Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (792)
  • Open Access

    ARTICLE

    Numerical Optimization Algorithm for Unsteady Flows of Rotor Based on Web Service

    Jilin Zhang1,4,5, Xuechao Liu1,5, Jian Wan2,1,5, Yongjian Ren1,5, Binglin Xu1,5, Jianfan He1,5, Yuchen Fan1,5, Li Zhou1,5, Zhenguo Wei6, Juncong Zhang6, Jue Wang3

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 527-546, 2019, DOI:10.31209/2019.100000109

    Abstract A numerical optimization algorithm for unsteady flows of rotor based on web service is proposed. Space discretization uses the finite volume method, time discretization uses the implicit dual-time steps method, and turbulence model uses the Spalart–Allmaras (S–A) model. In order to efficiently use the computing resources of the cluster, a service-oriented service computing architecture is used in a parallel computing service program. In order to realize the load balance of hybrid grid partition, the grid is partitioned by Metis Library. Meanwhile, data communication based on Message Passing Interface (MPI) technology guarantees the consistency of convergence between parallel algorithm and serial… More >

  • Open Access

    ARTICLE

    Realization of Internet of Things Smart Appliances

    Jia‐Shing Sheua, I‐Chen Chenb, Yi‐Syong Liaoa

    Intelligent Automation & Soft Computing, Vol.25, No.2, pp. 395-404, 2019, DOI:10.31209/2019.100000101

    Abstract This study proposed a household energy state monitoring system (HESMS) and a household energy load monitoring system (HELMS) for monitoring smart appliances. The HESMS applies reinforcement learning to receive changes in the external environment and the state of an electrical appliance, determines if the electrical appliance should be turned on, and controls the signals sent to the HELMS according to these decisions. The HELMS implements an ON/OFF control mechanism for household appliances according to the control signals and the power consumption state. The proposed systems are based on the wireless communication network and can monitor household appliances’ energy usage, control… More >

  • Open Access

    ARTICLE

    Trust Provision in the Internet of Things Using Transversal Blockchain Networks

    Borja Bordela, Ramon Alcarriab, Diego Martína, Álvaro Sánchez-Picota

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 155-170, 2019, DOI:10.31209/2018.100000052

    Abstract The Internet-of-Things (IoT) paradigm faces new and genuine challenges and problems associated, mainly, with the ubiquitous access to the Internet, the huge number of devices involved and the heterogeneity of the components making up this new global network. In this context, protecting these systems against cyberattacks and cybercrimes has turn into a basic issue. In relation to this topic, most proposed solutions in the literature are focused on security; however other aspects have to be considered (such as privacy or trust). Therefore, in this paper we define a theoretical framework for trust in IoT scenarios, including a mathematical formalization and… More >

  • Open Access

    ARTICLE

    Automated Dimensioning Method of Engineering Drawings for Mechanical Products Based on Curve Chain

    Gui Li1, *, Peng Yang2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 847-863, 2020, DOI:10.32604/cmc.2020.011398

    Abstract An automated method based on the curve chain was proposed for dimensioning of engineering drawings for the mechanical products. According to the internal relation between the features of 3D model feature and elements of 2D drawing, the curve chain was established to reflect the geometric topological structure between the elements. It divides the dimensions into the absolute dimensions within the cure chain and the relative dimensions between the curve chains. The parallel and lengthy relationship between the drawing elements of the constructed X and Y parallel matrix was solved to remove redundant elements in the curve chain and labeled the… More >

  • Open Access

    ARTICLE

    Semi-GSGCN: Social Robot Detection Research with Graph Neural Network

    Xiujuan Wang1, Qianqian Zheng1, *, Kangfeng Zheng2, Yi Sui1, Jiayue Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 617-638, 2020, DOI:10.32604/cmc.2020.011165

    Abstract Malicious social robots are the disseminators of malicious information on social networks, which seriously affect information security and network environments. Efficient and reliable classification of social robots is crucial for detecting information manipulation in social networks. Supervised classification based on manual feature extraction has been widely used in social robot detection. However, these methods not only involve the privacy of users but also ignore hidden feature information, especially the graph feature, and the label utilization rate of semi-supervised algorithms is low. Aiming at the problems of shallow feature extraction and low label utilization rate in existing social network robot detection… More >

