Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (514)
  • Open Access

    ARTICLE

    Surface Defect Detection and Evaluation Method of Large Wind Turbine Blades Based on an Improved Deeplabv3+ Deep Learning Model

    Wanrun Li1,2,3,*, Wenhai Zhao1, Tongtong Wang1, Yongfeng Du1,2,3

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 553-575, 2024, DOI:10.32604/sdhm.2024.050751

    Abstract The accumulation of defects on wind turbine blade surfaces can lead to irreversible damage, impacting the aerodynamic performance of the blades. To address the challenge of detecting and quantifying surface defects on wind turbine blades, a blade surface defect detection and quantification method based on an improved Deeplabv3+ deep learning model is proposed. Firstly, an improved method for wind turbine blade surface defect detection, utilizing Mobilenetv2 as the backbone feature extraction network, is proposed based on an original Deeplabv3+ deep learning model to address the issue of limited robustness. Secondly, through integrating the concept of… More > Graphic Abstract

    Surface Defect Detection and Evaluation Method of Large Wind Turbine Blades Based on an Improved Deeplabv3+ Deep Learning Model

  • Open Access

    ARTICLE

    Target Detection on Water Surfaces Using Fusion of Camera and LiDAR Based Information

    Yongguo Li, Yuanrong Wang, Jia Xie*, Caiyin Xu, Kun Zhang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 467-486, 2024, DOI:10.32604/cmc.2024.051426

    Abstract To address the challenges of missed detections in water surface target detection using solely visual algorithms in unmanned surface vehicle (USV) perception, this paper proposes a method based on the fusion of visual and LiDAR point-cloud projection for water surface target detection. Firstly, the visual recognition component employs an improved YOLOv7 algorithm based on a self-built dataset for the detection of water surface targets. This algorithm modifies the original YOLOv7 architecture to a Slim-Neck structure, addressing the problem of excessive redundant information during feature extraction in the original YOLOv7 network model. Simultaneously, this modification simplifies… More >

  • Open Access

    ARTICLE

    Adsorption of Malachite Green Using Activated Carbon from Mangosteen Peel: Optimization Using Box-Behnken Design

    Nabila Eka Yuningsih, Latifa Ariani, Suprapto Suprapto, Ita Ulfin, Harmami Harmami, Hendro Juwono, Yatim Lailun Ni’mah*

    Journal of Renewable Materials, Vol.12, No.5, pp. 981-992, 2024, DOI:10.32604/jrm.2024.049109

    Abstract In this research, activated carbon from mangosteen peel has been synthesized using sulfuric acid as an activator. The adsorption performance of the activated carbon was optimized using malachite green dye as absorbate. Malachite green dye waste is a toxic and non-biodegradable material that damages the environment. Optimization of adsorption processes was carried out using Response Surface Methodology (RSM) with a Box-Behnken Design (BBD). The synthesized activated carbon was characterized using FTIR and SEM instruments. The FTIR spectra confirmed the presence of a sulfonate group (-SOH) in the activated carbon, indicating that the activation process using… More >

  • Open Access

    ARTICLE

    FFRA: A Fine-Grained Function-Level Framework to Reduce the Attack Surface

    Xingxing Zhang1, Liang Liu1,*, Yu Fan1, Qian Zhou2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 969-987, 2024, DOI:10.32604/csse.2024.046615

    Abstract System calls are essential interfaces that enable applications to access and utilize the operating system’s services and resources. Attackers frequently exploit application’s vulnerabilities and misuse system calls to execute malicious code, aiming to elevate privileges and so on. Consequently, restricting the misuse of system calls becomes a crucial measure in ensuring system security. It is an effective method known as reducing the attack surface. Existing attack surface reduction techniques construct a global whitelist of system calls for the entire lifetime of the application, which is coarse-grained. In this paper, we propose a Fine-grained Function-level framework… More >

  • Open Access

    ARTICLE

    Numerical Investigations on Fluid Flow and Heat Transfer Characteristics of an Ultra-Thin Heat Pipe with Separated Wick Structures

    Yasushi Koito1,*, Akira Fukushima2

    Frontiers in Heat and Mass Transfer, Vol.22, No.3, pp. 869-887, 2024, DOI:10.32604/fhmt.2024.050910

    Abstract Thermal and fluid-flow characteristics were numerically analyzed for ultra-thin heat pipes. Many studies have been conducted for ultra-thin heat pipes with a centered wick structure, but this study focused on separated wick structures to increase the evaporation/condensation surface areas within the heat pipe and to reduce the concentration of heat flux within the wick structure. A mathematical heat-pipe model was made in the three-dimensional coordinate system, and the model consisted of three regions: a vapor channel, liquid-wick, and container wall regions. The conservation equations for mass, momentum, and energy were solved numerically with boundary conditions… More >

  • Open Access

    ARTICLE

    Finite Element Analysis for Magneto-Convection Heat Transfer Performance in Vertical Wavy Surface Enclosure: Fin Size Impact

