Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (161)
  • Open Access

    ARTICLE

    An Efficient Computational Method for Differential Equations of Fractional Type

    Mustafa Turkyilmazoglu1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.1, pp. 47-65, 2022, DOI:10.32604/cmes.2022.020781

    Abstract An effective solution method of fractional ordinary and partial differential equations is proposed in the present paper. The standard Adomian Decomposition Method (ADM) is modified via introducing a functional term involving both a variable and a parameter. A residual approach is then adopted to identify the optimal value of the embedded parameter within the frame of L2 norm. Numerical experiments on sample problems of open literature prove that the presented algorithm is quite accurate, more advantageous over the traditional ADM and straightforward to implement for the fractional ordinary and partial differential equations of the recent focus of mathematical models. Better… More >

  • Open Access

    ARTICLE

    Single Point Cutting Tool Fault Diagnosis in Turning Operation Using Reduced Error Pruning Tree Classifier

    E. Akshay1, V. Sugumaran1,*, M. Elangovan2

    Structural Durability & Health Monitoring, Vol.16, No.3, pp. 255-270, 2022, DOI:10.32604/sdhm.2022.0271

    Abstract Tool wear is inevitable in daily machining process since metal cutting process involves the chip rubbing the tool surface after it has been cut by the tool edge. Tool wear dominantly influences the deterioration of surface finish, geometric and dimensional tolerances of the workpiece. Moreover, for complete utilization of cutting tools and reduction of machine downtime during the machining process, it becomes necessary to understand the development of tool wear and predict its status before happening. In this study, tool condition monitoring system was used to monitor the behavior of a single point cutting tool to predict flank wear. A… More >

  • Open Access

    ARTICLE

    Handling Uncertainty in Human Cognitive Reliability Method for Safety Assessment Based on DSET

    Yujun Su1, Xianghao Gao2, Hong Qian2, Xiaoyan Su2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 201-214, 2022, DOI:10.32604/cmes.2022.020541

    Abstract Human Reliability Analysis (HRA) is an important part in safety assessment of a large complex system. Human Cognitive Reliability (HCR) model is a method of evaluating the probability that operators fail to complete during diagnostic decision making within a limited time, which is widely used in HRA. In the application of this method, cognitive patterns of humans are required to be considered and classified, and this process often relies on the evaluation opinions of experts which is highly subjective and uncertain. How to effectively express and process this uncertain and subjective information plays a critical role in improving the accuracy… More >

  • Open Access

    ARTICLE

    A Steganography Based on Optimal Multi-Threshold Block Labeling

    Shuying Xu1, Chin-Chen Chang1, Ji-Hwei Horng2,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 721-739, 2023, DOI:10.32604/csse.2023.026046

    Abstract Hiding secret data in digital images is one of the major research fields in information security. Recently, reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud services. This paper proposes a novel reversible data hiding method in encrypted images based on an optimal multi-threshold block labeling technique (OMTBL-RDHEI). In our scheme, the content owner encrypts the cover image with block permutation, pixel permutation, and stream cipher, which preserve the in-block correlation of pixel values. After uploading to the cloud service, the data hider applies the prediction error rearrangement (PER), the optimal threshold selection… More >

  • Open Access

    ARTICLE

    Simulating Error-Opening of Pressure Relief Valves of a Station on a Continuous Undulating Oil Pipeline with Large Elevation Difference

    Xiaohua Chen1,*, Caifu Lan1, Honghao Zheng2, Wang Li1, Chao Zhao1, Wenjun Dang3

    Energy Engineering, Vol.119, No.4, pp. 1439-1452, 2022, DOI:10.32604/ee.2022.018208

    Abstract For oil pipeline in mountain areas, high hydrostatic pressure in the pipeline may cause error-opening of pressure relief valves, and oil is discharged from the pipeline to the pressure relief tanks, bringing spilling-over risk of the pressure relief tanks. Therefore, simulating the error-opening situations of the pressure relief valves and investigating the oil discharge process are necessary for checking the possibility of the spilling-over accident and then proposing measures to improve the pressure relief system. This research focuses on a continuous undulating oil pipeline with large elevation difference and a station along this pipeline, which is named B station in… More >

  • Open Access

    ARTICLE

    Quaternion Integers Based Higher Length Cyclic Codes and Their Decoding Algorithm

