Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (150)
  • Open Access

    PROCEEDINGS

    Damping Properties in Gradient Nano-Grained Metals

    Sheng Qian1, Qi Tong1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.3, pp. 1-1, 2023, DOI:10.32604/icces.2023.010116

    Abstract Applications such as aircrafts and electronic devices require the noise and vibration reduction without much extra burden, such as extra damping systems. High damping metallic materials that exhibit the ability to dissipate mechanical energy are potential candidates in these application via directly being part of the functional components, such as the frame materials. The energy damping in polycrystalline metals depends on the activities of defects such as dislocation and grain boundary. However, operating defects has the opposite effect on strength and damping capacity. In the quest for high damping metals, maintaining the level of strength is desirable in practice. In… More >

  • Open Access

    ARTICLE

    Developing Transparent IDS for VANETs Using LIME and SHAP: An Empirical Study

    Fayaz Hassan1,*, Jianguo Yu1, Zafi Sherhan Syed2, Arif Hussain Magsi3, Nadeem Ahmed4

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3185-3208, 2023, DOI:10.32604/cmc.2023.044650

    Abstract Vehicular Ad-hoc Networks (VANETs) are mobile ad-hoc networks that use vehicles as nodes to create a wireless network. Whereas VANETs offer many advantages over traditional transportation networks, ensuring security in VANETs remains a significant challenge due to the potential for malicious attacks. This study addresses the critical issue of security in VANETs by introducing an intelligent Intrusion Detection System (IDS) that merges Machine Learning (ML)–based attack detection with Explainable AI (XAI) explanations. This study ML pipeline involves utilizing correlation-based feature selection followed by a Random Forest (RF) classifier that achieves a classification accuracy of 100% for the binary classification task… More >

  • Open Access

    ARTICLE

    Empirical Analysis of Neural Networks-Based Models for Phishing Website Classification Using Diverse Datasets

    Shoaib Khan, Bilal Khan, Saifullah Jan*, Subhan Ullah, Aiman

    Journal of Cyber Security, Vol.5, pp. 47-66, 2023, DOI:10.32604/jcs.2023.045579

    Abstract Phishing attacks pose a significant security threat by masquerading as trustworthy entities to steal sensitive information, a problem that persists despite user awareness. This study addresses the pressing issue of phishing attacks on websites and assesses the performance of three prominent Machine Learning (ML) models—Artificial Neural Networks (ANN), Convolutional Neural Networks (CNN), and Long Short-Term Memory (LSTM)—utilizing authentic datasets sourced from Kaggle and Mendeley repositories. Extensive experimentation and analysis reveal that the CNN model achieves a better accuracy of 98%. On the other hand, LSTM shows the lowest accuracy of 96%. These findings underscore the potential of ML techniques in… More >

  • Open Access

    ARTICLE

    Prediction of Damping Capacity Demand in Seismic Base Isolators via Machine Learning

    Ayla Ocak1, Ümit Işıkdağ2, Gebrail Bekdaş1,*, Sinan Melih Nigdeli1, Sanghun Kim3, Zong Woo Geem4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2899-2924, 2024, DOI:10.32604/cmes.2023.030418

    Abstract Base isolators used in buildings provide both a good acceleration reduction and structural vibration control structures. The base isolators may lose their damping capacity over time due to environmental or dynamic effects. This deterioration of them requires the determination of the maintenance and repair needs and is important for the long-term isolator life. In this study, an artificial intelligence prediction model has been developed to determine the damage and maintenance-repair requirements of isolators as a result of environmental effects and dynamic factors over time. With the developed model, the required damping capacity of the isolator structure was estimated and compared… More >

  • Open Access

    ARTICLE

    PERFORMANCE ASSESSMENT AND EMPIRICAL CORRELATION IN A HEAT EXCHANGER SQUARE DUCT WITH DIAGONAL INSERTED GENERATORS

    Amnart Boonloi*

    Frontiers in Heat and Mass Transfer, Vol.5, pp. 1-12, 2014, DOI:10.5098/hmt.5.8

    Abstract A mathematical analysis of the heat transfer enhancement, thermal performance and flow configurations in a heat exchanger square duct with diagonal inserted plate vortex generators is presented. The 30o V–shaped baffles are modified and placed on the double sides of the thin plate or frame (with no plate) which inserted diagonally in the square duct. The effects of blockage ratio (b/H, BR), the pitch ratio (p/H, PR), flow direction (V–Downstream and V–Upstream) and configuration of inserting plate are investigated for Reynolds number based on the hydraulic diameter of the square duct, Dh, Re = 100 – 2000. The finite volume… More >

  • Open Access

    ARTICLE

    Influence of Trailing-Edge Wear on the Vibrational Behavior of Wind Turbine Blades

