Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (128)
  • Open Access

    PROCEEDINGS

    Analytical Modeling for Asymmetric Four-Point Bend End-Notched Flexure Delamination Testing of Composite Laminates Considering Friction

    Kaixin Xia1, Yu Gong2,*, Xinxin Qi3,4, Libin Zhao3,4,*, Linjuan Wang1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.1, pp. 1-1, 2024, DOI:10.32604/icces.2024.011650

    Abstract The crack tip of the asymmetric four-point bend end-notched flexure (4AENF) delamination testing under shear loading often exhibits a proportion of mode I component, making it a typical mixed-mode I/II problem. Characterizing the total fracture toughness in 4AENF laminates is crucial for understanding the delamination phenomenon in composites. In this study, 4AENF tests were conducted on carbon fiber-reinforced epoxy asymmetric laminates to evaluate the total interlaminar fracture toughness under shear loading conditions. Additionally, the variation of interlaminar fracture toughness in asymmetric laminates with different fiber orientation angles was considered. Theoretical modelling was performed using an More >

  • Open Access

    ARTICLE

    The Wellbore Temperature and Pressure Behavior during the Flow Testing of Ultra-Deepwater Gas Wells

    Xingbin Zhao1, Neng Yang2, Hao Liang3, Mingqiang Wei2,*, Benteng Ma2, Dongling Qiu2

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.11, pp. 2523-2540, 2024, DOI:10.32604/fdmp.2024.052766 - 28 October 2024

    Abstract The transient flow testing of ultra-deepwater gas wells is greatly impacted by the low temperatures of seawater encountered over extended distances. This leads to a redistribution of temperature within the wellbore, which in turn influences the flow behavior. To accurately predict such a temperature distribution, in this study a comprehensive model of the flowing temperature and pressure fields is developed. This model is based on principles of fluid mechanics, heat transfer, mass conservation, and energy conservation and relies on the Runge-Kutta method for accurate integration in time of the resulting equations. The analysis includes the… More >

  • Open Access

    ARTICLE

    Investigation of the Film Formation in Dynamic Air Spray Painting

    Deqing Han, Yong Zeng*, Jintong Gu, Bin Yan

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.10, pp. 2393-2415, 2024, DOI:10.32604/fdmp.2024.053114 - 23 September 2024

    Abstract To accurately predict the film thickness distribution during dynamic spraying performed with air guns and support accordingly the development of intelligent spray painting, the spray problem was analyzed numerically. In particular, the Eulerian-Eulerian approach was employed to calculate the paint atomization and film deposition process. Different spray heights, spray angles, spray gun movement speeds, spray trajectory curvature radii, and air pressure values were considered. Numerical simulation results indicate that the angle of spray painting significantly affects the velocity of droplets near the spray surface. With an increase in the spraying angle, spraying height and spray… More >

  • Open Access

    ARTICLE

    Towards Improving the Quality of Requirement and Testing Process in Agile Software Development: An Empirical Study

    Irum Ilays1, Yaser Hafeez1,*, Nabil Almashfi2, Sadia Ali1, Mamoona Humayun3,*, Muhammad Aqib1, Ghadah Alwakid4

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3761-3784, 2024, DOI:10.32604/cmc.2024.053830 - 12 September 2024

    Abstract Software testing is a critical phase due to misconceptions about ambiguities in the requirements during specification, which affect the testing process. Therefore, it is difficult to identify all faults in software. As requirement changes continuously, it increases the irrelevancy and redundancy during testing. Due to these challenges; fault detection capability decreases and there arises a need to improve the testing process, which is based on changes in requirements specification. In this research, we have developed a model to resolve testing challenges through requirement prioritization and prediction in an agile-based environment. The research objective is to… More >

  • Open Access

    ARTICLE

    Grasslands Response to Livestock Grazing Intensity in the Austral Pampas (Argentina): Testing the Intermediate Disturbance Hypothesis

