Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,115)
  • Open Access

    ARTICLE

    Energy Management of Photovoltaic Plant for Smart Street Lighting System

    Rebhi M’hamed1,*, Himri Youcef2,3,*, Bouchiba Bousmaha1, Yaichi Mouaadh1

    Energy Engineering, Vol.122, No.12, pp. 4899-4918, 2025, DOI:10.32604/ee.2025.070806 - 27 November 2025

    Abstract Currently, most conventional street lighting systems use a constant light mode throughout the entire night, from sunset to sunrise, which results in high energy consumption and maintenance costs. Furthermore, scientific research predicts that energy consumption for street lighting will increase in the coming years due to growing demand and rising electricity prices. The dimming strategy is a current trend and a key concept in smart street lighting systems. It involves turning on the road lights only when a vehicle or pedestrian is detected; otherwise, the control system reduces the light intensity of the lamps. Power… More >

  • Open Access

    ARTICLE

    Optimization Scheduling of Hydrogen-Coupled Electro-Heat-Gas Integrated Energy System Based on Generative Adversarial Imitation Learning

    Baiyue Song1, Chenxi Zhang2, Wei Zhang2,*, Leiyu Wan2

    Energy Engineering, Vol.122, No.12, pp. 4919-4945, 2025, DOI:10.32604/ee.2025.068971 - 27 November 2025

    Abstract Hydrogen energy is a crucial support for China’s low-carbon energy transition. With the large-scale integration of renewable energy, the combination of hydrogen and integrated energy systems has become one of the most promising directions of development. This paper proposes an optimized scheduling model for a hydrogen-coupled electro-heat-gas integrated energy system (HCEHG-IES) using generative adversarial imitation learning (GAIL). The model aims to enhance renewable-energy absorption, reduce carbon emissions, and improve grid-regulation flexibility. First, the optimal scheduling problem of HCEHG-IES under uncertainty is modeled as a Markov decision process (MDP). To overcome the limitations of conventional deep… More >

  • Open Access

    ARTICLE

    The Kalman Filter Design for MJS in Power System Based on Derandomization Technique

    Quan Li1,*, Ziheng Zhou2

    Energy Engineering, Vol.122, No.12, pp. 5001-5020, 2025, DOI:10.32604/ee.2025.068866 - 27 November 2025

    Abstract This study considers the state estimation problem of the circuit breakers (CBs), solving for random abrupt changes that occurred in power systems. With the abrupt changes randomly occurring, it is represented in a Markov chain, and then the CBs can be considered as a Markov jump system (MJS). In these MJSs, the transition probabilities are obtained from historical statistical data of the random abrupt changes when the faults occurred. Considering that the traditional Kalman filter (KF) frameworks based on MJS only depend on the subsystem of MJS, but neglect the stochastic jump between different subsystems.… More > Graphic Abstract

    The Kalman Filter Design for MJS in Power System Based on Derandomization Technique

  • Open Access

    ARTICLE

    Robust Control and Stabilization of Autonomous Vehicular Systems under Deception Attacks and Switching Signed Networks

    Muflih Alhazmi1, Waqar Ul Hassan2, Saba Shaheen3, Mohammed M. A. Almazah4, Azmat Ullah Khan Niazi3,*, Nafisa A. Albasheir5, Ameni Gargouri6, Naveed Iqbal7

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 1903-1940, 2025, DOI:10.32604/cmes.2025.072973 - 26 November 2025

    Abstract This paper proposes a model-based control framework for vehicle platooning systems with second-order nonlinear dynamics operating over switching signed networks, time-varying delays, and deception attacks. The study includes two configurations: a leaderless structure using Finite-Time Non-Singular Terminal Bipartite Consensus (FNTBC) and Fixed-Time Bipartite Consensus (FXTBC), and a leader—follower structure ensuring structural balance and robustness against deceptive signals. In the leaderless model, a bipartite controller based on impulsive control theory, gauge transformation, and Markovian switching Lyapunov functions ensures mean-square stability and coordination under deception attacks and communication delays. The FNTBC achieves finite-time convergence depending on initial More >

  • Open Access

    ARTICLE

    Enhancing Roaming Security in Cloud-Native 5G Core Network through Deep Learning-Based Intrusion Detection System

    I Wayan Adi Juliawan Pawana1,2, Vincent Abella2, Jhury Kevin Lastre2, Yongho Ko2, Ilsun You2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2733-2760, 2025, DOI:10.32604/cmes.2025.072611 - 26 November 2025

    Abstract Roaming in 5G networks enables seamless global mobility but also introduces significant security risks due to legacy protocol dependencies, uneven Security Edge Protection Proxy (SEPP) deployment, and the dynamic nature of inter-Public Land Mobile Network (inter-PLMN) signaling. Traditional rule-based defenses are inadequate for protecting cloud-native 5G core networks, particularly as roaming expands into enterprise and Internet of Things (IoT) domains. This work addresses these challenges by designing a scalable 5G Standalone testbed, generating the first intrusion detection dataset specifically tailored to roaming threats, and proposing a deep learning based intrusion detection framework for cloud-native environments.… More > Graphic Abstract