    Md. Fayz-Al-Asad1,4, F. Mebarek-Oudina2,*, H. Vaidya3, Md. Shamim Hasan4, Md. Manirul Alam Sarker4, A. I. Ismail5

    Frontiers in Heat and Mass Transfer, Vol.22, No.3, pp. 817-837, 2024, DOI:10.32604/fhmt.2024.050814

    Abstract The goal of this paper is to represent a numerical study of magnetohydrodynamic mixed convection heat transfer in a lid-driven vertical wavy enclosure with a fin attached to the bottom wall. We use a finite element method based on Galerkin weighted residual (GWR) techniques to set up the appropriate governing equations for the present flow model. We have conducted a parametric investigation to examine the impact of Hartmann and Richardson numbers on the flow pattern and heat transmission features inside a wavy cavity. We graphically represent the numerical results, such as isotherms, streamlines, velocity profiles,… More >

  • Open Access

    ARTICLE

    Numerical Predictions of Laminar Forced Convection Heat Transfer with and without Buoyancy Effects from an Isothermal Horizontal Flat Plate to Supercritical Nitrogen

    K. S. Rajendra Prasad1, Sathya Sai2, T. R. Seetharam3, Adithya Garimella1,*

    Frontiers in Heat and Mass Transfer, Vol.22, No.3, pp. 889-917, 2024, DOI:10.32604/fhmt.2024.047703

    Abstract Numerical predictions are made for Laminar Forced convection heat transfer with and without buoyancy effects for Supercritical Nitrogen flowing over an isothermal horizontal flat plate with a heated surface facing downwards. Computations are performed by varying the value of from 5 to 30 K and ratio from 1.1 to 1.5. Variation of all the thermophysical properties of supercritical Nitrogen is considered. The wall temperatures are chosen in such a way that two values of T are less than is the temperature at which the fluid has a maximum value of C for the given pressure), More >

  • Open Access

    REVIEW

    Applications of Soft Computing Methods in Backbreak Assessment in Surface Mines: A Comprehensive Review

    Mojtaba Yari1,*, Manoj Khandelwal2, Payam Abbasi3, Evangelos I. Koutras4, Danial Jahed Armaghani5,*, Panagiotis G. Asteris4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2207-2238, 2024, DOI:10.32604/cmes.2024.048071

    Abstract Geo-engineering problems are known for their complexity and high uncertainty levels, requiring precise definitions, past experiences, logical reasoning, mathematical analysis, and practical insight to address them effectively. Soft Computing (SC) methods have gained popularity in engineering disciplines such as mining and civil engineering due to computer hardware and machine learning advancements. Unlike traditional hard computing approaches, SC models use soft values and fuzzy sets to navigate uncertain environments. This study focuses on the application of SC methods to predict backbreak, a common issue in blasting operations within mining and civil projects. Backbreak, which refers to More >

  • Open Access

    ARTICLE

    Rapid and Accurate Identification of Concrete Surface Cracks via a Lightweight & Efficient YOLOv3 Algorithm

    Haoan Gu1, Kai Zhu1, Alfred Strauss2, Yehui Shi3,4, Dragoslav Sumarac5, Maosen Cao1,*

    Structural Durability & Health Monitoring, Vol.18, No.4, pp. 363-380, 2024, DOI:10.32604/sdhm.2024.042388

    Abstract Concrete materials and structures are extensively used in transformation infrastructure and they usually bear cracks during their long-term operation. Detecting cracks using deep-learning algorithms like YOLOv3 (You Only Look Once version 3) is a new trend to pursue intelligent detection of concrete surface cracks. YOLOv3 is a typical deep-learning algorithm used for object detection. Owing to its generality, YOLOv3 lacks specific efficiency and accuracy in identifying concrete surface cracks. An improved algorithm based on YOLOv3, specialized in the rapid and accurate identification of concrete surface cracks is worthy of investigation. This study proposes a tailored… More >

  • Open Access

    ARTICLE

    Generalized nth-Order Perturbation Method Based on Loop Subdivision Surface Boundary Element Method for Three-Dimensional Broadband Structural Acoustic Uncertainty Analysis

    Ruijin Huo1,2,3, Qingxiang Pei1,2,3, Xiaohui Yuan1,*, Yanming Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 2053-2077, 2024, DOI:10.32604/cmes.2024.049185

    Abstract In this paper, a generalized th-order perturbation method based on the isogeometric boundary element method is proposed for the uncertainty analysis of broadband structural acoustic scattering problems. The Burton-Miller method is employed to solve the problem of non-unique solutions that may be encountered in the external acoustic field, and the th-order discretization formulation of the boundary integral equation is derived. In addition, the computation of loop subdivision surfaces and the subdivision rules are introduced. In order to confirm the effectiveness of the algorithm, the computed results are contrasted and analyzed with the results under Monte More >

Displaying 1-10 on page 1 of 514. Per Page