Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (684)
  • Open Access

    ARTICLE

    Performance Prediction Based Workload Scheduling in Co-Located Cluster

    Dongyang Ou, Yongjian Ren, Congfeng Jiang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2043-2067, 2024, DOI:10.32604/cmes.2023.029987

    Abstract Cloud service providers generally co-locate online services and batch jobs onto the same computer cluster, where the resources can be pooled in order to maximize data center resource utilization. Due to resource competition between batch jobs and online services, co-location frequently impairs the performance of online services. This study presents a quality of service (QoS) prediction-based scheduling model (QPSM) for co-located workloads. The performance prediction of QPSM consists of two parts: the prediction of an online service’s QoS anomaly based on XGBoost and the prediction of the completion time of an offline batch job based on random forest. On-line service… More >

  • Open Access

    ARTICLE

    A Performance Analysis of Machine Learning Techniques for Credit Card Fraud Detection

    Ayesha Aslam1, Adil Hussain2,*

    Journal on Artificial Intelligence, Vol.6, pp. 1-21, 2024, DOI:10.32604/jai.2024.047226

    Abstract With the increased accessibility of global trade information, transaction fraud has become a major worry in global banking and commerce security. The incidence and magnitude of transaction fraud are increasing daily, resulting in significant financial losses for both customers and financial professionals. With improvements in data mining and machine learning in computer science, the capacity to detect transaction fraud is becoming increasingly attainable. The primary goal of this research is to undertake a comparative examination of cutting-edge machine-learning algorithms developed to detect credit card fraud. The research looks at the efficacy of these machine learning algorithms using a publicly available… More >

  • Open Access

    ARTICLE

    Electro-Optical Model of Soiling Effects on Photovoltaic Panels and Performance Implications

    A. Asbayou1,*, G.P. Smestad2, I. Ismail1, A. Soussi1, A. Elfanaoui1, L. Bouhouch1, A. Ihlal1

    Energy Engineering, Vol.121, No.2, pp. 243-258, 2024, DOI:10.32604/ee.2024.046409

    Abstract In this paper, a detailed model of a photovoltaic (PV) panel is used to study the accumulation of dust on solar panels. The presence of dust diminishes the incident light intensity penetrating the panel’s cover glass, as it increases the reflection of light by particles. This phenomenon, commonly known as the “soiling effect”, presents a significant challenge to PV systems on a global scale. Two basic models of the equivalent circuits of a solar cell can be found, namely the single-diode model and the two-diode models. The limitation of efficiency data in manufacturers’ datasheets has encouraged us to develop an… More > Graphic Abstract

    Electro-Optical Model of Soiling Effects on Photovoltaic Panels and Performance Implications

  • Open Access

    ARTICLE

    Bond-Slip Behavior of Steel Bar and Recycled Steel Fibre-Reinforced Concrete

    Ismail Shah1,2, Jing Li1,3,4,*, Nauman Khan5, Hamad R. Almujibah6, Muhammad Mudassar Rehman2, Ali Raza7, Yun Peng3,4

    Journal of Renewable Materials, Vol.12, No.1, pp. 167-186, 2024, DOI:10.32604/jrm.2023.031503

    Abstract Recycled steel fiber reinforced concrete is an innovative construction material that offers exceptional mechanical properties and durability. It is considered a sustainable material due to its low carbon footprint and environmental friendly characteristics. This study examines the key influencing factors that affect the behavior of this material, such as the steel fiber volume ratio, recycled aggregate replacement rate, concrete strength grade, anchorage length, and stirrup constraint. The study investigates the bond failure morphology, bond-slip, and bond strength constitutive relationship of steel fiber recycled concrete. The results show that the addition of steel fibers at 0.5%, 1.0%, and 1.5% volume ratios… More >

  • Open Access

    PROCEEDINGS

    Heat Transfer Performance Improvement of Twisted Tubes with Different Starts by Combination of Dimples

    Tao Wang1, Zhen Tian1, Chen Gao1, Quanfu Gao1, Kewei Song1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.4, pp. 1-3, 2023, DOI:10.32604/icces.2023.8880

    Abstract With the rapid development of the economy and the increasing consumption of fossil energy, energysaving becomes imperative [1,2]. Improving the heat transfer efficiency of heat exchangers, which are widely applied in many fields, is important for energy utilization [3,4]. Twisted tube can produce secondary flow, increase turbulence and thin thermal boundary layer, and hence the enhancement of heat transfer [5-9]. However, the mixture of the fluid between the center of the twisted tube and the region around the tube is still not effectively improved. Thus, the heat transfer of the twisted tube can be further improved by combining with other… More >

