Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,356)
  • Open Access


    Retraction: Optimized Design of Bio-inspired Wind Turbine Blades

    Yuanjun Dai1,4,*, Dong Wang1, Xiongfei Liu2, Weimin Wu3

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.7, pp. 1665-1665, 2024, DOI:10.32604/fdmp.2024.053146

    Abstract This article has no abstract. More >

  • Open Access


    Optimized Design of Bio-Inspired Wind Turbine Blades

    Yuanjun Dai1,4,*, Dong Wang1, Xiongfei Liu2, Weimin Wu3

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.7, pp. 1647-1664, 2024, DOI:10.32604/fdmp.2024.046158

    Abstract To enhance the aerodynamic performance of wind turbine blades, this study proposes the adoption of a bionic airfoil inspired by the aerodynamic shape of an eagle. Based on the blade element theory, a non-uniform extraction method of blade elements is employed for the optimization design of the considered wind turbine blades. Moreover, Computational Fluid Dynamics (CFD) is used to determine the aerodynamic performances of the eagle airfoil and a NACA2412 airfoil, thereby demonstrating the superior aerodynamic performance of the former. Finally, a mathematical model for optimizing the design of wind turbine blades is introduced and More >

  • Open Access


    Enhancing Network Design through Statistical Evaluation of MANET Routing Protocols

    Ibrahim Alameri1,*, Tawfik Al-Hadhrami2, Anjum Nazir3, Abdulsamad Ebrahim Yahya4, Atef Gharbi5

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 319-339, 2024, DOI:10.32604/cmc.2024.052999

    Abstract This paper contributes a sophisticated statistical method for the assessment of performance in routing protocols salient Mobile Ad Hoc Network (MANET) routing protocols: Destination Sequenced Distance Vector (DSDV), Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), and Zone Routing Protocol (ZRP). In this paper, the evaluation will be carried out using complete sets of statistical tests such as Kruskal-Wallis, Mann-Whitney, and Friedman. It articulates a systematic evaluation of how the performance of the previous protocols varies with the number of nodes and the mobility patterns. The study is premised upon the Quality of More >

  • Open Access


    A Hybrid Feature Fusion Traffic Sign Detection Algorithm Based on YOLOv7

    Bingyi Ren1,4, Juwei Zhang2,3,4,*, Tong Wang2,4

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1425-1440, 2024, DOI:10.32604/cmc.2024.052667

    Abstract Autonomous driving technology has entered a period of rapid development, and traffic sign detection is one of the important tasks. Existing target detection networks are difficult to adapt to scenarios where target sizes are seriously imbalanced, and traffic sign targets are small and have unclear features, which makes detection more difficult. Therefore, we propose a Hybrid Feature Fusion Traffic Sign detection algorithm based on YOLOv7 (HFFT-YOLO). First, a self-attention mechanism is incorporated at the end of the backbone network to calculate feature interactions within scales; Secondly, the cross-scale fusion part of the neck introduces a… More >

  • Open Access


    Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies

    Waseem Akram1, Khalid Mahmood2, Hafiz Burhan ul Haq3, Muhammad Asif3, Shehzad Ashraf Chaudhry4,5, Taeshik Shon6,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 263-280, 2024, DOI:10.32604/cmc.2024.052405

    Abstract Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol (HTTP) requests and maintains the states of clients’ information over the Internet. HTTP cookies are exploited to carry client patterns observed by a website. These client patterns facilitate the particular client’s future visit to the corresponding website. However, security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser. Several protocols have been introduced that maintain HTTP cookies, but many of those fail to achieve More >

  • Open Access


    A New Speed Limit Recognition Methodology Based on Ensemble Learning: Hardware Validation

    Mohamed Karray1,*, Nesrine Triki2,*, Mohamed Ksantini2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 119-138, 2024, DOI:10.32604/cmc.2024.051562

