Home / Journals / CMES / Vol.138, No.1, 2024
Special lssues
Table of Content
  • Open AccessOpen Access

    REVIEW

    Review of Recent Trends in the Hybridisation of Preprocessing-Based and Parameter Optimisation-Based Hybrid Models to Forecast Univariate Streamflow

    Baydaa Abdul Kareem1,2, Salah L. Zubaidi2,3, Nadhir Al-Ansari4,*, Yousif Raad Muhsen2,5
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 1-41, 2024, DOI:10.32604/cmes.2023.027954
    Abstract Forecasting river flow is crucial for optimal planning, management, and sustainability using freshwater resources. Many machine learning (ML) approaches have been enhanced to improve streamflow prediction. Hybrid techniques have been viewed as a viable method for enhancing the accuracy of univariate streamflow estimation when compared to standalone approaches. Current researchers have also emphasised using hybrid models to improve forecast accuracy. Accordingly, this paper conducts an updated literature review of applications of hybrid models in estimating streamflow over the last five years, summarising data preprocessing, univariate machine learning modelling strategy, advantages and disadvantages of standalone ML techniques, hybrid models, and performance… More >

    Graphic Abstract

    Review of Recent Trends in the Hybridisation of Preprocessing-Based and Parameter Optimisation-Based Hybrid Models to Forecast Univariate Streamflow

  • Open AccessOpen Access

    REVIEW

    Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey

    Md. Shohidul Islam1,*, Md. Arafatur Rahman2, Mohamed Ariff Bin Ameedeen1, Husnul Ajra1, Zahian Binti Ismail1, Jasni Mohamad Zain3
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 43-123, 2024, DOI:10.32604/cmes.2023.028687
    Abstract Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance, transportation, healthcare, education, and supply chain management. Blockchain interactions in the heterogeneous network have fascinated more attention due to the authentication of their digital application exchanges. However, the exponential development of storage space capabilities across the blockchain-based heterogeneous network has become an important issue in preventing blockchain distribution and the extension of blockchain nodes. There is the biggest challenge of data integrity and scalability, including significant computing complexity and inapplicable latency on regional network diversity, operating system… More >

    Graphic Abstract

    Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey

  • Open AccessOpen Access

    REVIEW

    Comprehensive Survey of the Landscape of Digital Twin Technologies and Their Diverse Applications

    Haiyu Chen1, Haijian Shao1,2,*, Xing Deng1, Lijuan Wang1, Xia Wang3
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 125-165, 2024, DOI:10.32604/cmes.2023.027834
    Abstract The concept of the digital twin, also known colloquially as the DT, is a fundamental principle within Industry 4.0 framework. In recent years, the concept of digital siblings has generated considerable academic and practical interest. However, academia and industry have used a variety of interpretations, and the scientific literature lacks a unified and consistent definition of this term. The purpose of this study is to systematically examine the definitional landscape of the digital twin concept as outlined in scholarly literature, beginning with its origins in the aerospace domain and extending to its contemporary interpretations in the manufacturing industry. Notably, this… More >

  • Open AccessOpen Access

    ARTICLE

    Combining Deep Learning with Knowledge Graph for Design Knowledge Acquisition in Conceptual Product Design

    Yuexin Huang1,2, Suihuai Yu1, Jianjie Chu1,*, Zhaojing Su1,3, Yangfan Cong1, Hanyu Wang1, Hao Fan4
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 167-200, 2024, DOI:10.32604/cmes.2023.028268
    Abstract The acquisition of valuable design knowledge from massive fragmentary data is challenging for designers in conceptual product design. This study proposes a novel method for acquiring design knowledge by combining deep learning with knowledge graph. Specifically, the design knowledge acquisition method utilises the knowledge extraction model to extract design-related entities and relations from fragmentary data, and further constructs the knowledge graph to support design knowledge acquisition for conceptual product design. Moreover, the knowledge extraction model introduces ALBERT to solve memory limitation and communication overhead in the entity extraction module, and uses multi-granularity information to overcome segmentation errors and polysemy ambiguity… More >

  • Open AccessOpen Access

    ARTICLE

    Meter-Scale Thin-Walled Structure with Lattice Infill for Fuel Tank Supporting Component of Satellite: Multiscale Design and Experimental Verification

    Xiaoyu Zhang1,2, Huizhong Zeng2, Shaohui Zhang2, Yan Zhang3,*, Mi Xiao4, Liping Liu2, Hao Zhou2,*, Hongyou Chai2, Liang Gao4
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 201-220, 2024, DOI:10.32604/cmes.2023.029389
    Abstract Lightweight thin-walled structures with lattice infill are widely desired in satellite for their high stiffness-to-weight ratio and superior buckling strength resulting from the sandwich effect. Such structures can be fabricated by metallic additive manufacturing technique, such as selective laser melting (SLM). However, the maximum dimensions of actual structures are usually in a sub-meter scale, which results in restrictions on their appliance in aerospace and other fields. In this work, a meter-scale thin-walled structure with lattice infill is designed for the fuel tank supporting component of the satellite by integrating a self-supporting lattice into the thickness optimization of the thin-wall. The… More >

