Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,894)
  • Open Access

    ARTICLE

    An Iterative Boundary Element Method for the Solution of a Cauchy Steady State Heat Conduction Problem

    N.S. Mera, L. Elliott, D.B. Ingham, D. Lesnic1

    CMES-Computer Modeling in Engineering & Sciences, Vol.1, No.3, pp. 101-106, 2000, DOI:10.3970/cmes.2000.001.403

    Abstract In this paper the iterative algorithm proposed by [Kozlov and Maz'ya (1990)] for the backward heat conduction problem is extended in order to solve the Cauchy steady state heat conduction problem and the accuracy, convergence and stability of the numerical algorithm are investigated. The numerical results which are obtained confirm that this new iterative BEM procedure is accurate, convergent and stable with respect to increasing the number of boundary elements and decreasing the amount of noise which is added into the input data. More >

  • Open Access

    ARTICLE

    Non-Linear Rigid Body Dynamics: Energy and Momentum Conserving Algorithm

    Fernando A. Rochinha1, Rubens Sampaio2

    CMES-Computer Modeling in Engineering & Sciences, Vol.1, No.2, pp. 7-18, 2000, DOI:10.3970/cmes.2000.001.167

    Abstract The dynamics of flexible systems, such as robot manipulators, mechanical chains or cables, is becoming increasingly important in engineering. The main question arising from the numerical modelling of large overall motions of multibody systems is an appropriate treatment for the large rotations. In the present work an alternative approach is proposed leading to a time-stepping numerical algorithm which achieves stable solutions combined with high precision. In particular, in order to check the performance of the proposed approach, two examples having preserved constants of the motion are presented. More >

  • Open Access

    ARTICLE

    Simulation of Anisotropic Crystalline Etching using a Continuous Cellular Automata Algorithm

    Zhenjun Zhu, Chang Liu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.1, No.1, pp. 11-20, 2000, DOI:10.3970/cmes.2000.001.011

    Abstract We present results on the development of an anisotropic crystalline etching simulation (ACES) program based on a new continuous Cellular Automata (CA) model, which provides improved spatial resolution and accuracy compared with the conventional and the stochastic CA \mbox{methods}. Implementation of a dynamic CA technique provides increased simulation speed and reduced memory requirement (5x). A first ACES software based on common personal computer platforms has been realized. Simulated results of etching match well with experiments. We have developed a new methodology to obtain the etch-rate diagram of anisotropic etching efficiently using both experimental and numerical techniques. More >

  • Open Access

    ARTICLE

    Optimizing the Design of PV Solar Reverse Osmosis Unit (RO/PV) by using Genetic Algorithms for Abu Dhabi Climate

    K. Bououni1, T. Jaber1, S. Elbehissy1

    FDMP-Fluid Dynamics & Materials Processing, Vol.13, No.2, pp. 127-141, 2017, DOI:10.3970/fdmp.2017.013.127

    Abstract The economic progress in the United Arab Emirates (UAE) induces to a significant increase in the demand for agricultural development. In Emirates the majority of the farms are irrigated by underground water, characterized by a high level of salinity. Liwa, Al Ain and Al Khatem areas are suffering from high water well salinity that exceeds 20,000 ppm. This work focuses on this problem and suggests a suitable solution allowing the use of renewable energy (Solar Photovoltaic) to drive RO desalination units. An optimal design of RO/PV unit adapted to a typical farm in Abu Dhabi was suggested using a model… More >

  • Open Access

    ARTICLE

    A Time-Marching Algorithm for Solving Non-Linear Obstacle Problems with the Aid of an NCP-Function

    Chein-Shan Liu1

    CMC-Computers, Materials & Continua, Vol.8, No.2, pp. 53-66, 2008, DOI:10.3970/cmc.2008.008.053

    Abstract Proposed is a time-marching algorithm to solve a nonlinear system of complementarity equations: Pi(xj) ≥ 0, Qi(xj) ≥ 0 , Pi(xj)Qi(xj) = 0, i, j = 1,...,n, resulting from a discretization of nonlinear obstacle problem. We transform the above nonlinear complementarity problem (NCP) into a nonlinear algebraic equations (NAEs) system: Fi(xj) = 0 with the aid of the Fischer-Burmeister NCP-function. Such NAEs are semi-smooth, highly nonlinear and usually implicit, being hard to handle by the Newton-like method. Instead of, a first-order system of ODEs is derived through a fictitious time equation. The time-stepping equations are obtained by applying a numerical… More >

