Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (140)
  • Open Access

    ARTICLE

    A Reliable Stochastic Numerical Analysis for Typhoid Fever Incorporating With Protection Against Infection

    Muhammad Shoaib Arif1,*, Ali Raza1, Muhammad Rafiq2, Mairaj Bibi3, Rabia Fayyaz3, Mehvish Naz3, Umer Javed4

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 787-804, 2019, DOI:10.32604/cmc.2019.04655

    Abstract In this paper, a reliable stochastic numerical analysis for typhoid fever incorporating with protection against infection has been considered. We have compared the solutions of stochastic and deterministic typhoid fever model. It has been shown that the stochastic typhoid fever model is more realistic as compared to the deterministic typhoid fever model. The effect of threshold number T* hold in stochastic typhoid fever model. The proposed framework of the stochastic non-standard finite difference scheme (SNSFD) preserves all dynamical properties like positivity, bounded-ness and dynamical consistency defined by Mickens, R. E. The stochastic numerical simulation of the model showed that increase… More >

  • Open Access

    ARTICLE

    A Line Model-Based Fast Boundary Element Method for the Cathodic Protection Analysis of Pipelines in Layered Soils

    L.Q. Liu1, H.T. Wang1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.90, No.6, pp. 439-462, 2013, DOI:10.3970/cmes.2013.090.439

    Abstract A line model-based fast boundary element method (BEM) is presented for the large-scale cathodic protection (CP) analysis of three-dimensional pipelines in layered soils. In this approach, pipelines are treated as lines with potentials assumed constant over the cross-section and the boundary integrals happen on the associated cylindrical surfaces. The advantage of this model is that pipelines can be meshed with line elements while the boundary integrals are based on the original shapes. Therefore, the number of unknowns is significantly reduced with accuracy effectively retained. A unified formulation of the multipole moments is developed for the mixed boundary element types in… More >

  • Open Access

    ARTICLE

    Model Predictive Control for High-speed Train with Automatic Trajectory Configuration and Tractive Force Optimization

    Yonghua Zhou1 , Xun Yang1 , Chao Mi1

    CMES-Computer Modeling in Engineering & Sciences, Vol.90, No.6, pp. 415-437, 2013, DOI:10.3970/cmes.2013.090.415

    Abstract High-speed train transportation is organized in a way of globally centralized planning and locally autonomous adjustment with the real-time known positions, speeds and other state information of trains. The hierarchical integration architecture composed of top, middle and bottom levels is proposed based on model predictive control (MPC) for the real-time scheduling and control. The middle-level trajectory configuration and tractive force setpoints play a critical role in fulfilling the top-level scheduling commands and guaranteeing the controllability of bottomlevel train operations. In the middle-level MPC-based train operation planning, the continuous cellular automaton model of train movements is proposed to dynamically configure the… More >

  • Open Access

    ARTICLE

    A Dual BEM Genetic Algorithm Scheme for the Identification of Polarization Curves of Buried Slender Structures

    L.A. de Lacerda1, J. M. da Silva1

    CMES-Computer Modeling in Engineering & Sciences, Vol.14, No.3, pp. 153-160, 2006, DOI:10.3970/cmes.2006.014.153

    Abstract A two-dimensional boundary element formulation is presented and coupled to a genetic algorithm to identify polarization curves of buried slender structures. The dual boundary element method is implemented to model the cathodic protection of the metallic body and the genetic algorithm is employed to deal with the inverse problem of determining the non-linear polarization curve, which describes the relation between current density and electrochemical potential at the soil metal interface. In this work, this non-linear relation resulting from anodic and cathodic reactions is represented by a classical seven parameters expression. Stratified soil resistivity is modeled with a piece-wise homogeneous domain.… More >

  • Open Access

    ARTICLE

    An Application of Genetic Algorithms and the Method of Fundamental Solutions to Simulate Cathodic Protection Systems

    W.J. Santos1 , J.A.F. Santiago1, J.C.F Telles1

    CMES-Computer Modeling in Engineering & Sciences, Vol.87, No.1, pp. 23-40, 2012, DOI:10.3970/cmes.2012.087.023