    Yuanjun Dai1,2,*, Xin Wei1, Baohua Li1, Cong Wang1, Kunju Shi1

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.2, pp. 337-348, 2024, DOI:10.32604/fdmp.2023.042434

    Abstract To study the impact of the trailing-edge wear on the vibrational behavior of wind-turbine blades, unworn blades and trailing-edge worn blades have been assessed through relevant modal tests. According to these experiments, the natural frequencies of trailing-edge worn blades −1, −2, and −3 increase the most in the second to fourth order, the fifth order increases in the middle, and the first order increases the least. The damping ratio data indicate that, in general, the first five-order damping ratios of trailing-edge worn blades −1 and trailing-edge worn blades −2 are reduced, and the first five-order damping ratios of trailing-edge worn… More >

  • Open Access

    ARTICLE

    Numerical Analysis of the Influence of the Impinging Distance on the Scouring Efficiency of Submerged Jets

    Hao Chen1,2, Xianbin Teng2,*, Zhibin Zhang2, Faxin Zhu1, Jie Wang1, Zhaohao Zhang2

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.2, pp. 429-445, 2024, DOI:10.32604/fdmp.2023.030585

    Abstract Water jet technology is widely used in submerged buried pipes as a non-traditional trenching process, often involving a complex sediment response. An important adjustable and influential engineering variable in this technology is represented by the impinging distance. In this study, the FLOW-3D software was used to simulate the jet scouring of sand beds in a submerged environment. In particular, four sets of experimental conditions were considered to discern the relationship between the maximum scour depth and mass and the impinging distance. As shown by the results, a critical impinging distance exists by which the static scour depth can be maximized;… More > Graphic Abstract

    Numerical Analysis of the Influence of the Impinging Distance on the Scouring Efficiency of Submerged Jets

  • Open Access

    REVIEW

    Use of Statistical Tools for Comparison between Different Analytical and Semi-Empirical Models of the Bleve Fireball

    Abderraouf Guelzim1,2,*, Baraka Achraf Chakir3, Aziz Ettahir1, Anas Mbarki1,*

    Frontiers in Heat and Mass Transfer, Vol.21, pp. 125-140, 2023, DOI:10.32604/fhmt.2023.041832

    Abstract The Bleve is an explosion involving both the rapid vaporization of liquid and the rapid expansion of vapor in a vessel. The loss of containment results in a large fireball if the stored chemical is flammable. In order to predict the damage generated by a Bleve, several authors propose analytical or semi-empirical correlations, which consist in predicting the diameter and the lifetime of the fireballs according to the quantity of fuel. These models are based on previous experience, which makes their validity arbitrary in relation to the initial conditions and the nature of the product concerned. The article delves into… More > Graphic Abstract

    Use of Statistical Tools for Comparison between Different Analytical and Semi-Empirical Models of the Bleve Fireball

  • Open Access

    ARTICLE

    Can PAPE-Induced Increases in Jump Height Be Explained by Jumping Kinematics?

    Xiaojie Jiang1, Xin Li1, Yining Xu1, Dong Sun1, Julien S. Baker2, Yaodong Gu1,3,*

    Molecular & Cellular Biomechanics, Vol.20, No.2, pp. 67-79, 2023, DOI:10.32604/mcb.2023.042910

    Abstract

    The aim of this study was to investigate whether kinematic data during a countermovement jump (CMJ) could explain the post-activation performance enhancement (PAPE) effects following acute resistance exercise. Twenty-four male participants with resistance training and jumping experience were recruited and randomly assigned to either the experimental group (PAPE-stimulus) (n = 12) or the control group (n = 12). In the experimental group, participants performed 5 reps of squats at 80% 1RM to induce PAPE, while the control group received no intervention. Both groups performed three CMJ tests before (PRE) and at immediate (POST0), 4 (POST4), 8 (POST8), and 12 (POST12)… More > Graphic Abstract

    Can PAPE-Induced Increases in Jump Height Be Explained by Jumping Kinematics?

  • Open Access

    ARTICLE

    An Improved Jump Spider Optimization for Network Traffic Identification Feature Selection

    Hui Xu, Yalin Hu*, Weidong Cao, Longjie Han

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3239-3255, 2023, DOI:10.32604/cmc.2023.039227

    Abstract The massive influx of traffic on the Internet has made the composition of web traffic increasingly complex. Traditional port-based or protocol-based network traffic identification methods are no longer suitable for today’s complex and changing networks. Recently, machine learning has been widely applied to network traffic recognition. Still, high-dimensional features and redundant data in network traffic can lead to slow convergence problems and low identification accuracy of network traffic recognition algorithms. Taking advantage of the faster optimization-seeking capability of the jumping spider optimization algorithm (JSOA), this paper proposes a jumping spider optimization algorithm that incorporates the harris hawk optimization (HHO) and… More >

Displaying 11-20 on page 2 of 150. Per Page