Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17,350)
  • Open Access

    ARTICLE

    Research on Fatigue Damage Behavior of Main Beam Sub-Structure of Composite Wind Turbine Blade

    Haixia Kou1,*, Bowen Yang1, Xuyao Zhang2, Xiaobo Yang1, Haibo Zhao1

    Structural Durability & Health Monitoring, Vol.18, No.3, pp. 277-297, 2024, DOI:10.32604/sdhm.2024.045023

    Abstract Given the difficulty in accurately evaluating the fatigue performance of large composite wind turbine blades (referred to as blades), this paper takes the main beam structure of the blade with a rectangular cross-section as the simulation object and establishes a composite laminate rectangular beam structure that simultaneously includes the flange, web, and adhesive layer, referred to as the blade main beam sub-structure specimen, through the definition of blade sub-structures. This paper examines the progressive damage evolution law of the composite laminate rectangular beam utilizing an improved 3D Hashin failure criterion, cohesive zone model, B-K failure criterion, and computer simulation technology.… More > Graphic Abstract

    Research on Fatigue Damage Behavior of Main Beam Sub-Structure of Composite Wind Turbine Blade

  • Open Access

    ARTICLE

    Numerical Exploration of Asymmetrical Impact Dynamics: Unveiling Nonlinearities in Collision Problems and Resilience of Reinforced Concrete Structures

    AL-Bukhaiti Khalil1, Yanhui Liu1,*, Shichun Zhao1, Daguang Han2

    Structural Durability & Health Monitoring, Vol.18, No.3, pp. 223-254, 2024, DOI:10.32604/sdhm.2024.044751

    Abstract This study provides a comprehensive analysis of collision and impact problems’ numerical solutions, focusing on geometric, contact, and material nonlinearities, all essential in solving large deformation problems during a collision. The initial discussion revolves around the stress and strain of large deformation during a collision, followed by explanations of the fundamental finite element solution method for addressing such issues. The hourglass mode’s control methods, such as single-point reduced integration and contact-collision algorithms are detailed and implemented within the finite element framework. The paper further investigates the dynamic response and failure modes of Reinforced Concrete (RC) members under asymmetrical impact using… More >

  • Open Access

    REVIEW

    A Review of NILM Applications with Machine Learning Approaches

    Maheesha Dhashantha Silva*, Qi Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2971-2989, 2024, DOI:10.32604/cmc.2024.051289

    Abstract In recent years, Non-Intrusive Load Monitoring (NILM) has become an emerging approach that provides affordable energy management solutions using aggregated load obtained from a single smart meter in the power grid. Furthermore, by integrating Machine Learning (ML), NILM can efficiently use electrical energy and offer less of a burden for the energy monitoring process. However, conducted research works have limitations for real-time implementation due to the practical issues. This paper aims to identify the contribution of ML approaches to developing a reliable Energy Management (EM) solution with NILM. Firstly, phases of the NILM are discussed, along with the research works… More >

  • Open Access

    ARTICLE

    Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence

    Xiong Zhang1,2, Minqing Zhang1,2,3,*, Xu An Wang1,2,3, Wen Jiang1,2, Chao Jiang1,2, Pan Yang1,4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1925-1938, 2024, DOI:10.32604/cmc.2024.050899

    Abstract This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission. The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission. The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data. This process effectively enhances the concealment and imperceptibility of confidential information, thereby improving the security of such information during transmission and reducing security risks. Furthermore, we… More >

  • Open Access

    ARTICLE

    Prediction of the Pore-Pressure Built-Up and Temperature of Fire-Loaded Concrete with Pix2Pix

    Xueya Wang1, Yiming Zhang2,3,*, Qi Liu4, Huanran Wang1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2907-2922, 2024, DOI:10.32604/cmc.2024.050736

    Abstract Concrete subjected to fire loads is susceptible to explosive spalling, which can lead to the exposure of reinforcing steel bars to the fire, substantially jeopardizing the structural safety and stability. The spalling of fire-loaded concrete is closely related to the evolution of pore pressure and temperature. Conventional analytical methods involve the resolution of complex, strongly coupled multifield equations, necessitating significant computational efforts. To rapidly and accurately obtain the distributions of pore-pressure and temperature, the Pix2Pix model is adopted in this work, which is celebrated for its capabilities in image generation. The open-source dataset used herein features RGB images we generated… More >

