Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (35)
  • Open Access

    ARTICLE

    A Probabilistic Approach to Hazard Mapping Based on Computer Simulations. An Example for Lava Flows at Mount Etna

    R. Rongo1,2, D. D’Ambrosio1,2, G. Iovine2,3, F. Lucà4, V. Lupiano5, V.P.Boñgolan6, W. Spataro1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.109-110, No.2, pp. 105-130, 2015, DOI:10.3970/cmes.2015.109.105

    Abstract Determining sectors that could be affected by lava flows in volcanic areas is essential for risk mitigation purposes. Traditionally, when adopting methods based on probabilistic numerical simulations, the hazard is assessed by analysing a huge set of simulations of hypothetical events, each characterized by a distinct probability of occurrence based on statistics of historical events. If lateral or eccentric eruptions are also taken into account, simulated lava flows usually start from the nodes of regular grids of potential vents, uniformly covering the study area. In this study, an alternative approach to evaluate flow-type hazard, based on a nonuniform grid of… More >

  • Open Access

    ARTICLE

    Mode-III Stress Intensity Factors of a Three-Phase Composite with an Eccentric Circular Inclusion

    C.K. Chao1, A. Wikarta1

    CMES-Computer Modeling in Engineering & Sciences, Vol.84, No.5, pp. 439-458, 2012, DOI:10.3970/cmes.2012.084.439

    Abstract An analytical solution to a three-phase composite with an eccentric circular inclusion under a remote uniform shear load is given in this work. Mode-III stress intensity factors for an arbitrarily oriented crack embedded in an infinite matrix or a core inclusion are provided in this paper. Based on the method of analytical continuation in conjunction with the alternating technique, the solution for a screw dislocation located either in the core inclusion or in the infinite matrix is first derived in a series form. The integral equations with logarithmic singular kernels for a line crack are established by using the screw… More >

  • Open Access

    ARTICLE

    Local Moving Least Square - One-Dimensional IRBFN Technique: Part I - Natural Convection Flows in Concentric and Eccentric Annuli

    D. Ngo-Cong1,2, N. Mai-Duy1, W. Karunasena2, T. Tran-Cong1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.83, No.3, pp. 275-310, 2012, DOI:10.3970/cmes.2012.083.275

    Abstract In this paper, natural convection flows in concentric and eccentric annuli are studied using a new numerical method, namely local moving least square - one dimensional integrated radial basis function networks (LMLS-1D-IRBFN). The partition of unity method is used to incorporate the moving least square (MLS) and one dimensional-integrated radial basis function (1D-IRBFN) techniques in an approach that leads to sparse system matrices and offers a high level of accuracy as in the case of 1D-IRBFN method. The present method possesses a Kronecker-Delta function property which helps impose the essential boundary condition in an exact manner. The method is first… More >

  • Open Access

    ARTICLE

    Effect of Large Eccentric Rotation on the Stability of Liquid Bridges

    A. Laverón-Simavilla1, V. Lapuerta1, J. Rodríguez1, M. A. González1

    FDMP-Fluid Dynamics & Materials Processing, Vol.3, No.4, pp. 339-348, 2007, DOI:10.3970/fdmp.2007.003.339

    Abstract A cylindrical liquid bridge supported between two circular-shaped disks in isorotation is considered. The effect of an offset between the rotation axis and the axis of the two supporting disks (eccentricity) on the stability of the liquid bridge is investigated. In a previous work a numerical method used to determine the stability limit for different values of eccentricity was validated comparing these results with analytical and experimental results for small eccentricity values, recovering the same behavior. In this work we use the numerical method to extend the analysis to large values of the eccentricity, finding a change in the bifurcation… More >

  • Open Access

    ARTICLE

    Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications

    V. Gopinath1, R. S. Bhuvaneswaran2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 341-352, 2018, DOI:10.32604/cmc.2018.04006

    Abstract Cloud computing is the highly demanded technology nowadays. Due to the service oriented architecture, seamless accessibility and other advantages of this advent technology, many transaction rich applications are making use of it. At the same time, it is vulnerable to hacks and threats. Hence securing this environment is of at most important and many research works are being reported focusing on it. This paper proposes a safe storage mechanism using Elliptic curve cryptography (ECC) for the Transaction Rich Applications (TRA). With ECC based security scheme, the security level of the protected system will be increased and it is more suitable… More >

Displaying 31-40 on page 4 of 35. Per Page