Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (239)
  • Open Access

    ARTICLE

    Physics Based Digital Twin Modelling from Theory to Concept Implementation Using Coiled Springs Used in Suspension Systems

    Mohamed Ammar1,*, Alireza Mousavi1, Hamed Al-Raweshidy2,*

    Digital Engineering and Digital Twin, Vol.2, pp. 1-31, 2024, DOI:10.32604/dedt.2023.044930

    Abstract The advent of technology around the globe based on the Internet of Things, Cloud Computing, Big Data, Cyber-Physical Systems, and digitalisation. This advancement introduced industry 4.0. It is challenging to measure how enterprises adopt the new technologies. Industry 4.0 introduced Digital Twins, given that no specific terms or definitions are given to Digital Twins still challenging to define or conceptualise the Digital Twins. Many academics and industries still use old technologies, naming it Digital Twins. This young technology is in danger of reaching the plateau despite the immense benefit to sectors. This paper proposes a novel and unique definition for… More >

  • Open Access

    ARTICLE

    Distribution Line Longitudinal Protection Method Based on Virtual Measurement Current Restraint

    Wei Wang1, Yang Yu1, Simin Luo2,*, Wenlin Liu2, Wei Tang1, Yuanbo Ye1

    Energy Engineering, Vol.121, No.2, pp. 315-337, 2024, DOI:10.32604/ee.2023.042082

    Abstract As an effective approach to achieve the “dual-carbon” goal, the grid-connected capacity of renewable energy increases constantly. Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions. However, the inherent randomness, intermittency, and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics. Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources. Therefore, a longitudinal protection method based on virtual measurement of current restraint is proposed in this paper. The positive… More >

  • Open Access

    ARTICLE

    The Effect of Atrial Septal Defect Closure on Cardiac Volumetric Changes in Adults, Transcatheter Versus Surgical Closure, a Pilot Cardiac Magnetic Resonance Study

    Amr Mansour1, Noha M. Gamal2,*, Alaa M. Nady3, Amr Ibraheem3, Dalia M. Salah4, Khaled M. El-Maghraby2

    Congenital Heart Disease, Vol.18, No.6, pp. 679-691, 2023, DOI:10.32604/chd.2023.020028

    Abstract Background: Closure of an atrial septal defect (ASD) reduces right-side heart volumes by abolishing shunting with simultaneous improvement of the left ventricle (LV) filling and functions due to ventricular interdependence, thereby improving symptoms. Furthermore, studies conducted on atrial volume changes after ASD closure are limited. Cardiac magnetic resonance (CMR) is considered as the gold standard method for measuring cardiac volume and mass. Objective: We aimed to study the effect of transcatheter and surgical closure of secundum ASD on cardiac volumes and systolic functions as well as the fate of tricuspid regurgitation (TR), using CMR analysis. Methods: We prospectively enrolled 30… More >

  • Open Access

    EDITORIAL

    Introduction to the Journal of Digital Engineering and Digital Twin

    Satya Atluri1, Leiting Dong2,*

    Digital Engineering and Digital Twin, Vol.1, pp. 1-2, 2023, DOI:10.32604/dedt.2023.028823

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Integration of Digital Twins and Artificial Intelligence for Classifying Cardiac Ischemia

    Mohamed Ammar1,*, Hamed Al-Raweshidy2,*

    Journal on Artificial Intelligence, Vol.5, pp. 195-218, 2023, DOI:10.32604/jai.2023.045199

    Abstract Despite advances in intelligent medical care, difficulties remain. Due to its complicated governance, designing, planning, improving, and managing the cardiac system remains difficult. Oversight, including intelligent monitoring, feedback systems, and management practises, is unsuccessful. Current platforms cannot deliver lifelong personal health management services. Insufficient accuracy in patient crisis warning programmes. No frequent, direct interaction between healthcare workers and patients is visible. Physical medical systems and intelligent information systems are not integrated. This study introduces the Advanced Cardiac Twin (ACT) model integrated with Artificial Neural Network (ANN) to handle real-time monitoring, decision-making, and crisis prediction. THINGSPEAK is used to create an… More >

