Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (418)
  • Open Access

    ARTICLE

    Comparative Investigations on Fracture Toughness and Damping Response of Fabric Reinforced Epoxy Composites

    GAURAV AGARWAL

    Journal of Polymer Materials, Vol.39, No.3-4, pp. 255-267, 2022, DOI:10.32381/JPM.2022.39.3-4.6

    Abstract Studies were conducted to observe the effect of fracture toughness and damping response on fabric reinforced epoxy polymer composites. The samples of glass fabric, kevlar fabric and carbon fabric having 15wt%, 25wt%, 35wt%, 45wt% and 55wt % fabric content were prepared and tested following ASTM standards. Fracture toughness, peak load and increase in energy absorption are determined for the fabric-epoxy composites. Effect of temperature on storage modulus, loss modulus and tan delta values for various percentages of fabric epoxy composites are noticed and corresponding damping response behaviour is determined. The results revealed that reduction in strength at higher percentage of… More >

  • Open Access

    ARTICLE

    A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks

    Bing Liu1, Zhe Zhang1, Shengrong Hu2, Song Sun3,*, Dapeng Liu4, Zhenyu Qiu5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4049-4069, 2024, DOI:10.32604/cmc.2024.048099

    Abstract Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks. This leads to the misreporting of normal data, which will impact the normal operation of IoT. To mitigate the impact caused by the high false positive rate of ADS, this paper proposes an ADS management scheme for clustered IoT. First, we model the data transmission and anomaly detection in clustered IoT. Then, the operation strategy of the clustered IoT is formulated as the running probabilities of all ADSs deployed on… More >

  • Open Access

    ARTICLE

    Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust

    Xiaoyan Zhu1, Ruchun Jia2, Tingrui Zhang3, Song Yao4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4363-4377, 2024, DOI:10.32604/cmc.2023.045615

    Abstract The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect, which is easy to leads to the problem that the data is usurped. Starting from the application of the ATC (automatic train control) network, this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data. Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation, this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the… More >

  • Open Access

    ARTICLE

    Gyroscope Dynamic Balance Counterweight Prediction Based on Multi-Head ResGAT Networks

    Wuyang Fan, Shisheng Zhong*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2525-2555, 2024, DOI:10.32604/cmes.2023.046951

    Abstract The dynamic balance assessment during the assembly of the coordinator gyroscope significantly impacts the guidance accuracy of precision-guided equipment. In dynamic balance debugging, reliance on rudimentary counterweight empirical formulas persists, resulting in suboptimal debugging accuracy and an increased repetition rate. To mitigate this challenge, we present a multi-head residual graph attention network (ResGAT) model, designed to predict dynamic balance counterweights with high precision. In this research, we employ graph neural networks for interaction feature extraction from assembly graph data. An SDAE-GPC model is designed for the assembly condition classification to derive graph data inputs for the ResGAT regression model, which… More >

  • Open Access

    ARTICLE

    An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection

    Younghoon Ban, Myeonghyun Kim, Haehyun Cho*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3535-3563, 2024, DOI:10.32604/cmes.2023.046658

    Abstract Antivirus vendors and the research community employ Machine Learning (ML) or Deep Learning (DL)-based static analysis techniques for efficient identification of new threats, given the continual emergence of novel malware variants. On the other hand, numerous researchers have reported that Adversarial Examples (AEs), generated by manipulating previously detected malware, can successfully evade ML/DL-based classifiers. Commercial antivirus systems, in particular, have been identified as vulnerable to such AEs. This paper firstly focuses on conducting black-box attacks to circumvent ML/DL-based malware classifiers. Our attack method utilizes seven different perturbations, including Overlay Append, Section Append, and Break Checksum, capitalizing on the ambiguities present… More >

  • Open Access

    REVIEW

    A Review of the Tuned Mass Damper Inerter (TMDI) in Energy Harvesting and Vibration Control: Designs, Analysis and Applications

    Xiaofang Kang1,2,*, Qiwen Huang1, Zongqin Wu1, Jianjun Tang1, Xueqin Jiang1, Shancheng Lei3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2361-2398, 2024, DOI:10.32604/cmes.2023.043936

