Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (928)
  • Open Access

    ARTICLE

    A Unified Theory for Interphase Transport Phenomena with Interfacial Velocity and Surface Tension Gradients: Applications to Single Crystal Growth and Microgravity Sciences

    Akira Hirata1

    FDMP-Fluid Dynamics & Materials Processing, Vol.3, No.3, pp. 203-230, 2007, DOI:10.3970/fdmp.2007.003.203

    Abstract This article is a summary of author's typical research works (over the last four decades) on interphase transport phenomena in the presence of interfacial fluid motion and surface tension gradients on liquid-fluid interfaces, and related applications to single crystal growth and microgravity sciences. A unified theory for momentum, heat and mass transfer on liquid-fluid and solid-fluid interfaces is proposed, which takes into account interface mobility. It is shown that interface contamination and turbulence can be well explained, respectively, by suppression and enhancement of the interfacial velocity induced by surface tension gradients. Transport phenomena on solid spheres, liquid drops and gas… More >

  • Open Access

    ARTICLE

    Flow Features and Industrial Applications of TSE Rheoextrusion Process

    H. Tang1, L.C. Wrobel2, Z. Fan2

    FDMP-Fluid Dynamics & Materials Processing, Vol.3, No.2, pp. 129-146, 2007, DOI:10.3970/fdmp.2007.003.129

    Abstract This paper presents an overview of diverse extrusion techniques and, in particular, a focused discussion about the rheoextrusion process for semi-solid casting (a novel casting process for the fabrication of high quality metals). The review reveals a wealth of interesting rheological and microstructural features, illustrating qualitative and quantitative data. The analysis is supported by relevant numerical results and examples. It is shown how numerical studies can lead to significant insights into these processes by providing more detailed information on the fundamental mechanisms of morphology development (during phase change) and profile forming. The die filling and solidification behaviours within extrusion dies… More >

  • Open Access

    ARTICLE

    Application of Component Mode Synthesis to Protein Structure for Dynamic Analysis

    Jae In Kim1, Kilho Eom2, Moon Kyu Kwak3, Sungsoo Na4

    CMC-Computers, Materials & Continua, Vol.8, No.2, pp. 67-74, 2008, DOI:10.3970/cmc.2008.008.067

    Abstract This paper concerns the application of component mode synthesis for biomolecule modeling to understand protein dynamics. As for protein dynamics, eigenvalue problem should be formulated to obtain eigenvalue, eigenvector and thermal fluctuation. To describe the thermal fluctuation of protein, normal mode analysis is introduced and normal modes identify the dynamic behavior of protein very well. Component mode synthesis considers the given complex structure as an assembly of smaller components. The selection of a component may be arbitrary. When the component mode synthesis is applied to formulate the eigenvalue problem of protein structure, we selected a protein which may be composed… More >

  • Open Access

    ARTICLE

    Application of Self-Organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion Detection

    Ling Tan1,*, Chong Li2, Jingming Xia2, Jun Cao3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 275-288, 2019, DOI:10.32604/cmc.2019.03735

    Abstract Due to the widespread use of the Internet, customer information is vulnerable to computer systems attack, which brings urgent need for the intrusion detection technology. Recently, network intrusion detection has been one of the most important technologies in network security detection. The accuracy of network intrusion detection has reached higher accuracy so far. However, these methods have very low efficiency in network intrusion detection, even the most popular SOM neural network method. In this paper, an efficient and fast network intrusion detection method was proposed. Firstly, the fundamental of the two different methods are introduced respectively. Then, the self-organizing feature… More >

  • Open Access

    ARTICLE

    Adaptive Median Filtering Algorithm Based on Divide and Conquer and Its Application in CAPTCHA Recognition

    Wentao Ma1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Yuanjing Luo1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 665-677, 2019, DOI:10.32604/cmc.2019.05683