  • Open Access

    ARTICLE

    Assessment of the Influence of Tunnel Settlement on Operational Performance of Subway Vehicles

    Gang Niu1,2, Guangwei Zhang1, Zhaoyang Jin1, Wei Zhang3,*, Xiang Liu3

    Structural Durability & Health Monitoring, Vol.18, No.1, pp. 55-71, 2024, DOI:10.32604/sdhm.2023.044832

    Abstract In the realm of subway shield tunnel operations, the impact of tunnel settlement on the operational performance of subway vehicles is a crucial concern. This study introduces an advanced analytical model to investigate rail geometric deformations caused by settlement within a vehicle-track-tunnel coupled system. The model integrates the geometric deformations of the track, attributed to settlement, as track irregularities. A novel “cyclic model” algorithm was employed to enhance computational efficiency without compromising on precision, a claim that was rigorously validated. The model’s capability extends to analyzing the time-history responses of vehicles traversing settlement-affected areas. The research primarily focuses on how… More >

  • Open Access

    PROCEEDINGS

    Effects of Unequal Individual Spacing on the Aerodynamic Performance of Three Flapping Wings in Tandem

    Xueguang Meng1, Zengshuang Chen1, Yuxin Xie1, Gang Chen1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.4, pp. 1-5, 2023, DOI:10.32604/icces.2023.09892

    Abstract Many species generally choose highly organized movements to gain more performance advantages rather than alone in the animal world, such as V-formation and line formation in birds. Understanding the aerodynamic characteristics and flow variation of multi-flapping wings in formation flight could be applied to the formation design of new bionic flapping-wing aircraft. In this paper, the effects of unequal individual spacing on the aerodynamic performance and flow mechanism of three-dimensional three-flapping wings flying in tandem formation are investigated numerically at a low Reynolds number. The simulations include small and large spacings, as well as cases with equal and unequal spacings… More >

  • Open Access

    PROCEEDINGS

    How Travelling Wavelength Affects Hydrodynamic Performance of Two Linear-Accelerating Mirror-Symmetric Fish-Like Swimmers

    Zhonglu Lin1,2, Dongfang Liang2, Yu Zhang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.3, pp. 1-9, 2023, DOI:10.32604/icces.2023.010442

    Abstract Fish schools are capable of simultaneous linear acceleration. To reveal the underlying hydrodynamic mechanism, we numerically investigate how Reynolds number Re = 1000−2000, Strouhal number St = 0.2−0.7 and wavelength λ = 0.5−2 affects the mean net thrust of two side-by-side NACA0012 hydrofoils undulating in anti-phase. In total, 550 cases are simulated using immersed boundary method. The thrust is strengthened by wavelength and Strouhal number, yet only slightly by the Reynolds number. We apply the symbolic regression algorithm to formulate this relationship as a high-level summary. More >

  • Open Access

    PROCEEDINGS

    Multi-Scale Topology Optimization Method Considering Multiple Structural Performances

    Wenjun Chen1, Yingjun Wang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.3, pp. 1-1, 2023, DOI:10.32604/icces.2023. 09096

    Abstract The rapid development of topology optimization has given birth to a large amount of different topology optimization methods, and each of them can manage a class of corresponding engineering problems. However, structures need to meet a variety of requirements in engineering application, such as lightweight and multiple load-bearing performance. To design composite structures that have multiple structural properties, a new multi-scale topology optimization method considering multiple structural performances is proposed in this paper. Based on the fitting functions of the result set and the bisection method, a new method to determine the weight coefficient is proposed in this paper, which… More >

  • Open Access

    ARTICLE

    A Comparative Performance Analysis of Machine Learning Models for Intrusion Detection Classification

    Adil Hussain1, Amna Khatoon2,*, Ayesha Aslam2, Tariq1, Muhammad Asif Khosa1

    Journal of Cyber Security, Vol.6, pp. 1-23, 2024, DOI:10.32604/jcs.2023.046915

    Abstract The importance of cybersecurity in contemporary society cannot be inflated, given the substantial impact of networks on various aspects of daily life. Traditional cybersecurity measures, such as anti-virus software and firewalls, safeguard networks against potential threats. In network security, using Intrusion Detection Systems (IDSs) is vital for effectively monitoring the various software and hardware components inside a given network. However, they may encounter difficulties when it comes to detecting solitary attacks. Machine Learning (ML) models are implemented in intrusion detection widely because of the high accuracy. The present work aims to assess the performance of machine learning algorithms in the… More >

Displaying 31-40 on page 4 of 684. Per Page