Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (139)
  • Open Access

    PROCEEDINGS

    Atomistic Migration Mechanisms of [1210] Symmetric Tilt Grain Boundaries in Magnesium

    Chuanlong Xu1, Haidong Fan1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.25, No.3, pp. 1-1, 2023, DOI:10.32604/icces.2023.010110

    Abstract Grain boundary (GB) is an important microstructure and plays a vital role in the mechanical properties of polycrystalline materials by GB migration and sliding. In this work, molecular dynamic (MD) simulations were performed to investigate the migration mechanisms of symmetric tilt grain boundaries (STGBs) in magnesium. A total of 15 STGBs with the rotation angle θ from 0° to 90° were studied under a pure shear loading. The results show that the GB migration mechanisms are significantly influenced by the GB structure. For small angle STGBs (θ<28°), the GB migration is mediated … More >

  • Open Access

    ARTICLE

    Research on Asymmetric Fault Location of Wind Farm Collection System Based on Compressed Sensing

    Huanan Yu1, Gang Han1,*, Hansong Luo2, He Wang1

    Energy Engineering, Vol.120, No.9, pp. 2029-2057, 2023, DOI:10.32604/ee.2023.028365 - 03 August 2023

    Abstract Aiming at the problem that most of the cables in the power collection system of offshore wind farms are buried deep in the seabed, which makes it difficult to detect faults, this paper proposes a two-step fault location method based on compressed sensing and ranging equation. The first step is to determine the fault zone through compressed sensing, and improve the data measurement, dictionary design and algorithm reconstruction: Firstly, the phase-locked loop trigonometric function method is used to suppress the spike phenomenon when extracting the fault voltage, so that the extracted voltage value will not… More >

  • Open Access

    ARTICLE

    A Fault Feature Extraction Model in Synchronous Generator under Stator Inter-Turn Short Circuit Based on ACMD and DEO3S

    Yuling He, Shuai Li, Chao Zhang*, Xiaolong Wang

    Structural Durability & Health Monitoring, Vol.17, No.2, pp. 115-130, 2023, DOI:10.32604/sdhm.2023.022317 - 09 May 2023

    Abstract This paper proposed a new diagnosis model for the stator inter-turn short circuit fault in synchronous generators. Different from the past methods focused on the current or voltage signals to diagnose the electrical fault, the stator vibration signal analysis based on ACMD (adaptive chirp mode decomposition) and DEO3S (demodulation energy operator of symmetrical differencing) was adopted to extract the fault feature. Firstly, FT (Fourier transform) is applied to the vibration signal to obtain the instantaneous frequency, and PE (permutation entropy) is calculated to select the proper weighting coefficients. Then, the signal is decomposed by ACMD, More >

  • Open Access

    ARTICLE

    ASYMMETRIC PHENOMENON OF FLICKERING FLAME UNDER DIFFERENT CO-FLOW VELOCITIES

    Wenhua Liua,b, Mo Yangc,a,*, Yuwen Zhangb , Guiliang Liua , Liang Linga , Xuchen Yinga,*

    Frontiers in Heat and Mass Transfer, Vol.20, pp. 1-7, 2023, DOI:10.5098/hmt.20.15

    Abstract In this study, numerical investigations are performed on a partially premixed flame of methane and air in two- and three-dimensional models. Nonlinear method is adopted to illustrate the asymmetric phenomenon that affects the flame stability under various co-flow velocities. According to the results, the mathematical relationship between the flame flickering frequency Stanton number and the dimensionless velocity Froude number has been summarized as St=0.7Fr-0.46. The bifurcation phenomena under different Reynold numbers are found to have significant influence on the system stability. Two critical bifurcation points, which is when Re=300 and Re=1200, are determined as the onset More >

  • Open Access

    ARTICLE

    Modified Wild Horse Optimization with Deep Learning Enabled Symmetric Human Activity Recognition Model

    Bareen Shamsaldeen Tahir1, Zainab Salih Ageed2, Sheren Sadiq Hasan3, Subhi R. M. Zeebaree4,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4009-4024, 2023, DOI:10.32604/cmc.2023.037433 - 31 March 2023

