Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (327)
  • Open Access

    ARTICLE

    NUMERICAL INVESTIGATION OF HEAT TRANSPORT IN A DIRECT METHANOL FUEL CELL WITH ANISOTROPIC GAS DIFFUSION LAYERS

    Zheng Miaoa, Ya-Ling Hea,*, Tian-Shou Zhaob, Wen-Quan Taoa

    Frontiers in Heat and Mass Transfer, Vol.2, No.1, pp. 1-10, 2011, DOI:10.5098/hmt.v2.1.3001

    Abstract A non-isothermal two-phase mass transport model is developed in this paper to investigate the heat generation and transport phenomena in a direct methanol fuel cell with anisotropic gas diffusion layers (GDLs). Thermal contact resistances at the GDL/CL (catalyst layer) and GDL/Rib interfaces, and the deformation of GDLs are considered together with the inherent anisotropy of the GDL. Latent heat effects due to condensation/evaporation of water and methanol between liquid and gas phases are also taken into account. Formulation of the two-phase mass transport across the membrane electrode assembly (MEA) is mainly based on the classical multiphase flow theory in the… More >

  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System

    Yanzhong Sun1, Xiaoni Du1,*, Shufen Niu2, Xiaodong Yang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3287-3310, 2024, DOI:10.32604/cmes.2023.043589

    Abstract Traditional email systems can only achieve one-way communication, which means only the receiver is allowed to search for emails on the email server. In this paper, we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption (CL-BSE) by combining the storage function of cloud server with the communication function of email server. In the new model, not only can the data receiver search for the relevant content by generating its own trapdoor, but the data owner also can retrieve the content in the same way. Meanwhile, there are dual… More >

  • Open Access

    REVIEW

    A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions

    Shahriar Md Arman1, Tao Yang1,*, Shahadat Shahed2, Alanoud Al Mazroa3, Afraa Attiah4, Linda Mohaisen4

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2087-2110, 2024, DOI:10.32604/cmc.2024.047870

    Abstract The rapid growth of smart technologies and services has intensified the challenges surrounding identity authentication techniques. Biometric credentials are increasingly being used for verification due to their advantages over traditional methods, making it crucial to safeguard the privacy of people’s biometric data in various scenarios. This paper offers an in-depth exploration for privacy-preserving techniques and potential threats to biometric systems. It proposes a noble and thorough taxonomy survey for privacy-preserving techniques, as well as a systematic framework for categorizing the field’s existing literature. We review the state-of-the-art methods and address their advantages and limitations in the context of various biometric… More >

  • Open Access

    ARTICLE

    Classification of Conversational Sentences Using an Ensemble Pre-Trained Language Model with the Fine-Tuned Parameter

    R. Sujatha, K. Nimala*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1669-1686, 2024, DOI:10.32604/cmc.2023.046963

    Abstract Sentence classification is the process of categorizing a sentence based on the context of the sentence. Sentence categorization requires more semantic highlights than other tasks, such as dependence parsing, which requires more syntactic elements. Most existing strategies focus on the general semantics of a conversation without involving the context of the sentence, recognizing the progress and comparing impacts. An ensemble pre-trained language model was taken up here to classify the conversation sentences from the conversation corpus. The conversational sentences are classified into four categories: information, question, directive, and commission. These classification label sequences are for analyzing the conversation progress and… More >

  • Open Access

    ARTICLE

    A Normalizing Flow-Based Bidirectional Mapping Residual Network for Unsupervised Defect Detection

    Lanyao Zhang1, Shichao Kan2, Yigang Cen3, Xiaoling Chen1, Linna Zhang1,*, Yansen Huang4,5

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1631-1648, 2024, DOI:10.32604/cmc.2024.046924

    Abstract Unsupervised methods based on density representation have shown their abilities in anomaly detection, but detection performance still needs to be improved. Specifically, approaches using normalizing flows can accurately evaluate sample distributions, mapping normal features to the normal distribution and anomalous features outside it. Consequently, this paper proposes a Normalizing Flow-based Bidirectional Mapping Residual Network (NF-BMR). It utilizes pre-trained Convolutional Neural Networks (CNN) and normalizing flows to construct discriminative source and target domain feature spaces. Additionally, to better learn feature information in both domain spaces, we propose the Bidirectional Mapping Residual Network (BMR), which maps sample features to these two spaces… More > Graphic Abstract

    A Normalizing Flow-Based Bidirectional Mapping Residual Network for Unsupervised Defect Detection

  • Open Access

    ARTICLE

    Facial Expression Recognition with High Response-Based Local Directional Pattern (HR-LDP) Network

