Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (77)
  • Open Access

    ARTICLE

    Spectral Solutions of Linear and Nonlinear BVPs Using Certain Jacobi Polynomials Generalizing Third- and Fourth-Kinds of Chebyshev Polynomials

    W. M. Abd-Elhameed1,2,*, Asmaa M. Alkenedri2

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 955-989, 2021, DOI:10.32604/cmes.2021.013603

    Abstract This paper is dedicated to implementing and presenting numerical algorithms for solving some linear and nonlinear even-order two-point boundary value problems. For this purpose, we establish new explicit formulas for the high-order derivatives of certain two classes of Jacobi polynomials in terms of their corresponding Jacobi polynomials. These two classes generalize the two celebrated non-symmetric classes of polynomials, namely, Chebyshev polynomials of third- and fourth-kinds. The idea of the derivation of such formulas is essentially based on making use of the power series representations and inversion formulas of these classes of polynomials. The derived formulas serve in converting the even-order… More >

  • Open Access

    ARTICLE

    TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators

    Zhengqiu Weng1,2, Timing Chen1,*, Tiantian Zhu1, Hang Dong1, Dan Zhou1, Osama Alfarraj3

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 105-119, 2021, DOI:10.32604/csse.2021.015074

    Abstract Internet traffic encryption is a very common traffic protection method. Most internet traffic is protected by the encryption protocol called transport layer security (TLS). Although traffic encryption can ensure the security of communication, it also enables malware to hide its information and avoid being detected. At present, most of the malicious traffic detection methods are aimed at the unencrypted ones. There are some problems in the detection of encrypted traffic, such as high false positive rate, difficulty in feature extraction, and insufficient practicability. The accuracy and effectiveness of existing methods need to be improved. In this paper, we present TLSmell,… More >

  • Open Access

    ARTICLE

    Numerical Investigation of an Idealized Total Cavopulmonary Connection Physiology Assisted by the Axial Blood Pump With and Without Diffuser

    Zhenxin Zhao1,#, Tong Chen2,#, Xudong Liu3, Shengzhang Wang2,4,*, Haiyan Lu5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.3, pp. 1173-1184, 2020, DOI:10.32604/cmes.2020.013702

    Abstract In order to improve the surgical treatment of the congenital heart disease patient with single ventricle defect, two axial flow blood pumps, one with diffuser and the other without diffuser, were designed and virtually implanted into an idealized total cavopulmonary connection (TCPC) model to form two types of Pump-TCPC physiological structure. Computational fluid dynamics (CFD) simulations were performed to analyze the variations of the hemodynamic characteristics, such as flow field, wall shear stress (WSS), oscillatory shear index (OSI), relative residence time (RRT), between the two Pump-TCPC models. Numerical results indicate that the Pump-TCPC with diffuser has better flow field stability,… More >

  • Open Access

    ARTICLE

    Exploring the Abnormal Brain Regions and Abnormal Functional Connections in SZ by Multiple Hypothesis Testing Techniques

    Lan Yang1, Shun Qi2,3,#, Chen Qiao1,*, Yanmei Kang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 215-237, 2020, DOI:10.32604/cmes.2020.010796

    Abstract Schizophrenia (SZ) is one of the most common mental diseases. Its main characteristics are abnormal social behavior and inability to correctly understand real things. In recent years, the magnetic resonance imaging (MRI) technique has been popularly utilized to study SZ. However, it is still a great challenge to reveal the essential information contained in the MRI data. In this paper, we proposed a biomarker selection approach based on the multiple hypothesis testing techniques to explore the difference between SZ and healthy controls by using both functional and structural MRI data, in which biomarkers represent both abnormal brain functional connectivity and… More >

  • Open Access

    ARTICLE

    Detection of Precipitation Cloud over the Tibet Based on the Improved U-Net

    Runzhe Tao1, *, Yonghong Zhang1, Lihua Wang1, Pengyan Cai1, Haowen Tan2

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2455-2474, 2020, DOI:10.32604/cmc.2020.011526

    Abstract Aiming at the problem of radar base and ground observation stations on the Tibet is sparsely distributed and cannot achieve large-scale precipitation monitoring. UNet, an advanced machine learning (ML) method, is used to develop a robust and rapid algorithm for precipitating cloud detection based on the new-generation geostationary satellite of FengYun-4A (FY-4A). First, in this algorithm, the real-time multi-band infrared brightness temperature from FY-4A combined with the data of Digital Elevation Model (DEM) has been used as predictor variables for our model. Second, the efficiency of the feature was improved by changing the traditional convolution layer serial connection method of… More >

  • Open Access

    CASE REPORT

    Percutaneous Occlusion of Right Partial Anomalous Pulmonary Venous Connection with Dual Drainage to the Innominate Vein and the Left Atrium: A Unique Anatomical Finding

