Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (68)
  • Open Access

    ARTICLE

    Research on the MPPT of Photovoltaic Power Generation Based on Improved WOA and P&O under Partial Shading Conditions

    Jian Zhong, Lei Zhang*, Ling Qin

    Energy Engineering, Vol.121, No.4, pp. 951-971, 2024, DOI:10.32604/ee.2023.041433 - 26 March 2024

    Abstract Partial shading conditions (PSCs) caused by uneven illumination become one of the most common problems in photovoltaic (PV) systems, which can make the PV power-voltage (P-V) characteristics curve show multi-peaks. Traditional maximum power point tracking (MPPT) methods have shortcomings in tracking to the global maximum power point (GMPP), resulting in a dramatic decrease in output power. In order to solve the above problems, intelligent algorithms are used in MPPT. However, the existing intelligent algorithms have some disadvantages, such as slow convergence speed and large search oscillation. Therefore, an improved whale algorithm (IWOA) combined with the More >

  • Open Access

    ARTICLE

    KSKV: Key-Strategy for Key-Value Data Collection with Local Differential Privacy

    Dan Zhao1, Yang You2, Chuanwen Luo3,*, Ting Chen4,*, Yang Liu5

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3063-3083, 2024, DOI:10.32604/cmes.2023.045400 - 11 March 2024

    Abstract In recent years, the research field of data collection under local differential privacy (LDP) has expanded its focus from elementary data types to include more complex structural data, such as set-value and graph data. However, our comprehensive review of existing literature reveals that there needs to be more studies that engage with key-value data collection. Such studies would simultaneously collect the frequencies of keys and the mean of values associated with each key. Additionally, the allocation of the privacy budget between the frequencies of keys and the means of values for each key does not… More >

  • Open Access

    ARTICLE

    VeriFace: Defending against Adversarial Attacks in Face Verification Systems

    Awny Sayed1, Sohair Kilany2, Alaa Zaki2, Ahmed Mahfouz2,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3151-3166, 2023, DOI:10.32604/cmc.2023.040256 - 08 October 2023

    Abstract Face verification systems are critical in a wide range of applications, such as security systems and biometric authentication. However, these systems are vulnerable to adversarial attacks, which can significantly compromise their accuracy and reliability. Adversarial attacks are designed to deceive the face verification system by adding subtle perturbations to the input images. These perturbations can be imperceptible to the human eye but can cause the system to misclassify or fail to recognize the person in the image. To address this issue, we propose a novel system called VeriFace that comprises two defense mechanisms, adversarial detection,… More >

  • Open Access

    ARTICLE

    HEAT TRANSFER ANALYSIS OF MHD CASSON FLUID FLOW BETWEEN TWO POROUS PLATES WITH DIFFERENT PERMEABILITY

    V.S. Sampath Kumar, N.P. Pai , B. Devaki

    Frontiers in Heat and Mass Transfer, Vol.20, pp. 1-13, 2023, DOI:10.5098/hmt.20.30

    Abstract In the present study, we consider Casson fluid flow between two porous plates with permeability criteria in the presence of heat transfer and magnetic effect. A proper set of similarity transformations simplify the Navier-Stokes equations to non-linear ODEs with boundary conditions. The homotopy perturbation method is an efficient and stable method which is used to get solutions. Further, the results obtained are compared with the solution computed through an effective and efficient finite difference approach. The purpose of this analysis is to study the four different cases arise viz: suction, injection, mixed suction and mixed More >

  • Open Access

    ARTICLE

    Cover Enhancement Method for Audio Steganography Based on Universal Adversarial Perturbations with Sample Diversification

    Jiangchuan Li, Peisong He*, Jiayong Liu, Jie Luo, Qiang Xia

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4893-4915, 2023, DOI:10.32604/cmc.2023.036819 - 29 April 2023

