Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (40)
  • Open Access

    ARTICLE

    On a Novel Extended Lomax Distribution with Asymmetric Properties and Its Statistical Applications

    Aisha Fayomi1, Christophe Chesneau2,*, Farrukh Jamal3, Ali Algarni1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2371-2403, 2023, DOI:10.32604/cmes.2023.027000

    Abstract In this article, we highlight a new three-parameter heavy-tailed lifetime distribution that aims to extend the modeling possibilities of the Lomax distribution. It is called the extended Lomax distribution. The considered distribution naturally appears as the distribution of a transformation of a random variable following the logweighted power distribution recently introduced for percentage or proportion data analysis purposes. As a result, its cumulative distribution has the same functional basis as that of the Lomax distribution, but with a novel special logarithmic term depending on several parameters. The modulation of this logarithmic term reveals new types of asymetrical shapes, implying a… More >

  • Open Access

    ARTICLE

    Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks

    Muhammad Nadeem1, Ali Arshad2, Saman Riaz2, Syeda Wajiha Zahra1, Shahab S. Band3, Amir Mosavi4,5,6,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2625-2640, 2023, DOI:10.32604/cmc.2023.030899

    Abstract Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double… More >

  • Open Access

    ARTICLE

    Coordinated Rotor-Side Control Strategy for Doubly-Fed Wind Turbine under Symmetrical and Asymmetrical Grid Faults

    Quanchun Yan1,2,*, Chao Yuan1, Wen Gu1, Yanan Liu1, Yiming Tang1

    Energy Engineering, Vol.120, No.1, pp. 49-68, 2023, DOI:10.32604/ee.2022.018555

    Abstract In order to solve the problems of rotor overvoltage, overcurrent and DC side voltage rise caused by grid voltage drops, a coordinated control strategy based on symmetrical and asymmetrical low voltage ride through of rotor side converter of the doubly-fed generator is proposed. When the power grid voltage drops symmetrically, the generator approximate equation under steady-state conditions is no longer applicable. Considering the dynamic process of stator current excitation, according to the change of stator flux and the depth of voltage drop, the system can dynamically provide reactive power support for parallel nodes and suppress the rise of DC side… More >

  • Open Access

    ARTICLE

    Fault Ride-Through (FRT) Behavior in VSC-HVDC as Key Enabler of Transmission Systems Using SCADA Viewer Software

    Samuel Bimenyimana1, Chen Wang1,*, Godwin Norense Osarumwense Asemota2, Aphrodis Nduwamungu2, Francis Mulolani6, Jean De Dieu Niyonteze8, Shilpi Bora1,7, Chun-Ling Ho1, Noel Hagumimana3, Theobald Habineza4, Waqar Bashir5, Yiyi Mo1

    Energy Engineering, Vol.119, No.6, pp. 2369-2406, 2022, DOI:10.32604/ee.2022.019257

    Abstract The world’s energy consumption and power generation demand will continue to rise. Furthermore, the bulk of the energy resources needed to satisfy the rising demand is far from the load centers. The aforementioned requires long-distance transmission systems and one way to accomplish this is to use high voltage direct current (HVDC) transmission systems. The main technical issues for HVDC transmission systems are loss of synchronism, variation of quadrature currents, amplitude, the inability of station 1 (rectifier), and station 2 (inverter) to either inject, or absorb active, or reactive power in the network in any circumstances (before a fault occurs, during… More >

  • Open Access

    ARTICLE

    Experimental Investigation of Regular or Wavy Two-Phase Flow in a Manifold

    Xiaowei Nie1, Lihui Ma2,*, Yiqiu Xu3, Dong Sun2, Weibo Zheng2, Liang Zhou2, Xiaodong Wang2, Xiaohan Zhang2, Weijia Dong2, Yunfei Li2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.1, pp. 37-50, 2023, DOI:10.32604/fdmp.2023.021118

    Abstract An experimental study was conducted to investigate the properties of stratified regular or wavy two-phase flow in two parallel separators located after a manifold. A total of 103 experiments with various gas and liquid velocity combinations in three inlet pipes were conducted, including 77 groups of outlet pipe resistance symmetry and 26 groups of outlet pipe resistance asymmetry trials. The experimental results have revealed that when the gas-liquid flow rate is low, the degree of uneven splitting is high, and “extreme” conditions are attained. When the superficial gas velocity is greater than that established in the extreme case, the direction… More >

  • Open Access

    ARTICLE

    Asymmetric Patch Element Reflectarray with Dual Linear and Dual Circular Polarization

