Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    PRESSURE DROP MEASUREMENTS WITH BOILING IN DIVERGING MICROCHANNEL

    Amit Agrawala,*, V.S. Duryodhana, S. G. Singhb

    Frontiers in Heat and Mass Transfer, Vol.3, No.1, pp. 1-7, 2012, DOI:10.5098/hmt.v3.1.3005

    Abstract An experimental study of flow boiling through diverging microchannels has been carried out in this work, with the aim of exploring reduction in flow instabilities during boiling in diverging microchannels. Effect of mass flux, heat flux and divergence angle on two phase pressure drop has been studied using deionized water as the working fluid. The experiments are carried out on three test sections with divergence angle of 4, 8 and 12 deg with nearly constant hydraulic diameter (146, 154 and 157 µm respectively), for inlet mass flux and heat flux range of 117 - 1197 kg/m2 -s and 2.5 to… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Robust Morphed Face Authentication Framework for Online Systems

    Harsh Mankodiya1, Priyal Palkhiwala1, Rajesh Gupta1,*, Nilesh Kumar Jadav1, Sudeep Tanwar1, Osama Alfarraj2, Amr Tolba2, Maria Simona Raboaca3,4,*, Verdes Marina5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1123-1142, 2023, DOI:10.32604/cmc.2023.038556

    Abstract The amalgamation of artificial intelligence (AI) with various areas has been in the picture for the past few years. AI has enhanced the functioning of several services, such as accomplishing better budgets, automating multiple tasks, and data-driven decision-making. Conducting hassle-free polling has been one of them. However, at the onset of the coronavirus in 2020, almost all worldly affairs occurred online, and many sectors switched to digital mode. This allows attackers to find security loopholes in digital systems and exploit them for their lucrative business. This paper proposes a three-layered deep learning (DL)-based authentication framework to develop a secure online… More >

  • Open Access

    PROCEEDINGS

    On the Static Aeroelasticity Instability of an Inverted Cantilever Plate with a Crack Under Steady Axial Airflow

    Junzhe Cui1, Dechun Zhang1, Peng Li1,*, Yiren Yang1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.1, pp. 1-1, 2023, DOI:10.32604/icces.2023.010401

    Abstract This study investigates the static instability of a cracked plate in subsonic airflow. The plate model is an inverted cantilever plate, where its leading edge is free and the trailing edge the clamped. A mathematical model of the crack is developed using the Dirac function, while Theodorsen aerodynamic mode is applied for the fluid force. To account for angle discontinuity caused by cracks, Fourier expansion is employed to transform the form corresponding to the angle into a continuous model. The critical divergent dynamic pressure and mode of an inverted cantilever plate with a crack are calculated using the Galerkin method.… More >

  • Open Access

    ARTICLE

    Genotypic Divergence, Photosynthetic Efficiency, Sodium Extrusion, and Osmoprotectant Regulation Conferred Salt Tolerance in Sorghum

    Ashaduzzaman Sagar1 , Md. Sabibul Haque1, Md. Alamgir Hossain1, Md. Nesar Uddin1, Jannat E. Tajkia1, Md. Ashik Mia1, Toufika Hossain Shabi2, Md. Solaiman Ali Fakir1, Md. Abdul Kader3,4,5, Walid Soufan6, Md. Atikur Rahman7, Muhammad Aamir Iqbal8, Mohammad Sohidul Islam9, Ayman El Sabagh10,*, A. K. M. Zakir Hossain1,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.8, pp. 2349-2368, 2023, DOI:10.32604/phyton.2023.028974

    Abstract Salt stress is one of the major limitations to modern agriculture that negatively influences plant growth and productivity. Salt tolerant cultivar can provide excellent solution to enhance stress tolerance with plant fitness to unfavorable environments. Therefore, this study was aimed to screen salt tolerant sorghum genotypes through evaluating of different morphological, biochemical, and physiological attributes in response to salinity stress. In this study, we have been evaluated total six sorghum genotypes including Hybrid sorgo, Debgiri, BD-703, BD-706, BD-707, and BD-725 under salt stress (12 dS m−1 NaCl). The response variables included length and weight of root and shoot, root: shoot… More >

  • Open Access

    ARTICLE

    Estimation of Genetic Divergence and Character Association Studies in Local and Exotic Diversity Panels of Soybean (Glycine max L.) Genotypes

    Syed Ali Zafar1,*, Muhammad Aslam2, Haroon Zaman Khan3, Sehrish Sarwar1, Rao Saad Rehman4, Mariam Hassan1, Ramala Masood Ahmad2, Rafaqat A. Gill5, Basharat Ali6, Ibrahim Al-Ashkar7, Abdullah Ibrahim7, Md Atikur Rahman8, Ayman El Sabagh9,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.6, pp. 1887-1906, 2023, DOI:10.32604/phyton.2023.027679

