Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,660)
  • Open Access

    ARTICLE

    Design and Manufacture of Bionic Porous Titanium Alloy Spinal Implant Based on Selective Laser Melting (SLM)

    Xiaojun Chen1, Di Wang1,*, Wenhao Dou1, Yimeng Wang1, Yongqiang Yang1, Jianhua Wang2, Jie Chen1

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1099-1117, 2020, DOI:10.32604/cmes.2020.09619 - 21 August 2020

    Abstract In order to meet the clinical requirements of spine surgery, this paper proposed the exploratory research of computer-aided design and selective laser melting (SLM) fabrication of a bionic porous titanium spine implant. The structural design of the spinal implant is based on CT scanning data to ensure correct matching, and the mechanical properties of the implant are verified by simulation analysis and laser selective melting experiment. The surface roughness of the spinal implant manufactured by SLM without post-processing is Ra 15 μm, and the implant is precisely jointed with the photosensitive resin model of the… More >

  • Open Access

    ARTICLE

    Thermodynamics of Molten Pool Predicted by Computational Fluid Dynamics in Selective Laser Melting of Ti6Al4V: Surface Morphology Evolution and Densification Behavior

    Donghua Dai1,2, Dongdong Gu1,2,*, Qing Ge1,2, Chenglong Ma1,2, Xinyu Shi1,2, Han Zhang1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1085-1098, 2020, DOI:10.32604/cmes.2020.010927 - 21 August 2020

    Abstract The three-dimensional physical model of the randomly packed powder material irradiated by the laser beam was established, taking into account the transformation of the material phase, the melt spreading and the interaction of the free surface of the molten pool and the recoiling pressure caused by the material evaporation during the selective laser melting. Influence of the processing parameters on the thermal behavior, the material evaporation, the surface morphology and the densification behavior in the connection region of the molten pool and the substrate was studied. It was shown that the powder material underwent the… More >

  • Open Access

    ARTICLE

    Validating the Correct Wearing of Protection Mask by Taking a Selfie: Design of a Mobile Application “CheckYourMask” to Limit the Spread of COVID-19

    Karim Hammoudi1,2,*, Adnane Cabani3, Halim Benhabiles4, Mahmoud Melkemi1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1049-1059, 2020, DOI:10.32604/cmes.2020.011663 - 21 August 2020

    Abstract In a context of a virus that is transmissive by sputtering, wearing masks appear necessary to protect the wearer and to limit the propagation of the disease. Currently, we are facing the 2019–2020 coronavirus pandemic. Coronavirus disease 2019 (COVID-19) is an infectious disease with first symptoms similar to the flu. The symptom of COVID-19 was reported first in China and very quickly spreads to the rest of the world. The COVID-19 contagiousness is known to be high by comparison with the flu. In this paper, we propose a design of a mobile application for permitting… More >

  • Open Access

    ARTICLE

    Interpolating Isogeometric Boundary Node Method and Isogeometric Boundary Element Method Based on Parameter Space

    Hongyin Yang1,2, Jiwei Zhong1,*, Ying Wang3, Xingquan Chen2, Xiaoya Bian2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 807-824, 2020, DOI:10.32604/cmes.2020.010936 - 21 August 2020

    Abstract In this paper, general interpolating isogeometric boundary node method (IIBNM) and isogeometric boundary element method (IBEM) based on parameter space are proposed for 2D elasticity problems. In both methods, the integral cells and elements are defined in parameter space, which can reproduce the geometry exactly at all the stages. In IIBNM, the improved interpolating moving leastsquare method (IIMLS) is applied for field approximation and the shape functions have the delta function property. The Lagrangian basis functions are used for field approximation in IBEM. Thus, the boundary conditions can be imposed directly in both methods. The More >

  • Open Access

    ARTICLE

    Milling Parameters Optimization of Al-Li Alloy Thin-Wall Workpieces Using Response Surface Methodology and Particle Swarm Optimization

    Haitao Yue1, Chenguang Guo1,*, Qiang Li1, Lijuan Zhao1, Guangbo Hao2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 937-952, 2020, DOI:10.32604/cmes.2020.010565 - 21 August 2020

    Abstract To improve the milling surface quality of the Al-Li alloy thin-wall workpieces and reduce the cutting energy consumption. Experimental research on the milling processing of AA2195 Al-Li alloy thin-wall workpieces based on Response Surface Methodology was carried out. The single factor and interaction of milling parameters on surface roughness and specific cutting energy were analyzed, and the multi-objective optimization model was constructed. The Multiobjective Particle Swarm Optimization algorithm introducing the Chaos Local Search algorithm and the adaptive inertial weight was applied to determine the optimal combination of milling parameters. It was observed that surface roughness… More >