    Enhancing Roaming Security in Cloud-Native 5G Core Network through Deep Learning-Based Intrusion Detection System

  • Open Access

    ARTICLE

    Cross-Site Map-Free Indoor Localization for 6G ISAC Systems Using Low-Frequency Radio and Transformer Networks

    Bin Zhang1, En-Cheng Liou2,*, Yi-Chih Tung3, Muhammad Usman2,4, Chiung-An Chen2,4, Chao-Shun Yang2,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2551-2571, 2025, DOI:10.32604/cmes.2025.072471 - 26 November 2025

    Abstract Indoor localization is a fundamental requirement for future 6G Intelligent Sensing and Communication (ISAC) systems, enabling precise navigation in environments where Global Positioning System (GPS) signals are unavailable. Existing methods, such as map-based navigation or site-specific fingerprinting, often require intensive data collection and lack generalization capability across different buildings, thereby limiting scalability. This study proposes a cross-site, map-free indoor localization framework that uses low-frequency sub-1 GHz radio signals and a Transformer-based neural network for robust positioning without prior environmental knowledge. The Transformer’s self-attention mechanisms allow it to capture spatial correlations among anchor nodes, facilitating accurate… More >

  • Open Access

    ARTICLE

    A Computational Modeling Approach for Joint Calibration of Low-Deviation Surgical Instruments

    Bo Yang1,2, Yu Zhou3, Jiawei Tian4,*, Xiang Zhang2, Fupei Guo2, Shan Liu5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2253-2276, 2025, DOI:10.32604/cmes.2025.072031 - 26 November 2025

    Abstract Accurate calibration of surgical instruments and ultrasound probes is essential for achieving high precision in image guided minimally invasive procedures. However, existing methods typically treat the calibration of the needle tip and the ultrasound probe as two independent processes, lacking an integrated calibration mechanism, which often leads to cumulative errors and reduced spatial consistency. To address this challenge, we propose a joint calibration model that unifies the calibration of the surgical needle tip and the ultrasound probe within a single coordinate system. The method formulates the calibration process through a series of mathematical models and… More >

  • Open Access

    ARTICLE

    Structure-Aware Malicious Behavior Detection through 2D Spatio-Temporal Modeling of Process Hierarchies

    Seong-Su Yoon, Dong-Hyuk Shin, Ieck-Chae Euom*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2683-2706, 2025, DOI:10.32604/cmes.2025.071577 - 26 November 2025

    Abstract With the continuous expansion of digital infrastructures, malicious behaviors in host systems have become increasingly sophisticated, often spanning multiple processes and employing obfuscation techniques to evade detection. Audit logs, such as Sysmon, offer valuable insights; however, existing approaches typically flatten event sequences or rely on generic graph models, thereby discarding the natural parent-child process hierarchy that is critical for analyzing multiprocess attacks. This paper proposes a structure-aware threat detection framework that transforms audit logs into a unified two-dimensional (2D) spatio-temporal representation, where process hierarchy is modeled as the spatial axis and event chronology as the More >

  • Open Access

    REVIEW

    A Comprehensive Review of Sizing and Allocation of Distributed Power Generation: Optimization Techniques, Global Insights, and Smart Grid Implications

    Abdullrahman A. Al-Shamma’a1, Hassan M. Hussein Farh1,*, Ridwan Taiwo2, Al-Wesabi Ibrahim3, Abdulrhman Alshaabani1, Saad Mekhilef 4, Mohamed A. Mohamed5,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 1303-1347, 2025, DOI:10.32604/cmes.2025.071302 - 26 November 2025

    Abstract Optimal sizing and allocation of distributed generators (DGs) have become essential computational challenges in improving the performance, efficiency, and reliability of electrical distribution networks. Despite extensive research, existing approaches often face algorithmic limitations such as slow convergence, premature stagnation in local minima, or suboptimal accuracy in determining optimal DG placement and capacity. This study presents a comprehensive scientometric and systematic review of global research focused on computer-based modelling and algorithmic optimization for renewable DG sizing and placement. It integrates both quantitative and qualitative analyses of the scholarly landscape, mapping influential research domains, co-authorship structures, the More >

  • Open Access

    ARTICLE

    How Robust Are Language Models against Backdoors in Federated Learning?

    Seunghan Kim1,#, Changhoon Lim2,#, Gwonsang Ryu3, Hyunil Kim2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2617-2630, 2025, DOI:10.32604/cmes.2025.071190 - 26 November 2025

    Abstract Federated Learning enables privacy-preserving training of Transformer-based language models, but remains vulnerable to backdoor attacks that compromise model reliability. This paper presents a comparative analysis of defense strategies against both classical and advanced backdoor attacks, evaluated across autoencoding and autoregressive models. Unlike prior studies, this work provides the first systematic comparison of perturbation-based, screening-based, and hybrid defenses in Transformer-based FL environments. Our results show that screening-based defenses consistently outperform perturbation-based ones, effectively neutralizing most attacks across architectures. However, this robustness comes with significant computational overhead, revealing a clear trade-off between security and efficiency. By explicitly More >

Displaying 21-30 on page 3 of 3115. Per Page