Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (131)
  • Open Access

    ARTICLE

    Multi-Stage Multidisciplinary Design Optimization Method for Enhancing Complete Artillery Internal Ballistic Firing Performance

    Jipeng Xie1,2, Guolai Yang1,*, Liqun Wang1, Lei Li1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 793-819, 2024, DOI:10.32604/cmes.2024.048174

    Abstract To enhance the comprehensive performance of artillery internal ballistics—encompassing power, accuracy, and service life—this study proposed a multi-stage multidisciplinary design optimization (MS-MDO) method. First, the comprehensive artillery internal ballistic dynamics (AIBD) model, based on propellant combustion, rotation band engraving, projectile axial motion, and rifling wear models, was established and validated. This model was systematically decomposed into subsystems from a system engineering perspective. The study then detailed the MS-MDO methodology, which included Stage I (MDO stage) employing an improved collaborative optimization method for consistent design variables, and Stage II (Performance Optimization) focusing on the independent optimization of local design variables and… More >

  • Open Access

    ARTICLE

    The Influence of Internet Use on Women’s Depression and Its Countermeasures—Empirical Analysis Based on Data from CFPS

    Dengke Xu1, Linlin Shen1, Fangzhong Xu2,*

    International Journal of Mental Health Promotion, Vol.26, No.3, pp. 229-238, 2024, DOI:10.32604/ijmhp.2024.046023

    Abstract Based on China Family Panel Studies (CFPS) 2018 data, the multiple linear regression model is used to analyze the effects of Internet use on women’s depression, and to test the robustness of the regression results. At the same time, the effects of Internet use on mental health of women with different residence, age, marital status and physical health status are analyzed. Then, we can obtain that Internet use has a significant promoting effect on women’s mental health, while the degree of Internet use has a significant inhibitory effect on women’s mental health. In addition, the study found that women’s age,… More >

  • Open Access

    ARTICLE

    Identification and Transcriptional Regulation of CAMTA Genes in Liriodendron chinense

    Kaiyue Hong, Yasmina Radani, Teja Manda, Jinhui Chen, Liming Yang*

    Phyton-International Journal of Experimental Botany, Vol.93, No.3, pp. 413-425, 2024, DOI:10.32604/phyton.2024.047739

    Abstract This study explores CAMTA genes in the rare and endangered Chinese plant species, Liriodendron chinense. Despite the completion of whole-genome sequencing, the roles of CAMTA genes in calcium regulation and stress responses in this species remain largely unexplored. Within the L. chinense genome, we identified two CAMTA genes, Lchi09764 and Lchi222536, characterized by four functional domains: CG-1, TIG, ANK repeats, and IQ motifs. Our analyses, including phylogenetic investigations, cis-regulatory element analyses, and chromosomal location studies, aim to elucidate the defining features of CAMTA genes in L. chinense. Applying Weighted Gene Co-Expression Network Analysis (WGCNA), we explored the impact of CAMTAMore >

  • Open Access

    ARTICLE

    An Enhanced Ensemble-Based Long Short-Term Memory Approach for Traffic Volume Prediction

    Duy Quang Tran1, Huy Q. Tran2,*, Minh Van Nguyen3

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3585-3602, 2024, DOI:10.32604/cmc.2024.047760

    Abstract With the advancement of artificial intelligence, traffic forecasting is gaining more and more interest in optimizing route planning and enhancing service quality. Traffic volume is an influential parameter for planning and operating traffic structures. This study proposed an improved ensemble-based deep learning method to solve traffic volume prediction problems. A set of optimal hyperparameters is also applied for the suggested approach to improve the performance of the learning process. The fusion of these methodologies aims to harness ensemble empirical mode decomposition’s capacity to discern complex traffic patterns and long short-term memory’s proficiency in learning temporal relationships. Firstly, a dataset for… More >

  • Open Access

    ARTICLE

    Computational Verification of Low-Frequency Broadband Noise from Wind Turbine Blades Using Semi-Empirical Methods

    Vasishta Bhargava Nukala*, Chinmaya Prasad Padhy

    Sound & Vibration, Vol.58, pp. 133-150, 2024, DOI:10.32604/sv.2024.047762

    Abstract A significant aerodynamic noise from wind turbines arises when the rotating blades interact with turbulent flows. Though the trailing edge of the blade is an important source of noise at high frequencies, the present work deals with the influence of turbulence distortion on leading edge noise from wind turbine blades which becomes significant in low-frequency regions. Four quasi-empirical methods are studied to verify the accuracy of turbulent inflow noise predicted at low frequencies for a 2 MW horizontal axis wind turbine. Results have shown that all methods exhibited a downward linear trend in noise spectra for a given mean wind… More >

