window.location= '';
CMES-Computer Modeling in Engineering & Sciences

About the Journal

This journal publishes original research papers of reasonable permanent value, in the areas of computational mechanics, computational physics, computational chemistry, and computational biology, pertinent to solids, fluids, gases, biomaterials, and other continua. Various length scales (quantum, nano, micro, meso, and macro), and various time scales (picoseconds to hours) are of interest. Papers which deal with multi-physics problems, as well as those which deal with the interfaces of mechanics, chemistry, and biology, are particularly encouraged. New computational approaches, and more efficient algorithms, which eventually make near-real-time computations possible, are welcome. Original papers dealing with new methods such as meshless methods, and mesh-reduction methods are sought.

Indexing and Abstracting

Science Citation Index (Web of Science): 2020 Impact Factor 1.593; Current Contents: Engineering, Computing & Technology; Scopus Citescore (Impact per Publication 2020): 1.6; SNIP (Source Normalized Impact per Paper 2020): 0.59; RG Journal Impact (average over last three years); Engineering Index (Compendex); Applied Mechanics Reviews; Cambridge Scientific Abstracts: Aerospace and High Technology, Materials Sciences & Engineering, and Computer & Information Systems Abstracts Database; CompuMath Citation Index; INSPEC Databases; Mathematical Reviews; MathSci Net; Mechanics; Science Alert; Science Navigator; Zentralblatt fur Mathematik; Portico, etc...

  • Data-Driven Determinant-Based Greedy Under/Oversampling Vector Sensor Placement
  • Abstract A vector-measurement-sensor-selection problem in the undersampled and oversampled cases is considered by extending the previous novel approaches: a greedy method based on D-optimality and a noise-robust greedy method in this paper. Extensions of the vector-measurement-sensor selection of the greedy algorithms are proposed and applied to randomly generated systems and practical datasets of flowfields around the airfoil and global climates to reconstruct the full state given by the vector-sensor measurement. More
  •   Views:364       Downloads:365        Download PDF
  • Predicting Genotype Information Related to COVID-19 for Molecular Mechanism Based on Computational Methods
  • Abstract Novel coronavirus disease 2019 (COVID-19) is an ongoing health emergency. Several studies are related to COVID-19. However, its molecular mechanism remains unclear. The rapid publication of COVID-19 provides a new way to elucidate its mechanism through computational methods. This paper proposes a prediction method for mining genotype information related to COVID-19 from the perspective of molecular mechanisms based on machine learning. The method obtains seed genes based on prior knowledge. Candidate genes are mined from biomedical literature. The candidate genes are scored by machine learning based on the similarities measured between the seed and candidate genes. Furthermore, the results of… More
  •   Views:259       Downloads:195        Download PDF
  • Deep Learning Applications for COVID-19 Analysis: A State-of-the-Art Survey
  • Abstract The COVID-19 has resulted in catastrophic situation and the deaths of millions of people all over the world. In this paper, the predictions of epidemiological propagation models, such as SIR and SEIR, are introduced to analyze the earlier COVID-19 propagation. The deep learning methods combined with transfer learning are familiar with classification-detection approaches based on chest X-ray and CT images are presented in detail. Besides, deep learning approaches have also been applied to lung ultrasound (LUS), which has been shown to be more sensitive than chest X-ray and CT images in detecting COVID-19. In the absence of a vaccine, the… More
  • Graphical Abstract