    Alejandro R. Peirone1,*, Alejandro E. Contreras2, Carolina Carrizo2, Mailén Konicoff2, Raúl O. Cayre3

    Congenital Heart Disease, Vol.15, No.4, pp. 267-274, 2020, DOI:10.32604/CHD.2020.013199

    Abstract A 43-year-old woman with a past medical history of aortic coarctation surgically repaired at the age of 3 years using an end-to-end anastomosis, presented with 2 years complain of increasing dyspnea and fatigue with exercise associated to frequent palpitations. During extensive work-up, she was found to have a partial anomalous pulmonary venous connection (PAPVC) with “dual drainage” represented by a communication between the right pulmonary veins draining into the left atrium and the innominate vein via an anomalous vein due to a persistence of early connections between the sinus of the right pulmonary veins and the cardinal veins system in… More >

  • Open Access

    REVIEW

    Review on the Application of Bamboo-Based Materials in Construction Engineering

    Biqing Shu1,2, Zhongping Xiao2, Lu Hong1, Sujun Zhang2, Chen Li2, Naiqiang Fu2, Xiaoning Lu1,*

    Journal of Renewable Materials, Vol.8, No.10, pp. 1215-1242, 2020, DOI:10.32604/jrm.2020.011263

    Abstract Due to the continuously increasing demand for building materials across the world, it is necessary to use renewable materials in place of the existing nonrenewable materials in construction projects. Bamboo is a fast-growing flowering plant that may be used as a renewable material in construction. The use of bamboo in the construction of buildings can improve its long-term carbon fixation capacity and economic benefits. Although bamboo has the advantages of superior performance, low carbon content, high energy-saving and emission-reducing capacity, bamboo is an anisotropic material, which has many factors affecting its material performance, large variability of material performance, lack of… More >

  • Open Access

    ARTICLE

    A Novel Method for Node Connectivity with Adaptive Dragonfly Algorithm and Graph-Based m-Connection Establishment in MANET

    S. B. Manoojkumaar1, *, C. Poongodi2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1649-1670, 2020, DOI:10.32604/cmc.2020.010781

    Abstract Maximizing network lifetime is measured as the primary issue in Mobile Adhoc Networks (MANETs). In geographically routing based models, packet transmission seems to be more appropriate in dense circumstances. The involvement of the Heuristic model directly is not appropriate to offer an effectual solution as it becomes NP-hard issues; therefore investigators concentrate on using Meta-heuristic approaches. Dragonfly Optimization (DFO) is an effective meta-heuristic approach to resolve these problems by providing optimal solutions. Moreover, Meta-heuristic approaches (DFO) turn to be slower in convergence problems and need proper computational time while expanding network size. Thus, DFO is adaptively improved as Adaptive Dragonfly… More >

  • Open Access

    ARTICLE

    Mechanical Behavior of Light Trusses Made of Poplar Laminated Veneer Lumber and Connected with Bolts and Tooth Plates

    Yan Liu1, Yanfei Guo1, Xufeng Sun1,*, Meng Gong2

    Journal of Renewable Materials, Vol.8, No.9, pp. 1111-1127, 2020, DOI:10.32604/jrm.2020.09575

    Abstract Poplar Laminated Veneer Lumber (Poplar LVL) is a new type of engineering materials with high strength, good reliability and small variability. Poplar LVL is manufactured from the fast-growing poplar, which is widely used in packaging, furniture and others, however, is rarely adopted in construction. In order to explore the feasibility of poplar LVL trusses in construction of roof, four 4.5-m-span Fink-and-Howe trusses were designed and assembled, which were made of poplar LVL with bolted- and tooth-plated connections. Vertical static loading on the upper chord joints of a truss was imposed by self-balancing test device. The mechanical properties of trusses were… More >

  • Open Access

    ARTICLE

    Experimental Study on Properties of Masonry Infill Walls Connected to Steel Frames with Different Connection Details

    Mehdi Kahrizi, Mehrzad TahamouliRoudsari*

    Structural Durability & Health Monitoring, Vol.14, No.2, pp. 165-185, 2020, DOI:10.32604/sdhm.2020.07816

    Abstract The properties of infills and the way they are connected to frames may have significant effects on the seismic behavior of the structure. This study presents an experimental study on evaluation and testing of five single story, single bay samples with the scale 1:3. This study strives to evaluate the behavior of masonry infill walls encased in steel frames, with emphasis on different details of the connection of the wall to the frame. Four frames with masonry infills and one frame without infill are experimented on by applying lateral load to their upper beams. Different details of the connection between… More >

Displaying 51-60 on page 6 of 77. Per Page