Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (141)
  • Open Access

    ARTICLE

    Expert Recommendation in Community Question Answering via Heterogeneous Content Network Embedding

    Hong Li1,*, Jianjun Li1, Guohui Li1, Rong Gao2, Lingyu Yan2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1687-1709, 2023, DOI:10.32604/cmc.2023.035239

    Abstract Expert Recommendation (ER) aims to identify domain experts with high expertise and willingness to provide answers to questions in Community Question Answering (CQA) web services. How to model questions and users in the heterogeneous content network is critical to this task. Most traditional methods focus on modeling questions and users based on the textual content left in the community while ignoring the structural properties of heterogeneous CQA networks and always suffering from textual data sparsity issues. Recent approaches take advantage of structural proximities between nodes and attempt to fuse the textual content of nodes for modeling. However, they often fail… More >

  • Open Access

    ARTICLE

    Study of the Seepage Mechanism in Thick Heterogeneous Gas Reservoirs

    Xin Huang1,*, Yunpeng Jiang1, Daowu Huang1, Xianke He1, Xianguo Zhang2, Ping Guo3

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.6, pp. 1679-1691, 2023, DOI:10.32604/fdmp.2023.025312

    Abstract

    The seepage mechanism plays a crucial role in low-permeability gas reservoirs. Compared with conventional gas reservoirs, low-permeability sandstone gas reservoirs are characterized by low porosity, low permeability, strong heterogeneity, and high water saturation. Moreover, their percolation mechanisms are more complex. The present work describes a series of experiments conducted considering low-permeability sandstone cores under pressure-depletion conditions (from the Xihu Depression in the East China Sea Basin). It is shown that the threshold pressure gradient of a low-permeability gas reservoir in thick layers is positively correlated with water saturation and negatively correlated with permeability and porosity. The reservoir stress sensitivity is… More >

  • Open Access

    ARTICLE

    Experimental Research on the Millimeter-Scale Distribution of Oil in Heterogeneous Reservoirs

    Zhao Yu1,2,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.6, pp. 1521-1534, 2023, DOI:10.32604/fdmp.2023.023296

    Abstract Oil saturation is a critical parameter when designing oil field development plans. This study focuses on the change of oil saturation during water flooding. Particularly, a meter-level artificial model is used to conduct relevant experiments on the basis of similarity principles and taking into account the layer geological characteristics of the reservoir. The displacement experiment’s total recovery rate is 41.35%. The changes in the remaining oil saturation at a millimeter-scale are examined using medical spiral computer tomography principles. In all experimental stages, regions exists where the oil saturation decline is more than 10.0%. The shrinkage percentage is 20.70% in the… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks

    J. Divakaran1,*, Arvind Chakrapani2, K. Srihari3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1141-1152, 2023, DOI:10.32604/csse.2023.028050

    Abstract Under various deployment circumstances, fifth-generation (5G) telecommunications delivers improved network compound management with fast communication channels. Due to the introduction of the Internet of Things (IoT) in data management, the majority of the ultra-dense network models in 5G networks frequently have decreased spectral efficiency, weak handover management, and vulnerabilities. The majority of traditional handover authentication models are seriously threatened, making them vulnerable to a variety of security attacks. The authentication of networked devices is the most important issue. Therefore, a model that incorporates the handover mechanism and authentication model must be created. This article uses a fuzzy logic model to… More >

  • Open Access

    ARTICLE

    A New Hybrid Hierarchical Parallel Algorithm to Enhance the Performance of Large-Scale Structural Analysis Based on Heterogeneous Multicore Clusters

    Gaoyuan Yu1, Yunfeng Lou2, Hang Dong3, Junjie Li1, Xianlong Jin1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 135-155, 2023, DOI:10.32604/cmes.2023.025166

    Abstract Heterogeneous multicore clusters are becoming more popular for high-performance computing due to their great computing power and cost-to-performance effectiveness nowadays. Nevertheless, parallel efficiency degradation is still a problem in large-scale structural analysis based on heterogeneous multicore clusters. To solve it, a hybrid hierarchical parallel algorithm (HHPA) is proposed on the basis of the conventional domain decomposition algorithm (CDDA) and the parallel sparse solver. In this new algorithm, a three-layer parallelization of the computational procedure is introduced to enable the separation of the communication of inter-nodes, heterogeneous-core-groups (HCGs) and inside-heterogeneous-core-groups through mapping computing tasks to various hardware layers. This approach can… More >

