Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (100)
  • Open Access

    ARTICLE

    Inverse Load Identification in Stiffened Plate Structure Based on in situ Strain Measurement

    Yihua Wang1, Zhenhuan Zhou1, Hao Xu1,*, Shuai Li2, Zhanjun Wu1

    Structural Durability & Health Monitoring, Vol.15, No.2, pp. 85-101, 2021, DOI:10.32604/sdhm.2021.014256 - 03 June 2021

    Abstract For practical engineering structures, it is usually difficult to measure external load distribution in a direct manner, which makes inverse load identification important. Specifically, load identification is a typical inverse problem, for which the models (e.g., response matrix) are often ill-posed, resulting in degraded accuracy and impaired noise immunity of load identification. This study aims at identifying external loads in a stiffened plate structure, through comparing the effectiveness of different methods for parameter selection in regulation problems, including the Generalized Cross Validation (GCV) method, the Ordinary Cross Validation method and the truncated singular value decomposition… More >

  • Open Access

    ARTICLE

    Web Attack Detection Using the Input Validation Method: DPDA Theory

    Osamah Ibrahim Khalaf1, Munsif Sokiyna2,*, Youseef Alotaibi3, Abdulmajeed Alsufyani4, Saleh Alghamdi5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3167-3184, 2021, DOI:10.32604/cmc.2021.016099 - 06 May 2021

    Abstract A major issue while building web applications is proper input validation and sanitization. Attackers can quickly exploit errors and vulnerabilities that lead to malicious behavior in web application validation operations. Attackers are rapidly improving their capabilities and technologies and now focus on exploiting vulnerabilities in web applications and compromising confidentiality. Cross-site scripting (XSS) and SQL injection attack (SQLIA) are attacks in which a hacker sends malicious inputs (cheat codes) to confuse a web application, to access or disable the application’s back-end without user awareness. In this paper, we explore the problem of detecting and removing… More >

  • Open Access

    ARTICLE

    Slime Mold Optimizer for Transformer Parameters Identification with Experimental Validation

    Salah K. Elsayed1,*, Ahmed M. Agwa2,3, Mahmoud A. El-Dabbah2, Ehab E. Elattar1

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 639-651, 2021, DOI:10.32604/iasc.2021.016464 - 20 April 2021

    Abstract The problem of parameters identification for transformer equivalent circuit can be solved by optimizing a nonlinear formula. The objective function attempts to minimize the sum of squared relative errors amongst the accompanying calculated and actual points of currents, powers, and secondary voltage during the load test of the transformer subject to a set of parameters constraints. The authors of this paper propose applying a new and efficient stochastic optimizer called the slime mold optimization algorithm (SMOA) to identify parameters of the transformer equivalent circuit. The experimental measurements of load test of single- and three-phase transformers… More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Saeed Rubaiee5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692 - 13 April 2021

    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about… More >

  • Open Access

    ARTICLE

    Alcoholism Detection by Wavelet Energy Entropy and Linear Regression Classifier

    Xianqing Chen1,2, Yan Yan3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.1, pp. 325-343, 2021, DOI:10.32604/cmes.2021.014489 - 30 March 2021

    Abstract Alcoholism is an unhealthy lifestyle associated with alcohol dependence. Not only does drinking for a long time leads to poor mental health and loss of self-control, but alcohol seeps into the bloodstream and shortens the lifespan of the body’s internal organs. Alcoholics often think of alcohol as an everyday drink and see it as a way to reduce stress in their lives because they cannot see the damage in their bodies and they believe it does not affect their physical health. As their drinking increases, they become dependent on alcohol and it affects their daily More >

  • Open Access

    ARTICLE

    Exploration and Validation of the Potential Downstream Genes Underlying ipa1-2D Locus for Rice Panicle Branching

    Lin Zhang1,2,*, Dong Xie1, Zhong Bian1, Yiting Zou1, Han Zhou1, Wenlu Cai1, Hadi Yeilaghi1, Xiaolei Fan1,2, Changquan Zhang1,2, Qiaoquan Liu1,2,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.3, pp. 773-787, 2021, DOI:10.32604/phyton.2021.015229 - 30 March 2021