  • Open AccessOpen Access

    ARTICLE

    A Calculation Method of Double Strength Reduction for Layered Slope Based on the Reduction of Water Content Intensity

    Feng Shen1,*, Yang Zhao1, Bingyi Li1, Kai Wu2
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 221-243, 2024, DOI:10.32604/cmes.2023.029159
    Abstract The calculation of the factor of safety (FOS) is an important means of slope evaluation. This paper proposed an improved double strength reduction method (DRM) to analyze the safety of layered slopes. The physical properties of different soil layers of the slopes are different, so the single coefficient strength reduction method (SRM) is not enough to reflect the actual critical state of the slopes. Considering that the water content of the soil in the natural state is the main factor for the strength of the soil, the attenuation law of shear strength of clayey soil changing with water content is… More >

  • Open AccessOpen Access

    ARTICLE

    An Interpolation Method for Karhunen–Loève Expansion of Random Field Discretization

    Zi Han1,*, Zhentian Huang2
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 245-272, 2024, DOI:10.32604/cmes.2023.029708
    Abstract In the context of global mean square error concerning the number of random variables in the representation, the Karhunen–Loève (KL) expansion is the optimal series expansion method for random field discretization. The computational efficiency and accuracy of the KL expansion are contingent upon the accurate resolution of the Fredholm integral eigenvalue problem (IEVP). The paper proposes an interpolation method based on different interpolation basis functions such as moving least squares (MLS), least squares (LS), and finite element method (FEM) to solve the IEVP. Compared with the Galerkin method based on finite element or Legendre polynomials, the main advantage of the… More >

    Graphic Abstract

    An Interpolation Method for Karhunen–Loève Expansion of Random Field Discretization

  • Open AccessOpen Access

    ARTICLE

    Overall Assessment of Heat Transfer for a Rarefied Flow in a Microchannel with Obstacles Using Lattice Boltzmann Method

    Siham Hammid1, Khatir Naima2, Omolayo M. Ikumapayi3, Cheikh Kezrane1, Abdelkrim Liazid4, Jihad Asad5, Mokdad Hayawi Rahman6, Farhan Lafta Rashid7, Naseer Ali Hussien8, Younes Menni2,9,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 273-299, 2024, DOI:10.32604/cmes.2023.028951
    Abstract The objective of this investigation is to assess the effect of obstacles on numerical heat transfer and fluid flow momentum in a rectangular microchannel (MC). Two distinct configurations were studied: one without obstacles and the other with alternating obstacles placed on the upper and lower walls. The research utilized the thermal lattice Boltzmann method (LBM), which solves the energy and momentum equations of fluids with the BGK approximation, implemented in a Python coding environment. Temperature jump and slip velocity conditions were utilized in the simulation for the MC and extended to all obstacle boundaries. The study aims to analyze the… More >

  • Open AccessOpen Access

    ARTICLE

    EfficientShip: A Hybrid Deep Learning Framework for Ship Detection in the River

    Huafeng Chen1, Junxing Xue2, Hanyun Wen2, Yurong Hu1, Yudong Zhang3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 301-320, 2024, DOI:10.32604/cmes.2023.028738
    Abstract Optical image-based ship detection can ensure the safety of ships and promote the orderly management of ships in offshore waters. Current deep learning researches on optical image-based ship detection mainly focus on improving one-stage detectors for real-time ship detection but sacrifices the accuracy of detection. To solve this problem, we present a hybrid ship detection framework which is named EfficientShip in this paper. The core parts of the EfficientShip are DLA-backboned object location (DBOL) and CascadeRCNN-guided object classification (CROC). The DBOL is responsible for finding potential ship objects, and the CROC is used to categorize the potential ship objects. We… More >

  • Open AccessOpen Access

    ARTICLE

    Research and Application of a Multi-Field Co-Simulation Data Extraction Method Based on Adaptive Infinitesimal Element

    Changfu Wan1,2, Wenqiang Li1,2,*, Sitong Ling1,2, Yingdong Liu1,2, Jiahao Chen1,2
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 321-348, 2024, DOI:10.32604/cmes.2023.029053
    Abstract Regarding the spatial profile extraction method of a multi-field co-simulation dataset, different extraction directions, locations, and numbers of profiles will greatly affect the representativeness and integrity of data. In this study, a multi-field co-simulation data extraction method based on adaptive infinitesimal elements is proposed. The multi-field co-simulation dataset based on related infinitesimal elements is constructed, and the candidate directions of data profile extraction undergo dimension reduction by principal component analysis to determine the direction of data extraction. Based on the fireworks algorithm, the data profile with optimal representativeness is searched adaptively in different data extraction intervals to realize the adaptive… More >

    Graphic Abstract

    Research and Application of a Multi-Field Co-Simulation Data Extraction Method Based on Adaptive Infinitesimal Element

  • Open AccessOpen Access

    ARTICLE

    Effect of Blasting Stress Wave on Dynamic Crack Propagation

    Huizhen Liu1,2, Duanying Wan3, Meng Wang3, Zheming Zhu3, Liyun Yang2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 349-368, 2024, DOI:10.32604/cmes.2023.028197
    Abstract Stress waves affect the stress field at the crack tip and dominate the dynamic crack propagation. Therefore, evaluating the influence of blasting stress waves on the crack propagation behavior and the mechanical characteristics of crack propagation is of great significance for engineering blasting. In this study, ANSYS/LS-DYNA was used for blasting numerical simulation, in which the propagation characteristics of blasting stress waves and stress field distribution at the crack tip were closely observed. Moreover, ABAQUS was applied for simulating the crack propagation path and calculating dynamic stress intensity factors (DSIFs). The universal function was calculated by the fractal method. The… More >