  • Open Access

    ARTICLE

    Transparent Access to Heterogeneous IoT Based on Virtual Resources

    Wenquan Jin1, Sunhwan Lim2, Young-Ho Suh2, Chanwon Park2, Dohyeun Kim3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4983-4999, 2023, DOI:10.32604/cmc.2023.020851

    Abstract The Internet of Things (IoT) inspires industries to deploy a massive number of connected devices to provide smart and ubiquitous services to influence our daily life. Edge computing leverages sufficient computation and storage at the edge of the network to enable deploying complex functions closer to the environment using Internet-connected devices. According to the purpose of the environment including privacy level, domain functionality, network scale and service quality, various environment-specific services can be provided through heterogeneous applications with sensors and actuators based on edge computing. However, for providing user-friendly service scenarios based on the transparent access to heterogeneous devices in… More >

  • Open Access

    ARTICLE

    Displacement Field Variable Modeling Method for Heterogeneous Materials in Wind Power Blade Core Plates

    Ying He, Yongshuang Wen*, Xuemei Huang, Leian Zhang, Rujun Song, Chang Li

    Energy Engineering, Vol.120, No.2, pp. 445-459, 2023, DOI:10.32604/ee.2022.022223

    Abstract In order to study the mechanical properties of the heterogeneous core plate of the wind turbine blade, a modeling method of the core plate based on displacement field variables is proposed. Firstly, the wind turbine blade core plate was modeled according to the theory of modeling heterogeneous material characteristics. Secondly, the three-point bending finite element model of the wind turbine blade core plate was solved by the display dynamic equation to obtain the deformation pattern and force-deformation relationship of the core plate. Finally, the three-point bending static test was conducted to compare with the finite element analysis. The test results… More >

  • Open Access

    ARTICLE

    Heterogeneous Ensemble Feature Selection Model (HEFSM) for Big Data Analytics

    M. Priyadharsini1,*, K. Karuppasamy2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2187-2205, 2023, DOI:10.32604/csse.2023.031115

    Abstract Big Data applications face different types of complexities in classifications. Cleaning and purifying data by eliminating irrelevant or redundant data for big data applications becomes a complex operation while attempting to maintain discriminative features in processed data. The existing scheme has many disadvantages including continuity in training, more samples and training time in feature selections and increased classification execution times. Recently ensemble methods have made a mark in classification tasks as combine multiple results into a single representation. When comparing to a single model, this technique offers for improved prediction. Ensemble based feature selections parallel multiple expert’s judgments on a… More >

  • Open Access

    ARTICLE

    Automated File Labeling for Heterogeneous Files Organization Using Machine Learning

    Sagheer Abbas1, Syed Ali Raza1,2, M. A. Khan3, Muhammad Adnan Khan4,*, Atta-ur-Rahman5, Kiran Sultan6, Amir Mosavi7,8,9

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3263-3278, 2023, DOI:10.32604/cmc.2023.032864

    Abstract File labeling techniques have a long history in analyzing the anthological trends in computational linguistics. The situation becomes worse in the case of files downloaded into systems from the Internet. Currently, most users either have to change file names manually or leave a meaningless name of the files, which increases the time to search required files and results in redundancy and duplications of user files. Currently, no significant work is done on automated file labeling during the organization of heterogeneous user files. A few attempts have been made in topic modeling. However, one major drawback of current topic modeling approaches… More >

  • Open Access

    ARTICLE

    A Fused Machine Learning Approach for Intrusion Detection System

    Muhammad Sajid Farooq1, Sagheer Abbas1, Atta-ur-Rahman2, Kiran Sultan3, Muhammad Adnan Khan4,*, Amir Mosavi5,6,7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2607-2623, 2023, DOI:10.32604/cmc.2023.032617

    Abstract The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of internet. The interconnectivity of networks has brought various complexities in maintaining network availability, consistency, and discretion. Machine learning based intrusion detection systems have become essential to monitor network traffic for malicious and illicit activities. An intrusion detection system controls the flow of network traffic with the help of computer systems. Various deep learning algorithms in intrusion detection systems have played a prominent role in identifying and analyzing intrusions in network traffic. For this purpose, when the network traffic encounters known or unknown… More >

Displaying 31-40 on page 4 of 141. Per Page