Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,286)
  • Open Access

    ARTICLE

    ASSESSMENT OF TURBULENCE MODELS IN THE PREDICTION OF FLOW FIELD AND THERMAL CHARACTERISTICS OF WALL JET

    Arvind Pattamattaa,*, Ghanshyam Singhb

    Frontiers in Heat and Mass Transfer, Vol.3, No.2, pp. 1-11, 2012, DOI:10.5098/hmt.v3.2.3005

    Abstract The present study deals with the assessment of different turbulence models for heated wall jet flow. The velocity field and thermal characteristics for isothermal and uniform heat flux surfaces in the presence of wall jet flow have been predicted using different turbulence models and the results are compared against the experimental data of Wygnanski et al. (1992), Schneider and Goldstein (1994), and AbdulNour et al. (2000). Thirteen different turbulence models are considered for validation, which include the Standard k-ε (SKE), Realizable k-ε (RKE), shear stress transport (SST), Sarkar & So (SSA), v 2 -f, Reynolds stress Model (RSM), and Spalart… More >

  • Open Access

    ARTICLE

    NUMERICAL STUDY OF 3D THERMAL AND HYDRAULIC CHARACTERISTICS OF WAVY FIN AND TUBE HEAT EXCHANGER

    Arafat A. Bhuiyana,1, A. K. M. Sadrul Islama, M. Ruhul Aminb

    Frontiers in Heat and Mass Transfer, Vol.3, No.3, pp. 1-9, 2012, DOI:10.5098/hmt.v3.3.3006

    Abstract This numerical analysis presents the airside performance of a wavy fin-and-tube heat exchanger having 4 row configurations considering steady, incompressible and 3D flow using Commercial CFD Code ANSYS CFX 12.0. Results are presented in the form of friction factor (f), Colburn factor (j) and efficiency index (j/f). The numerical procedure has been validated by comparison with published numerical and experimental results and good agreement has been observed. A series of numerical calculations have been carried out in order to analyze the influence of various geometric characteristics on different fields as well as on the heat transfer and pressure drop and… More >

  • Open Access

    ARTICLE

    Gyroscope Dynamic Balance Counterweight Prediction Based on Multi-Head ResGAT Networks

    Wuyang Fan, Shisheng Zhong*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2525-2555, 2024, DOI:10.32604/cmes.2023.046951

    Abstract The dynamic balance assessment during the assembly of the coordinator gyroscope significantly impacts the guidance accuracy of precision-guided equipment. In dynamic balance debugging, reliance on rudimentary counterweight empirical formulas persists, resulting in suboptimal debugging accuracy and an increased repetition rate. To mitigate this challenge, we present a multi-head residual graph attention network (ResGAT) model, designed to predict dynamic balance counterweights with high precision. In this research, we employ graph neural networks for interaction feature extraction from assembly graph data. An SDAE-GPC model is designed for the assembly condition classification to derive graph data inputs for the ResGAT regression model, which… More >

  • Open Access

    ARTICLE

    An Improved Bounded Conflict-Based Search for Multi-AGV Pathfinding in Automated Container Terminals

    Xinci Zhou, Jin Zhu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2705-2727, 2024, DOI:10.32604/cmes.2024.046363

    Abstract As the number of automated guided vehicles (AGVs) within automated container terminals (ACT) continues to rise, conflicts have become more frequent. Addressing point and edge conflicts of AGVs, a multi-AGV conflict-free path planning model has been formulated to minimize the total path length of AGVs between shore bridges and yards. For larger terminal maps and complex environments, the grid method is employed to model AGVs’ road networks. An improved bounded conflict-based search (IBCBS) algorithm tailored to ACT is proposed, leveraging the binary tree principle to resolve conflicts and employing focal search to expand the search range. Comparative experiments involving 60… More >

  • Open Access

    ARTICLE

    Optimal Shape Factor and Fictitious Radius in the MQ-RBF: Solving Ill-Posed Laplacian Problems

    Chein-Shan Liu1, Chung-Lun Kuo1, Chih-Wen Chang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3189-3208, 2024, DOI:10.32604/cmes.2023.046002

    Abstract To solve the Laplacian problems, we adopt a meshless method with the multiquadric radial basis function (MQ-RBF) as a basis whose center is distributed inside a circle with a fictitious radius. A maximal projection technique is developed to identify the optimal shape factor and fictitious radius by minimizing a merit function. A sample function is interpolated by the MQ-RBF to provide a trial coefficient vector to compute the merit function. We can quickly determine the optimal values of the parameters within a preferred rage using the golden section search algorithm. The novel method provides the optimal values of parameters and,… More >