    Sherly Alphonse*, Harshit Verma

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2067-2086, 2024, DOI:10.32604/cmc.2024.046070

    Abstract Although lots of research has been done in recognizing facial expressions, there is still a need to increase the accuracy of facial expression recognition, particularly under uncontrolled situations. The use of Local Directional Patterns (LDP), which has good characteristics for emotion detection has yielded encouraging results. An innovative end-to-end learnable High Response-based Local Directional Pattern (HR-LDP) network for facial emotion recognition is implemented by employing fixed convolutional filters in the proposed work. By combining learnable convolutional layers with fixed-parameter HR-LDP layers made up of eight Kirsch filters and derivable simulated gate functions, this network considerably minimizes the number of network… More >

  • Open Access

    ARTICLE

    RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments

    Amal Hkiri1,*, Mouna Karmani1, Omar Ben Bahri2, Ahmed Mohammed Murayr2, Fawaz Hassan Alasmari2, Mohsen Machhout1

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 227-247, 2024, DOI:10.32604/cmc.2023.047087

    Abstract The RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem. Despite its significance, RPL’s susceptibility to attacks remains a concern. This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static and mobile network environments. We employ the Random Direction Mobility Model (RDM) for mobile scenarios within the Cooja simulator. Our systematic evaluation focuses on critical performance metrics, including Packet Delivery Ratio (PDR), Average End to End Delay (AE2ED), throughput, Expected Transmission Count (ETX), and Average Power Consumption… More >

  • Open Access

    ARTICLE

    A Time Series Intrusion Detection Method Based on SSAE, TCN and Bi-LSTM

    Zhenxiang He*, Xunxi Wang, Chunwei Li

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 845-871, 2024, DOI:10.32604/cmc.2023.046607

    Abstract In the fast-evolving landscape of digital networks, the incidence of network intrusions has escalated alarmingly. Simultaneously, the crucial role of time series data in intrusion detection remains largely underappreciated, with most systems failing to capture the time-bound nuances of network traffic. This leads to compromised detection accuracy and overlooked temporal patterns. Addressing this gap, we introduce a novel SSAE-TCN-BiLSTM (STL) model that integrates time series analysis, significantly enhancing detection capabilities. Our approach reduces feature dimensionality with a Stacked Sparse Autoencoder (SSAE) and extracts temporally relevant features through a Temporal Convolutional Network (TCN) and Bidirectional Long Short-term Memory Network (Bi-LSTM). By… More >

  • Open Access

    ARTICLE

    A Reverse Path Planning Approach for Enhanced Performance of Multi-Degree-of-Freedom Industrial Manipulators

    Zhiwei Lin1, Hui Wang1,*, Tianding Chen1, Yingtao Jiang2, Jianmei Jiang3, Yingpin Chen1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1357-1379, 2024, DOI:10.32604/cmes.2023.045990

    Abstract In the domain of autonomous industrial manipulators, precise positioning and appropriate posture selection in path planning are pivotal for tasks involving obstacle avoidance, such as handling, heat sealing, and stacking. While Multi-Degree-of-Freedom (MDOF) manipulators offer kinematic redundancy, aiding in the derivation of optimal inverse kinematic solutions to meet position and posture requisites, their path planning entails intricate multi-objective optimization, encompassing path, posture, and joint motion optimization. Achieving satisfactory results in practical scenarios remains challenging. In response, this study introduces a novel Reverse Path Planning (RPP) methodology tailored for industrial manipulators. The approach commences by conceptualizing the manipulator’s end-effector as an… More > Graphic Abstract

    A Reverse Path Planning Approach for Enhanced Performance of Multi-Degree-of-Freedom Industrial Manipulators

  • Open Access

    ARTICLE

    Investigations on High-Speed Flash Boiling Atomization of Fuel Based on Numerical Simulations

    Wei Zhong1, Zhenfang Xin2, Lihua Wang1,*, Haiping Liu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1427-1453, 2024, DOI:10.32604/cmes.2023.031271

    Abstract Flash boiling atomization (FBA) is a promising approach for enhancing spray atomization, which can generate a fine and more evenly distributed spray by increasing the fuel injection temperature or reducing the ambient pressure. However, when the outlet speed of the nozzle exceeds 400 m/s, investigating high-speed flash boiling atomization (HFBA) becomes quite challenging. This difficulty arises from the involvement of many complex physical processes and the requirement for a very fine mesh in numerical simulations. In this study, an HFBA model for gasoline direct injection (GDI) is established. This model incorporates primary and secondary atomization, as well as vaporization and… More >

Displaying 11-20 on page 2 of 327. Per Page