    Muhammad Sajjad1, Tariq Shah1,*, Mohammad Mazyad Hazzazi2, Adel R. Alharbi3, Iqtadar Hussain4

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1177-1194, 2022, DOI:10.32604/cmc.2022.025245

    Abstract The decoding algorithm for the correction of errors of arbitrary Mannheim weight has discussed for Lattice constellations and codes from quadratic number fields. Following these lines, the decoding algorithms for the correction of errors of length cyclic codes over quaternion integers of Quaternion Mannheim weight one up to two coordinates have considered. In continuation, the case of cyclic codes of lengths and has studied to improve the error correction efficiency. In this study, we present the decoding of cyclic codes of length and length 2 (where is prime integer and is Euler phi function) over Hamilton Quaternion integers of Quaternion… More >

  • Open Access

    ARTICLE

    Speak-Correct: A Computerized Interface for the Analysis of Mispronounced Errors

    Kamal Jambi1,*, Hassanin Al-Barhamtoshy1, Wajdi Al-Jedaibi1, Mohsen Rashwan2, Sherif Abdou3

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1155-1173, 2022, DOI:10.32604/csse.2022.024967

    Abstract Any natural language may have dozens of accents. Even though the equivalent phonemic formation of the word, if it is properly called in different accents, humans do have audio signals that are distinct from one another. Among the most common issues with speech, the processing is discrepancies in pronunciation, accent, and enunciation. This research study examines the issues of detecting, fixing, and summarising accent defects of average Arabic individuals in English-speaking speech. The article then discusses the key approaches and structure that will be utilized to address both accent flaws and pronunciation issues. The proposed SpeakCorrect computerized interface employs a… More >

  • Open Access

    ARTICLE

    Errorless Underwater Channel Selection Scheme Using Forward Error Rectification and Modulation

    A. Herald1,*, C. Vennila2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 753-768, 2022, DOI:10.32604/iasc.2022.025362

    Abstract Acoustic and optical communication are the best options for data transmission in underwater communication. This paper presents the simulation model of an underwater wireless optical communication channel using the Errorless Channel Selection Using Forward Error Rectification and Modulation Progression (ECFM). The suitable modulation methods are used to encode and transfer the packets properly, the data is encoded in differential phase shift key mode at the phase of the light wave carrier. In addition, to send and receive data, an error rectification method is developed in the transport layer, which improves network speed. In addition, we create connections by observing the… More >

  • Open Access

    ARTICLE

    Optimized Deep Learning Model for Fire Semantic Segmentation

    Songbin Li1,*, Peng Liu1, Qiandong Yan1, Ruiling Qian2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4999-5013, 2022, DOI:10.32604/cmc.2022.026498

    Abstract Recent convolutional neural networks (CNNs) based deep learning has significantly promoted fire detection. Existing fire detection methods can efficiently recognize and locate the fire. However, the accurate flame boundary and shape information is hard to obtain by them, which makes it difficult to conduct automated fire region analysis, prediction, and early warning. To this end, we propose a fire semantic segmentation method based on Global Position Guidance (GPG) and Multi-path explicit Edge information Interaction (MEI). Specifically, to solve the problem of local segmentation errors in low-level feature space, a top-down global position guidance module is used to restrain the offset… More >

  • Open Access

    ARTICLE

    Enhanced Marathi Speech Recognition Facilitated by Grasshopper Optimisation-Based Recurrent Neural Network

    Ravindra Parshuram Bachate1, Ashok Sharma2, Amar Singh3, Ayman A. Aly4, Abdulaziz H. Alghtani4, Dac-Nhuong Le5,6,*

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 439-454, 2022, DOI:10.32604/csse.2022.024214

    Abstract Communication is a significant part of being human and living in the world. Diverse kinds of languages and their variations are there; thus, one person can speak any language and cannot effectively communicate with one who speaks that language in a different accent. Numerous application fields such as education, mobility, smart systems, security, and health care systems utilize the speech or voice recognition models abundantly. Though, various studies are focused on the Arabic or Asian and English languages by ignoring other significant languages like Marathi that leads to the broader research motivations in regional languages. It is necessary to understand… More >

Displaying 41-50 on page 5 of 161. Per Page