Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (489)
  • Open Access

    ARTICLE

    Flexural wave dispersion in finitely pre-strained solid and hollow circular cylinders made of compressible materials

    S. D. Akbarov1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.92, No.4, pp. 387-421, 2013, DOI:10.3970/cmes.2013.092.387

    Abstract Flexural wave dispersion in finitely pre-stretched (or pre-compressed) solid and hollow, circular cylinders is investigated with the use of the threedimensional linearized theory of elastic waves in initially stressed bodies. It is assumed that the initial strains in the cylinders are homogeneous and correspond to the uniaxial tension, or compression, along their central axes. The elasticity relations of the cylinders’ materials are described by the harmonic potential. The analytical solution of the corresponding field equations is presented and, using these solutions, the dispersion equations for the cases under consideration are obtained. The dispersion equations are solved numerically and based on… More >

  • Open Access

    ARTICLE

    Interaction of Two Parallel Short Fibers in the Matrix at Loss of Stability

    A. N. Guz, V. A. Dekret1

    CMES-Computer Modeling in Engineering & Sciences, Vol.13, No.3, pp. 165-170, 2006, DOI:10.3970/cmes.2006.013.165

    Abstract Stability problem of composite material reinforced by two parallel short fibers is solved. The problem is formulated with application of equations of linearized three-dimensional theory of stability. The composite is modeled as piecewise-homogeneous medium. The influence of geometrical and mechanical parameters of the material on critical strain is investigated. More >

  • Open Access

    ARTICLE

    An Advanced Implicit Meshless Approach for the Non-linear Anomalous Subdiffusion Equation

    Y. T. Gu1, P. Zhuang2, F. Liu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.56, No.3, pp. 303-334, 2010, DOI:10.3970/cmes.2010.056.303

    Abstract Recently, the numerical modelling and simulation for anomalous subdiffusion equation (ASDE), which is a type of fractional partial differential equation(FPDE) and has been found with widely applications in modern engineering and sciences, are attracting more and more attentions. The current dominant numerical method for modelling ASDE is Finite Difference Method (FDM), which is based on a pre-defined grid leading to inherited issues or shortcomings. This paper aims to develop an implicit meshless approach based on the radial basis functions (RBF) for numerical simulation of the non-linear ASDE. The discrete system of equations is obtained by using the meshless shape functions… More >

  • Open Access

    ARTICLE

    Analysis of Hydrogen Permeation in Metals by Means of a New Anomalous Diffusion Model and Bayesian Inference

    Marco A.A. Kappel1, Diego C. Knupp1, Roberto P. Domingos1, IvanN. Bastos1

    CMC-Computers, Materials & Continua, Vol.49-50, No.1, pp. 13-29, 2015, DOI:10.3970/cmc.2015.049.013

    Abstract This work is aimed at the direct and inverse analysis of hydrogen permeation in steels employing a novel anomalous diffusion model. For the inverse analysis, experimental data for hydrogen permeation in a 13% chromium martensitic stainless steel, available in the literature [Turnbull, Carroll and Ferriss (1989)], was employed within the Bayesian framework for inverse problems. The comparison between the predicted values and the available experimental data demonstrates the feasibility of the new model in adequately describing the physical phenomena occurring in this particular problem. More >

  • Open Access

    ARTICLE

    YATA: Yet Another Proposal for Traffic Analysis and Anomaly Detection

    Yu Wang1,2,*, Yan Cao2, Liancheng Zhang2, Hongtao Zhang3, Roxana Ohriniuc4, Guodong Wang5, Ruosi Cheng6

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1171-1187, 2019, DOI:10.32604/cmc.2019.05575

    Abstract Network traffic anomaly detection has gained considerable attention over the years in many areas of great importance. Traditional methods used for detecting anomalies produce quantitative results derived from multi-source information. This makes it difficult for administrators to comprehend and deal with the underlying situations. This study proposes another method to yet determine traffic anomaly (YATA), based on the cloud model. YATA adopts forward and backward cloud transformation algorithms to fuse the quantitative value of acquisitions into the qualitative concept of anomaly degree. This method achieves rapid and direct perspective of network traffic. Experimental results with standard dataset indicate that using… More >

  • Open Access

    ARTICLE

    Key Process Protection of High Dimensional Process Data in Complex Production

    He Shi1,2,3,4, Wenli Shang1,2,3,4,*, Chunyu Chen1,2,3,4, Jianming Zhao1,2,3,4, Long Yin1, 2, 3, 4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 645-658, 2019, DOI:10.32604/cmc.2019.05648

    Abstract In order to solve the problem of locating and protecting key processes and detecting outliers efficiently in complex industrial processes. An anomaly detection system which is based on the two-layer model fusion frame is designed in this paper. The key process is located by using the random forest model firstly, then the process data feature selection, dimension reduction and noise reduction are processed. Finally, the validity of the model is verified by simulation experiments. It is shown that this method can effectively reduce the prediction accuracy variance and improve the generalization ability of the traditional anomaly detection model from the… More >

  • Open Access

    ARTICLE

    Using Imbalanced Triangle Synthetic Data for Machine Learning Anomaly Detection

    Menghua Luo1,2, Ke Wang1, Zhiping Cai1,*, Anfeng Liu3, Yangyang Li4, Chak Fong Cheang5

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 15-26, 2019, DOI:10.32604/cmc.2019.03708

    Abstract The extreme imbalanced data problem is the core issue in anomaly detection. The amount of abnormal data is so small that we cannot get adequate information to analyze it. The mainstream methods focus on taking fully advantages of the normal data, of which the discrimination method is that the data not belonging to normal data distribution is the anomaly. From the view of data science, we concentrate on the abnormal data and generate artificial abnormal samples by machine learning method. In this kind of technologies, Synthetic Minority Over-sampling Technique and its improved algorithms are representative milestones, which generate synthetic examples… More >

  • Open Access

    ARTICLE

    Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems

    Ming Wan1, Jiangyuan Yao2,*, Yuan Jing1, Xi Jin3,4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 447-463, 2018, DOI: 10.3970/cmc.2018.02195

    Abstract As the main communication mediums in industrial control networks, industrial communication protocols are always vulnerable to extreme exploitations, and it is very difficult to take protective measures due to their serious privacy. Based on the SDN (Software Defined Network) technology, this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach first restructures the industrial communication sessions and merges the payloads from industrial communication… More >

  • Open Access

    ARTICLE

    Anomaly Detection

    Nadipuram R. Prasad1, Salvador Almanza-Garcia1, Thomas T. Lu2

    CMC-Computers, Materials & Continua, Vol.14, No.1, pp. 1-22, 2009, DOI:10.3970/cmc.2009.014.001

    Abstract The paper presents a revolutionary framework for the modeling, detection, characterization, identification, and machine-learning of anomalous behavior in observed phenomena arising from a large class of unknown and uncertain dynamical systems. An evolved behavior would in general be very difficult to correct unless the specific anomalous event that caused such behavior can be detected early, and any consequence attributed to the specific anomaly following its detection. Substantial investigative time and effort is required to back-track the cause for abnormal behavior and to recreate the event sequence leading to such abnormal behavior. The need to automatically detect anomalous behavior is therefore… More >

Displaying 481-490 on page 49 of 489. Per Page