Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (58)
  • Open Access

    ARTICLE

    Research on the MPPT of Photovoltaic Power Generation Based on Improved WOA and P&O under Partial Shading Conditions

    Jian Zhong, Lei Zhang*, Ling Qin

    Energy Engineering, Vol.121, No.4, pp. 951-971, 2024, DOI:10.32604/ee.2023.041433

    Abstract Partial shading conditions (PSCs) caused by uneven illumination become one of the most common problems in photovoltaic (PV) systems, which can make the PV power-voltage (P-V) characteristics curve show multi-peaks. Traditional maximum power point tracking (MPPT) methods have shortcomings in tracking to the global maximum power point (GMPP), resulting in a dramatic decrease in output power. In order to solve the above problems, intelligent algorithms are used in MPPT. However, the existing intelligent algorithms have some disadvantages, such as slow convergence speed and large search oscillation. Therefore, an improved whale algorithm (IWOA) combined with the P&O (IWOA-P&O) is proposed for… More >

  • Open Access

    ARTICLE

    KSKV: Key-Strategy for Key-Value Data Collection with Local Differential Privacy

    Dan Zhao1, Yang You2, Chuanwen Luo3,*, Ting Chen4,*, Yang Liu5

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3063-3083, 2024, DOI:10.32604/cmes.2023.045400

    Abstract In recent years, the research field of data collection under local differential privacy (LDP) has expanded its focus from elementary data types to include more complex structural data, such as set-value and graph data. However, our comprehensive review of existing literature reveals that there needs to be more studies that engage with key-value data collection. Such studies would simultaneously collect the frequencies of keys and the mean of values associated with each key. Additionally, the allocation of the privacy budget between the frequencies of keys and the means of values for each key does not yield an optimal utility tradeoff.… More >

  • Open Access

    ARTICLE

    VeriFace: Defending against Adversarial Attacks in Face Verification Systems

    Awny Sayed1, Sohair Kinlany2, Alaa Zaki2, Ahmed Mahfouz2,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3151-3166, 2023, DOI:10.32604/cmc.2023.040256

    Abstract Face verification systems are critical in a wide range of applications, such as security systems and biometric authentication. However, these systems are vulnerable to adversarial attacks, which can significantly compromise their accuracy and reliability. Adversarial attacks are designed to deceive the face verification system by adding subtle perturbations to the input images. These perturbations can be imperceptible to the human eye but can cause the system to misclassify or fail to recognize the person in the image. To address this issue, we propose a novel system called VeriFace that comprises two defense mechanisms, adversarial detection, and adversarial removal. The first… More >

  • Open Access

    ARTICLE

    A LARGE PARAMETER SPECTRAL PERTURBATION METHOD FOR NONLINEAR SYSTEMS OF PARTIAL DIFFERENTIAL EQUATIONS THAT MODELS BOUNDARY LAYER FLOW PROBLEMS

    T. M. Agbajea,b, S. S. Motsaa,* , S. Mondalc,† , P. Sibandaa

    Frontiers in Heat and Mass Transfer, Vol.9, pp. 1-13, 2017, DOI:10.5098/hmt.9.36

    Abstract In this work, we present a compliment of the spectral perturbation method (SPM) for solving nonlinear partial differential equations (PDEs) with applications in fluid flow problems. The (SPM) is a series expansion based approach that uses the Chebyshev spectral collocation method to solve the governing sequence of differential equation generated by the perturbation series approximation. Previously the SPM had the limitation of being used to solve problems with small parameters only. This current investigation seeks to improve the performance of the SPM by doing the series expansion about a large parameter. The new method namely the large parameter spectral perturbation… More >

  • Open Access

    ARTICLE

    A STUDY OF MAGNETIC EFFECT ON FLOW BETWEEN TWO PLATES WITH SUCTION OR INJECTION WITH SPECIAL REFERENCE TO CASSON FLUID

    V. S. Sampath Kumar, N. P. Pai

    Frontiers in Heat and Mass Transfer, Vol.12, pp. 1-9, 2019, DOI:10.5098/hmt.12.23