  • Open Access

    ARTICLE

    Computer Simulation of Random Sphere Packing in an Arbitrarily Shaped Container

    S.X. Li1, L. Zhao1, Y.W. Liu2

    CMC-Computers, Materials & Continua, Vol.7, No.2, pp. 109-118, 2008, DOI:10.3970/cmc.2008.007.109

    Abstract Most simulations of random sphere packing concern a cubic or cylindric container with periodic boundary, containers of other shapes are rarely studied. In this paper, a new relaxation algorithm with pre-expanding procedure for random sphere packing in an arbitrarily shaped container is presented. Boundaries of the container are simulated by overlapping spheres which covers the boundary surface of the container. We find 0.4~0.6 of the overlap rate is a proper value for boundary spheres. The algorithm begins with a random distribution of small internal spheres. Then the expansion and relaxation procedures are performed alternately to increase the packing density. The… More >

  • Open Access

    ARTICLE

    A Physical Layer Algorithm for Estimation of Number of Tags in UHF RFID Anti-Collision Design

    Zhong Huang1, Jian Su2, Guangjun Wen1, Wenxian Zheng3, Chu Chu1, Yijun Zhang4,*, Yibo Zhang5

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 399-408, 2019, DOI:10.32604/cmc.2019.05876

    Abstract A priori knowledge of the number of tags is crucial for anti-collision protocols in slotted UHF RFID systems. The number of tags is used to decide optimal frame length in dynamic frame slotted ALOHA (DFSA) and to adjust access probability in random access protocols. Conventional researches estimate the number of tags in MAC layer based on statistics of empty slots, collided slots and successful slots. Usually, a collision detection algorithm is employed to determine types of time slots. Only three types are distinguished because of lack of ability to detect the number of tags in single time slot. In this… More >

  • Open Access

    ARTICLE

    A Novel Improved Bat Algorithm in UAV Path Planning

    Na Lin1, Jiacheng Tang1, Xianwei Li2,3, Liang Zhao1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 323-344, 2019, DOI:10.32604/cmc.2019.05674

    Abstract Path planning algorithm is the key point to UAV path planning scenario. Many traditional path planning methods still suffer from low convergence rate and insufficient robustness. In this paper, three main methods are contributed to solving these problems. First, the improved artificial potential field (APF) method is adopted to accelerate the convergence process of the bat’s position update. Second, the optimal success rate strategy is proposed to improve the adaptive inertia weight of bat algorithm. Third chaos strategy is proposed to avoid falling into a local optimum. Compared with standard APF and chaos strategy in UAV path planning scenarios, the… More >

  • Open Access

    ARTICLE

    Uncertain Knowledge Reasoning Based on the Fuzzy Multi Entity Bayesian Networks

    Dun Li1, Hong Wu1, Jinzhu Gao2, Zhuoyun Liu1, Lun Li1, Zhiyun Zheng1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 301-321, 2019, DOI:10.32604/cmc.2019.05953

    Abstract With the rapid development of the semantic web and the ever-growing size of uncertain data, representing and reasoning uncertain information has become a great challenge for the semantic web application developers. In this paper, we present a novel reasoning framework based on the representation of fuzzy PR-OWL. Firstly, the paper gives an overview of the previous research work on uncertainty knowledge representation and reasoning, incorporates Ontology into the fuzzy Multi Entity Bayesian Networks theory, and introduces fuzzy PR-OWL, an Ontology language based on OWL2. Fuzzy PR-OWL describes fuzzy semantics and uncertain relations and gives grammatical definition and semantic interpretation. Secondly,… More >

  • Open Access

    ARTICLE

    An Intrusion Detection Algorithm Based on Feature Graph

    Xiang Yu1, Zhihong Tian2, Jing Qiu2,*, Shen Su2,*, Xiaoran Yan3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 255-274, 2019, DOI:10.32604/cmc.2019.05821

    Abstract With the development of Information technology and the popularization of Internet, whenever and wherever possible, people can connect to the Internet optionally. Meanwhile, the security of network traffic is threatened by various of online malicious behaviors. The aim of an intrusion detection system (IDS) is to detect the network behaviors which are diverse and malicious. Since a conventional firewall cannot detect most of the malicious behaviors, such as malicious network traffic or computer abuse, some advanced learning methods are introduced and integrated with intrusion detection approaches in order to improve the performance of detection approaches. However, there are very few… More >

Displaying 1831-1840 on page 184 of 1894. Per Page