Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (170)
  • Open Access

    PROCEEDINGS

    Study on Variation Law of In-Situ Stress Around Well Under Different Fracturing Technology of Shale Gas Platform Well

    Xiaojun Zhang1, Jun Li1,2,*, Wei Lian2, Gonghui Liu1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.1, pp. 1-1, 2023, DOI:10.32604/icces.2023.010343

    Abstract In recent years, shale gas development in Fengnan 4 well area of Xinjiang Oilfield is dominated by platform wells. In contrast to conventional fracturing development, the zipper fracturing is primarily used in this block. In this paper, the finite element model of platform well fracturing is established by establishing the mathematical model of multi-cluster fractures interacting with each other, considering the condition of multi-well and multi-fracture. The sequential fracturing of platform wells and the zipper fracturing (well alternating fracturing, fracturing stage alternating fracturing) are simulated in this paper, and the variation law of induced stress and horizontal principal s are… More >

  • Open Access

    PROCEEDINGS

    Segment Crack Formation and Density Regulation in Air Plasma Sprayed Coatings

    Liuyu Yang1, Peng Jiang1, Tiejun Wang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.25, No.3, pp. 1-1, 2023, DOI:10.32604/icces.2023.010538

    Abstract Air Plasma Sprayed (APS) Thermal Barrier Coatings (TBCs) have been widely used in land-based gas engines for enhancing the high temperature performance due to their outstanding thermal insulation and high durability. Introducing the segment cracks into APS-TBCs to enhance its durability has been quite attractive approaches nowadays. Qualitative conclusions have been drawn to explore the mechanisms on segment crack formation in the past decades. This article acts as a quantitative study of segment crack formation and crack density regulation mechanism in APS Yttria-Stabilized Zirconia (YSZ) TBCs with experimental observations and analytical calculations. An in-situ stress measurement method is developed through… More >

  • Open Access

    ARTICLE

    Cloud Resource Integrated Prediction Model Based on Variational Modal Decomposition-Permutation Entropy and LSTM

    Xinfei Li2, Xiaolan Xie1,2,*, Yigang Tang2, Qiang Guo1,2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2707-2724, 2023, DOI:10.32604/csse.2023.037351

    Abstract Predicting the usage of container cloud resources has always been an important and challenging problem in improving the performance of cloud resource clusters. We proposed an integrated prediction method of stacking container cloud resources based on variational modal decomposition (VMD)-Permutation entropy (PE) and long short-term memory (LSTM) neural network to solve the prediction difficulties caused by the non-stationarity and volatility of resource data. The variational modal decomposition algorithm decomposes the time series data of cloud resources to obtain intrinsic mode function and residual components, which solves the signal decomposition algorithm’s end-effect and modal confusion problems. The permutation entropy is used… More >

  • Open Access

    ARTICLE

    THERMAL MANAGEMENT OF DATA CENTERS UNDER STEADY AND TRANSIENT CONDITIONS

    Yogesh Jaluriaa,*, Arvindh Sundera, Jingru Z. Bennerb

    Frontiers in Heat and Mass Transfer, Vol.15, pp. 1-12, 2020, DOI:10.5098/hmt.15.12

    Abstract Data centers are of crucial importance today in the storage and retrieval of large amounts of data. Most organizations and firms, ranging from banks and online retailers to government departments and internet companies, use data centers to store information that can be recovered efficiently and rapidly. As the deployment of data centers has increased, along with their capacity for data storage, the demands on thermal management have also increased. It is necessary to remove the energy dissipated by the electronic circuitry since the temperature of the components must not rise beyond acceptable levels that could damage them or affect their… More >

  • Open Access

    ARTICLE

    Micropropagation of Daylily (Hemerocallis fulva) from Crown-Tip Explants and Assessment of Somaclonal Variation of in Vitro-Propagated Plants Using SCoT Markers

    Esraa E. Shalan1, Said S. Soliman1, Ahmed A. Mahmoud1, Jameel M. Al-Khayri2,*, Salha M. ALshamrani3, Fatmah A. Safhi4, Areej S. Jalal4, Diaa Abd El-Moneim5, Abdallah A. Hassanin1,*

    Phyton-International Journal of Experimental Botany, Vol.92, No.7, pp. 2183-2196, 2023, DOI:10.32604/phyton.2023.028537