  • Open Access

    ARTICLE

    Predicting Human Mobility via Long Short-Term Patterns

    Jianwei Chen, Jianbo Li*, Ying Li

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 847-864, 2020, DOI:10.32604/cmes.2020.010240 - 21 August 2020

    Abstract Predicting human mobility has great significance in Location based Social Network applications, while it is challenging due to the impact of historical mobility patterns and current trajectories. Among these challenges, historical patterns tend to be crucial in the prediction task. However, it is difficult to capture complex patterns from long historical trajectories. Motivated by recent success of Convolutional Neural Network (CNN)-based methods, we propose a Union ConvGRU (UCG) Net, which can capture long short-term patterns of historical trajectories and sequential impact of current trajectories. Specifically, we first incorporate historical trajectories into hidden states by a More >

  • Open Access

    ARTICLE

    Who Will Come: Predicting Freshman Registration Based on Decision Tree

    Lei Yang1, Li Feng1, *, Liwei Tian1, Hongning Dai1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1825-1836, 2020, DOI:10.32604/cmc.2020.010011 - 20 August 2020

    Abstract The registration rate of freshmen has been a great concern at many colleges and universities, particularly private institutions. Traditionally, there are two inquiry methods: telephone and tuition-payment-status. Unfortunately, the former is not only time-consuming but also suffers from the fact that many students tend to keep their choices secret. On the other hand, the latter is not always feasible because only few students are willing to pay their university tuition fees in advance. It is often believed that it is impossible to predict incoming freshmen’s choice of university due to the large amount of subjectivity.… More >

  • Open Access

    ARTICLE

    Identifying Honeypots from ICS Devices Using Lightweight Fuzzy Testing

    Yanbin Sun1, Xiaojun Pan1, Chao Xu2, Penggang Sun2, Quanlong Guan3, Mohan Li1, *, Men Han4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1723-1737, 2020, DOI:10.32604/cmc.2020.010593 - 20 August 2020

    Abstract The security issues of industrial control systems (ICSs) have become increasingly prevalent. As an important part of ICS security, honeypots and antihoneypots have become the focus of offensive and defensive confrontation. However, research on ICS honeypots still lacks breakthroughs, and it is difficult to simulate real ICS devices perfectly. In this paper, we studied ICS honeypots to identify and address their weaknesses. First, an intelligent honeypot identification framework is proposed, based on which feature data type requirements and feature data acquisition for honeypot identification is studied. Inspired by vulnerability mining, we propose a feature acquisition More >

  • Open Access

    ARTICLE

    A Novel Method for Node Connectivity with Adaptive Dragonfly Algorithm and Graph-Based m-Connection Establishment in MANET

    S. B. Manoojkumaar1, *, C. Poongodi2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1649-1670, 2020, DOI:10.32604/cmc.2020.010781 - 20 August 2020

    Abstract Maximizing network lifetime is measured as the primary issue in Mobile Adhoc Networks (MANETs). In geographically routing based models, packet transmission seems to be more appropriate in dense circumstances. The involvement of the Heuristic model directly is not appropriate to offer an effectual solution as it becomes NP-hard issues; therefore investigators concentrate on using Meta-heuristic approaches. Dragonfly Optimization (DFO) is an effective meta-heuristic approach to resolve these problems by providing optimal solutions. Moreover, Meta-heuristic approaches (DFO) turn to be slower in convergence problems and need proper computational time while expanding network size. Thus, DFO is More >

  • Open Access

    ARTICLE

    A Middleware for Polyglot Persistence and Data Portability of Big Data PaaS Cloud Applications

    Kiranbir Kaur1, *, Sandeep Sharma1, Karanjeet Singh Kahlon2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1625-1647, 2020, DOI:10.32604/cmc.2020.011535 - 20 August 2020

    Abstract Vendor lock-in can occur at any layer of the cloud stack-Infrastructure, Platform, and Software-as-a-service. This paper covers the vendor lock-in issue at Platform as a Service (PaaS) level where applications can be created, deployed, and managed without worrying about the underlying infrastructure. These applications and their persisted data on one PaaS provider are not easy to port to another provider. To overcome this issue, we propose a middleware to abstract and make the database services as cloud-agnostic. The middleware supports several SQL and NoSQL data stores that can be hosted and ported among disparate PaaS… More >

Displaying 3801-3810 on page 381 of 5660. Per Page