    Abstract The present paper encorporates the effet of magnetic field on the incompressible Casson fluid flow between two parallel infinite rectangular plates approaching towards or away from each other with suction or injection at the porous plates. Using similarity transformations the governing Navier-Stokes equations are reduced to a nonlinear ordinary differential equation. Semi-analytical solution is obtained based on the Homotopy perturbation method. Further, the solution is compared with the classical finite difference method separately. The effect of magnetic field on velocity, skin friction and pressure is analysed on flow between two plates with suction or injection, where two plates moving towards… More >

  • Open Access

    ARTICLE

    HEAT TRANSFER ANALYSIS OF MHD CASSON FLUID FLOW BETWEEN TWO POROUS PLATES WITH DIFFERENT PERMEABILITY

    V.S. Sampath Kumar, N.P. Pai , B. Devaki

    Frontiers in Heat and Mass Transfer, Vol.20, pp. 1-13, 2023, DOI:10.5098/hmt.20.30

    Abstract In the present study, we consider Casson fluid flow between two porous plates with permeability criteria in the presence of heat transfer and magnetic effect. A proper set of similarity transformations simplify the Navier-Stokes equations to non-linear ODEs with boundary conditions. The homotopy perturbation method is an efficient and stable method which is used to get solutions. Further, the results obtained are compared with the solution computed through an effective and efficient finite difference approach. The purpose of this analysis is to study the four different cases arise viz: suction, injection, mixed suction and mixed injection in this problem, along… More >

  • Open Access

    ARTICLE

    Cover Enhancement Method for Audio Steganography Based on Universal Adversarial Perturbations with Sample Diversification

    Jiangchuan Li, Peisong He*, Jiayong Liu, Jie Luo, Qiang Xia

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4893-4915, 2023, DOI:10.32604/cmc.2023.036819

    Abstract Steganography techniques, such as audio steganography, have been widely used in covert communication. However, the deep neural network, especially the convolutional neural network (CNN), has greatly threatened the security of audio steganography. Besides, existing adversarial attacks-based countermeasures cannot provide general perturbation, and the transferability against unknown steganography detection methods is weak. This paper proposes a cover enhancement method for audio steganography based on universal adversarial perturbations with sample diversification to address these issues. Universal adversarial perturbation is constructed by iteratively optimizing adversarial perturbation, which applies adversarial attack techniques, such as Deepfool. Moreover, the sample diversification strategy is designed to improve… More >

  • Open Access

    ARTICLE

    ANALYSIS OF MHD FLOW AND HEAT TRANSFER OF LAMINAR FLOW BETWEEN POROUS DISKS

    V. S. Sampath Kumara , N. P. Paia,† , B. Devakia

    Frontiers in Heat and Mass Transfer, Vol.16, pp. 1-7, 2021, DOI:10.5098/hmt.16.3

    Abstract A study is carried out for the two dimensional laminar flow of conducting fluid in presence of magnetic field. The governing non-linear equations of motion are transformed in to dimensionaless form. A solution is obtained by homotopy perturbation method and it is valid for moderately large Reynolds numbers for injection at the wall. Also an efficient algorithm based finite difference scheme is developed to solve the reduced coupled ordinary differential equations with necessary boundary conditions. The effects of Reynolds number, the magnetic parameter and the pradantle number on flow velocity and tempratare distribution is analysed by both the methods and… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature selection and Bengio Nesterov Momentum-based… More >

  • Open Access

    ARTICLE

    Ensemble Classifier Design Based on Perturbation Binary Salp Swarm Algorithm for Classification

    Xuhui Zhu1,3, Pingfan Xia1,3, Qizhi He2,4,*, Zhiwei Ni1,3, Liping Ni1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 653-671, 2023, DOI:10.32604/cmes.2022.022985

    Abstract Multiple classifier system exhibits strong classification capacity compared with single classifiers, but they require significant computational resources. Selective ensemble system aims to attain equivalent or better classification accuracy with fewer classifiers. However, current methods fail to identify precise solutions for constructing an ensemble classifier. In this study, we propose an ensemble classifier design technique based on the perturbation binary salp swarm algorithm (ECDPB). Considering that extreme learning machines (ELMs) have rapid learning rates and good generalization ability, they can serve as the basic classifier for creating multiple candidates while using fewer computational resources. Meanwhile, we introduce a combined diversity measure… More >

Displaying 1-10 on page 1 of 58. Per Page