  • Open Access

    ARTICLE

    Automated Video Generation of Moving Digits from Text Using Deep Deconvolutional Generative Adversarial Network

    Anwar Ullah1, Xinguo Yu1,*, Muhammad Numan2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2359-2383, 2023, DOI:10.32604/cmc.2023.041219

    Abstract Generating realistic and synthetic video from text is a highly challenging task due to the multitude of issues involved, including digit deformation, noise interference between frames, blurred output, and the need for temporal coherence across frames. In this paper, we propose a novel approach for generating coherent videos of moving digits from textual input using a Deep Deconvolutional Generative Adversarial Network (DD-GAN). The DD-GAN comprises a Deep Deconvolutional Neural Network (DDNN) as a Generator (G) and a modified Deep Convolutional Neural Network (DCNN) as a Discriminator (D) to ensure temporal coherence between adjacent frames. The proposed research involves several steps.… More >

  • Open Access

    ARTICLE

    Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM

    Luoyin Feng1,*, Jize Du2, Chong Fu1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1645-1662, 2023, DOI:10.32604/cmc.2023.042630

    Abstract In the era of network communication, digital image encryption (DIE) technology is critical to ensure the security of image data. However, there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images. So, this paper addresses this gap by studying the generation of pseudo-random sequences (PRS) chaotic signals using dual logistic chaotic maps. These signals are then predicted using long and short-term memory (LSTM) networks, resulting in the reconstruction of a new chaotic signal. During the research process, it was discovered that there are numerous training parameters associated with the LSTM… More >

  • Open Access

    ARTICLE

    Cross Flow Characteristics and Heat Transfer of Staggered Tubes Bundle: A Numerical Study

    Husam Rashid Hudear*, Saad Najeeb Shehab

    Frontiers in Heat and Mass Transfer, Vol.21, pp. 367-383, 2023, DOI:10.32604/fhmt.2023.042639

    Abstract This paper presents a numerical emulation study of heat transmission through tube banks in three-dimensions. Staggered configuration is displayed by fluid dynamics using computer programs (CFD) software (ANSYS fluent). The computer model is used to predict the values of the Nusselt number when changing the values of heat flux and longitudinal pitch. The longitudinal pitch (SL/D) of 1.3, 1.8, and 2.4 mm. The transverse pitch (ST/D) of 1.5 mm, and also considered Reynolds numbers 10000, 13000, 17000, and 190000. The staggered configuration of the tube bundle is demonstrated to investigate the impact of this arrangement on the heat transmission rate… More >

  • Open Access

    ARTICLE

    Hybrid Dynamic Optimization for Multilevel Security System in Disseminating Confidential Information

    Shahina Anwarul1, Sunil Kumar2, Ashok Bhansali3, Hammam Alshazly4,*, Hany S. Hussein5,6

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3145-3163, 2023, DOI:10.32604/csse.2023.041061

    Abstract Security systems are the need of the hour to protect data from unauthorized access. The dissemination of confidential information over the public network requires a high level of security. The security approach such as steganography ensures confidentiality, authentication, integrity, and non-repudiation. Steganography helps in hiding the secret data inside the cover media so that the attacker can be confused during the transmission process of secret data between sender and receiver. Therefore, we present an efficient hybrid security model that provides multifold security assurance. To this end, a rectified Advanced Encryption Standard (AES) algorithm is proposed to overcome the problems existing… More >

  • Open Access

    ARTICLE

    New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features

    Raheem Ogla1,*, Eman Shakar Mahmood1, Rasha I. Ahmed1, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3075-3096, 2023, DOI:10.32604/cmc.2023.039818

    Abstract The transmission of video content over a network raises various issues relating to copyright authenticity, ethics, legality, and privacy. The protection of copyrighted video content is a significant issue in the video industry, and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media. However, there are still many unresolved challenges. This paper aims to address those challenges by proposing a new technique for detecting moving objects in digital videos, which can help prove the credibility of video content by detecting any fake objects inserted by hackers. The… More >

Displaying 11-20 on page 2 of 239. Per Page