    Abstract Traditional indoor human activity recognition (HAR) is a time-series data classification problem and needs feature extraction. Presently, considerable attention has been given to the domain of HAR due to the enormous amount of its real-time uses in real-time applications, namely surveillance by authorities, biometric user identification, and health monitoring of older people. The extensive usage of the Internet of Things (IoT) and wearable sensor devices has made the topic of HAR a vital subject in ubiquitous and mobile computing. The more commonly utilized inference and problem-solving technique in the HAR system have recently been deep… More >

  • Open Access

    ARTICLE

    Asymmetric Consortium Blockchain and Homomorphically Polynomial-Based PIR for Secured Smart Parking Systems

    T. Haritha, A. Anitha*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3923-3939, 2023, DOI:10.32604/cmc.2023.036278 - 31 March 2023

    Abstract In crowded cities, searching for the availability of parking lots is a herculean task as it results in the wastage of drivers’ time, increases air pollution, and traffic congestion. Smart parking systems facilitate the drivers to determine the information about the parking lot in real time and book them depending on the requirement. But the existing smart parking systems necessitate the drivers to reveal their sensitive information that includes their mobile number, personal identity, and desired destination. This disclosure of sensitive information makes the existing centralized smart parking systems more vulnerable to service providers’ security… More >

  • Open Access

    ARTICLE

    Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality

    Ali Arshad1,*, Muhammad Nadeem2, Saman Riaz1, Syeda Wajiha Zahra2, Ashit Kumar Dutta3, Zaid Alzaid4, Rana Alabdan5, Badr Almutairi6, Sultan Almotairi4,7

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3065-3089, 2023, DOI:10.32604/cmc.2023.035695 - 31 March 2023

    Abstract There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker… More >

  • Open Access

    ARTICLE

    On a Novel Extended Lomax Distribution with Asymmetric Properties and Its Statistical Applications

    Aisha Fayomi1, Christophe Chesneau2,*, Farrukh Jamal3, Ali Algarni1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2371-2403, 2023, DOI:10.32604/cmes.2023.027000 - 09 March 2023

    Abstract In this article, we highlight a new three-parameter heavy-tailed lifetime distribution that aims to extend the modeling possibilities of the Lomax distribution. It is called the extended Lomax distribution. The considered distribution naturally appears as the distribution of a transformation of a random variable following the logweighted power distribution recently introduced for percentage or proportion data analysis purposes. As a result, its cumulative distribution has the same functional basis as that of the Lomax distribution, but with a novel special logarithmic term depending on several parameters. The modulation of this logarithmic term reveals new types… More >

  • Open Access

    ARTICLE

    Numerical Investigation of the Temperature and Flow Fields in a Solar Chimney Power Plant

    Roudouane Laouar1,*, Olaf Wünsch2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.4, pp. 1055-1066, 2023, DOI:10.32604/fdmp.2022.022677 - 02 November 2022

    Abstract In this work, a parametric two-dimensional computational fluid dynamics (CFD) analysis of a solar chimney power plant (a prototype located in Manzanares, Spain) is presented to illustrate the effects of the solar radiation mode in the collector on the plant performances. The simulations rely on a mathematical model that includes solar radiation within the collector; energy storage; air flow and heat transfer, and a turbine. It is based on the Navier-Stokes equation for turbulent flow formulated according to the standard k-ε model. Moreover, the Boussinesq approach is used to account for the fluid density variations. More >

  • Open Access

    ARTICLE

    An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms

    Muhammad Nadeem1, Ali Arshad2,*, Saman Riaz2, Syeda Wajiha Zahra1, Ashit Kumar Dutta3, Moteeb Al Moteri4, Sultan Almotairi5

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4059-4079, 2023, DOI:10.32604/cmc.2023.032882 - 31 October 2022

    Abstract Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form. Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data. This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse. If this algorithm is applied to the cloud network, the attacker will not be able to access the data. To encrypt the data, the values of the bytes have been obtained by converting the plain text to… More >

Displaying 21-30 on page 3 of 139. Per Page