Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (95)
  • Open Access

    ARTICLE

    MLPG Method Based on Rankine Source Solution for Modelling 3D Breaking Waves

    J.T. Zhou1, Q.W. Ma1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.56, No.2, pp. 179-210, 2010, DOI:10.3970/cmes.2010.056.179

    Abstract In this paper, the Meshless Local Petrov-Galerkin method based on Rankine source solution (MLPG_R) is further developed to model 3D breaking waves. For this purpose, the technique for identifying free surface particles called Mixed Particle Number Density and Auxiliary Function Method (MPAM) and the semi-analytical technique for estimating the domain integrals for 2D cases are extended to 3D cases. In addition, a new semi-analytical technique is developed to deal with the local spherical surface integrals. The numerical results obtained by the newly developed method will be compared with experimental data available in literature and satisfactory agreement will be shown. More >

  • Open Access

    ARTICLE

    MLPG Method Based on Rankine Source Solution for Simulating Nonlinear Water Waves

    Q.W. Ma1

    CMES-Computer Modeling in Engineering & Sciences, Vol.9, No.2, pp. 193-210, 2005, DOI:10.3970/cmes.2005.009.193

    Abstract Recently, the MLPG (Meshless Local Petrov-Galerkin Method) method has been successfully extended to simulating nonlinear water waves [Ma, (2005)]. In that paper, the author employed the Heaviside step function as the test function to formulate the weak form over local sub-domains, acquiring an expression in terms of pressure gradient. In this paper, the solution for Rankine sources is taken as the test function and the local weak form is expressed in term of pressure rather than pressure gradient. Apart from not including pressure gradient, velocity gradient is also eliminated from the weak form. In addition, a semi-analytical technique is developed… More >

  • Open Access

    ARTICLE

    Analyzing Dynamic Change in Social Network Based on Distribution-Free Multivariate Process Control Method

    Yan Liu1,*, Lian Liu1, Yu Yan2, Hao Feng1, Shichang Ding3

    CMC-Computers, Materials & Continua, Vol.60, No.3, pp. 1123-1139, 2019, DOI:10.32604/cmc.2019.05619

    Abstract Social organizations can be represented by social network because it can mathematically quantify and represent complex interrelated organizational behavior. Exploring the change in dynamic social network is essential for the situation awareness of the corresponding social organization. Social network usually evolves gradually and slightly, which is hard to be noticed. The statistical process control techniques in industry field have been used to distinguish the statistically significant change of social network. But the original method is narrowed due to some limitation on measures. This paper presents a generic framework to address the change detection problem in dynamic social network and introduces… More >

  • Open Access

    ARTICLE

    Adversarial Learning for Distant Supervised Relation Extraction

    Daojian Zeng1,3, Yuan Dai1,3, Feng Li1,3, R. Simon Sherratt2, Jin Wang3,*

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 121-136, 2018, DOI:10.3970/cmc.2018.055.121

    Abstract Recently, many researchers have concentrated on using neural networks to learn features for Distant Supervised Relation Extraction (DSRE). These approaches generally use a softmax classifier with cross-entropy loss, which inevitably brings the noise of artificial class NA into classification process. To address the shortcoming, the classifier with ranking loss is employed to DSRE. Uniformly randomly selecting a relation or heuristically selecting the highest score among all incorrect relations are two common methods for generating a negative class in the ranking loss function. However, the majority of the generated negative class can be easily discriminated from positive class and will contribute… More >

  • Open Access

    ARTICLE

    Verifiable Diversity Ranking Search Over Encrypted Outsourced Data

    Yuling Liu1,*, Hua Peng1, Jie Wang2

    CMC-Computers, Materials & Continua, Vol.55, No.1, pp. 37-57, 2018, DOI:10.3970/cmc.2018.055.037

    Abstract Data outsourcing has become an important application of cloud computing. Driven by the growing security demands of data outsourcing applications, sensitive data have to be encrypted before outsourcing. Therefore, how to properly encrypt data in a way that the encrypted and remotely stored data can still be queried has become a challenging issue. Searchable encryption scheme is proposed to allow users to search over encrypted data. However, most searchable encryption schemes do not consider search result diversification, resulting in information redundancy. In this paper, a verifiable diversity ranking search scheme over encrypted outsourced data is proposed while preserving privacy in… More >

Displaying 91-100 on page 10 of 95. Per Page