Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (936)
  • Open Access

    ARTICLE

    Simulation of Pollutants Dispersion in the Bay of Tangier (Morocco)

    A. Belcaid1,2, G. Le Palec2, A. Draoui1, Ph. Bournot1

    FDMP-Fluid Dynamics & Materials Processing, Vol.8, No.2, pp. 241-256, 2012, DOI:10.3970/fdmp.2012.008.241

    Abstract The study is focused on numerical simulation of the process of coastal pollution by wastewater in the Bay of Tangier in Morocco. The process is governed by flows generated by the tide and the large variations of the discharges from the different Wadis (rivers) flowing into the bay. The simulation requires a number of tests and trials, something that is experimentally expensive and sometimes impossible. Hence the idea was developed of a numerical study aimed at tracking the dispersion of pollutants into the bay and determining the level of degradation of its waters. The simulation was done using the computer… More >

  • Open Access

    ARTICLE

    Effect of Large Eccentric Rotation on the Stability of Liquid Bridges

    A. Laverón-Simavilla1, V. Lapuerta1, J. Rodríguez1, M. A. González1

    FDMP-Fluid Dynamics & Materials Processing, Vol.3, No.4, pp. 339-348, 2007, DOI:10.3970/fdmp.2007.003.339

    Abstract A cylindrical liquid bridge supported between two circular-shaped disks in isorotation is considered. The effect of an offset between the rotation axis and the axis of the two supporting disks (eccentricity) on the stability of the liquid bridge is investigated. In a previous work a numerical method used to determine the stability limit for different values of eccentricity was validated comparing these results with analytical and experimental results for small eccentricity values, recovering the same behavior. In this work we use the numerical method to extend the analysis to large values of the eccentricity, finding a change in the bifurcation… More >

  • Open Access

    ARTICLE

    A simple and accurate four-node quadrilateral element using stabilized nodal integration for laminated plates

    H. Nguyen-Van1, N. Mai Duy2, T. Tran-Cong 3

    CMC-Computers, Materials & Continua, Vol.6, No.3, pp. 159-176, 2007, DOI:10.3970/cmc.2007.006.159

    Abstract This paper reports the development of a simple but efficient and accurate four-node quadrilateral element for models of laminated, anisotropic plate behaviour within the framework of the first-order shear deformation theory. The approach incorporates the strain smoothing method for mesh-free conforming nodal integration into the conventional finite element techniques. The membrane-bending part of the element stiffness matrix is calculated by the line integral on the boundaries of the smoothing elements while the shear part is performed using an independent interpolation field in the natural co-ordinate system. Numerical results show that the element offered here is locking-free for extremely thin laminates,… More >

  • Open Access

    ARTICLE

    A Novel Improved Bat Algorithm in UAV Path Planning

    Na Lin1, Jiacheng Tang1, Xianwei Li2,3, Liang Zhao1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 323-344, 2019, DOI:10.32604/cmc.2019.05674

    Abstract Path planning algorithm is the key point to UAV path planning scenario. Many traditional path planning methods still suffer from low convergence rate and insufficient robustness. In this paper, three main methods are contributed to solving these problems. First, the improved artificial potential field (APF) method is adopted to accelerate the convergence process of the bat’s position update. Second, the optimal success rate strategy is proposed to improve the adaptive inertia weight of bat algorithm. Third chaos strategy is proposed to avoid falling into a local optimum. Compared with standard APF and chaos strategy in UAV path planning scenarios, the… More >

  • Open Access

    ARTICLE

    Design of Working Model of Steering, Accelerating and Braking Control for Autonomous Parking Vehicle

    P. K. Shyamshankar1, S. Rajendraboopathy2, R. S. Bhuvaneswaran1,*

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 55-68, 2019, DOI:10.32604/cmc.2019.07761

    Abstract Now a days, the number of vehicles especially cars are increased day by day and the people expect sophistication with safety and they wish automation for the perfection by reducing their effort and to prevent damage from collision of the vehicle. Parking the vehicle has always been a big task for the drivers that lead to problems such as traffic, congestion, accident, pollution etc. In order to overcome the parking problem, an automatic steering, braking and accelerating system is proposed to park a vehicle in a stipulated area and also to enhance the parking in a safety and secured way.… More >

  • Open Access

    ARTICLE

    High Precision SAR ADC Using CNTFET for Internet of Things

    V. Gowrishankar1,*, K. Venkatachalam1

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 947-957, 2019, DOI:10.32604/cmc.2019.07749

    Abstract A high precision 10-bit successive approximation register analog to digital converter (ADC) designed and implemented in 32nm CNTFET process technology at the supply of 0.6V, with 73.24 dB SNDR at a sampling rate of 640 MS/s with the average power consumption of 120.2 μW for the Internet of things node. The key components in CNTFET SAR ADCs are binary scaled charge redistribution digital to analog converter using MOS capacitors, CNTFET based dynamic latch comparator and simple SAR digital code error correction logic. These techniques are used to increase the sampling rate and precision while ensuring the linearity, power consumption and… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

    Xin Jiang1, Mingzhe Liu1,*, Chen Yang1, Yanhua Liu1, Ruili Wang2

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 45-59, 2019, DOI:10.32604/cmc.2019.03863

    Abstract In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed. However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system. This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication. This method takes the user’s authentication request as a transaction, considers all the authentication records in the mesh network as the public… More >

  • Open Access

    ARTICLE

    ia-PNCC: Noise Processing Method for Underwater Target Recognition Convolutional Neural Network

    Nianbin Wang1, Ming He1,2, Jianguo Sun1,*, Hongbin Wang1, Lianke Zhou1, Ci Chu1, Lei Chen3

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 169-181, 2019, DOI:10.32604/cmc.2019.03709

    Abstract Underwater target recognition is a key technology for underwater acoustic countermeasure. How to classify and recognize underwater targets according to the noise information of underwater targets has been a hot topic in the field of underwater acoustic signals. In this paper, the deep learning model is applied to underwater target recognition. Improved anti-noise Power-Normalized Cepstral Coefficients (ia-PNCC) is proposed, based on PNCC applied to underwater noises. Multitaper and normalized Gammatone filter banks are applied to improve the anti-noise capacity. The method is combined with a convolutional neural network in order to recognize the underwater target. Experiment results show that the… More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased and it is more suitable… More >

  • Open Access

    ARTICLE

    Inverted XML Access Control Model Based on Ontology Semantic Dependency

    Meijuan Wang1,2,*, Jian Wang1, Lihong Guo1,3, Lein Harn4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 465-482, 2018, DOI: 10.3970/cmc.2018.02568

    Abstract In the era of big data, the conflict between data mining and data privacy protection is increasing day by day. Traditional information security focuses on protecting the security of attribute values without semantic association. The data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive information. Considering the semantic association, reasonable security access for privacy protect is required. Semi-structured and self-descriptive XML (eXtensible Markup Language) has become a common form of data organization for database management in big data environments. Based on the semantic integration nature of XML data, this paper… More >

Displaying 911-920 on page 92 of 936. Per Page