    Ana Elena de Villalobos1,2,*, María Andrea Long1,2

    Phyton-International Journal of Experimental Botany, Vol.93, No.8, pp. 2037-2050, 2024, DOI:10.32604/phyton.2024.053928 - 30 August 2024

    Abstract Livestock grazing has a significant impact on natural grasslands, with approximately one-third of the world’s land area dedicated to this industry. Around 20% of global grasslands are highly degraded due to overgrazing, affecting their productivity and conservation capacity. Best practices are required to ensure sustainable livestock production that supports biodiversity. The Intermediate Disturbance Hypothesis (IDH) suggests that environments with moderate levels of disturbance exhibit a higher species diversity. Moderate grazing can reduce the dominance of certain species, thereby enhancing plant diversity. However, concerns arise regarding the increase of exotic and unpalatable species under moderate grazing… More >

  • Open Access

    ARTICLE

    Impact Damage Testing Study of Shanxi-Beijing Natural Gas Pipeline Based on Decision Tree Rotary Tiller Operation

    Liqiong Chen1, Kai Zhang1,*, Song Yang1, Duo Xu1, Weihe Huang1, Hongxuan Hu2, Haonan Liu2

    Structural Durability & Health Monitoring, Vol.18, No.5, pp. 683-706, 2024, DOI:10.32604/sdhm.2024.049536 - 19 July 2024

    Abstract The North China Plain and the agricultural region are crossed by the Shanxi-Beijing natural gas pipeline. Residents in the area use rototillers for planting and harvesting; however, the depth of the rototillers into the ground is greater than the depth of the pipeline, posing a significant threat to the safe operation of the pipeline. Therefore, it is of great significance to study the dynamic response of rotary tillers impacting pipelines to ensure the safe operation of pipelines. This article focuses on the Shanxi-Beijing natural gas pipeline, utilizing finite element simulation software to establish a finite More >

  • Open Access

    ARTICLE

    BArcherFuzzer: An Android System Services Fuzzier via Transaction Dependencies of BpBinder

    Jiawei Qin1,2, Hua Zhang1,*, Hanbing Yan2, Tian Zhu2, Song Hu1, Dingyu Yan2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 527-544, 2024, DOI:10.32604/iasc.2024.047509 - 11 July 2024

    Abstract By the analysis of vulnerabilities of Android native system services, we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server. The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage. In this paper, we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy. Based on the above method, More >

  • Open Access

    ARTICLE

    Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory

    Ziqiao Zhou1, Tianyang Zhou1,*, Jinghao Xu2, Junhu Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2613-2634, 2024, DOI:10.32604/cmes.2023.028553 - 08 July 2024

    Abstract Intelligent penetration testing is of great significance for the improvement of the security of information systems, and the critical issue is the planning of penetration test paths. In view of the difficulty for attackers to obtain complete network information in realistic network scenarios, Reinforcement Learning (RL) is a promising solution to discover the optimal penetration path under incomplete information about the target network. Existing RL-based methods are challenged by the sizeable discrete action space, which leads to difficulties in the convergence. Moreover, most methods still rely on experts’ knowledge. To address these issues, this paper… More >

  • Open Access

    ARTICLE

    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140 - 16 April 2024

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core… More >

  • Open Access

    REVIEW

    Fuzzing: Progress, Challenges, and Perspectives

    Zhenhua Yu1, Zhengqi Liu1, Xuya Cong1,*, Xiaobo Li2, Li Yin3

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1-29, 2024, DOI:10.32604/cmc.2023.042361 - 30 January 2024

    Abstract As one of the most effective techniques for finding software vulnerabilities, fuzzing has become a hot topic in software security. It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system. In recent years, considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing, so there are more and more methods and forms, which make it difficult to have a comprehensive understanding of the technique. This paper conducts a thorough survey of fuzzing, focusing on its general process, classification, common application scenarios, and some More >

Displaying 1-10 on page 1 of 128. Per Page