    Deep Learning Applications for COVID-19 Analysis: A <i>State-of-the-Art</i> Survey
  •   Views:280       Downloads:230        Download PDF
  • Simulating the Effect of Temperature Gradient on Grain Growth of 6061-T6 Aluminum Alloy via Monte Carlo Potts Algorithm
  • Abstract During heat treatment or mechanical processing, most polycrystalline materials experience grain growth, which significantly affects their mechanical properties. Microstructure simulation on a mesoscopic scale is an important way of studying grain growth. A key research focus of this type of method has long been how to efficiently and accurately simulate the grain growth caused by a non-uniform temperature field with temperature gradients. In this work, we propose an improved 3D Monte Carlo Potts (MCP) method to quantitatively study the relationship between non-uniform temperature fields and final grain morphologies. Properties of the aluminum alloy AA6061-T6 are used to establish a trial… More
  •   Views:528       Downloads:324        Download PDF
  • Medical Waste Treatment Station Selection Based on Linguistic q-Rung Orthopair Fuzzy Numbers
  • Abstract During the COVID-19 outbreak, the use of single-use medical supplies increased significantly. It is essential to select suitable sites for establishing medical waste treatment stations. It is a big challenge to solve the medical waste treatment station selection problem due to some conflicting factors. This paper proposes a multi-attribute decision-making (MADM) method based on the partitioned Maclaurin symmetric mean (PMSM) operator. For the medical waste treatment station selection problem, the factors or attributes (these two terms can be interchanged.) in the same clusters are closely related, and the attributes in different clusters have no relationships. The partitioned Maclaurin symmetric mean… More
  •   Views:208       Downloads:158        Download PDF
  • A Reliability Evaluation Method for Intermittent Jointed Rock Slope Based on Evolutionary Support Vector Machine
  • Abstract The randomness of rock joint development is an important factor in the uncertainty of geotechnical engineering stability. In this study, a method is proposed to evaluate the reliability of intermittent jointed rock slope. The least squares support vector machine (LSSVM) evolved by a bacterial foraging optimization algorithm (BFOA) is used to establish a response surface model to express the mapping relationship between the intermittent joint parameters and the slope safety factor. The training samples are obtained from the numerical calculation based on the joint finite element method during this process. Considering the randomness of the intermittent joint parameters in the… More
  •   Views:206       Downloads:162        Download PDF
  • Moving Least Squares Interpolation Based A-Posteriori Error Technique in Finite Element Elastic Analysis
  • Abstract The performance of a-posteriori error methodology based on moving least squares (MLS) interpolation is explored in this paper by varying the finite element error recovery parameters, namely recovery points and field variable derivatives recovery. The MLS interpolation based recovery technique uses the weighted least squares method on top of the finite element method's field variable derivatives solution to build a continuous field variable derivatives approximation. The boundary of the node support (mesh free patch of influenced nodes within a determined distance) is taken as circular, i.e., circular support domain constructed using radial weights is considered. The field variable derivatives (stress… More
  •   Views:206       Downloads:164        Download PDF
  • Adaptive Object Tracking Discriminate Model for Multi-Camera Panorama Surveillance in Airport Apron
  • Abstract Autonomous intelligence plays a significant role in aviation security. Since most aviation accidents occur in the take-off and landing stage, accurate tracking of moving object in airport apron will be a vital approach to ensure the operation of the aircraft safely. In this study, an adaptive object tracking method based on a discriminant is proposed in multi-camera panorama surveillance of large-scale airport apron. Firstly, based on channels of color histogram, the pre-estimated object probability map is employed to reduce searching computation, and the optimization of the disturbance suppression options can make good resistance to similar areas around the object. Then… More
  •   Views:212       Downloads:151        Download PDF
  • Methodology for Road Defect Detection and Administration Based on Mobile Mapping Data
  • Abstract A detailed inspection of roads requires highly detailed spatial data with sufficient precision to deliver an accurate geometry and to describe road defects visually. This paper presents a novel method for the detection of road defects. The input data for road defect detection included point clouds and orthomosaics gathered by mobile mapping technology. The defects were categorized in three major groups with the following geometric primitives: points, lines and polygons. The method suggests the detection of point objects from matched point clouds, panoramic images and ortho photos. Defects were mapped as point, line or polygon geometries, directly derived from orthomosaics… More