    Abstract In recent years, some super hybrid rice varieties were bred with strong culms and large panicles, which are mainly contributed by the ipa1-2D locus. A gain-of-function allele of OsSPL14 is the ipa1-2D and it can greatly increase the panicle primary branch number. However, the key downstream genes mediating this trait variation are not fully explored. In this study, we developed high-quality near-isogenic lines (NILs) with a difference of only 30 kb chromosomal segment covering the ipa1-2D locus. Using the NILs, we explored the impact of ipa1-2D on five sequential stages of early inflorescence development, and found that the… More >

  • Open Access

    ARTICLE

    Performance Characteristics of Geothermal Single Well for Building Heating

    Jingying Li1, Tiejun Zhu1, Fengming Li1, Dong Wang1, Xianbiao Bu2, Lingbao Wang2,*

    Energy Engineering, Vol.118, No.3, pp. 517-534, 2021, DOI:10.32604/EE.2021.014464 - 22 March 2021

    Abstract The single well geothermal heating (SWGH) technology has attracted extensive attention. To enhance heat extraction from SWGH, a mathematical model describing heat transfer is set up, and the key influence factor and heat transfer enhancement method are discussed by thermal resistance analysis. The numerical results show that the thermal resistance of rock is far greater than that of well wall and fluid. So, reducing rock thermal resistance is the most effective method for enhancing the heat extraction power. For geothermal well planning to drill: rock thermal resistance can be reduced by increasing well diameter and… More >

  • Open Access

    ARTICLE

    Design and Validation of a Route Planner for Logistic UAV Swarm

    Meng-Tse Lee1,*, Ying-Chih Lai2, Ming-Lung Chuang1, Bo-Yu Chen1

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 227-240, 2021, DOI:10.32604/iasc.2021.015339 - 17 March 2021

    Abstract Unmanned Aerial Vehicles (UAV) are widely used in different fields of aviation today. The efficient delivery of packages by drone may be one of the most promising applications of this technology. In logistic UAV missions, due to the limited capacities of power supplies, such as fuel or batteries, it is almost impossible for one unmanned vehicle to visit multiple wide areas. Thus, multiple unmanned vehicles with well-planned routes become necessary to minimize the unnecessary consumption of time, distance, and energy while carrying out the delivery missions. The aim of the present study was to develop… More >

  • Open Access

    ARTICLE

    Mechanical Properties of a Wood Flour-PET Composite Through Computational Homogenisation

    P. Pesante1, K. Saavedra2,*, G. Pincheira2

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 4061-4079, 2021, DOI:10.32604/cmc.2021.015268 - 01 March 2021

    Abstract This work proposes to study the effective elastic properties (EEP) of a wood-plastic composite (WPC) made from polyethylene terephthalate (PET) and Chilean Radiate pine’s wood flour, using finite element simulations of a representative volume element (RVE) with periodic boundary conditions. Simulations are validated through a static 3-point bending test, with specimens obtained by extruding and injection. The effect of different weight fractions, space orientations and sizes of particles are here examined. Numerical predictions are empirically confirmed in the sense that composites with more wood flour content and bigger size, have higher elastic modulus. However, these More >

  • Open Access

    ARTICLE

    Analyzing Some Elements of Technological Singularity Using Regression Methods

    Ishaani Priyadarshini1,*, Pinaki Ranjan Mohanty2, Chase Cotton1

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3229-3247, 2021, DOI:10.32604/cmc.2021.015250 - 01 March 2021

    Abstract Technological advancement has contributed immensely to human life and society. Technologies like industrial robots, artificial intelligence, and machine learning are advancing at a rapid pace. While the evolution of Artificial Intelligence has contributed significantly to the development of personal assistants, automated drones, smart home devices, etc., it has also raised questions about the much-anticipated point in the future where machines may develop intelligence that may be equal to or greater than humans, a term that is popularly known as Technological Singularity. Although technological singularity promises great benefits, past research works on Artificial Intelligence (AI) systems… More >

Displaying 51-60 on page 6 of 100. Per Page