  • Open AccessOpen Access

    ARTICLE

    Multi-Material Topology Optimization for Spatial-Varying Porous Structures

    Chengwan Zhang1, Kai Long1,*, Zhuo Chen1,2, Xiaoyu Yang1, Feiyu Lu1, Jinhua Zhang3, Zunyi Duan4
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 369-390, 2024, DOI:10.32604/cmes.2023.029876
    Abstract This paper aims to propose a topology optimization method on generating porous structures comprising multiple materials. The mathematical optimization formulation is established under the constraints of individual volume fraction of constituent phase or total mass, as well as the local volume fraction of all phases. The original optimization problem with numerous constraints is converted into a box-constrained optimization problem by incorporating all constraints to the augmented Lagrangian function, avoiding the parameter dependence in the conventional aggregation process. Furthermore, the local volume percentage can be precisely satisfied. The effects including the global mass bound, the influence radius and local volume percentage… More >

  • Open AccessOpen Access

    ARTICLE

    Modeling Method of C/C-ZrC Composites and Prediction of Equivalent Thermal Conductivity Tensor Based on Asymptotic Homogenization

    Junpeng Lyu1, Hai Mei1,2, Liping Zu1, Lisheng Liu1,2,*, Liangliang Chu1,2
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 391-410, 2024, DOI:10.32604/cmes.2023.030614
    (This article belongs to the Special Issue: Theoretical and Computational Modeling of Advanced Materials and Structures)
    Abstract This article proposes a modeling method for C/C-ZrC composite materials. According to the superposition of Gaussian random field, the original gray model is obtained, and the threshold segmentation method is used to generate the C-ZrC inclusion model. Finally, the fiber structure is added to construct the microstructure of the three-phase plain weave composite. The reconstructed inclusions can meet the randomness of the shape and have a uniform distribution. Using an algorithm based on asymptotic homogenization and finite element method, the equivalent thermal conductivity prediction of the microstructure finite element model was carried out, and the influence of component volume fraction… More >

  • Open AccessOpen Access

    ARTICLE

    Learning Discriminatory Information for Object Detection on Urine Sediment Image

    Sixian Chan1,2, Binghui Wu1, Guodao Zhang3, Yuan Yao4, Hongqiang Wang2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 411-428, 2024, DOI:10.32604/cmes.2023.029485
    (This article belongs to the Special Issue: Computer Modeling of Artificial Intelligence and Medical Imaging)
    Abstract In clinical practice, the microscopic examination of urine sediment is considered an important in vitro examination with many broad applications. Measuring the amount of each type of urine sediment allows for screening, diagnosis and evaluation of kidney and urinary tract disease, providing insight into the specific type and severity. However, manual urine sediment examination is labor-intensive, time-consuming, and subjective. Traditional machine learning based object detection methods require hand-crafted features for localization and classification, which have poor generalization capabilities and are difficult to quickly and accurately detect the number of urine sediments. Deep learning based object detection methods have the potential… More >

    Graphic Abstract

    Learning Discriminatory Information for Object Detection on Urine Sediment Image

  • Open AccessOpen Access

    ARTICLE

    A Large-Scale Group Decision Making Model Based on Trust Relationship and Social Network Updating

    Rongrong Ren1,2, Luyang Su1,2, Xinyu Meng1,2, Jianfang Wang3, Meng Zhao1,2,4,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 429-458, 2024, DOI:10.32604/cmes.2023.027310
    (This article belongs to the Special Issue: Linguistic Approaches for Multiple Criteria Decision Making and Applications)
    Abstract With the development of big data and social computing, large-scale group decision making (LGDM) is now merging with social networks. Using social network analysis (SNA), this study proposes an LGDM consensus model that considers the trust relationship among decision makers (DMs). In the process of consensus measurement: the social network is constructed according to the social relationship among DMs, and the Louvain method is introduced to classify social networks to form subgroups. In this study, the weights of each decision maker and each subgroup are computed by comprehensive network weights and trust weights. In the process of consensus improvement: A… More >

  • Open AccessOpen Access

    ARTICLE

    A Degradation Type Adaptive and Deep CNN-Based Image Classification Model for Degraded Images

    Huanhua Liu, Wei Wang*, Hanyu Liu, Shuheng Yi, Yonghao Yu, Xunwen Yao
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 459-472, 2024, DOI:10.32604/cmes.2023.029084
    (This article belongs to the Special Issue: Machine Learning-Guided Intelligent Modeling with Its Industrial Applications)
    Abstract Deep Convolutional Neural Networks (CNNs) have achieved high accuracy in image classification tasks, however, most existing models are trained on high-quality images that are not subject to image degradation. In practice, images are often affected by various types of degradation which can significantly impact the performance of CNNs. In this work, we investigate the influence of image degradation on three typical image classification CNNs and propose a Degradation Type Adaptive Image Classification Model (DTA-ICM) to improve the existing CNNs’ classification accuracy on degraded images. The proposed DTA-ICM comprises two key components: a Degradation Type Predictor (DTP) and a Degradation Type… More >

