Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    A Double-Ended Protection Principle for an LCC-VSC-MTDC System with Strong Anti-Interference Ability

    Chuanjian Wu, Dahai Zhang*, Jinghan He

    Energy Engineering, Vol.120, No.2, pp. 299-316, 2023, DOI:10.32604/ee.2023.023532

    Abstract The DC grid technology of multi-power supply and multi-drop-point power reception is an effective solution for large-scale renewable energy integration into the power grid. Line-commutated converter-Voltage source converter (LCC-VSC) power grids are one of the more important developmental directions of the future power grid that have occured in recent years. But the multi-terminal high voltage direct current system has the problems of inconsistent boundary characteristics, inconsistent control, and fault response characteristics, which puts higher requirements on the protection scheme. Thus, a completely new protection principle is proposed in this paper. Firstly, the fault characteristics of distributed capacitance current are analyzed.… More >

  • Open Access

    ARTICLE

    A Secure Framework for Blockchain Transactions Protection

    Wafaa N. Al-Sharu1,*, Majdi K. Qabalin2, Muawya Naser2, Omar A. Saraerh1

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1095-1111, 2023, DOI:10.32604/csse.2023.032862

    Abstract One of the most extensively used technologies for improving the security of IoT devices is blockchain technology. It is a new technology that can be utilized to boost the security. It is a decentralized peer-to-peer network with no central authority. Multiple nodes on the network mine or verify the data recorded on the Blockchain. It is a distributed ledger that may be used to keep track of transactions between several parties. No one can tamper with the data on the blockchain since it is unchangeable. Because the blocks are connected by hashes, the transaction data is safe. It is managed… More >

  • Open Access

    ARTICLE

    Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain

    Jin Wang1, Wei Ou1, Osama Alfarraj2, Amr Tolba2, Gwang-Jun Kim3,*, Yongjun Ren4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1805-1819, 2023, DOI:10.32604/csse.2023.029622

    Abstract Since transactions in blockchain are based on public ledger verification, this raises security concerns about privacy protection. And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification, when the whole transaction on the chain is verified. In order to improve the efficiency and privacy protection of block data verification, this paper proposes an efficient block verification mechanism with privacy protection based on zero-knowledge proof (ZKP), which not only protects the privacy of users but also improves the speed of data block verification. There is no need to put the whole… More >

  • Open Access

    ARTICLE

    Federation Boosting Tree for Originator Rights Protection

    Yinggang Sun1, Hongguo Zhang1, Chao Ma1,*, Hai Huang1, Dongyang Zhan2,3, Jiaxing Qu4

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4043-4058, 2023, DOI:10.32604/cmc.2023.031684

    Abstract The problem of data island hinders the application of big data in artificial intelligence model training, so researchers propose a federated learning framework. It enables model training without having to centralize all data in a central storage point. In the current horizontal federated learning scheme, each participant gets the final jointly trained model. No solution is proposed for scenarios where participants only provide training data in exchange for benefits, but do not care about the final jointly trained model. Therefore, this paper proposes a new boosted tree algorithm, called RPBT (the originator Rights Protected federated Boosted Tree algorithm). Compared with… More >

  • Open Access

    ARTICLE

    A Single-Ended Protection Principle for LCC-VSC-MTDC System with High Resistance Fault Tolerance

    Dahai Zhang*, Chuanjian Wu, Jinghan He

    Energy Engineering, Vol.120, No.1, pp. 1-21, 2023, DOI:10.32604/ee.2022.023304

    Abstract Line-commutated converter-voltage source converter (LCC-VSC) power transmission technology does not have the problem of communication failure very usually. It therefore can support the long-distance, long-capacity transmission of electric energy. However, factors such as topology, control strategy, and short-circuit capacities make the traditional protection principles not fully applicable to LCC-VSC hybrid transmission systems. To enhance the reliability of hybrid DC systems, a single-ended principle based on transmission coefficients is proposed and produced. First, the equivalent circuit of the LCC-VSC hybrid DC system is analyzed and the expression of the first traveling wave is deduced accordingly. Then, the concept of multi-frequency transmission… More >

  • Open Access

    ARTICLE

    Health Data Availability Protection: Delta-XOR-Relay Data Update in Erasure-Coded Cloud Storage Systems

    Yifei Xiao, Shijie Zhou*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 169-185, 2023, DOI:10.32604/cmes.2022.021795

