Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    A Novel Defender-Attacker-Defender Model for Resilient Distributed Generator Planning with Network Reconfiguration and Demand Response

    Wenlu Ji*, Teng Tu, Nan Ma

    Energy Engineering, Vol.121, No.5, pp. 1223-1243, 2024, DOI:10.32604/ee.2024.046112

    Abstract To improve the resilience of a distribution system against extreme weather, a fuel-based distributed generator (DG) allocation model is proposed in this study. In this model, the DGs are placed at the planning stage. When an extreme event occurs, the controllable generators form temporary microgrids (MGs) to restore the load maximally. Simultaneously, a demand response program (DRP) mitigates the imbalance between the power supply and demand during extreme events. To cope with the fault uncertainty, a robust optimization (RO) method is applied to reduce the long-term investment and short-term operation costs. The optimization is formulated as a tri-level defender-attacker-defender (DAD)… More >

  • Open Access

    ARTICLE

    Research on Quantitative Identification of Three-Dimensional Connectivity of Fractured-Vuggy Reservoirs

    Xingliang Deng1, Peng Cao2,*, Yintao Zhang1, Yuhui Zhou3, Xiao Luo1, Liang Wang3

    Energy Engineering, Vol.121, No.5, pp. 1195-1207, 2024, DOI:10.32604/ee.2023.045870

    Abstract The fractured-vuggy carbonate oil resources in the western basin of China are extremely rich. The connectivity of carbonate reservoirs is complex, and there is still a lack of clear understanding of the development and topological structure of the pore space in fractured-vuggy reservoirs. Thus, effective prediction of fractured-vuggy reservoirs is difficult. In view of this, this work employs adaptive point cloud technology to reproduce the shape and capture the characteristics of a fractured-vuggy reservoir. To identify the complex connectivity among pores, fractures, and vugs, a simplified one-dimensional connectivity model is established by using the meshless connection element method (CEM). Considering… More >

  • Open Access

    ARTICLE

    Desired Dynamic Equation for Primary Frequency Modulation Control of Gas Turbines

    Aimin Gao1, Xiaobo Cui2,*, Guoqiang Yu1, Jianjun Shu1, Tianhai Zhang1

    Energy Engineering, Vol.121, No.5, pp. 1347-1361, 2024, DOI:10.32604/ee.2023.045805

    Abstract Gas turbines play core roles in clean energy supply and the construction of comprehensive energy systems. The control performance of primary frequency modulation of gas turbines has a great impact on the frequency control of the power grid. However, there are some control difficulties in the primary frequency modulation control of gas turbines, such as the coupling effect of the fuel control loop and speed control loop, slow tracking speed, and so on. To relieve the abovementioned difficulties, a control strategy based on the desired dynamic equation proportional integral (DDE-PI) is proposed in this paper. Based on the parameter stability… More >

  • Open Access

    ARTICLE

    The Effects of the Geometry of a Current Collector with an Equal Open Ratio on Output Power of a Direct Methanol Fuel Cell

    Yingli Zhu1,*, Jiachi Xie1, Mingwei Zhu1, Jun Zhang2, Miaomiao Li3

    Energy Engineering, Vol.121, No.5, pp. 1161-1172, 2024, DOI:10.32604/ee.2024.041205

    Abstract The open ratio of a current collector has a great impact on direct methanol fuel cell (DMFC) performance. Although a number of studies have investigated the influence of the open ratio of DMFC current collectors, far too little attention has been given to how geometry (including the shape and feature size of the flow field) affects a current collector with an equal open ratio. In this paper, perforated and parallel current collectors with an equal open ratio of 50% and different feature sizes are designed, and the corresponding experimental results are shown to explain the geometry effects on the output… More >

  • Open Access

    ARTICLE

    Combo Packet: An Encryption Traffic Classification Method Based on Contextual Information

    Yuancong Chai, Yuefei Zhu*, Wei Lin, Ding Li

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1223-1243, 2024, DOI:10.32604/cmc.2024.049904

    Abstract With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has become a core key technology in network supervision. In recent years, many different solutions have emerged in this field. Most methods identify and classify traffic by extracting spatiotemporal characteristics of data flows or byte-level features of packets. However, due to changes in data transmission mediums, such as fiber optics and satellites, temporal features can exhibit significant variations due to changes in communication links and transmission quality. Additionally, partial spatial features can change due to reasons like data reordering and retransmission. Faced with these challenges, identifying… More >

