Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (395)
  • Open Access

    PROCEEDINGS

    Numerical Study on the Thermal Management of Lithium-Ion Battery Pack Based on Heat Pipes and Phase Change Material

    Chen Gao1, Kai Sun1, QingZhi Hou2,3, KeWei Song1,2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.4, pp. 1-3, 2023, DOI:10.32604/icces.2023.08905

    Abstract As the fossil energy is increasingly exhausted and air pollution becomes more and more serious, blade electric vehicles equipped with rechargeable lithium-ion battery turns into the major developing direction of new energy automobile [1-3]. Lithium-ion batteries have the advantages of high energy density, light weight, and no pollution, and thereby are widely used in electric vehicles [4,5]. However, the working performance and service life of lithium-ion batteries are greatly affected by temperature [6]. Excessive high and low temperature will reduce the charge and discharge capacity of lithium-ion batteries, shorten their service life, and even lead to safety accidents [7]. Therefore,… More >

  • Open Access

    ARTICLE

    Optimization Algorithms of PERT/CPM Network Diagrams in Linear Diophantine Fuzzy Environment

    Mani Parimala1, Karthikeyan Prakash1, Ashraf Al-Quran2,*, Muhammad Riaz3, Saeid Jafari4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 1095-1118, 2024, DOI:10.32604/cmes.2023.031193

    Abstract The idea of linear Diophantine fuzzy set (LDFS) theory with its control parameters is a strong model for machine learning and optimization under uncertainty. The activity times in the critical path method (CPM) representation procedures approach are initially static, but in the Project Evaluation and Review Technique (PERT) approach, they are probabilistic. This study proposes a novel way of project review and assessment methodology for a project network in a linear Diophantine fuzzy (LDF) environment. The LDF expected task time, LDF variance, LDF critical path, and LDF total expected time for determining the project network are all computed using LDF… More > Graphic Abstract

    Optimization Algorithms of PERT/CPM Network Diagrams in Linear Diophantine Fuzzy Environment

  • Open Access

    ARTICLE

    Fuzzy Logic Inference System for Managing Intensive Care Unit Resources Based on Knowledge Graph

    Ahmad F Subahi*, Areej Athama

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3801-3816, 2023, DOI:10.32604/cmc.2023.034522

    Abstract With the rapid growth in the availability of digital health-related data, there is a great demand for the utilization of intelligent information systems within the healthcare sector. These systems can manage and manipulate this massive amount of health-related data and encourage different decision-making tasks. They can also provide various sustainable health services such as medical error reduction, diagnosis acceleration, and clinical services quality improvement. The intensive care unit (ICU) is one of the most important hospital units. However, there are limited rooms and resources in most hospitals. During times of seasonal diseases and pandemics, ICUs face high admission demand. In… More >

  • Open Access

    ARTICLE

    CONTACT ANGLE MEASUREMENTS FOR ADVANCED THERMAL MANAGEMENT TECHNOLOGIES

    Sally M. Smith*, Brenton S. Taft , Jacob Moulton

    Frontiers in Heat and Mass Transfer, Vol.5, pp. 1-9, 2014, DOI:10.5098/hmt.5.6

    Abstract This study investigates the wettability of fluid-solid interactions of interest for oscillating heat pipe (OHP) applications. Measurements were taken using two techniques: the sessile drop method and capillary rise at a vertical plate. Tested surface materials include copper, aluminum, and Teflon PFA. The working fluids tested were water, acetone, R-134a, and HFO-1234yf. A novel low-pressure experimental setup was developed for refrigerant testing. Results show that the refrigerants have significantly lower hysteresis than the water and acetone-based systems, which is thought to lead to better heat transfer in OHP design. More >

  • Open Access

    ARTICLE

    A Fully Adaptive Active Queue Management Method for Congestion Prevention at the Router Buffer

    Ali Alshahrani1, Ahmad Adel Abu-Shareha2,*, Qusai Y. Shambour2, Basil Al-Kasasbeh1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1679-1698, 2023, DOI:10.32604/cmc.2023.043545