  •   Views:219       Downloads:164        Download PDF
  • Numerical Solutions of a Novel Designed Prevention Class in the HIV Nonlinear Model
  • Abstract The presented research aims to design a new prevention class (P) in the HIV nonlinear system, i.e., the HIPV model. Then numerical treatment of the newly formulated HIPV model is portrayed handled by using the strength of stochastic procedure based numerical computing schemes exploiting the artificial neural networks (ANNs) modeling legacy together with the optimization competence of the hybrid of global and local search schemes via genetic algorithms (GAs) and active-set approach (ASA), i.e., GA-ASA. The optimization performances through GA-ASA are accessed by presenting an error-based fitness function designed for all the classes of the HIPV model and its corresponding… More
  •   Views:186       Downloads:145        Download PDF
  • Code Transform Model Producing High-Performance Program
  • Abstract This paper introduces a novel transform method to produce the newly generated programs through code transform model called the second generation of Generative Pre-trained Transformer (GPT-2) reasonably, improving the program execution performance significantly. Besides, a theoretical estimation in statistics has given the minimum number of generated programs as required, which guarantees to find the best one within them. The proposed approach can help the voice assistant machine resolve the problem of inefficient execution of application code. In addition to GPT-2, this study develops the variational Simhash algorithm to check the code similarity between sample program and newly generated program, and… More
  •   Views:521       Downloads:336        Download PDF
  • Uncertainty Analysis of Seepage-Induced Consolidation in a Fractured Porous Medium
  • Abstract Numerical modeling of seepage-induced consolidation process usually encounters significant uncertainty in the properties of geotechnical materials. Assessing the effect of uncertain parameters on the performance variability of the seepage consolidation model is of critical importance to the simulation and tests of this process. To this end, the uncertainty and sensitivity analyses are performed on a seepage consolidation model in a fractured porous medium using the Bayesian sparse polynomial chaos expansion (SPCE) method. Five uncertain parameters including Young’s modulus, Poisson’s ratio, and the permeability of the porous matrix, the permeability within the fracture, and Biot’s constant are studied. Bayesian SPCE models… More
  •   Views:197       Downloads:152        Download PDF
  • IDV: Internet Domain Name Verification Based on Blockchain
  • Abstract The rapid development of blockchain technology has provided new ideas for network security research. Blockchain-based network security enhancement solutions are attracting widespread attention. This paper proposes an Internet domain name verification method based on blockchain. The authenticity of DNS (Domain Name System) resolution results is crucial for ensuring the accessibility of Internet services. Due to the lack of adequate security mechanisms, it has always been a challenge to verify the authenticity of Internet domain name resolution results. Although the solution represented by DNSSEC (Domain Name System Security Extensions) can theoretically solve the domain name verification problem, it has not been… More
  •   Views:182       Downloads:157        Download PDF
  • Neutrosophic N-Structures Applied to Sheffer Stroke BL-Algebras
  • Abstract In this paper, we introduce a neutrosophic N-subalgebra, a (ultra) neutrosophic N-filter, level sets of these neutrosophic N-structures and their properties on a Sheffer stroke BL-algebra. By defining a quasi-subalgebra of a Sheffer stroke BL-algebra, it is proved that the level set of neutrosophic N-subalgebras on the algebraic structure is its quasi-subalgebra and vice versa. Then we show that the family of all neutrosophic N-subalgebras of a Sheffer stroke BL-algebra forms a complete distributive lattice. After that a (ultra) neutrosophic N-filter of a Sheffer stroke BL-algebra is described, we demonstrate that every neutrosophic N-filter of a Sheffer stroke BL-algebra is… More
  •   Views:218       Downloads:176        Download PDF
  • Study of Degenerate Poly-Bernoulli Polynomials by λ-Umbral Calculus
  • Abstract Recently, degenerate poly-Bernoulli polynomials are defined in terms of degenerate polyexponential functions by Kim-Kim-Kwon-Lee. The aim of this paper is to further examine some properties of the degenerate poly-Bernoulli polynomials by using three formulas from the recently developed ‘λ-umbral calculus.’ In more detail, we represent the degenerate poly-Bernoulli polynomials by Carlitz Bernoulli polynomials and degenerate Stirling numbers of the first kind, by fully degenerate Bell polynomials and degenerate Stirling numbers of the first kind, and by higherorder degenerate Bernoulli polynomials and degenerate Stirling numbers of the second kind. More
  •   Views:750       Downloads:439        Download PDF