    M. Hashim Dahri1, M. H. Jamaluddin2, M. Inam3, M. R. Kamarudin4, F. C. Seman4, A. Y. I. Ashyap4, Z. A. Shamsan5,*, K. Almuhanna5, F. Alorifi5

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6085-6101, 2022, DOI:10.32604/cmc.2022.031532

    Abstract A reflectarray antenna consisting of asymmetrical patch elements is proposed, which is capable of producing dual linear and dual circular polarized operation at 26 GHz frequency. The main purpose of this design is to support four different polarizations using the same patch element. The proposed reflectarray has a single layer configuration with a linearly polarized feed and circular ring slots in the ground plane. Asymmetric patch element is designed from a square patch element by tilting its one vertical side to some optimized inclination. A wide reflection phase range of 600° is obtained with the asymmetric patch element during unit cell… More >

  • Open Access

    ARTICLE

    Nutlin-3-Induced Sensitization of Non-Small Cell Lung Cancer Stem Cells to Axitinib-Induced Apoptosis Through Repression of Akt1/Wnt Signaling

    Meng Wang*1, Xin Wang†1, Yuan Li‡1, Qiang Xiao§, Xiao-Hai Cui*, Guo-Dong Xiao*, Ji-Chang Wang, Chong-Wen Xu#, Hong Ren*, Dapeng Liu*

    Oncology Research, Vol.27, No.9, pp. 987-995, 2019, DOI:10.3727/096504018X15424918479652

    Abstract The aim of this study was to investigate the potential biological activities of nutlin-3 in the regulation of growth and proliferation of non-small cell lung cancer (NSCLC) stem cells (CSCs), which may help in sensitizing to axitinib-induced apoptosis. Nutlin-3 induction of p53 expression was used to test its role in controlling the cell division pattern and apoptosis of NSCLC cells. A549 cells and H460 cells were pretreated with nutlin-3 and then treated with either an Akt1 activator or shRNA-GSK3 , to investigate the potential role of p53 sensitization in the biological effects of axitinib. We also determined the expression levels… More >

  • Open Access

    ARTICLE

    Modelling a Learning-Based Dynamic Tree Routing Model for Wireless Mesh Access Networks

    N. Krishnammal1,*, C. Kalaiarasan2, A. Bharathi3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1531-1549, 2023, DOI:10.32604/csse.2023.024251

    Abstract Link asymmetry in wireless mesh access networks (WMAN) of Mobile ad-hoc Networks (MANETs) is due mesh routers’ transmission range. It is depicted as significant research challenges that pose during the design of network protocol in wireless networks. Based on the extensive review, it is noted that the substantial link percentage is symmetric, i.e., many links are unidirectional. It is identified that the synchronous acknowledgement reliability is higher than the asynchronous message. Therefore, the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asymmetric links. It paves the way to exploit an investigation on asymmetric links… More >

  • Open Access

    ARTICLE

    Protected Fair Secret Sharing Based Bivariate Asymmetric Polynomials in Satellite Network

    Yanyan Han1,2, Jiangping Yu3, Guangyu Hu4, Chenglei Pan4, Dingbang Xie5, Chao Guo1,2,6,*, Abdul Waheed7

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4789-4802, 2022, DOI:10.32604/cmc.2022.027496

    Abstract Verifiable secret sharing mainly solves the cheating behavior between malicious participants and the ground control center in the satellite network. The verification stage can verify the effectiveness of secret shares issued by the ground control center to each participant and verify the effectiveness of secret shares shown by participants. We use a lot of difficult assumptions based on mathematical problems in the verification stage, such as solving the difficult problem of the discrete logarithm, large integer prime factorization, and so on. Compared with other verifiable secret sharing schemes designed for difficult problems under the same security, the verifiable secret sharing… More >

  • Open Access

    ARTICLE

    Study on the Mechanical Properties of Ni-Ti-Cu Shape Memory Alloy Considering Different Cu Contents

    Bingfei Liu1,*, Yangjie Hao2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1601-1613, 2022, DOI:10.32604/cmes.2022.019226

    Abstract By adding copper to increase the performance, the Ni-Ti-Cu Shape Memory Alloy (SMA), has been widely used in the field of engineering in recent years. A thermodynamic constitutive model for Ni-Ti-Cu SMA considering different copper contents is established in this work. Numerical results for two different copper contents, as examples, are compared with the experimental results to verify the accuracy of the theoretical work. Based on the verified constitutive model, the effects of different copper content on the mechanical properties of Ni-Ti-Cu SMA and the tensile and compressive asymmetric properties of Ni-Ti-Cu SMA are finally discussed, respectively. More >

Displaying 11-20 on page 2 of 40. Per Page