  • Open AccessOpen Access

    ARTICLE

    Role Dynamic Allocation of Human-Robot Cooperation Based on Reinforcement Learning in an Installation of Curtain Wall

    Zhiguang Liu1, Shilin Wang1, Jian Zhao1,*, Jianhong Hao2, Fei Yu3
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 473-487, 2024, DOI:10.32604/cmes.2023.029729
    (This article belongs to the Special Issue: Machine Learning-Guided Intelligent Modeling with Its Industrial Applications)
    Abstract A real-time adaptive roles allocation method based on reinforcement learning is proposed to improve human-robot cooperation performance for a curtain wall installation task. This method breaks the traditional idea that the robot is regarded as the follower or only adjusts the leader and the follower in cooperation. In this paper, a self-learning method is proposed which can dynamically adapt and continuously adjust the initiative weight of the robot according to the change of the task. Firstly, the physical human-robot cooperation model, including the role factor is built. Then, a reinforcement learning model that can adjust the role factor in real… More >

    Graphic Abstract

    Role Dynamic Allocation of Human-Robot Cooperation Based on Reinforcement Learning in an Installation of Curtain Wall

  • Open AccessOpen Access

    ARTICLE

    Time-Domain Analysis of Body Freedom Flutter Based on 6DOF Equation

    Zhehan Ji1, Tongqing Guo1,*, Di Zhou1, Zhiliang Lu1, Binbin Lyu2
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 489-508, 2024, DOI:10.32604/cmes.2023.029088
    (This article belongs to the Special Issue: Vibration Control and Utilization)
    Abstract The reduced weight and improved efficiency of modern aeronautical structures result in a decreasing separation of frequency ranges of rigid and elastic modes. Particularly, a high-aspect-ratio flexible flying wing is prone to body freedom flutter (BFF), which is a result of coupling of the rigid body short-period mode with 1st wing bending mode. Accurate prediction of the BFF characteristics is helpful to reflect the attitude changes of the vehicle intuitively and design the active flutter suppression control law. Instead of using the rigid body mode, this work simulates the rigid body motion of the model by using the six-degree-of-freedom (6DOF)… More >

  • Open AccessOpen Access

    ARTICLE

    Bifurcation Analysis of a Nonlinear Vibro-Impact System with an Uncertain Parameter via OPA Method

    Dongmei Huang1, Dang Hong2, Wei Li1,*, Guidong Yang1, Vesna Rajic3
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 509-524, 2024, DOI:10.32604/cmes.2023.029215
    (This article belongs to the Special Issue: Vibration Control and Utilization)
    Abstract In this paper, the bifurcation properties of the vibro-impact systems with an uncertain parameter under the impulse and harmonic excitations are investigated. Firstly, by means of the orthogonal polynomial approximation (OPA) method, the nonlinear damping and stiffness are expanded into the linear combination of the state variable. The condition for the appearance of the vibro-impact phenomenon is to be transformed based on the calculation of the mean value. Afterwards, the stochastic vibro-impact system can be turned into an equivalent high-dimensional deterministic non-smooth system. Two different Poincaré sections are chosen to analyze the bifurcation properties and the impact numbers are identified… More >

  • Open AccessOpen Access

    ARTICLE

    Study on Chaotic Characteristics of the Friction Process between High Hardness Alloy Steel and Cemented Carbide under C60 Nanoparticle Fluid Lubrication

    Jingshan Huang, Bin Yao*, Qixin Lan, Zhirong Pan
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 525-550, 2024, DOI:10.32604/cmes.2023.029675
    (This article belongs to the Special Issue: Vibration Control and Utilization)
    Abstract Friction and wear phenomenon is a complex nonlinear system, and it is also a significant problem in the process of metal cutting. In order to systematically analyze the friction and wear process of tool material-workpiece material friction pair in the cutting process of high hardness alloy steel under different lubrication conditions, the chaotic characteristics of friction process between high hardness alloy steel and cemented carbide under the lubrication C60 nano-particles fluid are studied based on the chaos theory. Firstly, the friction and wear experiments of the friction pair between high hardness alloy steel and cemented carbide tool are carried out… More >

  • Open AccessOpen Access

    ARTICLE

    Parameters Optimization and Performance Evaluation of the Tuned Inerter Damper for the Seismic Protection of Adjacent Building Structures

    Xiaofang Kang1,*, Jian Wu1, Xinqi Wang1, Shancheng Lei2
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 551-593, 2024, DOI:10.32604/cmes.2023.029044
    (This article belongs to the Special Issue: Vibration Control and Utilization)
    Abstract In order to improve the seismic performance of adjacent buildings, two types of tuned inerter damper (TID) damping systems for adjacent buildings are proposed, which are composed of springs, inerter devices and dampers in serial or in parallel. The dynamic equations of TID adjacent building damping systems were derived, and the H2 norm criterion was used to optimize and adjust them, so that the system had the optimum damping performance under white noise random excitation. Taking TID frequency ratio and damping ratio as optimization parameters, the optimum analytical solutions of the displacement frequency response of the undamped structure under white… More >

