Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,946)
  • Open Access

    ARTICLE

    Investigation in the Effects of Configuration Parameters on the Thermal Behavior of Novel Conical Friction Plate in Continuously Sliding Condition

    Yanzhong Wang1, Xiangyu Wu1,*

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 353-363, 2018, DOI: 10.3970/cmc.2018.03714

    Abstract To investigate the effects of configuration parameters and operation condition on the thermal behavior of novel conical friction plate, a three-dimensional finite element model of conical friction plate is established for numerical simulation. The conical surface configuration and friction heat generation of novel conical friction surfaces are discussed. The results indicate that the thermal behavior of the conical friction plate during continuously sliding period is influenced by the conical surface configuration. Maximum temperature occurs in the conical friction plate with cone angle of 24°. The maximum temperature value of friction plate is increased 7.4°C, when cone depth increases from 3… More >

  • Open Access

    ARTICLE

    RETRACTED: Mitigating Content Caching Attack in NDN

    Zhiqiang Ruan1,*, Haibo Luo1, Wenzhong Lin1, Jie Wang2

    CMC-Computers, Materials & Continua, Vol.56, No.3, pp. 483-499, 2018, DOI: 10.3970/cmc.2018.03687

    Abstract Content caching is a core component in Named Data Networking (NDN), where content is cached in routers and served for future requests. However, the adversary can launch verification attack by placing poisoned data into the network with a legitimate name and allow the routers in the delivery path to frequently identify the content. Since NDN employs digital signature on each piece of content, verifying all content will exhaust routers’ computational resources due to the massive data in the network. In this paper, we propose a selective verification scheme upon the contents that are hit in the content store and allow… More >

  • Open Access

    ARTICLE

    An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection

    Yue Zhang1, Dengpan Ye2, Junjun Gan1, Zhenyu Li3, Qingfeng Cheng1,*

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 151-167, 2018, DOI: 10.3970/cmc.2018.02464

    Abstract In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method, this paper proposes an image steganography algorithm based on quantization index modulation resisting both scaling attacks and statistical detection. For the spatial image, this paper uses the watermarking algorithm based on quantization index modulation to extract the embedded domain. Then construct the embedding distortion function of the new embedded domain based on S-UNIWARD steganography, and use the minimum distortion coding to realize the embedding of the secret messages.… More >

  • Open Access

    ARTICLE

    A Novel Quantum Stegonagraphy Based on Brown States

    Zhiguo Qu1,*, Tiancheng Zhu2, Jinwei Wang1, Xiaojun Wang3

    CMC-Computers, Materials & Continua, Vol.56, No.1, pp. 47-59, 2018, DOI: 10.3970/cmc.2018.02215

    Abstract In this paper, a novel quantum steganography protocol based on Brown entangled states is proposed. The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states. Comparing with the previous quantum steganography algorithms, the new protocol focuses on its anti-noise capability for the phase-flip noise, which proved its good security resisting on quantum noise. Furthermore, the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good imperceptibility. If the number of… More >

  • Open Access

    ARTICLE

    Experiment and Simulation for Controlling Propagation Direction of Hydrofracture By Multi-Boreholes Hydraulic Fracturing

    Chenpeng Song1,2, Yulong Chen3,*, Jiehao Wang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.3, pp. 779-797, 2019, DOI:10.32604/cmes.2019.07000

    Abstract Hydraulic fracturing has been applied to enhance CBM production and prevent gas dynamical hazard in underground coal mines in China. However, affected by in situ stress orientation, hydrofracture can hardly continuously propagate within coal seam but may easily extend to the adjacent roof-floor strata, causing ineffective permeability enhancement in coal seam and increasing the risk of gas transfinite during mining coal. Thus, it is very necessary to artificially control the propagation direction of hydrofracture and make it well-aligned in large scale in coal seam. In this study, a method for controlling propagation direction of hydrofracture by multi-boreholes is investigated by… More >

  • Open Access

    ARTICLE

    Probabilistic Performance-Based Optimum Seismic Design Framework: Illustration and Validation

    Yong Li1,*, Joel P. Conte2, Philip E. Gill3

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.3, pp. 517-543, 2019, DOI:10.32604/cmes.2019.06269

