Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,178)
  • Open Access

    ARTICLE

    Optimization of Supply and Demand Balancing in Park-Level Energy Systems Considering Comprehensive Utilization of Hydrogen under P2G-CCS Coupling

    Zhiyuan Zhang1, Yongjun Wu1, Xiqin Li1, Minghui Song1, Guangwu Zhang2, Ziren Wang3,*, Wei Li3

    Energy Engineering, Vol.122, No.5, pp. 1919-1948, 2025, DOI:10.32604/ee.2025.063178 - 25 April 2025

    Abstract The park-level integrated energy system (PIES) is essential for achieving carbon neutrality by managing multi-energy supply and demand while enhancing renewable energy integration. However, current carbon trading mechanisms lack sufficient incentives for emission reductions, and traditional optimization algorithms often face challenges with convergence and local optima in complex PIES scheduling. To address these issues, this paper introduces a low-carbon dispatch strategy that combines a reward-penalty tiered carbon trading model with P2G-CCS integration, hydrogen utilization, and the Secretary Bird Optimization Algorithm (SBOA). Key innovations include: (1) A dynamic reward-penalty carbon trading mechanism with coefficients (μ = 0.2,… More >

  • Open Access

    ARTICLE

    Optimization Configuration Analysis of Wind-Solar-Storage System Based on HOMER

    Daixuan Zhou1, Zhichao Wang1, Kaile Xi2, Chong Zuo3, Yan Jia2,*

    Energy Engineering, Vol.122, No.5, pp. 2119-2153, 2025, DOI:10.32604/ee.2025.061712 - 25 April 2025

    Abstract HOMER (Hybrid Optimization Model for Electric Renewables) is an effective simulation and optimization platform for hybrid renewable energy. By inputting specific users’ energy resource data (such as wind speed, solar radiation, etc.) and load data, and by determining the types and models of components selected by the user, HOMER calculates and simulates the operational status of each component at every time step. Ultimately, it computes the energy balance of the system within specified constraints to simulate the overall system operation. This approach enables the reasonable determination of system component capacities, the evaluation of system feasibility,… More > Graphic Abstract

    Optimization Configuration Analysis of Wind-Solar-Storage System Based on HOMER

  • Open Access

    ARTICLE

    Optimizing Forecast Accuracy in Cryptocurrency Markets: Evaluating Feature Selection Techniques for Technical Indicators

    Ahmed El Youssefi1, Abdelaaziz Hessane1,2, Imad Zeroual1, Yousef Farhaoui1,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3411-3433, 2025, DOI:10.32604/cmc.2025.063218 - 16 April 2025

    Abstract This study provides a systematic investigation into the influence of feature selection methods on cryptocurrency price forecasting models employing technical indicators. In this work, over 130 technical indicators—covering momentum, volatility, volume, and trend-related technical indicators—are subjected to three distinct feature selection approaches. Specifically, mutual information (MI), recursive feature elimination (RFE), and random forest importance (RFI). By extracting an optimal set of 20 predictors, the proposed framework aims to mitigate redundancy and overfitting while enhancing interpretability. These feature subsets are integrated into support vector regression (SVR), Huber regressors, and k-nearest neighbors (KNN) models to forecast the… More >

  • Open Access

    ARTICLE

    Priority-Aware Resource Allocation for VNF Deployment in Service Function Chains Based on Graph Reinforcement Learning

    Seyha Ros1,#, Seungwoo Kang1,#, Taikuong Iv1, Inseok Song1, Prohim Tam2, Seokhoon Kim1,3,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1649-1665, 2025, DOI:10.32604/cmc.2025.062716 - 16 April 2025

    Abstract Recently, Network Functions Virtualization (NFV) has become a critical resource for optimizing capability utilization in the 5G/B5G era. NFV decomposes the network resource paradigm, demonstrating the efficient utilization of Network Functions (NFs) to enable configurable service priorities and resource demands. Telecommunications Service Providers (TSPs) face challenges in network utilization, as the vast amounts of data generated by the Internet of Things (IoT) overwhelm existing infrastructures. IoT applications, which generate massive volumes of diverse data and require real-time communication, contribute to bottlenecks and congestion. In this context, Multi-access Edge Computing (MEC) is employed to support resource… More >

  • Open Access

    ARTICLE

    Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking

    Shu-Chuan Chu1,2, Libin Fu2, Jeng-Shyang Pan2,3, Xingsi Xue4, Min Liu5,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 3135-3163, 2025, DOI:10.32604/cmc.2025.062469 - 16 April 2025

    Abstract Evolutionary algorithms have been extensively utilized in practical applications. However, manually designed population updating formulas are inherently prone to the subjective influence of the designer. Genetic programming (GP), characterized by its tree-based solution structure, is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems. This paper introduces a GP-based framework (GP-EAs) for the autonomous generation of update formulas, aiming to reduce human intervention. Partial modifications to tree-based GP have been instigated, encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm.… More >