  • Open Access

    ARTICLE

    Prediction of Ground Vibration Induced by Rock Blasting Based on Optimized Support Vector Regression Models

    Yifan Huang1, Zikang Zhou1,2, Mingyu Li1, Xuedong Luo1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3147-3165, 2024, DOI:10.32604/cmes.2024.045947

    Abstract Accurately estimating blasting vibration during rock blasting is the foundation of blasting vibration management. In this study, Tuna Swarm Optimization (TSO), Whale Optimization Algorithm (WOA), and Cuckoo Search (CS) were used to optimize two hyperparameters in support vector regression (SVR). Based on these methods, three hybrid models to predict peak particle velocity (PPV) for bench blasting were developed. Eighty-eight samples were collected to establish the PPV database, eight initial blasting parameters were chosen as input parameters for the prediction model, and the PPV was the output parameter. As predictive performance evaluation indicators, the coefficient of determination (R2), root mean square… More >

  • Open Access

    ARTICLE

    Improving Prediction of Chronic Kidney Disease Using KNN Imputed SMOTE Features and TrioNet Model

    Nazik Alturki1, Abdulaziz Altamimi2, Muhammad Umer3,*, Oumaima Saidani1, Amal Alshardan1, Shtwai Alsubai4, Marwan Omar5, Imran Ashraf6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3513-3534, 2024, DOI:10.32604/cmes.2023.045868

    Abstract Chronic kidney disease (CKD) is a major health concern today, requiring early and accurate diagnosis. Machine learning has emerged as a powerful tool for disease detection, and medical professionals are increasingly using ML classifier algorithms to identify CKD early. This study explores the application of advanced machine learning techniques on a CKD dataset obtained from the University of California, UC Irvine Machine Learning repository. The research introduces TrioNet, an ensemble model combining extreme gradient boosting, random forest, and extra tree classifier, which excels in providing highly accurate predictions for CKD. Furthermore, K nearest neighbor (KNN) imputer is utilized to deal… More >

  • Open Access

    ARTICLE

    ASLP-DL —A Novel Approach Employing Lightweight Deep Learning Framework for Optimizing Accident Severity Level Prediction

    Saba Awan1,*, Zahid Mehmood2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2535-2555, 2024, DOI:10.32604/cmc.2024.047337

    Abstract Highway safety researchers focus on crash injury severity, utilizing deep learning—specifically, deep neural networks (DNN), deep convolutional neural networks (D-CNN), and deep recurrent neural networks (D-RNN)—as the preferred method for modeling accident severity. Deep learning’s strength lies in handling intricate relationships within extensive datasets, making it popular for accident severity level (ASL) prediction and classification. Despite prior success, there is a need for an efficient system recognizing ASL in diverse road conditions. To address this, we present an innovative Accident Severity Level Prediction Deep Learning (ASLP-DL) framework, incorporating DNN, D-CNN, and D-RNN models fine-tuned through iterative hyperparameter selection with Stochastic… More >

  • Open Access

    ARTICLE

    Cross-Project Software Defect Prediction Based on SMOTE and Deep Canonical Correlation Analysis

    Xin Fan1,2, Shuqing Zhang1,2,*, Kaisheng Wu1,2, Wei Zheng1,2, Yu Ge1,2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1687-1711, 2024, DOI:10.32604/cmc.2023.046187

    Abstract Cross-Project Defect Prediction (CPDP) is a method that utilizes historical data from other source projects to train predictive models for defect prediction in the target project. However, existing CPDP methods only consider linear correlations between features (indicators) of the source and target projects. These models are not capable of evaluating non-linear correlations between features when they exist, for example, when there are differences in data distributions between the source and target projects. As a result, the performance of such CPDP models is compromised. In this paper, this paper proposes a novel CPDP method based on Synthetic Minority Oversampling Technique (SMOTE)… More >

  • Open Access

    ARTICLE

    Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction

    Bin Luo1,2,3, Liangguo Chen1,2,3, Shuhua Ruan1,2,3,*, Yonggang Luo2,3,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1731-1754, 2024, DOI:10.32604/cmc.2023.045739

    Abstract Considering the stealthiness and persistence of Advanced Persistent Threats (APTs), system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a host. Rule-based provenance graph APT detection approaches require elaborate rules and cannot detect unknown attacks, and existing learning-based approaches are limited by the lack of available APT attack samples or generally only perform graph-level anomaly detection, which requires lots of manual efforts to locate attack entities. This paper proposes an APT-exploited process detection approach called ThreatSniffer, which constructs the benign provenance graph from attack-free audit logs, fits normal system entity… More >

Displaying 41-50 on page 5 of 1286. Per Page