Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (50)
  • Open Access

    ARTICLE

    Research on Sleeve Grouting Density Detection Based on the Impact Echo Method

    Pu Zhang1, Yingjun Li1, Xinyu Zhu1, Shizhan Xu1, Pinwu Guan1,*, Wei Liu2, Yanwei Guo2, Haibo Wang2

    Structural Durability & Health Monitoring, Vol.18, No.2, pp. 143-159, 2024, DOI:10.32604/sdhm.2024.046986

    Abstract Grouting defects are an inherent challenge in construction practices, exerting a considerable impact on the operational structural integrity of connections. This investigation employed the impact-echo technique for the detection of grouting anomalies within connections, enhancing its precision through the integration of wavelet packet energy principles for damage identification purposes. A series of grouting completeness assessments were meticulously conducted, taking into account variables such as the divergent material properties of the sleeves and the configuration of adjacent reinforcement. The findings revealed that: (i) the energy distribution for the high-strength concrete cohort predominantly occupied the frequency bands 42, 44, 45, and 47,… More >

  • Open Access

    ARTICLE

    A Fully Adaptive Active Queue Management Method for Congestion Prevention at the Router Buffer

    Ali Alshahrani1, Ahmad Adel Abu-Shareha2,*, Qusai Y. Shambour2, Basil Al-Kasasbeh1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1679-1698, 2023, DOI:10.32604/cmc.2023.043545

    Abstract Active queue management (AQM) methods manage the queued packets at the router buffer, prevent buffer congestion, and stabilize the network performance. The bursty nature of the traffic passing by the network routers and the slake behavior of the existing AQM methods leads to unnecessary packet dropping. This paper proposes a fully adaptive active queue management (AAQM) method to maintain stable network performance, avoid congestion and packet loss, and eliminate unnecessary packet dropping. The proposed AAQM method is based on load and queue length indicators and uses an adaptive mechanism to adjust the dropping probability based on the buffer status. The… More >

  • Open Access

    ARTICLE

    Numerical Simulation of Turbulent Diffusion Flames of a Biogas Enriched with Hydrogen

    Naima Krarraz1,*, Amina Sabeur1, Khadidja Safer2, Ahmed Ouadha1

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.1, pp. 79-96, 2024, DOI:10.32604/fdmp.2023.026238

    Abstract Any biogas produced by the anaerobic fermentation of organic materials has the advantage of being an environmentally friendly biofuel. Nevertheless, the relatively low calorific value of such gases makes their effective utilization in practical applications relatively difficult. The present study considers the addition of hydrogen as a potential solution to mitigate this issue. In particular, the properties of turbulent diffusion jet flames and the related pollutant emissions are investigated numerically for different operating pressures. The related numerical simulations are conducted by solving the RANS equations in the frame of the Reynolds Stress Model in combination with the flamelet approach. Radiation… More > Graphic Abstract

    Numerical Simulation of Turbulent Diffusion Flames of a Biogas Enriched with Hydrogen

  • Open Access

    ARTICLE

    T_GRASP: Optimization Algorithm of Ship Avoiding Typhoon Route

    Yingxian Huang, Xueyan Ding, Yanan Zhang, Leiming Yan*

    Journal of Quantum Computing, Vol.4, No.2, pp. 85-95, 2022, DOI:10.32604/jqc.2022.031436

    Abstract A GRASP-based algorithm called T_GRASP for avoiding typhoon route optimization is suggested to increase the security and effectiveness of ship navigation. One of the worst natural calamities that can disrupt a ship’s navigation and result in numerous safety mishaps is a typhoon. Currently, the captains manually review the collected weather data and steer clear of typhoons using their navigational expertise. The distribution of heavy winds and waves produced by the typhoon also changes dynamically as a result of the surrounding large-scale air pressure distribution, which significantly enhances the challenge of the captain’s preparation for avoiding typhoon navigation. It is now… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks

    A. Francis Saviour Devaraj1, T. Satyanarayana Murthy2, Fayadh Alenezi3, E. Laxmi Lydia4, Mohamad Adzhar Md Zawawi5, Mohamad Khairi Ishak5,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1431-1445, 2023, DOI:10.32604/csse.2023.034421

