Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (599)
  • Open Access

    REVIEW

    Optimal Location of Renewable Energy Generators in Transmission and Distribution System of Deregulated Power Sector: A Review

    Digambar Singh1, Najat Elgeberi2, Mohammad Aljaidi3,*, Ramesh Kumar4,5, Rabia Emhamed Al Mamlook6, Manish Kumar Singla4,7,8,*

    Energy Engineering, Vol.122, No.3, pp. 823-859, 2025, DOI:10.32604/ee.2025.059309 - 07 March 2025

    Abstract The literature on multi-attribute optimization for renewable energy source (RES) placement in deregulated power markets is extensive and diverse in methodology. This study focuses on the most relevant publications directly addressing the research problem at hand. Similarly, while the body of work on optimal location and sizing of renewable energy generators (REGs) in balanced distribution systems is substantial, only the most pertinent sources are cited, aligning closely with the study’s objective function. A comprehensive literature review reveals several key research areas: RES integration, RES-related optimization techniques, strategic placement of wind and solar generation, and RES… More >

  • Open Access

    ARTICLE

    Enhanced Particle Swarm Optimization Algorithm Based on SVM Classifier for Feature Selection

    Xing Wang1,*, Huazhen Liu1, Abdelazim G. Hussien2, Gang Hu1, Li Zhang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2791-2839, 2025, DOI:10.32604/cmes.2025.058473 - 03 March 2025

    Abstract Feature selection (FS) is essential in machine learning (ML) and data mapping by its ability to preprocess high-dimensional data. By selecting a subset of relevant features, feature selection cuts down on the dimension of the data. It excludes irrelevant or surplus features, thus boosting the performance and efficiency of the model. Particle Swarm Optimization (PSO) boasts a streamlined algorithmic framework and exhibits rapid convergence traits. Compared with other algorithms, it incurs reduced computational expenses when tackling high-dimensional datasets. However, PSO faces challenges like inadequate convergence precision. Therefore, regarding FS problems, this paper presents a binary… More >

  • Open Access

    ARTICLE

    Particle Swarm Optimization Algorithm for Feature Selection Inspired by Peak Ecosystem Dynamics

    Shaobo Deng*, Meiru Xie, Bo Wang, Shuaikun Zhang, Sujie Guan, Min Li

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2723-2751, 2025, DOI:10.32604/cmc.2024.057874 - 17 February 2025

    Abstract In recent years, particle swarm optimization (PSO) has received widespread attention in feature selection due to its simplicity and potential for global search. However, in traditional PSO, particles primarily update based on two extreme values: personal best and global best, which limits the diversity of information. Ideally, particles should learn from multiple advantageous particles to enhance interactivity and optimization efficiency. Accordingly, this paper proposes a PSO that simulates the evolutionary dynamics of species survival in mountain peak ecology (PEPSO) for feature selection. Based on the pyramid topology, the algorithm simulates the features of mountain peak… More >

  • Open Access

    ARTICLE

    An Improved Chaotic Quantum Multi-Objective Harris Hawks Optimization Algorithm for Emergency Centers Site Selection Decision Problem

    Yuting Zhu1,*, Wenyu Zhang1,2, Hainan Wang1, Junjie Hou1, Haining Wang1, Meng Wang1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2177-2198, 2025, DOI:10.32604/cmc.2024.057441 - 17 February 2025

    Abstract Addressing the complex issue of emergency resource distribution center site selection in uncertain environments, this study was conducted to comprehensively consider factors such as uncertainty parameters and the urgency of demand at disaster-affected sites. Firstly, urgency cost, economic cost, and transportation distance cost were identified as key objectives. The study applied fuzzy theory integration to construct a triangular fuzzy multi-objective site selection decision model. Next, the defuzzification theory transformed the fuzzy decision model into a precise one. Subsequently, an improved Chaotic Quantum Multi-Objective Harris Hawks Optimization (CQ-MOHHO) algorithm was proposed to solve the model. The… More >

  • Open Access

    ARTICLE

    CRITIC-CoCoSo Model Application in Hybrid Solar-Wind Energy Plant Location Selection Problem: A Case Study in Vietnam

    Viet Tinh Nguyen, Rujira Chaysiri*

    Energy Engineering, Vol.122, No.2, pp. 515-536, 2025, DOI:10.32604/ee.2024.057786 - 31 January 2025

    Abstract This paper presents a novel multi-criteria decision-making (MCDM) model for selecting optimal locations for a solar-wind hybrid energy plant in Vietnam. The study employs the Criteria Importance Through Intercriteria Correlation (CRITIC) and Combined Compromise Solution (CoCoSo) methods to address the challenge of evaluating potential sites based on a range of economic, technical, environmental, and social criteria. By integrating CRITIC for criteria weighting and CoCoSo for ranking alternatives, the study underscores the importance of objective, data-driven approaches in the strategic planning and implementation of sustainable energy projects. The results identify Ham Thuan Nam District in Binh More >