  • Open Access

    ARTICLE

    Relational Turkish Text Classification Using Distant Supervised Entities and Relations

    Halil Ibrahim Okur1,2,*, Kadir Tohma1, Ahmet Sertbas2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2209-2228, 2024, DOI:10.32604/cmc.2024.050585

    Abstract Text classification, by automatically categorizing texts, is one of the foundational elements of natural language processing applications. This study investigates how text classification performance can be improved through the integration of entity-relation information obtained from the Wikidata (Wikipedia database) database and BERT-based pre-trained Named Entity Recognition (NER) models. Focusing on a significant challenge in the field of natural language processing (NLP), the research evaluates the potential of using entity and relational information to extract deeper meaning from texts. The adopted methodology encompasses a comprehensive approach that includes text preprocessing, entity detection, and the integration of relational information. Experiments conducted on… More >

  • Open Access

    ARTICLE

    Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives

    Maher Alharby*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2449-2463, 2024, DOI:10.32604/cmc.2024.050425

    Abstract Cloud computing has emerged as a viable alternative to traditional computing infrastructures, offering various benefits. However, the adoption of cloud storage poses significant risks to data secrecy and integrity. This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology, smart contracts, and cryptographic primitives. The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data. To preserve data secrecy, symmetric encryption systems are employed to encrypt user data before outsourcing it. An extensive performance analysis is conducted to… More >

  • Open Access

    ARTICLE

    Enhanced Hybrid Equilibrium Strategy in Fog-Cloud Computing Networks with Optimal Task Scheduling

    Muchang Rao, Hang Qin*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2647-2672, 2024, DOI:10.32604/cmc.2024.050380

    Abstract More devices in the Intelligent Internet of Things (AIoT) result in an increased number of tasks that require low latency and real-time responsiveness, leading to an increased demand for computational resources. Cloud computing’s low-latency performance issues in AIoT scenarios have led researchers to explore fog computing as a complementary extension. However, the effective allocation of resources for task execution within fog environments, characterized by limitations and heterogeneity in computational resources, remains a formidable challenge. To tackle this challenge, in this study, we integrate fog computing and cloud computing. We begin by establishing a fog-cloud environment framework, followed by the formulation… More >

  • Open Access

    ARTICLE

    Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms

    Zhenxiang He*, Zhenyu Zhao, Ke Chen, Yanlin Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3023-3045, 2024, DOI:10.32604/cmc.2024.050281

    Abstract The fast-paced development of blockchain technology is evident. Yet, the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain ecosystem. Conventional smart contract vulnerability detection primarily relies on static analysis tools, which are less efficient and accurate. Although deep learning methods have improved detection efficiency, they are unable to fully utilize the static relationships within contracts. Therefore, we have adopted the advantages of the above two methods, combining feature extraction mode of tools with deep learning techniques. Firstly, we have constructed corresponding feature extraction mode for different vulnerabilities, which are used… More >

  • Open Access

    ARTICLE

    A Novel Approach to Energy Optimization: Efficient Path Selection in Wireless Sensor Networks with Hybrid ANN

    Muhammad Salman Qamar1,*, Ihsan ul Haq1, Amil Daraz2, Atif M. Alamri3, Salman A. AlQahtani4, Muhammad Fahad Munir1

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2945-2970, 2024, DOI:10.32604/cmc.2024.050168

    Abstract In pursuit of enhancing the Wireless Sensor Networks (WSNs) energy efficiency and operational lifespan, this paper delves into the domain of energy-efficient routing protocols. In WSNs, the limited energy resources of Sensor Nodes (SNs) are a big challenge for ensuring their efficient and reliable operation. WSN data gathering involves the utilization of a mobile sink (MS) to mitigate the energy consumption problem through periodic network traversal. The mobile sink (MS) strategy minimizes energy consumption and latency by visiting the fewest nodes or pre-determined locations called rendezvous points (RPs) instead of all cluster heads (CHs). CHs subsequently transmit packets to neighboring… More >

Displaying 21-30 on page 3 of 17350. Per Page