    Abstract Steganography techniques, such as audio steganography, have been widely used in covert communication. However, the deep neural network, especially the convolutional neural network (CNN), has greatly threatened the security of audio steganography. Besides, existing adversarial attacks-based countermeasures cannot provide general perturbation, and the transferability against unknown steganography detection methods is weak. This paper proposes a cover enhancement method for audio steganography based on universal adversarial perturbations with sample diversification to address these issues. Universal adversarial perturbation is constructed by iteratively optimizing adversarial perturbation, which applies adversarial attack techniques, such as Deepfool. Moreover, the sample diversification… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430 - 31 October 2022

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature… More >

  • Open Access

    ARTICLE

    Ensemble Classifier Design Based on Perturbation Binary Salp Swarm Algorithm for Classification

    Xuhui Zhu1,3, Pingfan Xia1,3, Qizhi He2,4,*, Zhiwei Ni1,3, Liping Ni1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 653-671, 2023, DOI:10.32604/cmes.2022.022985 - 29 September 2022

    Abstract Multiple classifier system exhibits strong classification capacity compared with single classifiers, but they require significant computational resources. Selective ensemble system aims to attain equivalent or better classification accuracy with fewer classifiers. However, current methods fail to identify precise solutions for constructing an ensemble classifier. In this study, we propose an ensemble classifier design technique based on the perturbation binary salp swarm algorithm (ECDPB). Considering that extreme learning machines (ELMs) have rapid learning rates and good generalization ability, they can serve as the basic classifier for creating multiple candidates while using fewer computational resources. Meanwhile, we More >

  • Open Access

    ARTICLE

    Unsteady Flow and Heat Transfer of a Casson Micropolar Nanofluid over a Curved Stretching/Shrinking Surface

    Muhammad A. Sadiq1,2,*, Nadeem Abbas3, Haitham M. S. Bahaidarah4, Mohammad Amjad5

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.2, pp. 471-486, 2023, DOI:10.32604/fdmp.2022.021133 - 29 August 2022

    Abstract We present the results of an investigation into the behavior of the unsteady flow of a Casson Micropolar nanofluid over a shrinking/stretching curved surface, together with a heat transfer analysis of the same problem. The body force acting perpendicular to the surface wall is in charge of regulating the fluid flow rate. Curvilinear coordinates are used to account for the considered curved geometry and a set of balance equations for mass, momentum, energy and concentration is obtained accordingly. These are turned into ordinary differential equations using a similarity transformation. We show that these equations have More >

  • Open Access

    ARTICLE

    Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation

    B. Murugeshwari1,*, S. Rajalakshmi1, K. Sudharson2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2293-2307, 2023, DOI:10.32604/csse.2023.029074 - 01 August 2022

    Abstract Imagine numerous clients, each with personal data; individual inputs are severely corrupt, and a server only concerns the collective, statistically essential facets of this data. In several data mining methods, privacy has become highly critical. As a result, various privacy-preserving data analysis technologies have emerged. Hence, we use the randomization process to reconstruct composite data attributes accurately. Also, we use privacy measures to estimate how much deception is required to guarantee privacy. There are several viable privacy protections; however, determining which one is the best is still a work in progress. This paper discusses the… More >

  • Open Access

    VIEWPOINT

    Long term immunological perturbations post DAA therapy in chronic HCV/HIV co-infected patients

    SONIA MORETTI, FLAVIA MANCINI, ALESSANDRA BORSETTI*

    BIOCELL, Vol.46, No.12, pp. 2695-2699, 2022, DOI:10.32604/biocell.2022.022257 - 10 August 2022

    Abstract Direct-acting antiviral (DAA) therapies are efficacious for the achievement of sustained virologic response (SVR) in almost all treated hepatitis C virus (HCV)-infected patients. However, the impacts of HCV eradication on immune function and chronic immune activation in the long-term remain controversial and limited, especially in patients co-infected with human immunodeficiency virus (HIV). Indeed, although restoration of many immune responses clearly can be observed, several features of immune perturbations persist over time after HCV clearance. Understanding the degree and reasons of the partial recovery of the immune system in chronic HCV/HIV co-infection after HCV elimination is More >

Displaying 11-20 on page 2 of 68. Per Page