  • Open Access

    REVIEW

    Unveiling Effective Heuristic Strategies: A Review of Cross-Domain Heuristic Search Challenge Algorithms

    Mohamad Khairulamirin Md Razali1,*, Masri Ayob2, Abdul Hadi Abd Rahman2, Razman Jarmin3, Chian Yong Liu3, Muhammad Maaya3, Azarinah Izaham3, Graham Kendall4,5

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.2, pp. 1233-1288, 2025, DOI:10.32604/cmes.2025.060481 - 27 January 2025

    Abstract The Cross-domain Heuristic Search Challenge (CHeSC) is a competition focused on creating efficient search algorithms adaptable to diverse problem domains. Selection hyper-heuristics are a class of algorithms that dynamically choose heuristics during the search process. Numerous selection hyper-heuristics have different implementation strategies. However, comparisons between them are lacking in the literature, and previous works have not highlighted the beneficial and detrimental implementation methods of different components. The question is how to effectively employ them to produce an efficient search heuristic. Furthermore, the algorithms that competed in the inaugural CHeSC have not been collectively reviewed. This… More >

  • Open Access

    ARTICLE

    A Multi-Objective Particle Swarm Optimization Algorithm Based on Decomposition and Multi-Selection Strategy

    Li Ma1, Cai Dai1,*, Xingsi Xue2, Cheng Peng3

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 997-1026, 2025, DOI:10.32604/cmc.2024.057168 - 03 January 2025

    Abstract The multi-objective particle swarm optimization algorithm (MOPSO) is widely used to solve multi-objective optimization problems. In the article, a multi-objective particle swarm optimization algorithm based on decomposition and multi-selection strategy is proposed to improve the search efficiency. First, two update strategies based on decomposition are used to update the evolving population and external archive, respectively. Second, a multi-selection strategy is designed. The first strategy is for the subspace without a non-dominated solution. Among the neighbor particles, the particle with the smallest penalty-based boundary intersection value is selected as the global optimal solution and the particle… More >

  • Open Access

    ARTICLE

    An Intelligent Security Service Optimization Method Based on Knowledge Base

    Xianju Gao*, Huachun Zhou, Weilin Wang, Jingfu Yan

    Computer Systems Science and Engineering, Vol.49, pp. 19-48, 2025, DOI:10.32604/csse.2024.058327 - 03 January 2025

    Abstract The network security knowledge base standardizes and integrates network security data, providing a reliable foundation for real-time network security protection solutions. However, current research on network security knowledge bases mainly focuses on their construction, while the potential to optimize intelligent security services for real-time network security protection requires further exploration. Therefore, how to effectively utilize the vast amount of historical knowledge in the field of network security and establish a feedback mechanism to update it in real time, thereby enhancing the detection capability of security services against malicious traffic, has become an important issue. Our… More >

  • Open Access

    ARTICLE

    Congruent Feature Selection Method to Improve the Efficacy of Machine Learning-Based Classification in Medical Image Processing

    Mohd Anjum1, Naoufel Kraiem2, Hong Min3,*, Ashit Kumar Dutta4, Yousef Ibrahim Daradkeh5

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 357-384, 2025, DOI:10.32604/cmes.2024.057889 - 17 December 2024

    Abstract Machine learning (ML) is increasingly applied for medical image processing with appropriate learning paradigms. These applications include analyzing images of various organs, such as the brain, lung, eye, etc., to identify specific flaws/diseases for diagnosis. The primary concern of ML applications is the precise selection of flexible image features for pattern detection and region classification. Most of the extracted image features are irrelevant and lead to an increase in computation time. Therefore, this article uses an analytical learning paradigm to design a Congruent Feature Selection Method to select the most relevant image features. This process… More >

  • Open Access

    ARTICLE

    Robust Network Security: A Deep Learning Approach to Intrusion Detection in IoT

    Ammar Odeh*, Anas Abu Taleb

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4149-4169, 2024, DOI:10.32604/cmc.2024.058052 - 19 December 2024

    Abstract The proliferation of Internet of Things (IoT) technology has exponentially increased the number of devices interconnected over networks, thereby escalating the potential vectors for cybersecurity threats. In response, this study rigorously applies and evaluates deep learning models—namely Convolutional Neural Networks (CNN), Autoencoders, and Long Short-Term Memory (LSTM) networks—to engineer an advanced Intrusion Detection System (IDS) specifically designed for IoT environments. Utilizing the comprehensive UNSW-NB15 dataset, which encompasses 49 distinct features representing varied network traffic characteristics, our methodology focused on meticulous data preprocessing including cleaning, normalization, and strategic feature selection to enhance model performance. A robust… More >

Displaying 71-80 on page 8 of 599. Per Page