    Abstract The aim of this paper is to present numerical simulations of Cathodic Protection (CP) Systems using a Genetic Algorithm (GA) and the Method of Fundamental Solutions (MFS). MFS is used to obtain the solution of the associated homogeneous equation with the non-homogeneous equation subject to nonlinear boundary conditions defined as polarization curves. The adopted GA minimizes a nonlinear error function, whose design variables are the coefficients of the linear superposition of fundamental solutions and the positions of the source points, located outside the problem domain. In this work, the anodes added to the CP system are considered as point sources… More >

  • Open Access

    ARTICLE

    Electrically Heated Composite Leading Edges for Aircraft Anti-Icing Applications

    F. De Rosa1, A. Esposito1

    FDMP-Fluid Dynamics & Materials Processing, Vol.8, No.1, pp. 107-128, 2012, DOI:10.3970/fdmp.2011.008.107

    Abstract An investigation was conducted to evaluate the feasibility and the performance of an electrically heated composite leading edge for aircraft anti-icing applications. A prototype was designed, manufactured and equipped with a High Temperature composite leading edge with embedded Ni alloy resistance fed by a DC power supply unit. Running wet and fully evaporative functional modes have been verified both analytically and experimentally with reasonable agreement. A room temperature thermal endurance test has been run for 104 cycles aiming to preliminary verify the integrity of the composite laminate after the imposed thermal stress. The EHCLE system (Electrical Heated Composite Leading Edge)… More >

  • Open Access

    ARTICLE

    Key Process Protection of High Dimensional Process Data in Complex Production

    He Shi1,2,3,4, Wenli Shang1,2,3,4,*, Chunyu Chen1,2,3,4, Jianming Zhao1,2,3,4, Long Yin1, 2, 3, 4

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 645-658, 2019, DOI:10.32604/cmc.2019.05648

    Abstract In order to solve the problem of locating and protecting key processes and detecting outliers efficiently in complex industrial processes. An anomaly detection system which is based on the two-layer model fusion frame is designed in this paper. The key process is located by using the random forest model firstly, then the process data feature selection, dimension reduction and noise reduction are processed. Finally, the validity of the model is verified by simulation experiments. It is shown that this method can effectively reduce the prediction accuracy variance and improve the generalization ability of the traditional anomaly detection model from the… More >

  • Open Access

    ARTICLE

    A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things

    Baowei Wang1,2,*, Weiwen Kong1, Wei Li1, Neal N. Xiong3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 679-695, 2019, DOI:10.32604/cmc.2019.06106

    Abstract Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment, especially in resource-constrained sensor networks, such as the perception layer of Internet of Things applications. However, in all existing single chaining watermark schemes, how to ensure the synchronization between the data sender and the receiver is still an unsolved problem. Once the synchronization points are attacked by the adversary, existing data integrity authentication schemes are difficult to work properly, and the false negative rate might be up to 50 percent. And the additional fixed group delimiters not only increase the data size, but… More >

  • Open Access

    ARTICLE

    Expression Preserved Face Privacy Protection Based on Multi-mode Discriminant Analysis

    Xiang Wang1, *, Chen Xiong1, Qingqi Pei1, Youyang Qu2

    CMC-Computers, Materials & Continua, Vol.57, No.1, pp. 107-121, 2018, DOI:10.32604/cmc.2018.03675

    Abstract Most visual privacy protection methods only hide the identity information of the face images, but the expression, behavior and some other information, which are of great significant in the live broadcast and other scenarios, are also destroyed by the privacy protection process. To this end, this paper introduces a method to remove the identity information while preserving the expression information by performing multi-mode discriminant analysis on the images normalized with AAM algorithm. The face images are decomposed into mutually orthogonal subspaces corresponding to face attributes such as gender, race and expression, each of which owns related characteristic parameters. Then, the… More >

  • Open Access

    ARTICLE

    Inverted XML Access Control Model Based on Ontology Semantic Dependency

    Meijuan Wang1,2,*, Jian Wang1, Lihong Guo1,3, Lein Harn4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 465-482, 2018, DOI: 10.3970/cmc.2018.02568

    Abstract In the era of big data, the conflict between data mining and data privacy protection is increasing day by day. Traditional information security focuses on protecting the security of attribute values without semantic association. The data privacy of big data is mainly reflected in the effective use of data without exposing the user’s sensitive information. Considering the semantic association, reasonable security access for privacy protect is required. Semi-structured and self-descriptive XML (eXtensible Markup Language) has become a common form of data organization for database management in big data environments. Based on the semantic integration nature of XML data, this paper… More >

Displaying 131-140 on page 14 of 140. Per Page