    Graphic Abstract

    Parameters Optimization and Performance Evaluation of the Tuned Inerter Damper for the Seismic Protection of Adjacent Building Structures

  • Open AccessOpen Access

    ARTICLE

    LSDA-APF: A Local Obstacle Avoidance Algorithm for Unmanned Surface Vehicles Based on 5G Communication Environment

    Xiaoli Li, Tongtong Jiao#, Jinfeng Ma, Dongxing Duan, Shengbin Liang#,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 595-617, 2024, DOI:10.32604/cmes.2023.029367
    (This article belongs to the Special Issue: AI-Driven Intelligent Sensor Networks: Key Enabling Theories, Architectures, Modeling, and Techniques)
    Abstract In view of the complex marine environment of navigation, especially in the case of multiple static and dynamic obstacles, the traditional obstacle avoidance algorithms applied to unmanned surface vehicles (USV) are prone to fall into the trap of local optimization. Therefore, this paper proposes an improved artificial potential field (APF) algorithm, which uses 5G communication technology to communicate between the USV and the control center. The algorithm introduces the USV discrimination mechanism to avoid the USV falling into local optimization when the USV encounter different obstacles in different scenarios. Considering the various scenarios between the USV and other dynamic obstacles… More >

    Graphic Abstract

    LSDA-APF: A Local Obstacle Avoidance Algorithm for Unmanned Surface Vehicles Based on 5G Communication Environment

  • Open AccessOpen Access

    ARTICLE

    Cooperative Rate Splitting Transmit Design for Full-Duplex-Enabled Multiple Multicast Communication Systems

    Siyi Duan1, Mingsheng Wei1,*, Shidang Li1,*, Weiqiang Tan2, Bencheng Yu3
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 619-638, 2024, DOI:10.32604/cmes.2023.029572
    (This article belongs to the Special Issue: AI-Driven Intelligent Sensor Networks: Key Enabling Theories, Architectures, Modeling, and Techniques)
    Abstract This paper examines the performance of Full-Duplex Cooperative Rate Splitting (FD-CRS) with Simultaneous Wireless Information and Power Transfer (SWIPT) support in Multiple Input Single Output (MISO) networks. In a Rate Splitting Multiple Access (RSMA) multicast system with two local users and one remote user, the common data stream contains the needs of all users, and all users can decode the common data stream. Therefore, each user can receive some information that other users need, and local users with better channel conditions can use this information to further enhance the reception reliability and data rate of users with poor channel quality.… More >

  • Open AccessOpen Access

    ARTICLE

    Outage Probability Analysis for D2D-Enabled Heterogeneous Cellular Networks with Exclusion Zone: A Stochastic Geometry Approach

    Yulei Wang1, Li Feng1,*, Shumin Yao1,2, Hong Liang1, Haoxu Shi1, Yuqiang Chen3
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 639-661, 2024, DOI:10.32604/cmes.2023.029565
    (This article belongs to the Special Issue: AI-Driven Intelligent Sensor Networks: Key Enabling Theories, Architectures, Modeling, and Techniques)
    Abstract Interference management is one of the most important issues in the device-to-device (D2D)-enabled heterogeneous cellular networks (HetCNets) due to the coexistence of massive cellular and D2D devices in which D2D devices reuse the cellular spectrum. To alleviate the interference, an efficient interference management way is to set exclusion zones around the cellular receivers. In this paper, we adopt a stochastic geometry approach to analyze the outage probabilities of cellular and D2D users in the D2D-enabled HetCNets. The main difficulties contain three aspects: 1) how to model the location randomness of base stations, cellular and D2D users in practical networks; 2)… More >

  • Open AccessOpen Access

    ARTICLE

    Resource Allocation for IRS Assisted mmWave Wireless Powered Sensor Networks with User Cooperation

    Yonghui Lin1, Zhengyu Zhu2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 663-677, 2024, DOI:10.32604/cmes.2023.028584
    (This article belongs to the Special Issue: Recent Advances in Backscatter and Intelligent Reflecting Surface Communications for 6G-enabled Internet of Things Networks)
    Abstract In this paper, we investigate IRS-aided user cooperation (UC) scheme in millimeter wave (mmWave) wireless-powered sensor networks (WPSN), where two single-antenna users are wireless powered in the wireless energy transfer (WET) phase first and then cooperatively transmit information to a hybrid access point (AP) in the wireless information transmission (WIT) phase, following which the IRS is deployed to enhance the system performance of the WET and WIT. We maximized the weighted sum-rate problem by jointly optimizing the transmit time slots, power allocations, and the phase shifts of the IRS. Due to the non-convexity of the original problem, a semidefinite programming… More >

