Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (256)
  • Open Access

    ARTICLE

    The Class of Atomic Exponential Basis Functions EFupn(x,ω)-Development and Application

    Nives Brajčić Kurbaša*, Blaž Gotovac, Vedrana Kozulić

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 65-90, 2023, DOI:10.32604/cmes.2022.021940 - 29 September 2022

    Abstract The purpose of this paper is to present the class of atomic basis functions (ABFs) which are of exponential type and are denoted by . While ABFs of the algebraic type are already represented in the numerical modeling of various problems in mathematical physics and computational mechanics, ABFs of the exponential type have not yet been sufficiently researched. These functions, unlike the ABFs of the algebraic type , contain the tension parameter , which gives them additional approximation properties. Exponential monomials up to the th degree can be described exactly by the linear combination of… More >

  • Open Access

    ARTICLE

    Activation Functions Effect on Fractal Coding Using Neural Networks

    Rashad A. Al-Jawfi*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 957-965, 2023, DOI:10.32604/iasc.2023.031700 - 29 September 2022

    Abstract Activation functions play an essential role in converting the output of the artificial neural network into nonlinear results, since without this nonlinearity, the results of the network will be less accurate. Nonlinearity is the mission of all nonlinear functions, except for polynomials. The activation function must be differentiable for backpropagation learning. This study’s objective is to determine the best activation functions for the approximation of each fractal image. Different results have been attained using Matlab and Visual Basic programs, which indicate that the bounded function is more helpful than other functions. The non-linearity of the… More >

  • Open Access

    ARTICLE

    Distortion Evaluation of EMP Sensors Using Associated-Hermite Functions

    Rupo Ma1,2,*, Siping Gao3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1093-1105, 2023, DOI:10.32604/cmc.2023.030979 - 22 September 2022

    Abstract Electromagnetic pulse (EMP) is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum, which usually disrupts communications and damages electronic equipment and system. It is challenging for an EMP sensor to measure a wideband electromagnetic pulse without distortion for the whole spectrum. Therefore, analyzing the distortion of EMP measurement is crucial to evaluating the sensor distortion characteristics and correcting the measurement results. Waveform fidelity is usually employed to evaluate the distortion of an antenna. However, this metric depends on specific signal waveforms, thus is unsuitable for evaluating… More >

  • Open Access

    ARTICLE

    Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis

    Borja Bordel1,*, Ramón Alcarria1, Joaquin Chung2, Rajkumar Kettimuthu2, Tomás Robles1, Iván Armuelles3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 855-880, 2023, DOI:10.32604/cmc.2023.026787 - 22 September 2022

    Abstract Future components to enhance the basic, native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered, or lightweight solutions adapted to ultra-reliable low-latency communications (URLLC) but whose security properties remain under discussion. Although different 5G network slices may have different requirements, in general, both visions seem to fall short at provisioning secure URLLC in the future. In this work we address this challenge, by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in… More >

  • Open Access

    ARTICLE

    Distributed Timestamp Mechanism Based on Verifiable Delay Functions

    Qiang Wu1, Zhaoyang Han2, Ghulam Mohiuddin3, Yongjun Ren1,*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1633-1646, 2023, DOI:10.32604/csse.2023.030646 - 15 June 2022

    Abstract In the data communication system, the real-time information interaction of communication device increases the risk of privacy sensitive data being tampered with. Therefore, maintaining data security is one of the most important issues in network data communication. Because the timestamp is the most important way to authenticate data in information interaction, it is very necessary to provide timestamp service in the data communication system. However, the existing centralized timestamp mechanism is difficult to provide credible timestamp service, and users can conspire with timestamping servers to forge timestamps. Therefore, this paper designs a distributed timestamp mechanism… More >

  • Open Access

    ARTICLE

    Post-cystoscopy infections and device malfunctions in reprocessed flexible cystoscopes in a national database

    Jeffrey Lee, Elie Kaplan-Marans, Dhaval Jivanji, Daniel Tennenbaum, Ariel Schulman