    Abstract Active queue management (AQM) methods manage the queued packets at the router buffer, prevent buffer congestion, and stabilize the network performance. The bursty nature of the traffic passing by the network routers and the slake behavior of the existing AQM methods leads to unnecessary packet dropping. This paper proposes a fully adaptive active queue management (AAQM) method to maintain stable network performance, avoid congestion and packet loss, and eliminate unnecessary packet dropping. The proposed AAQM method is based on load and queue length indicators and uses an adaptive mechanism to adjust the dropping probability based on the buffer status. The… More >

  • Open Access

    ARTICLE

    Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management

    Lizhe Zhang1,2,*, Yongqiang Huang2, Jia Nie2, Kenian Wang1,2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1467-1488, 2023, DOI:10.32604/cmc.2023.042305

    Abstract System-wide information management (SWIM) is a complex distributed information transfer and sharing system for the next generation of Air Transportation System (ATS). In response to the growing volume of civil aviation air operations, users accessing different authentication domains in the SWIM system have problems with the validity, security, and privacy of SWIM-shared data. In order to solve these problems, this paper proposes a SWIM cross-domain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication. The scheme uses a consistent hash algorithm with virtual nodes in combination with a… More >

  • Open Access

    ARTICLE

    Leveraging Blockchain with Optimal Deep Learning-Based Drug Supply Chain Management for Pharmaceutical Industries

    Shanthi Perumalsamy, Venkatesh Kaliyamurthy*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2341-2357, 2023, DOI:10.32604/cmc.2023.040269

    Abstract Due to its complexity and involvement of numerous stakeholders, the pharmaceutical supply chain presents many challenges that companies must overcome to deliver necessary medications to patients efficiently. The pharmaceutical supply chain poses different challenging issues, encompasses supply chain visibility, cold-chain shipping, drug counterfeiting, and rising prescription drug prices, which can considerably surge out-of-pocket patient costs. Blockchain (BC) offers the technical base for such a scheme, as it could track legitimate drugs and avoid fake circulation. The designers presented the procedure of BC with fabric for creating a secured drug supply-chain management (DSCM) method. With this motivation, the study presents a… More >

  • Open Access

    ARTICLE

    Optimal Design of Porous Media in Solar Vapor Generators by Carbon Fiber Bundles

    Mohammad Yaghoub Abdollahzadeh Jamalabadi, Jinxiang Xi*

    Frontiers in Heat and Mass Transfer, Vol.21, pp. 65-79, 2023, DOI:10.32604/fhmt.2023.042613

    Abstract As a means of harvesting solar energy for water treatment, solar-driven vapor generation is becoming more appealing. Due to their entangled fibrous networks and high surface area, fibers can be used as building blocks to generate water vapor. In this paper, using a two-dimensional fiber bundle model, we studied the generation of solar vapor based on the fiber height, distance between fibers, and input sun radiation. The performance of solar absorption system was also evaluated by evaluating thermal and water management. Results showed a constant increase in solar vapor generation with an increasing fiber height and decreasing inter-fiber distance. However,… More > Graphic Abstract

    Optimal Design of Porous Media in Solar Vapor Generators by Carbon Fiber Bundles

  • Open Access

    ARTICLE

    Emergency Energy Management of Microgrid in Industrial Park Based on Robust Optimization

    Haoliang Yang*, Yonggang Dong, Zhifang Yang

    Energy Engineering, Vol.120, No.12, pp. 2917-2931, 2023, DOI:10.32604/ee.2023.029167

    Abstract Reducing the impact of power outages and maintaining the power supply duration must be considered in implementing emergency energy dispatching in micro-networks. This paper studies a new emergency energy treatment method based on the robust optimal method and the industrial park micro-network with the optical energy storage system. After controlling the load input, a control strategy of adjusting and removing is proposed. Rolling optimal theory is applied to emergency energy scheduling based on a robust optimal mathematical model. A weighting factor is introduced into the optimal model to balance the importance of reducing and retaining the power supply. Uncertainty is… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of different key performance indicators (KPIs)… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

Displaying 11-20 on page 2 of 395. Per Page