    Abstract Tuned mass damper inerter (TMDI) is a device that couples traditional tuned mass dampers (TMD) with an inertial device. The inertial device produces resistance proportional to the relative acceleration at its two ends through its “inertial” constant. Due to its unique mechanical properties, TMDI has received widespread attention and application in the past twenty years. As different configurations are required in different practical situations, TMDI is still active in the research on vibration control and energy harvesting in structures. This paper provides a comprehensive review of the research status of TMDI. This work first examines the generation and important vibration… More >

  • Open Access

    ARTICLE

    FPSblo: A Blockchain Network Transmission Model Utilizing Farthest Point Sampling

    Longle Cheng1,2, Xiru Li1, Shiyu Fang2, Wansu Pan1, He Zhao1,*, Haibo Tan1, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2491-2509, 2024, DOI:10.32604/cmc.2024.047166

    Abstract Peer-to-peer (P2P) overlay networks provide message transmission capabilities for blockchain systems. Improving data transmission efficiency in P2P networks can greatly enhance the performance of blockchain systems. However, traditional blockchain P2P networks face a common challenge where there is often a mismatch between the upper-layer traffic requirements and the underlying physical network topology. This mismatch results in redundant data transmission and inefficient routing, severely constraining the scalability of blockchain systems. To address these pressing issues, we propose FPSblo, an efficient transmission method for blockchain networks. Our inspiration for FPSblo stems from the Farthest Point Sampling (FPS) algorithm, a well-established technique widely… More >

  • Open Access

    ARTICLE

    Ash Detection of Coal Slime Flotation Tailings Based on Chromatographic Filter Paper Sampling and Multi-Scale Residual Network

    Wenbo Zhu1, Neng Liu1, Zhengjun Zhu2,*, Haibing Li1, Weijie Fu1, Zhongbo Zhang1, Xinghao Zhang1

    Intelligent Automation & Soft Computing, Vol.38, No.3, pp. 259-273, 2023, DOI:10.32604/iasc.2023.041860

    Abstract The detection of ash content in coal slime flotation tailings using deep learning can be hindered by various factors such as foam, impurities, and changing lighting conditions that disrupt the collection of tailings images. To address this challenge, we present a method for ash content detection in coal slime flotation tailings. This method utilizes chromatographic filter paper sampling and a multi-scale residual network, which we refer to as MRCN. Initially, tailings are sampled using chromatographic filter paper to obtain static tailings images, effectively isolating interference factors at the flotation site. Subsequently, the MRCN, consisting of a multi-scale residual network, is… More >

  • Open Access

    ARTICLE

    Do Public Health Events Promote the Prevalence of Adjustment Disorder in College Students? An Example from the COVID-19 Pandemic

    Rong Fu*, Luze Xie

    International Journal of Mental Health Promotion, Vol.26, No.1, pp. 21-30, 2024, DOI:10.32604/ijmhp.2023.041730

    Abstract COVID-19, as one of the most serious sudden public health problems in this century, is a serious threat to people’s mental health. College students, as a vulnerable group, are more likely to develop mental health problems. When the body is unable to adapt to new changes in the environment, the main mental health problem that arises is adjustment disorder. The aim of this study was to assess the prevalence and influencing factors of adjustment disorder among college students during the COVID-19 outbreak in China. Cross-sectional data collected by web-based questionnaires were obtained through convenience sampling and snowball sampling between March… More >

  • Open Access

    REVIEW

    Review on analytical technologies and applications in metabolomics

    XIN MENG*, YAN LIU, SHUJUN XU, LIANRONG YANG, RUI YIN

    BIOCELL, Vol.48, No.1, pp. 65-78, 2024, DOI:10.32604/biocell.2023.045986

    Abstract Over the past decade, the swift advancement of metabolomics can be credited to significant progress in technologies such as mass spectrometry, nuclear magnetic resonance, and multivariate statistics. Currently, metabolomics garners widespread application across diverse fields including drug research and development, early disease detection, toxicology, food and nutrition science, biology, prescription, and chinmedomics, among others. Metabolomics serves as an effective characterization technique, offering insights into physiological process alterations in vivo. These changes may result from various exogenous factors like environmental conditions, stress, medications, as well as endogenous elements including genetic and protein-based influences. The potential scientific outcomes gleaned from these insights… More > Graphic Abstract

    Review on analytical technologies and applications in metabolomics

Displaying 1-10 on page 1 of 418. Per Page