    Abstract Recently, a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks (WSN). In routing, the trust system includes or avoids nodes related to the estimated trust values in the routing function. This article introduces Enhanced Metaheuristics with Trust Aware Secure Route Selection Protocol (EMTA-SRSP) for WSN. The presented EMTA-SRSP technique majorly involves the optimal selection of routes in WSN. To accomplish this, the EMTA-SRSP technique involves the design of an oppositional Aquila optimization algorithm to choose safe routes for data communication. For the clustering process, the nodes with maximum residual energy will be considered… More >

  • Open Access

    ARTICLE

    TRS Scheduling for Improved QoS Performance in Cloud System

    G. John Samuel Babu1, M. Baskar2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1547-1559, 2023, DOI:10.32604/cmc.2023.033300

    Abstract Numerous methods are analysed in detail to improve task scheduling and data security performance in the cloud environment. The methods involve scheduling according to the factors like makespan, waiting time, cost, deadline, and popularity. However, the methods are inappropriate for achieving higher scheduling performance. Regarding data security, existing methods use various encryption schemes but introduce significant service interruption. This article sketches a practical Real-time Application Centric TRS (Throughput-Resource utilization–Success) Scheduling with Data Security (RATRSDS) model by considering all these issues in task scheduling and data security. The method identifies the required resource and their claim time by receiving the service… More >

  • Open Access

    ARTICLE

    Adaptive Route Sink Relocation Using Cluster Head Chain Cycling Model in WSN

    M. Sudha1,*, P. Shanmugapriya2, Rami Q. Malik3, Ahmed Alkhayyat4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1811-1826, 2023, DOI:10.32604/iasc.2023.032265

    Abstract Wireless Sensor Networks (WSN) have revolutionized the processes involved in industrial communication. However, the most important challenge faced by WSN sensors is the presence of limited energy. Multiple research investigations have been conducted so far on how to prolong the energy in WSN. This phenomenon is a result of inability of the network to have battery powered-sensor terminal. Energy-efficient routing on packet flow is a parallel phenomenon to delay nature, whereas the primary energy gets wasted as a result of WSN holes. Energy holes are present in the vicinity of sink and it is an important efficient-routing protocol for WSNs.… More >

  • Open Access

    ARTICLE

    Cooperative Channel and Optimized Route Selection in Adhoc Network

    D. Manohari1,*, M. S. Kavitha2, K. Periyakaruppan3, B. Chellapraba4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1547-1560, 2023, DOI:10.32604/iasc.2023.030540

    Abstract Over the last decade, mobile Adhoc networks have expanded dramatically in popularity, and their impact on the communication sector on a variety of levels is enormous. Its uses have expanded in lockstep with its growth. Due to its instability in usage and the fact that numerous nodes communicate data concurrently, adequate channel and forwarder selection is essential. In this proposed design for a Cognitive Radio Cognitive Network (CRCN), we gain the confidence of each forwarding node by contacting one-hop and second level nodes, obtaining reports from them, and selecting the forwarder appropriately with the use of an optimization technique. At… More >

  • Open Access

    ARTICLE

    Avoid Suspicious Route of Blackhole Nodes in MANET’s: Using A Cooperative Trapping

    Abdllkader Esaid1,*, Mary Agoyi2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1901-1915, 2023, DOI:10.32604/csse.2023.027819

    Abstract Mobile Ad hoc Network (MANET) is decentralized wireless network and can communicate without existing infrastructure in many areas. MANET is vulnerable to various attacks that affect its performance such as blackhole attack. Blackhole attacker, inject fault routing information to persuade the source node to select the path with malicious node as the shortest path. To eliminate malicious nodes from launching any collaborative attack. A cooperative Trapping Approach (CTA) was proposed based on modifying Ad-hoc On-demand Distance Vector (AODV) routing protocol and trapping the malicious nodes by responding to the trap request message. The approach aims to eliminate and rule out… More >

  • Open Access

    ARTICLE

    Combined Linear Multi-Model for Reliable Route Recommender in Next Generation Network

    S. Kalavathi1,*, R. Nedunchelian2

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 39-56, 2023, DOI:10.32604/iasc.2023.031522

    Abstract Network analysis is a promising field in the area of network applications as different types of traffic grow enormously and exponentially. Reliable route prediction is a challenging task in the Large Scale Networks (LSN). Various non-self-learning and self-learning approaches have been adopted to predict reliable routing. Routing protocols decide how to send all the packets from source to the destination addresses across the network through their IP. In the current era, dynamic protocols are preferred as they network self-learning internally using an algorithm and may not entail being updated physically more than the static protocols. A novel method named Reliable… More >

Displaying 1-10 on page 1 of 50. Per Page