    Abstract As the first barrier to protect cyberspace, the CAPTCHA has made significant contributions to maintaining Internet security and preventing malicious attacks. By researching the CAPTCHA, we can find its vulnerability and improve the security of CAPTCHA. Recently, many studies have shown that improving the image preprocessing effect of the CAPTCHA, which can achieve a better recognition rate by the state-of-the-art machine learning algorithms. There are many kinds of noise and distortion in the CAPTCHA images of this experiment. We propose an adaptive median filtering algorithm based on divide and conquer in this paper. Firstly, the filtering window data quickly sorted… More >

  • Open Access

    ARTICLE

    Optimization Algorithm for Reduction the Size of Dixon Resultant Matrix: A Case Study on Mechanical Application

    Shang Zhang1, *, Seyedmehdi Karimi2, Shahaboddin Shamshirband3, 4, *, Amir Mosavi5,6

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 567-583, 2019, DOI:10.32604/cmc.2019.02795

    Abstract In the process of eliminating variables in a symbolic polynomial system, the extraneous factors are referred to the unwanted parameters of resulting polynomial. This paper aims at reducing the number of these factors via optimizing the size of Dixon matrix. An optimal configuration of Dixon matrix would lead to the enhancement of the process of computing the resultant which uses for solving polynomial systems. To do so, an optimization algorithm along with a number of new polynomials is introduced to replace the polynomials and implement a complexity analysis. Moreover, the monomial multipliers are optimally positioned to multiply each of the… More >

  • Open Access

    ARTICLE

    The Application of BP Neural Networks to Analysis the National Vulnerability

    Guodong Zhao1, Yuewei Zhang1, Yiqi Shi2, Haiyan Lan1,*, Qing Yang3

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 421-436, 2019, DOI:10.32604/cmc.2019.03782

    Abstract Climate change is the main factor affecting the country’s vulnerability, meanwhile, it is also a complicated and nonlinear dynamic system. In order to solve this complex problem, this paper first uses the analytic hierarchy process (AHP) and natural breakpoint method (NBM) to implement an AHP-NBM comprehensive evaluation model to assess the national vulnerability. By using ArcGIS, national vulnerability scores are classified and the country’s vulnerability is divided into three levels: fragile, vulnerable, and stable. Then, a BP neural network prediction model which is based on multivariate linear regression is used to predict the critical point of vulnerability. The function of… More >

  • Open Access

    ARTICLE

    Improve Computer Visualization of Architecture Based on the Bayesian Network

    Tao Shen1,*, Yukari Nagai1, Chan Gao2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 307-318, 2019, DOI:10.32604/cmc.2019.04876

    Abstract Computer visualization has marvelous effects when it is applied in various fields, especially in architectural design. As an emerging force in the innovation industry, architects and design agencies have already demonstrated the value of architectural visual products in actual application projects. Based on the digital image technology, virtual presentation of future scenes simulates architecture design, architectural renderings and multimedia videos. Therefore, it can help design agencies transform the theoretical design concept into a lively and realistic visual which can provide the audience with a clearer understanding of the engineering and construction projects. However, it is challenging for designers to produce… More >

  • Open Access

    ARTICLE

    Development and Application of Big Data Platform for Garlic Industry Chain

    Weijie Chen1, Guo Feng1, Chao Zhang1, Pingzeng Liu1,*, Wanming Ren2, Ning Cao3, Jianrui Ding4

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 229-248, 2019, DOI:10.32604/cmc.2019.03743

    Abstract In order to effectively solve the problems which affect the stable and healthy development of garlic industry, such as the uncertainty of the planting scale and production data, the influence factors of price fluctuation is difficult to be accurately analyzed, the difficult to predict the trend of price change, the uncertainty of the market concentration, and the difficulty of the short-term price prediction etc. the big data platform of the garlic industry chain has been developed. Combined with a variety of data acquisition technology, the information collection of influencing factors for garlic industry chain is realized. Based on the construction… More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased and it is more suitable… More >

Displaying 901-910 on page 91 of 928. Per Page