  • Open Access

    ARTICLE

    An Empirical Study on the Effectiveness of Adversarial Examples in Malware Detection

    Younghoon Ban, Myeonghyun Kim, Haehyun Cho*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3535-3563, 2024, DOI:10.32604/cmes.2023.046658

    Abstract Antivirus vendors and the research community employ Machine Learning (ML) or Deep Learning (DL)-based static analysis techniques for efficient identification of new threats, given the continual emergence of novel malware variants. On the other hand, numerous researchers have reported that Adversarial Examples (AEs), generated by manipulating previously detected malware, can successfully evade ML/DL-based classifiers. Commercial antivirus systems, in particular, have been identified as vulnerable to such AEs. This paper firstly focuses on conducting black-box attacks to circumvent ML/DL-based malware classifiers. Our attack method utilizes seven different perturbations, including Overlay Append, Section Append, and Break Checksum, capitalizing on the ambiguities present… More >

  • Open Access

    ARTICLE

    Parental Educational Expectations, Academic Pressure, and Adolescent Mental Health: An Empirical Study Based on CEPS Survey Data

    Tao Xu1,*, Fangqiang Zuo1, Kai Zheng2,*

    International Journal of Mental Health Promotion, Vol.26, No.2, pp. 93-103, 2024, DOI:10.32604/ijmhp.2023.043226

    Abstract Background: This study aimed to investigate the relationship between parental educational expectations and adolescent mental health problems, with academic pressure as a moderating variable. Methods: This study was based on the baseline data of the China Education Panel Survey, which was collected within one school year during 2013–2014. It included 19,958 samples from seventh and ninth graders, who ranged from 11 to 18 years old. After removing missing values and conducting relevant data processing, the effective sample size for analysis was 16344. The OLS (Ordinary Least Squares) multiple linear regression analysis was used to examine the relationship between parental educational… More >

  • Open Access

    ARTICLE

    Adaptive Segmentation for Unconstrained Iris Recognition

    Mustafa AlRifaee1, Sally Almanasra2,*, Adnan Hnaif3, Ahmad Althunibat3, Mohammad Abdallah3, Thamer Alrawashdeh3

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1591-1609, 2024, DOI:10.32604/cmc.2023.043520

    Abstract In standard iris recognition systems, a cooperative imaging framework is employed that includes a light source with a near-infrared wavelength to reveal iris texture, look-and-stare constraints, and a close distance requirement to the capture device. When these conditions are relaxed, the system’s performance significantly deteriorates due to segmentation and feature extraction problems. Herein, a novel segmentation algorithm is proposed to correctly detect the pupil and limbus boundaries of iris images captured in unconstrained environments. First, the algorithm scans the whole iris image in the Hue Saturation Value (HSV) color space for local maxima to detect the sclera region. The image… More >

  • Open Access

    ARTICLE

    Predicting the International Roughness Index of JPCP and CRCP Rigid Pavement: A Random Forest (RF) Model Hybridized with Modified Beetle Antennae Search (MBAS) for Higher Accuracy

    Zhou Ji1, Mengmeng Zhou2, Qiang Wang2, Jiandong Huang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1557-1582, 2024, DOI:10.32604/cmes.2023.046025

    Abstract To improve the prediction accuracy of the International Roughness Index (IRI) of Jointed Plain Concrete Pavements (JPCP) and Continuously Reinforced Concrete Pavements (CRCP), a machine learning approach is developed in this study for the modelling, combining an improved Beetle Antennae Search (MBAS) algorithm and Random Forest (RF) model. The 10-fold cross-validation was applied to verify the reliability and accuracy of the model proposed in this study. The importance scores of all input variables on the IRI of JPCP and CRCP were analysed as well. The results by the comparative analysis showed the prediction accuracy of the IRI of the newly… More > Graphic Abstract

    Predicting the International Roughness Index of JPCP and CRCP Rigid Pavement: A Random Forest (RF) Model Hybridized with Modified Beetle Antennae Search (MBAS) for Higher Accuracy

  • Open Access

    ARTICLE

    Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study

    Shahad Alzahrani1, Hatim Alsuwat2, Emad Alsuwat3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1635-1654, 2024, DOI:10.32604/cmes.2023.044718

    Abstract Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among variables. However, the reliability and integrity of learned Bayesian network models are highly dependent on the quality of incoming data streams. One of the primary challenges with Bayesian networks is their vulnerability to adversarial data poisoning attacks, wherein malicious data is injected into the training dataset to negatively influence the Bayesian network models and impair their performance. In this research paper, we propose an efficient framework for detecting data poisoning attacks against Bayesian network structure learning algorithms. Our framework utilizes latent variables to quantify… More >

Displaying 1-10 on page 1 of 131. Per Page