  • Open Access

    ARTICLE

    A New Finite Element Model with Manufactured Error for Additive Manufacturing

    Zhaohui Xia1,2, Zhihao He2, Qifu Wang1, Yingjun Wang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.2, pp. 703-720, 2020, DOI:10.32604/cmes.2020.010368

    Abstract Additive manufacturing (AM), adding materials layer by layer, can be used to produce objects of almost any shape or geometry. However, AM techniques cannot accurately build parts with large overhangs, especially for the large features close to horizontal, hanging over the void. The overhangs will make the manufactured model deviate from the design model, which will result in the performance of the manufactured model that cannot satisfy the design requirements. In this paper, we will propose a new finite element (FE) analysis model that includes the manufacturing errors by mimicking the AM layer by layer construction process. In such FE… More >

  • Open Access

    ARTICLE

    A Cross Layer Protocol for Fast Identification of Blocked Tags in Large-Scale RFID Systems

    Chu Chu1, Zhong Huang1, Rui Xu1, Guangjun Wen1, *, Lilan Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1705-1724, 2020, DOI:10.32604/cmc.2020.010190

    Abstract Blocker tag attack is one of the denial-of-service (DoS) attacks that threatens the privacy and security of RFID systems. The attacker interferes with the blocked tag by simulating a fake tag with the same ID, thus causing a collision of message replies. In many practical scenarios, the number of blocked tags may vary, or even be small. For example, the attacker may only block the important customers or high-value items. To avoid the disclosure of privacy and economic losses, it is of great importance to fast pinpoint these blocked ones. However, existing works do not take into account the impact… More >

  • Open Access

    ARTICLE

    What is Discussed about COVID-19: A Multi-Modal Framework for Analyzing Microblogs from Sina Weibo without Human Labeling

    Hengyang Lu1, *, Yutong Lou2, Bin Jin2, Ming Xu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1453-1471, 2020, DOI:10.32604/cmc.2020.011270

    Abstract Starting from late 2019, the new coronavirus disease (COVID-19) has become a global crisis. With the development of online social media, people prefer to express their opinions and discuss the latest news online. We have witnessed the positive influence of online social media, which helped citizens and governments track the development of this pandemic in time. It is necessary to apply artificial intelligence (AI) techniques to online social media and automatically discover and track public opinions posted online. In this paper, we take Sina Weibo, the most widely used online social media in China, for analysis and experiments. We collect… More >

  • Open Access

    ARTICLE

    Improvement of UAV Based an Evaluation Approach to Mid-High Rise Buildings’ Exterior Walls

    Nai-Hsin Pan1, Ching-Hsiang Tsai2, Kuei-Yen Chen1, Shiaofang Sung3,*

    Structural Durability & Health Monitoring, Vol.14, No.2, pp. 109-125, 2020, DOI:10.32604/sdhm.2020.06489

    Abstract This research will develop a set of assessment techniques and procedures for exterior wall deterioration detection. The proposed method is mainly based on equipped with high-resolution photographic equipment for unmanned aerial vehicle (UAV). To overcome the problems of visual inspection difficulties due to different angles and height, the proposed method provides a safer and more efficient detection way to get the buildings’ exterior status. After using the proposed method to analyze the images taken from UAV, the size of the damaged area can be evaluated more accurately, and the accuracy rate of visual assessment will be significantly improved. The results… More >

  • Open Access

    ARTICLE

    Dithiothreitol and PEG Induced Combined Stress May Affect the Expressions of ABA Aldehyde Oxidase, Sucrose Synthase and Proline Metabolic Genes in Maize Seedlings

    Cansu Altuntaş1, Rabiye Terzi1,*

    Phyton-International Journal of Experimental Botany, Vol.89, No.3, pp. 487-495, 2020, DOI:10.32604/phyton.2020.08919

    Abstract The endoplasmic reticulum (ER) is an organelle in the cell where proteins are created and folded. Folding is a very elaborate process that is often interrupted by various biotic and abiotic stresses, leading to the formation of unfolded and misfolded proteins called ER stress. Dithiothreitol (DTT)-induced unfolded protein response (UPR) in endoplasmic reticulum (ER) has been recently reported in plants. Also, previous studies demonstrated that treatment with polyethylene glycol (PEG6000) could stimulate water deficit in crops. However, further researches should be conducted to elucidate the molecular mechanism of ER stress response and the relationship between water deficiency and ER. In… More >

Displaying 661-670 on page 67 of 792. Per Page