Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Deep Learning Enabled Predictive Model for P2P Energy Trading in TEM

    Pudi Sekhar1, T. J. Benedict Jose2, Velmurugan Subbiah Parvathy3, E. Laxmi Lydia4, Seifedine Kadry5, Kuntha Pin6, Yunyoung Nam7,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1473-1487, 2022, DOI:10.32604/cmc.2022.022110 - 03 November 2021

    Abstract With the incorporation of distributed energy systems in the electric grid, transactive energy market (TEM) has become popular in balancing the demand as well as supply adaptively over the grid. The classical grid can be updated to the smart grid by the integration of Information and Communication Technology (ICT) over the grids. The TEM allows the Peer-to-Peer (P2P) energy trading in the grid that effectually connects the consumer and prosumer to trade energy among them. At the same time, there is a need to predict the load for effectual P2P energy trading and can be… More >

  • Open Access

    ARTICLE

    Optimal Load Forecasting Model for Peer-to-Peer Energy Trading in Smart Grids

    Lijo Jacob Varghese1, K. Dhayalini2, Suma Sira Jacob3, Ihsan Ali4,*, Abdelzahir Abdelmaboud5, Taiseer Abdalla Elfadil Eisa6

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1053-1067, 2022, DOI:10.32604/cmc.2022.019435 - 07 September 2021

    Abstract Peer-to-Peer (P2P) electricity trading is a significant research area that offers maximum fulfilment for both prosumer and consumer. It also decreases the quantity of line loss incurred in Smart Grid (SG). But, uncertainities in demand and supply of the electricity might lead to instability in P2P market for both prosumer and consumer. In recent times, numerous Machine Learning (ML)-enabled load predictive techniques have been developed, while most of the existing studies did not consider its implicit features, optimal parameter selection, and prediction stability. In order to overcome fulfill this research gap, the current research paper… More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Saeed Rubaiee5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692 - 13 April 2021

    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about… More >

  • Open Access

    ARTICLE

    Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Jehad Saad Alqurni5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 983-1001, 2021, DOI:10.32604/cmc.2021.015371 - 22 March 2021

    Abstract One of the key challenges in ad-hoc networks is the resource discovery problem. How efficiently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique floods the network with query messages, while the random walk scheme operates… More >

  • Open Access

    ARTICLE

    Utility of the Aortic-Lesion-AttenuationDifference (ALAD) and Peak Early-Phase Enhancement Ratio (PEER) to differentiate benign from malignant renal masses

    Amanda E. Kahn1, Steven J. Lomax1, Essa M. Bajalia1, Colleen T. Ball2, David D. Thiel1

    Canadian Journal of Urology, Vol.27, No.4, pp. 10278-10284, 2020

    Abstract Introduction: To evaluate the utility of the Aorta-Lesion-Attenuation-Difference (ALAD) and Peak Early-phase Enhancement Ratio (PEER) on contrast-enhanced computed tomography (CT) to differentiate between the appearances of chromophobe renal cell carcinoma, clear cell renal cell carcinoma, and oncocytoma.
    Materials and methods: ALAD and PEER values were retrospectively measured by a reviewer from 119 patients with surgically resected renal masses (chromophobe renal cell carcinoma n = 29, clear cell renal cell carcinoma n = 28, and oncocytoma n = 62). The ALAD value is expressed as: ALAD = Hounsfield Units aorta – Hounsfield Units mass. PEER is expressed as… More >

  • Open Access

    ARTICLE

    Embracing and Growing as a Peer Support Provider: An Analysis of Participants’ Experience in a Peer Support Program Based on the Recovery Model of Mental Illness

    Su Yeon Kim1, Kyung Mi Lim2, Soo Jin Kim3, Go-Un Kim4, Boyoung Kim5,*

    International Journal of Mental Health Promotion, Vol.22, No.4, pp. 261-270, 2020, DOI:10.32604/IJMHP.2020.013279 - 22 December 2020

    Abstract Peer support is an important factor in the recovery of persons with mental illness. Most studies have focused on the effects of peer support programs on participants rather than on the process of mental health recovery. This study was a qualitative analysis of the experience of participants in a peer support provider program based on the recovery model of mental illness in Korean communities. The participants were recruited through flyers, and interested candidates were screened to determine whether they met the eligibility criteria. The total number of participants in individual interviews was 10, comprising 5… More >

  • Open Access

    ARTICLE

    A Sentinel-Based Peer Assessment Mechanism for Collaborative Learning

    Cong Wang1, Mingming Zhao2, Qinyue Wang2, 3, Min Li2, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2309-2319, 2020, DOI:10.32604/cmc.2020.09958 - 16 September 2020

    Abstract This paper introduces a novel mechanism to improve the performance of peer assessment for collaborative learning. Firstly, a small set of assignments which have being pre-scored by the teacher impartially, are introduced as “sentinels”. The reliability of a reviewer can be estimated by the deviation between the sentinels’ scores judged by the reviewers and the impartial scores. Through filtering the inferior reviewers by the reliability, each score can then be subjected into mean value correction and standard deviation correction processes sequentially. Then the optimized mutual score which mitigated the influence of the subjective differences of More >

  • Open Access

    ARTICLE

    Small unrepaired atrial septal defects display impaired exercise capacity compared with healthy peers

    Sebastian Udholm, Christian Rex, Filip Eckerström, Mine Onat, Camilla Nyboe, Vibeke E. Hjortdal

    Congenital Heart Disease, Vol.14, No.3, pp. 372-379, 2019, DOI:10.1111/chd.12740

    Abstract Objective: Adult patients with small, unrepaired atrial septal defects have an in‐ creased risk of pneumonia, atrial fibrillation, and stroke. Furthermore, they have higher late mortality than the background population. The functional capacity is un‐ known in these patients. Therefore, our objective was to determine exercise capacity in adult patients diagnosed with an unrepaired atrial septal defect compared to healthy controls. Design: A cross‐sectional study. Patients: Adult patients with small, unrepaired atrial septal defects, aged 18‐65, di‐ agnosed between 1953 and 2011. Interventions: Cardiopulmonary exercise test was performed using an incremental bicycle test and gas… More >

  • Open Access

    ARTICLE

    A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

    Alanoud Alhussain1, Heba Kurdi1,*, Lina Altoaimy2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 805-815, 2019, DOI:10.32604/cmc.2019.05848

    Abstract Edge devices in Internet of Things (IoT) applications can form peers to communicate in peer-to-peer (P2P) networks over P2P protocols. Using P2P networks ensures scalability and removes the need for centralized management. However, due to the open nature of P2P networks, they often suffer from the existence of malicious peers, especially malicious peers that unite in groups to raise each other's ratings. This compromises users' safety and makes them lose their confidence about the files or services they are receiving. To address these challenges, we propose a neural network-based algorithm, which uses the advantages of More >

  • Open Access

    ARTICLE

    A Hierarchical Trust Model for Peer-to-Peer Networks

    Nehal Al-Otaiby1, Heba Kurdi1,*, Shiroq Al-Megren1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 397-404, 2019, DOI:10.32604/cmc.2019.06236

    Abstract Trust has become an increasingly important issue given society’s growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem’s scale and More >

Displaying 21-30 on page 3 of 31. Per Page