    Canadian Journal of Urology, Vol.29, No.6, pp. 11361-11365, 2022

    Abstract Introduction: Flexible cystoscopes can be multi-use devices that visually inspect genitourinary structures such as the bladder and urethra. The objective of this study is to characterize the adverse events and associated device malfunctions of reusable flexible cystoscopes and to provide information on contamination and post-procedural infections.
    Materials and methods: The Manufacturer and User Facility Device Experience (MAUDE) database was queried for all adverse events and device malfunctions related to the use of flexible cystoscopes between January 2015 and December 2020. The MAUDE adverse event classification system was used to standardize the severity of complications and special focus… More >

  • Open Access

    ARTICLE

    Structural Optimization of Metal and Polymer Ore Conveyor Belt Rollers

    João Pedro Ceniz, Rodrigo de Sá Martins, Marco Antonio Luersen*, Tiago Cousseau

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 601-618, 2022, DOI:10.32604/cmes.2022.021011 - 03 August 2022

    Abstract Ore conveyor belt rollers operate in harsh environments, making them prone to premature failure. Their service lives are highly dependent on the stress field and bearing misalignment angle, for which limit values are defined in a standard. In this work, an optimization methodology using metamodels based on radial basis functions is implemented to reduce the mass of two models of rollers. From a structural point of view, one of the rollers is made completely of metal, while the other also has some components made of polymeric material. The objective of this study is to develop… More >

  • Open Access

    ARTICLE

    Some Identities of the Degenerate Poly-Cauchy and Unipoly Cauchy Polynomials of the Second Kind

    Ghulam Muhiuddin1,*, Waseem A. Khan2, Deena Al-Kadi3

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.3, pp. 763-779, 2022, DOI:10.32604/cmes.2022.017272 - 27 June 2022

    Abstract In this paper, we introduce modied degenerate polyexponential Cauchy (or poly-Cauchy) polynomials and numbers of the second kind and investigate some identities of these polynomials. We derive recurrence relations and the relationship between special polynomials and numbers. Also, we introduce modied degenerate unipolyCauchy polynomials of the second kind and derive some fruitful properties of these polynomials. In addition, positive associated beautiful zeros and graphical representations are displayed with the help of Mathematica. More >

  • Open Access

    ARTICLE

    Performance Evaluation of Electromagnetic Shield Constructed from Open-Cell Metal Foam Based on Sphere Functions

    Yuya Hanaoka1,*, Taku Itoh2, Kohei Tateyama3, Susumu Nakata4, Keiko Watanabe3

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 43-53, 2022, DOI:10.32604/cmes.2022.016831 - 02 June 2022

    Abstract This study evaluates the performance of a model of open-cell metal foams generated by sphere functions. To this end, an electromagnetic shield constructed from the model was inserted between two horn antennas in an electromagnetic wave propagation simulation. The foam-hole diameter in the electromagnetic shield model was varied as d = 2.5 and 5.0 mm, and the frequency of the electromagnetic waves was varied from 3 to 13 GHz. In the numerical experiments of shield effectiveness, the shields with foam holes of both diameters attenuated the electromagnetic waves across the studied frequency range. The shield effectiveness More >

  • Open Access

    ARTICLE

    Asymptotic Approximations of Apostol-Tangent Polynomials in Terms of Hyperbolic Functions

    Cristina B. Corcino1,2, Wilson D. Castañeda Jr.3, Roberto B. Corcino1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 133-151, 2022, DOI:10.32604/cmes.2022.019965 - 02 June 2022

    Abstract The tangent polynomials Tn (z) are generalization of tangent numbers or the Euler zigzag numbers Tn. In particular, Tn (0) = Tn. These polynomials are closely related to Bernoulli, Euler and Genocchi polynomials. One of the extensions and analogues of special polynomials that attract the attention of several mathematicians is the Apostoltype polynomials. One of these Apostol-type polynomials is the Apostol-tangent polynomials Tn(z, λ). When λ = 1, Tn (z, 1) = Tn(z). The use of hyperbolic functions to derive asymptotic approximations of polynomials together with saddle point method was applied to the Bernoulli and Euler polynomials by Lopez… More >

Displaying 41-50 on page 5 of 256. Per Page