    Abstract Determination of the somaclonal variation of in vitro-propagated plants is crucial to determine the appropriate micropropagation protocol and growth regulators for commercial scale multiplication. In this research, nine multiplication media (MM) augmented with different concentrations of 6-benzyl adenine (BA), Kinetin (Kin), and Thidiazuron (TDZ), Three rooting media (RM) supplemented with three levels of α-naphthalene acetic acid (NAA) and three types of soil mixtures (v/v); Coco peat/Vermiculite/Sand (CVS), Peat moss/Perlite/Sand (PPS) and Peat moss/Perlite (PP) were used in the micropropagation protocol of daylily plants. MM2 showed the maximum shoot length and the number of leaves, while MM9 showed the maximum number… More >

  • Open Access

    REVIEW

    In vitro Mutagenesis for the Improvement of Agave Genus

    Sugey Vásquez-Hernández, Joaquín Adolfo Montes-Molina*, Federico Antonio Gutiérrez-Miceli, Sheila Jazmín Reyes-Zambrano, Carlos Alberto Lecona-Guzmán*

    Phyton-International Journal of Experimental Botany, Vol.92, No.7, pp. 2065-2078, 2023, DOI:10.32604/phyton.2023.028784

    Abstract Biotechnological techniques provide a viable alternative to help improve and increase the production of plant species of agricultural and economic importance, which have been affected over the years by climate change, increasing their susceptibility to pests and/or diseases, generating losses in production as well as a decrease in their regenerative and genetic diversity. The application of biotechnological techniques such as in vitro mutagenesis offers a viable option for the generation of crops that are resistant to the different factors caused by abiotic and biotic stress. In vitro mutagenesis has been used in an efficient way to generate genetic changes in… More >

  • Open Access

    ARTICLE

    THE EFFECTS OF VARIATION IN SHAPE OF SMOKE RESERVOIRS AND NUMBERS AND DISTRIBUTION OF SMOKE EXTRACTION POINTS ON THE TENABILITY WITHIN A COMPARTMENT

    HM Iqbal Mahmuda,b,*,† , Vijay Rajaramb, Khalid Moinuddinb

    Frontiers in Heat and Mass Transfer, Vol.20, pp. 1-17, 2023, DOI:10.5098/hmt.20.2

    Abstract This study has examined some important aspects of the engineered smoke control system, namely the shape of smoke reservoirs and the quantity and distribution of smoke extract points within a smoke compartment. Three different shapes of smoke reservoirs have been selected for analysis, namely square, rectangular, and T-shaped. The shape of the smoke reservoir has been varied, but the area, length and height have been kept identical. Four different configurations of extract points have been used in each shape of the reservoir: a single extract point located at the corner of the smoke reservoir, a single extract point located at… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE)

    Lelisa Adeba Jilcha1, Deuk-Hun Kim2, Julian Jang-Jaccard3, Jin Kwak4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3261-3284, 2023, DOI:10.32604/csse.2023.037615

    Abstract Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.… More >

  • Open Access

    ARTICLE

    Dynamic Allocation of Manufacturing Tasks and Resources in Shared Manufacturing

    Caiyun Liu, Peng Liu*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3221-3242, 2023, DOI:10.32604/iasc.2023.035114

    Abstract Shared manufacturing is recognized as a new point-to-point manufacturing mode in the digital era. Shared manufacturing is referred to as a new manufacturing mode to realize the dynamic allocation of manufacturing tasks and resources. Compared with the traditional mode, shared manufacturing offers more abundant manufacturing resources and flexible configuration options. This paper proposes a model based on the description of the dynamic allocation of tasks and resources in the shared manufacturing environment, and the characteristics of shared manufacturing resource allocation. The execution of manufacturing tasks, in which candidate manufacturing resources enter or exit at various time nodes, enables the dynamic… More >

  • Open Access

    ARTICLE

    Augmenting Android Malware Using Conditional Variational Autoencoder for the Malware Family Classification

    Younghoon Ban, Jeong Hyun Yi, Haehyun Cho*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2215-2230, 2023, DOI:10.32604/csse.2023.036555

    Abstract Android malware has evolved in various forms such as adware that continuously exposes advertisements, banking malware designed to access users’ online banking accounts, and Short Message Service (SMS) malware that uses a Command & Control (C&C) server to send malicious SMS, intercept SMS, and steal data. By using many malicious strategies, the number of malware is steadily increasing. Increasing Android malware threats numerous users, and thus, it is necessary to detect malware quickly and accurately. Each malware has distinguishable characteristics based on its actions. Therefore, security researchers have tried to categorize malware based on their behaviors by conducting the familial… More >

Displaying 21-30 on page 3 of 170. Per Page