research area that offers maximum fulfilment for both prosumer and consumer. It also decreases the quantity of line loss incurred in Smart Grid (SG). But, uncertainities in demand and supply of the electricity might lead to instability in P2P market for both prosumer and consumer. In recent times, numerous Machine Learning (ML)-enabled load predictive techniques have been developed, while most of the existing studies did not consider its implicit features, optimal parameter selection, and prediction stability. In order to overcome fulfill this research gap, the current research paper… More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Saeed Rubaiee5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692 - 13 April 2021

    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about… More >

  • Open Access

    ARTICLE

    Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Jehad Saad Alqurni5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 983-1001, 2021, DOI:10.32604/cmc.2021.015371 - 22 March 2021

    Abstract One of the key challenges in ad-hoc networks is the resource discovery problem. How efficiently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique floods the network with query messages, while the random walk scheme operates… More >

  • Open Access

    ARTICLE

    Embracing and Growing as a Peer Support Provider: An Analysis of Participants’ Experience in a Peer Support Program Based on the Recovery Model of Mental Illness

    Su Yeon Kim1, Kyung Mi Lim2, Soo Jin Kim3, Go-Un Kim4, Boyoung Kim5,*

    International Journal of Mental Health Promotion, Vol.22, No.4, pp. 261-270, 2020, DOI:10.32604/IJMHP.2020.013279 - 22 December 2020

    Abstract Peer support is an important factor in the recovery of persons with mental illness. Most studies have focused on the effects of peer support programs on participants rather than on the process of mental health recovery. This study was a qualitative analysis of the experience of participants in a peer support provider program based on the recovery model of mental illness in Korean communities. The participants were recruited through flyers, and interested candidates were screened to determine whether they met the eligibility criteria. The total number of participants in individual interviews was 10, comprising 5… More >

  • Open Access

    ARTICLE

    A Sentinel-Based Peer Assessment Mechanism for Collaborative Learning

    Cong Wang1, Mingming Zhao2, Qinyue Wang2, 3, Min Li2, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2309-2319, 2020, DOI:10.32604/cmc.2020.09958 - 16 September 2020

    Abstract This paper introduces a novel mechanism to improve the performance of peer assessment for collaborative learning. Firstly, a small set of assignments which have being pre-scored by the teacher impartially, are introduced as “sentinels”. The reliability of a reviewer can be estimated by the deviation between the sentinels’ scores judged by the reviewers and the impartial scores. Through filtering the inferior reviewers by the reliability, each score can then be subjected into mean value correction and standard deviation correction processes sequentially. Then the optimized mutual score which mitigated the influence of the subjective differences of More >

Displaying 11-20 on page 2 of 24. Per Page