    Abstract The availability of favorable genetic diversity is a thriving vitality for the success of a breeding program. It provides a firm basis of selecting superior breeding lines for the development of high yielding crop genotypes. In this context, present investigation aimed to generate information on genetic divergence and character association in a diversity panel of 123 local and exotic soybean genotypes. Analysis of variance revealed significant response of the evaluated genotypes based on studied attributes. It depicted the probability of selecting desirable soybean genotypes by focusing on character association studies and genetic diversity analysis. Correlation analysis revealed that seed yield… More >

  • Open Access

    ARTICLE

    Federated Learning Based on Data Divergence and Differential Privacy in Financial Risk Control Research

    Mao Yuxin, Wang Honglin*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 863-878, 2023, DOI:10.32604/cmc.2023.034879

    Abstract In the financial sector, data are highly confidential and sensitive, and ensuring data privacy is critical. Sample fusion is the basis of horizontal federation learning, but it is suitable only for scenarios where customers have the same format but different targets, namely for scenarios with strong feature overlapping and weak user overlapping. To solve this limitation, this paper proposes a federated learning-based model with local data sharing and differential privacy. The indexing mechanism of differential privacy is used to obtain different degrees of privacy budgets, which are applied to the gradient according to the contribution degree to ensure privacy without… More >

  • Open Access

    ARTICLE

    Drought Tolerance in Mung Bean is Associated with the Genotypic Divergence, Regulation of Proline, Photosynthetic Pigment and Water Relation

    Mohammad Rafiqul Islam1, Mohd Mostofa Kamal2, Mohammad Faruk Hossain3, Jamil Hossain4, Mohammad Golam Azam4,11, Mst Masuma Akhter5, M. Kamrul Hasan6, Ibrahim Al-Ashkar7, Khalid F. Almutairi7, Ayman EL Sabagh8,*, Md Atikur Rahman9, Muhammad Aamir Iqbal10, Mohammad Sohidul Islam6,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.3, pp. 955-981, 2023, DOI:10.32604/phyton.2023.025138

    Abstract Drought is one of the critical conditions for the growth and productivity of many crops including mung bean (Vigna radiata L. Wilczek). Screening of genotypes for variations is one of the suitable strategies for evaluating crop adaptability and global food security. In this context, the study investigated the physiological and biochemical responses of four drought tolerant (BARI Mung-8, BMX-08010-2, BMX-010015, BMX-08009-7), and four drought sensitive (BARI Mung-1, BARI Mung-3, BU Mung-4, BMX-05001) mung bean genotypes under wellwatered (WW) and water deficit (WD) conditions. The WW treatment maintained sufficient soil moisture (22% ± 0.5%, i.e., 30% deficit of available water) by… More >

  • Open Access

    ARTICLE

    Fuzzy Reputation Based Trust Mechanism for Mitigating Attacks in MANET

    S. Maheswari, R. Vijayabhasker*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3677-3692, 2023, DOI:10.32604/iasc.2023.031422

    Abstract Mobile Ad-hoc Networks (MANET) usage across the globe is increasing by the day. Evaluating a node’s trust value has significant advantages since such network applications only run efficiently by involving trustable nodes. The trust values are estimated based on the reputation values of each node in the network by using different mechanisms. However, these mechanisms have various challenging issues which degrade the network performance. Hence, a novel Quality of Service (QoS) Trust Estimation with Black/Gray hole Attack Detection approach is proposed in this research work. Initially, the QoS-based trust estimation is proposed by using a Fuzzy logic scheme. The trust… More >

  • Open Access

    ARTICLE

    Spectral Matching Classification Method of Multi-State Similar Pigments Based on Feature Differences

    Meng Da1, Huiqin Wang1,*, Ke Wang1, Zhan Wang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 513-527, 2022, DOI:10.32604/cmes.2022.019040

    Abstract The properties of the same pigments in murals are affected by different concentrations and particle diameters, which cause the shape of the spectral reflectance data curve to vary, thus influencing the outcome of matching calculations. This paper proposes a spectral matching classification method of multi-state similar pigments based on feature differences. Fast principal component analysis (FPCA) was used to calculate the eigenvalue variance of pigment spectral reflectance, then applied to the original reflectance values for parameter characterization. We first projected the original spectral reflectance from the spectral space to the characteristic variance space to identify the spectral curve. Secondly, the… More >

  • Open Access

    ARTICLE

    Semantic Based Greedy Levy Gradient Boosting Algorithm for Phishing Detection

    R. Sakunthala Jenni*, S. Shankar

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 525-538, 2022, DOI:10.32604/csse.2022.019300

    Abstract The detection of phishing and legitimate websites is considered a great challenge for web service providers because the users of such websites are indistinguishable. Phishing websites also create traffic in the entire network. Another phishing issue is the broadening malware of the entire network, thus highlighting the demand for their detection while massive datasets (i.e., big data) are processed. Despite the application of boosting mechanisms in phishing detection, these methods are prone to significant errors in their output, specifically due to the combination of all website features in the training state. The upcoming big data system requires MapReduce, a popular… More >

Displaying 1-10 on page 1 of 16. Per Page