  • Open Access

    ARTICLE

    Side-Channel Leakage Analysis of Inner Product Masking

    Yuyuan Li1,2, Lang Li1,2,*, Yu Ou1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1245-1262, 2024, DOI:10.32604/cmc.2024.049882

    Abstract The Inner Product Masking (IPM) scheme has been shown to provide higher theoretical security guarantees than the Boolean Masking (BM). This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security. Some previous work unfolds when certain (adversarial and implementation) conditions are met, and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour. In this paper, we investigate the security characteristics of IPM under different conditions. In adversarial condition, the security properties of first-order IPMs obtained through parametric characterization are preserved in the face… More >

  • Open Access

    ARTICLE

    A Multi-Constraint Path Optimization Scheme Based on Information Fusion in Software Defined Network

    Jinlin Xu1,2, Wansu Pan1,*, Longle Cheng1,2, Haibo Tan1,2, Munan Yuan1,*, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1399-1418, 2024, DOI:10.32604/cmc.2024.049622

    Abstract The existing multipath routing in Software Defined Network (SDN) is relatively blind and inefficient, and there is a lack of cooperation between the terminal and network sides, making it difficult to achieve dynamic adaptation of service requirements and network resources. To address these issues, we propose a multi-constraint path optimization scheme based on information fusion in SDN. The proposed scheme collects network topology and network state information on the network side and computes disjoint paths between end hosts. It uses the Fuzzy Analytic Hierarchy Process (FAHP) to calculate the weight coefficients of multiple constrained parameters and constructs a composite quality… More >

  • Open Access

    ARTICLE

    Complementary-Label Adversarial Domain Adaptation Fault Diagnosis Network under Time-Varying Rotational Speed and Weakly-Supervised Conditions

    Siyuan Liu1,*, Jinying Huang2, Jiancheng Ma1, Licheng Jing2, Yuxuan Wang2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 761-777, 2024, DOI:10.32604/cmc.2024.049484

    Abstract Recent research in cross-domain intelligence fault diagnosis of machinery still has some problems, such as relatively ideal speed conditions and sample conditions. In engineering practice, the rotational speed of the machine is often transient and time-varying, which makes the sample annotation increasingly expensive. Meanwhile, the number of samples collected from different health states is often unbalanced. To deal with the above challenges, a complementary-label (CL) adversarial domain adaptation fault diagnosis network (CLADAN) is proposed under time-varying rotational speed and weakly-supervised conditions. In the weakly supervised learning condition, machine prior information is used for sample annotation via cost-friendly complementary label learning.… More >

  • Open Access

    ARTICLE

    An Elite-Class Teaching-Learning-Based Optimization for Reentrant Hybrid Flow Shop Scheduling with Bottleneck Stage

    Deming Lei, Surui Duan, Mingbo Li*, Jing Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 47-63, 2024, DOI:10.32604/cmc.2024.049481

    Abstract Bottleneck stage and reentrance often exist in real-life manufacturing processes; however, the previous research rarely addresses these two processing conditions in a scheduling problem. In this study, a reentrant hybrid flow shop scheduling problem (RHFSP) with a bottleneck stage is considered, and an elite-class teaching-learning-based optimization (ETLBO) algorithm is proposed to minimize maximum completion time. To produce high-quality solutions, teachers are divided into formal ones and substitute ones, and multiple classes are formed. The teacher phase is composed of teacher competition and teacher teaching. The learner phase is replaced with a reinforcement search of the elite class. Adaptive adjustment on… More >

  • Open Access

    ARTICLE

    Upper and Lower Bounds of the α-Universal Triple I Method for Unified Interval Implications

    Yiming Tang1,2, Jianwei Gao1,*, Yifan Huang1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1063-1088, 2024, DOI:10.32604/cmc.2024.049341

    Abstract The α-universal triple I (α-UTI) method is a recognized scheme in the field of fuzzy reasoning, which was proposed by our research group previously. The robustness of fuzzy reasoning determines the quality of reasoning algorithms to a large extent, which is quantified by calculating the disparity between the output of fuzzy reasoning with interference and the output without interference. Therefore, in this study, the interval robustness (embodied as the interval stability) of the α-UTI method is explored in the interval-valued fuzzy environment. To begin with, the stability of the α-UTI method is explored for the case of an individual rule,… More >

Displaying 11-20 on page 2 of 22212. Per Page