  • Open Access

    ARTICLE

    Two-Hop Delay-Aware Energy Efficiency Resource Allocation in Space-Air-Ground Integrated Smart Grid Network

    Qinghai Ou1, Min Yang1, Jingcai Kong1, Yang Yang2,*

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2429-2447, 2025, DOI:10.32604/cmc.2025.062067 - 16 April 2025

    Abstract The lack of communication infrastructure in remote regions presents significant obstacles to gathering data from smart power sensors (SPSs) in smart grid networks. In such cases, a space-air-ground integrated network serves as an effective emergency solution. This study addresses the challenge of optimizing the energy efficiency of data transmission from SPSs to low Earth orbit (LEO) satellites through unmanned aerial vehicles (UAVs), considering both effective capacity and fronthaul link capacity constraints. Due to the non-convex nature of the problem, the objective function is reformulated, and a delay-aware energy-efficient power allocation and UAV trajectory design (DEPATD)… More >

  • Open Access

    ARTICLE

    A Fuzzy Multi-Objective Framework for Energy Optimization and Reliable Routing in Wireless Sensor Networks via Particle Swarm Optimization

    Medhat A. Tawfeek1,*, Ibrahim Alrashdi1, Madallah Alruwaili2, Fatma M. Talaat3,4

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2773-2792, 2025, DOI:10.32604/cmc.2025.061773 - 16 April 2025

    Abstract Wireless Sensor Networks (WSNs) are one of the best technologies of the 21st century and have seen tremendous growth over the past decade. Much work has been put into its development in various aspects such as architectural attention, routing protocols, location exploration, time exploration, etc. This research aims to optimize routing protocols and address the challenges arising from conflicting objectives in WSN environments, such as balancing energy consumption, ensuring routing reliability, distributing network load, and selecting the shortest path. Many optimization techniques have shown success in achieving one or two objectives but struggle to achieve… More >

  • Open Access

    ARTICLE

    Hardware-Enabled Key Generation in Industry 4.0 Cryptosystems through Analog Hyperchaotic Signals

    Borja Bordel Sánchez1,*, Fernando Rodríguez-Sela1, Ramón Alcarria2, Tomás Robles1

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1821-1853, 2025, DOI:10.32604/cmc.2025.059012 - 16 April 2025

    Abstract The Industry 4.0 revolution is characterized by distributed infrastructures where data must be continuously communicated between hardware nodes and cloud servers. Specific lightweight cryptosystems are needed to protect those links, as the hardware node tends to be resource-constrained. Then Pseudo Random Number Generators are employed to produce random keys, whose final behavior depends on the initial seed. To guarantee good mathematical behavior, most key generators need an unpredictable voltage signal as input. However, physical signals evolve slowly and have a significant autocorrelation, so they do not have enough entropy to support high-randomness seeds. Then, electronic… More >

  • Open Access

    ARTICLE

    BIG-ABAC: Leveraging Big Data for Adaptive, Scalable, and Context-Aware Access Control

    Sondes Baccouri1,2,#,*, Takoua Abdellatif 3,#

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1071-1093, 2025, DOI:10.32604/cmes.2025.062902 - 11 April 2025

    Abstract Managing sensitive data in dynamic and high-stakes environments, such as healthcare, requires access control frameworks that offer real-time adaptability, scalability, and regulatory compliance. BIG-ABAC introduces a transformative approach to Attribute-Based Access Control (ABAC) by integrating real-time policy evaluation and contextual adaptation. Unlike traditional ABAC systems that rely on static policies, BIG-ABAC dynamically updates policies in response to evolving rules and real-time contextual attributes, ensuring precise and efficient access control. Leveraging decision trees evaluated in real-time, BIG-ABAC overcomes the limitations of conventional access control models, enabling seamless adaptation to complex, high-demand scenarios. The framework adheres to the… More >

  • Open Access

    ARTICLE

    Privacy-Aware Federated Learning Framework for IoT Security Using Chameleon Swarm Optimization and Self-Attentive Variational Autoencoder

    Saad Alahmari1,*, Abdulwhab Alkharashi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 849-873, 2025, DOI:10.32604/cmes.2025.062549 - 11 April 2025

    Abstract The Internet of Things (IoT) is emerging as an innovative phenomenon concerned with the development of numerous vital applications. With the development of IoT devices, huge amounts of information, including users’ private data, are generated. IoT systems face major security and data privacy challenges owing to their integral features such as scalability, resource constraints, and heterogeneity. These challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data, creating an attractive opportunity for cyberattacks. To address these challenges, artificial intelligence (AI) techniques, such as machine learning (ML) and deep learning (DL),… More >

Displaying 1-10 on page 1 of 1178. Per Page