    Abstract To achieve the high availability of health data in erasure-coded cloud storage systems, the data update performance in erasure coding should be continuously optimized. However, the data update performance is often bottlenecked by the constrained cross-rack bandwidth. Various techniques have been proposed in the literature to improve network bandwidth efficiency, including delta transmission, relay, and batch update. These techniques were largely proposed individually previously, and in this work, we seek to use them jointly. To mitigate the cross-rack update traffic, we propose DXR-DU which builds on four valuable techniques: (i) delta transmission, (ii) XOR-based data update, (iii) relay, and (iv)… More >

  • Open Access

    ARTICLE

    GrCol-PPFL: User-Based Group Collaborative Federated Learning Privacy Protection Framework

    Jieren Cheng1, Zhenhao Liu1,*, Yiming Shi1, Ping Luo1,2, Victor S. Sheng3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1923-1939, 2023, DOI:10.32604/cmc.2023.032758

    Abstract With the increasing number of smart devices and the development of machine learning technology, the value of users’ personal data is becoming more and more important. Based on the premise of protecting users’ personal privacy data, federated learning (FL) uses data stored on edge devices to realize training tasks by contributing training model parameters without revealing the original data. However, since FL can still leak the user's original data by exchanging gradient information. The existing privacy protection strategy will increase the uplink time due to encryption measures. It is a huge challenge in terms of communication. When there are a… More >

  • Open Access

    REVIEW

    Research Progress of Eco-Friendly Portland Cement Porous Concrete: A Review

    Xin Cai1,2, Fan Li1, Xingwen Guo2,*, Ren Li3, Yanan Zhang1, Qinghui Liu2, Minmin Jiang4

    Journal of Renewable Materials, Vol.11, No.1, pp. 103-130, 2023, DOI:10.32604/jrm.2022.022684

    Abstract With the great impetus of energy conservation and emission reduction policies in various countries, the proposal of concepts such as “Sponge City” and “Eco-City”, and the emphasis on restoration and governance of ecological environment day by day, portland cement porous concrete (PCPC), as a novel building material, has attracted more and more attention from scientific researchers and engineers. PCPC possesses the peculiar pore structure, which owns numerous functions like river embankment protection, vegetation greening as well as air-cleaning, and has been of wide application in different engineering fields. This paper reviews the salient properties of PCPC, detailedly expounds the research… More > Graphic Abstract

    Research Progress of Eco-Friendly Portland Cement Porous Concrete: A Review

  • Open Access

    ARTICLE

    Systematic Approach for Web Protection Runtime Tools’ Effectiveness Analysis

    Tomás Sureda Riera1,*, Juan Ramón Bermejo Higuera2, Javier Bermejo Higuera2, Juan Antonio Sicilia Montalvo2, José Javier Martínez Herráiz1

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 579-599, 2022, DOI:10.32604/cmes.2022.020976

    Abstract Web applications represent one of the principal vehicles by which attackers gain access to an organization’s network or resources. Thus, different approaches to protect web applications have been proposed to date. Of them, the two major approaches areWeb Application Firewalls (WAF) and Runtime Application Self Protection (RASP). It is, thus, essential to understand the differences and relative effectiveness of both these approaches for effective decisionmaking regarding the security of web applications. Here we present a comparative study between WAF and RASP simulated settings, with the aim to compare their effectiveness and efficiency against different categories of attacks. For this, we… More >

  • Open Access

    ARTICLE

    A Design of 220 kV Line Protection Action Deduction System Based on Numerical Simulation

    Tiecheng Li1, Qingquan Liu1, Hui Fan2, Xianzhi Wang1, Daming Zhou3,*, Junan Guo3, Lee Li3, Kun Zhou3, Yujie Hu3

    Energy Engineering, Vol.119, No.5, pp. 2105-2134, 2022, DOI:10.32604/ee.2022.017718

    Abstract Accurate conditions monitoring and early wrong action warnings of relay protection in the Smart Substation is the basic guarantee to realize the normal operation of primary and secondary system of the power grid. At present, the traditional operation and maintenance monitoring methods of relay protections have poor timeliness, while some automatic monitoring methods have insufficient early warning performance, and lack the online action deduction function independent of the actual device. In this paper, a design method of integrated action deduction system including protection logic reasoning and software and hardware operation condition is proposed. The system can receive real-time operation information… More >

Displaying 41-50 on page 5 of 140. Per Page