  • Open AccessOpen Access

    ARTICLE

    Anti-Jamming Null Space Projection Beamforming Based on Symbiotic Radio

    Baofeng Ji1,2,3,4,*, Yifan Liu1,2,3,4, Tingpeng Li1, Ling Xing2, Weixing Wang2, Shahid Mumtaz5, Xiaolong Shang6, Wanying Liu2, Congzheng Han4
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 679-689, 2024, DOI:10.32604/cmes.2023.028667
    (This article belongs to the Special Issue: Recent Advances in Backscatter and Intelligent Reflecting Surface Communications for 6G-enabled Internet of Things Networks)
    Abstract With the development of information technology, more and more devices are connected to the Internet through wireless communication to complete data interconnection. Due to the broadcast characteristics of wireless channels, wireless networks have suffered more and more malicious attacks. Physical layer security has received extensive attention from industry and academia. MIMO is considered to be one of the most important technologies related to physical layer security. Through beamforming technology, messages can be transmitted to legitimate users in an offset direction that is as orthogonal as possible to the interference channel to ensure the reception SINR by legitimate users. Combining the… More >

  • Open AccessOpen Access

    ARTICLE

    Machine Learning-Based Decision-Making Mechanism for Risk Assessment of Cardiovascular Disease

    Cheng Wang1, Haoran Zhu2,*, Congjun Rao2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 691-718, 2024, DOI:10.32604/cmes.2023.029258
    (This article belongs to the Special Issue: Data-Driven Robust Group Decision-Making Optimization and Application)
    Abstract Cardiovascular disease (CVD) has gradually become one of the main causes of harm to the life and health of residents. Exploring the influencing factors and risk assessment methods of CVD has become a general trend. In this paper, a machine learning-based decision-making mechanism for risk assessment of CVD is designed. In this mechanism, the logistics regression analysis method and factor analysis model are used to select age, obesity degree, blood pressure, blood fat, blood sugar, smoking status, drinking status, and exercise status as the main pathogenic factors of CVD, and an index system of risk assessment for CVD is established.… More >

  • Open AccessOpen Access

    ARTICLE

    Mixed Integer Robust Programming Model for Multimodal Fresh Agricultural Products Terminal Distribution Network Design

    Feng Yang1, Zhong Wu2,*, Xiaoyan Teng1
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 719-738, 2024, DOI:10.32604/cmes.2023.028699
    (This article belongs to the Special Issue: Data-Driven Robust Group Decision-Making Optimization and Application)
    Abstract The low efficiency and high cost of fresh agricultural product terminal distribution directly restrict the operation of the entire supply network. To reduce costs and optimize the distribution network, we construct a mixed integer programming model that comprehensively considers to minimize fixed, transportation, fresh-keeping, time, carbon emissions, and performance incentive costs. We analyzed the performance of traditional rider distribution and robot distribution modes in detail. In addition, the uncertainty of the actual market demand poses a huge threat to the stability of the terminal distribution network. In order to resist uncertain interference, we further extend the model to a robust… More >

    Graphic Abstract

    Mixed Integer Robust Programming Model for Multimodal Fresh Agricultural Products Terminal Distribution Network Design

  • Open AccessOpen Access

    ARTICLE

    The Weighted Basis for PHT-Splines

    Zhiguo Yong1, Hongmei Kang1, Falai Chen2,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 739-760, 2024, DOI:10.32604/cmes.2023.027171
    (This article belongs to the Special Issue: Integration of Geometric Modeling and Numerical Simulation)
    Abstract PHT-splines are defined as polynomial splines over hierarchical T-meshes with very efficient local refinement properties. The original PHT-spline basis functions constructed by the truncation mechanism have a decay phenomenon, resulting in numerical instability. The non-decay basis functions are constructed as the B-splines that are defined on the 2 × 2 tensor product meshes associated with basis vertices in Kang et al., but at the cost of losing the partition of unity. In the field of finite element analysis and topology optimization, forming the partition of unity is the default ingredient for constructing basis functions of approximate spaces. In this paper,… More >

    Graphic Abstract

    The Weighted Basis for PHT-Splines

  • Open AccessOpen Access

    ARTICLE

    A New Scheme of the ARA Transform for Solving Fractional-Order Waves-Like Equations Involving Variable Coefficients

    Yu-Ming Chu1, Sobia Sultana2, Shazia Karim3, Saima Rashid4,*, Mohammed Shaaf Alharthi5
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 761-791, 2024, DOI:10.32604/cmes.2023.028600
    (This article belongs to the Special Issue: On Innovative Ideas in Pure and Applied Mathematics with Applications)
    Abstract The goal of this research is to develop a new, simplified analytical method known as the ARA-residue power series method for obtaining exact-approximate solutions employing Caputo type fractional partial differential equations (PDEs) with variable coefficient. ARA-transform is a robust and highly flexible generalization that unifies several existing transforms. The key concept behind this method is to create approximate series outcomes by implementing the ARA-transform and Taylor’s expansion. The process of finding approximations for dynamical fractional-order PDEs is challenging, but the ARA-residual power series technique magnifies this challenge by articulating the solution in a series pattern and then determining the series… More >