    Abstract Advanced Driver Assistance Systems (ADAS) technologies can assist drivers or be part of automatic driving systems to support the driving process and improve the level of safety and comfort on the road. Traffic Sign Recognition System (TSRS) is one of the most important components of ADAS. Among the challenges with TSRS is being able to recognize road signs with the highest accuracy and the shortest processing time. Accordingly, this paper introduces a new real time methodology recognizing Speed Limit Signs based on a trio of developed modules. Firstly, the Speed Limit Detection (SLD) module uses… More >

  • Open Access


    QBIoT: A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature

    Ang Liu1, Qing Zhang2, Shengwei Xu3,*, Huamin Feng4, Xiu-bo Chen5, Wen Liu1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1727-1751, 2024, DOI:10.32604/cmc.2024.051233

    Abstract The Internet of Things (IoT) is a network system that connects physical devices through the Internet, allowing them to interact. Nowadays, IoT has become an integral part of our lives, offering convenience and smart functionality. However, the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats, such as device vulnerabilities, data privacy concerns, and network susceptibilities. Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security. Nevertheless, the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used… More >

  • Open Access


    A Multi-Strategy-Improved Northern Goshawk Optimization Algorithm for Global Optimization and Engineering Design

    Liang Zeng1,2, Mai Hu1, Chenning Zhang1, Quan Yuan1, Shanshan Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1677-1709, 2024, DOI:10.32604/cmc.2024.049717

    Abstract Optimization algorithms play a pivotal role in enhancing the performance and efficiency of systems across various scientific and engineering disciplines. To enhance the performance and alleviate the limitations of the Northern Goshawk Optimization (NGO) algorithm, particularly its tendency towards premature convergence and entrapment in local optima during function optimization processes, this study introduces an advanced Improved Northern Goshawk Optimization (INGO) algorithm. This algorithm incorporates a multifaceted enhancement strategy to boost operational efficiency. Initially, a tent chaotic map is employed in the initialization phase to generate a diverse initial population, providing high-quality feasible solutions. Subsequently, after… More >

  • Open Access


    Applying an Ordinal Priority Approach Based Neutrosophic Fuzzy Axiomatic Design Approach to Develop Sustainable Geothermal Energy Source

    Chia-Nan Wang, Thuy-Duong Thi Pham*, Nhat-Luong Nhieu

    Energy Engineering, Vol.121, No.8, pp. 2039-2064, 2024, DOI:10.32604/ee.2024.050224

    Abstract Geothermal energy is considered a renewable, environmentally friendly, especially carbon-free, sustainable energy source that can solve the problem of climate change. In general, countries with geothermal energy resources are the ones going through the ring of fire. Therefore, not every country is lucky enough to own this resource. As a country with 117 active volcanoes and within the world’s ring of fire, it is a country whose geothermal resources are estimated to be about 40% of the world’s geothermal energy potential. However, the percentage used compared to the geothermal potential is too small. Therefore, this… More >

  • Open Access


    Adsorption of Malachite Green Using Activated Carbon from Mangosteen Peel: Optimization Using Box-Behnken Design

    Nabila Eka Yuningsih, Latifa Ariani, Suprapto Suprapto, Ita Ulfin, Harmami Harmami, Hendro Juwono, Yatim Lailun Ni’mah*

    Journal of Renewable Materials, Vol.12, No.5, pp. 981-992, 2024, DOI:10.32604/jrm.2024.049109

    Abstract In this research, activated carbon from mangosteen peel has been synthesized using sulfuric acid as an activator. The adsorption performance of the activated carbon was optimized using malachite green dye as absorbate. Malachite green dye waste is a toxic and non-biodegradable material that damages the environment. Optimization of adsorption processes was carried out using Response Surface Methodology (RSM) with a Box-Behnken Design (BBD). The synthesized activated carbon was characterized using FTIR and SEM instruments. The FTIR spectra confirmed the presence of a sulfonate group (-SOH) in the activated carbon, indicating that the activation process using… More >

Displaying 1-10 on page 1 of 1356. Per Page