    Abstract In the field of earthquake engineering, the advent of the performance-based design philosophy, together with the highly uncertain nature of earthquake ground excitations to structures, has brought probabilistic performance-based design to the forefront of seismic design. In order to design structures that explicitly satisfy probabilistic performance criteria, a probabilistic performance-based optimum seismic design (PPBOSD) framework is proposed in this paper by extending the state-of-the-art performance-based earthquake engineering (PBEE) methodology. PBEE is traditionally used for risk evaluation of existing or newly designed structural systems, thus referred to herein as forward PBEE analysis. In contrast, its use for design purposes is limited… More >

  • Open Access

    ARTICLE

    Region-Aware Trace Signal Selection Using Machine Learning Technique for Silicon Validation and Debug

    R. Agalya1, R. Muthaiah2,*, D. Muralidharan3

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.1, pp. 25-43, 2019, DOI:10.32604/cmes.2019.05616

    Abstract In today’s modern design technology, post-silicon validation is an expensive and composite task. The major challenge involved in this method is that it has limited observability and controllability of internal signals. There will be an issue during execution how to address the useful set of signals and store it in the on-chip trace buffer. The existing approaches are restricted to particular debug set-up where all the components have equivalent prominence at all the time. Practically, the verification engineers will emphasis only on useful functional regions or components. Due to some constraints like clock gating, some of the regions can be… More >

  • Open Access

    ARTICLE

    On Hiding Secret Information in Medium Frequency DCT Components Using Least Significant Bits Steganography

    Sahib Khan1,*, M A Irfan1, Arslan Arif1, Syed Tahir Hussain Rizvi2, Asma Gul3, Muhammad Naeem4, Nasir Ahmad5

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.3, pp. 529-546, 2019, DOI:10.31614/cmes.2019.06179

    Abstract This work presents a new method of data hiding in digital images, in discrete cosine transform domain. The proposed method uses the least significant bits of the medium frequency components of the cover image for hiding the secret information, while the low and high frequency coefficients are kept unaltered. The unaltered low frequency DCT coefficients preserves the quality of the smooth region of the cover image, while no changes in the high DCT coefficient preserve the quality of the edges. As the medium frequency components have less contribution towards energy and image details, so the modification of these coefficients for… More >

  • Open Access

    ARTICLE

    Dynamic Fracture Analysis for Shale Material by Peridynamic Modelling

    Zhanqi Cheng1, Zhenyu Wang1, Zhongtao Luo2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.3, pp. 509-527, 2019, DOI:10.31614/cmes.2019.04339

    Abstract In this work, a bond-based peridynamics (PD) model was built to analyze the dynamic fracture of shale material. Both the the convergence studies and the result of dynamic crack propagation were presented. As well-known, crack propagation, aggregation, and bifurcation play an critical role in the failure analysis of brittle materials such as shale. The dynamic crack propagation and branching analysis of shale by using the PD method were discussed. Firstly, the valid and accuracy of the PD model for the rock materials was verified by comparing with the existed numerical results. Secondly, we discussed the convergence both with uniform grid… More >

  • Open Access

    ARTICLE

    Estimating the Properties of Ground-Waste-Brick Mortars Using DNN and ANN

    Abdulkadir Karaci1,*, Hasbi Yaprak2, Osman Ozkaraca3, Ilhami Demir4, Osman Simsek5

    CMES-Computer Modeling in Engineering & Sciences, Vol.118, No.1, pp. 207-228, 2019, DOI:10.31614/cmes.2019.04216

    Abstract In this study, deep-neural-network (DNN)- and artificial-neural-network (ANN)-based models along with regression models have been developed to estimate the pressure, bending and elongation values of ground-brick (GB)-added mortar samples. This study is aimed at utilizing GB as a mineral additive in concrete in the ratios 0.0%, 2.5%, 5.0%, 7.5%, 10.0%, 12.5% and 15.0%. In this study, 756 mortar samples were produced for 84 different series and were cured in tap water (W), 5% sodium sulphate solution (SS5) and 5% ammonium nitrate solution (AN5) for 7 days, 28 days, 90 days and 180 days. The developed DNN models have three inputs… More >

Displaying 2501-2510 on page 251 of 2946. Per Page