  • Open AccessOpen Access

    ARTICLE

    A Stable Fuzzy-Based Computational Model and Control for Inductions Motors

    Yongqiu Liu1, Shaohui Zhong2,*, Nasreen Kausar3, Chunwei Zhang4,*, Ardashir Mohammadzadeh4, Dragan Pamucar5,6
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 793-812, 2024, DOI:10.32604/cmes.2023.028175
    (This article belongs to the Special Issue: Advanced Computational Models for Decision-Making of Complex Systems in Engineering)
    Abstract In this paper, a stable and adaptive sliding mode control (SMC) method for induction motors is introduced. Determining the parameters of this system has been one of the existing challenges. To solve this challenge, a new self-tuning type-2 fuzzy neural network calculates and updates the control system parameters with a fast mechanism. According to the dynamic changes of the system, in addition to the parameters of the SMC, the parameters of the type-2 fuzzy neural network are also updated online. The conditions for guaranteeing the convergence and stability of the control system are provided. In the simulation part, in order… More >

  • Open AccessOpen Access

    ARTICLE

    Calculation of Mass Concrete Temperature Containing Cooling Water Pipe Based on Substructure and Iteration Algorithm

    Heng Zhang1,2, Chao Su2,*, Zhizhong Song1, Zhenzhong Shen1,2, Huiguang Lei3
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 813-826, 2024, DOI:10.32604/cmes.2023.030055
    (This article belongs to the Special Issue: Advanced Computational Models for Decision-Making of Complex Systems in Engineering)
    Abstract Mathematical physics equations are often utilized to describe physical phenomena in various fields of science and engineering. One such equation is the Fourier equation, which is a commonly used and effective method for evaluating the effectiveness of temperature control measures for mass concrete. One important measure for temperature control in mass concrete is the use of cooling water pipes. However, the mismatch of grids between large-scale concrete models and small-scale cooling pipe models can result in a significant waste of calculation time when using the finite element method. Moreover, the temperature of the water in the cooling pipe needs to… More >

  • Open AccessOpen Access

    ARTICLE

    Federated Learning Model for Auto Insurance Rate Setting Based on Tweedie Distribution

    Tao Yin1, Changgen Peng2,*, Weijie Tan3, Dequan Xu4, Hanlin Tang5
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 827-843, 2024, DOI:10.32604/cmes.2023.029039
    (This article belongs to the Special Issue: Federated Learning Algorithms, Approaches, and Systems for Internet of Things)
    Abstract In the assessment of car insurance claims, the claim rate for car insurance presents a highly skewed probability distribution, which is typically modeled using Tweedie distribution. The traditional approach to obtaining the Tweedie regression model involves training on a centralized dataset, when the data is provided by multiple parties, training a privacy-preserving Tweedie regression model without exchanging raw data becomes a challenge. To address this issue, this study introduces a novel vertical federated learning-based Tweedie regression algorithm for multi-party auto insurance rate setting in data silos. The algorithm can keep sensitive data locally and uses privacy-preserving techniques to achieve intersection… More >

  • Open AccessOpen Access

    ARTICLE

    A Blockchain-Based Game Approach to Multi-Microgrid Energy Dispatch

    Zhikang Wang#, Chengxuan Wang#, Wendi Wu, Cheng Sun, Zhengtian Wu*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 845-863, 2024, DOI:10.32604/cmes.2023.029442
    (This article belongs to the Special Issue: The Bottleneck of Blockchain Techniques: Scalability, Security and Privacy Protection)
    Abstract As the current global environment is deteriorating, distributed renewable energy is gradually becoming an important member of the energy internet. Blockchain, as a decentralized distributed ledger with decentralization, traceability and tamper-proof features, is an important way to achieve efficient consumption and multi-party supply of new energy. In this article, we establish a blockchain-based mathematical model of multiple microgrids and microgrid aggregators’ revenue, consider the degree of microgrid users’ preference for electricity thus increasing users’ reliance on the blockchain market, and apply the one-master-multiple-slave Stackelberg game theory to solve the energy dispatching strategy when each market entity pursues the maximum revenue.… More >

  • Open AccessOpen Access

    ARTICLE

    A Stroke-Limitation AMD Control System with Variable Gain and Limited Area for High-Rise Buildings

    Zuo-Hua Li1, Qing-Gui Wu1,*, Jun Teng1,*, Chao-Jun Chen1,2
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 865-884, 2024, DOI:10.32604/cmes.2023.029927
    (This article belongs to the Special Issue: Computer-Aided Uncertainty Modeling and Reliability Evaluation for Complex Engineering Structures)
    Abstract Collisions between a moving mass and an anti-collision device increase structural responses and threaten structural safety. An active mass damper (AMD) with stroke limitations is often used to avoid collisions. However, a stroke-limited AMD control system with a fixed limited area shortens the available AMD stroke and leads to significant control power. To solve this problem, the design approach with variable gain and limited area (VGLA) is proposed in this study. First, the boundary of variable-limited areas is calculated based on the real-time status of the moving mass. The variable gain (VG) expression at the variable limited area is deduced… More >

  • Open AccessOpen Access

    ARTICLE

    IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks

    Ying Zhang1,*, Weiming Niu2, Leibing Yan1
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 885-902, 2024, DOI:10.32604/cmes.2023.029234
    (This article belongs to the Special Issue: Edge Computing Enabled Internet of Drones)
    Abstract In this paper, we consider mobile edge computing (MEC) networks against proactive eavesdropping. To maximize the transmission rate, IRS assisted UAV communications are applied. We take the joint design of the trajectory of UAV, the transmitting beamforming of users, and the phase shift matrix of IRS. The original problem is strong non-convex and difficult to solve. We first propose two basic modes of the proactive eavesdropper, and obtain the closed-form solution for the boundary conditions of the two modes. Then we transform the original problem into an equivalent one and propose an alternating optimization (AO) based method to obtain a… More >

  • Open AccessOpen Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang1,2, Xiang Liu2, Lei Liu2, Shangchao Wang2, Baichuan Shao3, Yang Zhao3,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895
    (This article belongs to the Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This scheme boasts strong key insulation… More >

  • Open AccessOpen Access

    ARTICLE

    Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services

    Jinqiu Hou1, Changgen Peng1,*, Weijie Tan1,2, Hongfa Ding3
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 917-938, 2024, DOI:10.32604/cmes.2023.027276
    (This article belongs to the Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract Cloud-based services have powerful storage functions and can provide accurate computation. However, the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight. Although the attribute-based proxy re-encryption (ABPRE) schemes based on number theory can solve this problem, it is still difficult to resist quantum attacks and have limited expression capabilities. To address these issues, we present a novel linear secret sharing schemes (LSSS) matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research. Additionally, to detect the activities of illegal proxies, homomorphic signature (HS) technology is… More >

  • Open AccessOpen Access

    ARTICLE

    A Secure Device Management Scheme with Audio-Based Location Distinction in IoT

    Haifeng Lin1,2, Xiangfeng Liu2, Chen Chen2, Zhibo Liu2, Dexin Zhao3, Yiwen Zhang4, Weizhuang Li4, Mingsheng Cao5,6,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 939-956, 2024, DOI:10.32604/cmes.2023.028656
    (This article belongs to the Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract Identifying a device and detecting a change in its position is critical for secure devices management in the Internet of Things (IoT). In this paper, a device management system is proposed to track the devices by using audio-based location distinction techniques. In the proposed scheme, traditional cryptographic techniques, such as symmetric encryption algorithm, RSA-based signcryption scheme, and audio-based secure transmission, are utilized to provide authentication, non-repudiation, and confidentiality in the information interaction of the management system. Moreover, an audio-based location distinction method is designed to detect the position change of the devices. Specifically, the audio frequency response (AFR) of several… More >

  • Open AccessOpen Access

    ARTICLE

    Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure: A Practice of Cryptography Approach

    Mingxing Zhou1,2, Peng Xiao3, Qixu Wang1,2,*, Shuhua Ruan1,2, Xingshu Chen1,2, Menglong Yang4
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 957-979, 2024, DOI:10.32604/cmes.2023.028612
    (This article belongs to the Special Issue: Information Security Practice and Experience: Advances and Challenges)
    Abstract Due to the need for massive device connectivity, low communication latency, and various customizations in 6G architecture, a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario. However, the openness and heterogeneity of the 6G network cause the problems of network security. To improve the trustworthiness of 6G networks, we propose a trusted computing-based approach for establishing trust relationships in multi-cloud scenarios. The proposed method shows the relationship of trust based on dual-level verification. It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.… More >

  • Open AccessOpen Access

    ARTICLE

    Activation Redistribution Based Hybrid Asymmetric Quantization Method of Neural Networks

    Lu Wei, Zhong Ma*, Chaojie Yang
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 981-1000, 2024, DOI:10.32604/cmes.2023.027085
    (This article belongs to the Special Issue: Recent Advances in Virtual Reality)
    Abstract The demand for adopting neural networks in resource-constrained embedded devices is continuously increasing. Quantization is one of the most promising solutions to reduce computational cost and memory storage on embedded devices. In order to reduce the complexity and overhead of deploying neural networks on Integer-only hardware, most current quantization methods use a symmetric quantization mapping strategy to quantize a floating-point neural network into an integer network. However, although symmetric quantization has the advantage of easier implementation, it is sub-optimal for cases where the range could be skewed and not symmetric. This often comes at the cost of lower accuracy. This… More >

    Graphic Abstract

    Activation Redistribution Based Hybrid Asymmetric Quantization Method of Neural Networks

  • Open AccessOpen Access

    ARTICLE

    PanopticUAV: Panoptic Segmentation of UAV Images for Marine Environment Monitoring

    Yuling Dou1, Fengqin Yao1, Xiandong Wang1, Liang Qu2, Long Chen3, Zhiwei Xu4, Laihui Ding4, Leon Bevan Bullock1, Guoqiang Zhong1, Shengke Wang1,*
    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 1001-1014, 2024, DOI:10.32604/cmes.2023.027764
    (This article belongs to the Special Issue: Deep Learning for Marine and Underwater Environment: Theory, Method, and Applications)
    Abstract UAV marine monitoring plays an essential role in marine environmental protection because of its flexibility and convenience, low cost and convenient maintenance. In marine environmental monitoring, the similarity between objects such as oil spill and sea surface, Spartina alterniflora and algae is high, and the effect of the general segmentation algorithm is poor, which brings new challenges to the segmentation of UAV marine images. Panoramic segmentation can do object detection and semantic segmentation at the same time, which can well solve the polymorphism problem of objects in UAV ocean images. Currently, there are few studies on UAV marine image recognition… More >

Per Page:

Share Link