Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (167)
  • Open Access

    ARTICLE

    Numerical Simulation of Fire-Smoke Diffusion Caused by Vehicles in a Tunnel

    Li Lei*, Wukai Chen, Huiling Li, Shuai Shi

    FDMP-Fluid Dynamics & Materials Processing, Vol.16, No.5, pp. 837-856, 2020, DOI:10.32604/fdmp.2020.09631 - 09 October 2020

    Abstract Urban tunnels are generally narrow and fire smoke can hardly diffuse. In the present study, numerical simulation is used to analyze the diffusion of high temperature smoke produced by fire inside a specific tunnel (the Kaiyuan tunnel). The results are compared with similar data relating to other tests to determine the validity of the numerical method. Moreover, the critical velocity obtained by numerical simulation of 5 MW, 20 MW, and 50 MW fires in curved and linear sections of the considered tunnel is compared with the values obtained using empirical formulas. The results show that,… More >

  • Open Access

    ARTICLE

    Design of a Multichannel Dynamic Temperature Measurement System for Developing Thermal Management System of New Energy Vehicles

    Wei Li1, Shusheng Xiong2,*, Xiaojun Zhou1, Wei Shi3

    Energy Engineering, Vol.117, No.5, pp. 301-314, 2020, DOI:10.32604/EE.2020.011506 - 07 September 2020

    Abstract A multichannel temperature measurement system based on LabVIEW and modular instruments with general purpose input/output interface is described. External simple electronic components, such as analog switches arrays, sampling resistors and voltage reference are used to expand the analog input channel of the instrument. The interface circuit for 3-wire resistance temperature device powered by the voltage reference was designed and constructed. The feasibility of filtering algorithm based on moving average filter and the data conversion method by direct computation of the polynomial are verified in LabVIEW. A comparison test with the commercial temperature measurement instrument is… More >

  • Open Access

    ARTICLE

    "Data Mining of Urban New Energy Vehicles in an Intelligent Government Subsidy Environment Using Closed-Loop Supply Chain Pricing Model"

    Jing-Hua Zhao1,†, Da-Lin Zeng2,*, Ting-Wei Zhou1,‡, Ze-Chao Zhu1,§

    Computer Systems Science and Engineering, Vol.35, No.3, pp. 151-172, 2020, DOI:10.32604/csse.2020.35.151

    Abstract Given the government subsidies for new energy vehicles, this study is conducted to study the closed-loop supply chain comprising individual manufacturers, individual retailers and individual third-party recyclers. In this paper, combine the reality of new energy vehicles with the relevant research of game theory, and establish an no government subsidy model (Model N), a government subsidized consumer model (Model C), a government subsidized manufacturer model (Model M), a government subsidized third party recycler model (Model T), and a government subsidized retailer model (Model R) for quantitative research. Then, numerical examples are used to simulate the More >

  • Open Access

    ARTICLE

    A Method for Planning the Routes of Harvesting Equipment using Unmanned Aerial Vehicles

    Vitaliy Mezhuyev1,*, Yurii Gunchenko2, Sergey Shvorov3, Dmitry Chyrchenko3

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 121-132, 2020, DOI:10.31209/2019.100000133

    Abstract The widespread distribution of precision farming systems necessitates improvements in the methods for the control of unmanned harvesting equipment (UHE). While unmanned aerial vehicles (UAVs) provide an effective solution to this problem, there are many challenges in the implementation of technology. This paper considers the problem of identifying optimal routes of UHE movement as a multicriteria evaluation problem, which can be solved by a nonlinear scheme of compromises. The proposed method uses machine learning algorithms and statistical processing of the spectral characteristics obtained from UAV digital images. Developed method minimizes the resources needed for a More >

  • Open Access

    ARTICLE

    Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Fei Li1, *, Jiayan Zhang1, Edward Szczerbicki2, Jiaqi Song1, Ruxiang Li 1, Renhong Diao1

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 653-681, 2020, DOI:10.32604/cmc.2020.011264 - 23 July 2020

    Abstract The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated the intrusion detection system based on the in-vehicle system. We combined two algorithms to realize the efficient learning of the vehicle’s boundary behavior and the detection of intrusive behavior. In order to More >

  • Open Access

    ARTICLE

    Vehicle Target Detection Method Based on Improved SSD Model

    Guanghui Yu1, Honghui Fan1, Hongyan Zhou1, Tao Wu1, Hongjin Zhu1, *

    Journal on Artificial Intelligence, Vol.2, No.3, pp. 125-135, 2020, DOI:10.32604/jai.2020.010501 - 15 July 2020

    Abstract When we use traditional computer vision Inspection technology to locate the vehicles, we find that the results were unsatisfactory, because of the existence of diversified scenes and uncertainty. So, we present a new method based on improved SSD model. We adopt ResNet101 to enhance the feature extraction ability of algorithm model instead of the VGG16 used by the classic model. Meanwhile, the new method optimizes the loss function, such as the loss function of predicted offset, and makes the loss function drop more smoothly near zero points. In addition, the new method improves cross entropy More >

  • Open Access

    ARTICLE

    Behavioral Feature and Correlative Detection of Multiple Types of Node in the Internet of Vehicles

    Pengshou Xie1, Guoqiang Ma1, *, Tao Feng1, Yan Yan1, 2, Xueming Han1

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1127-1137, 2020, DOI:10.32604/cmc.2020.09695 - 10 June 2020

    Abstract Undoubtedly, uncooperative or malicious nodes threaten the safety of Internet of Vehicles (IoV) by destroying routing or data. To this end, some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication, data, energy, etc., to detect and evaluate vehicle nodes. However, it is difficult to effectively assess the trust level of a vehicle node only by message forwarding, data consistency, and energy sufficiency. In order to resolve these problems, a novel mechanism and a new trust calculating model is proposed in this… More >

  • Open Access

    ARTICLE

    Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model

    Wenxi Han1, 2, Mingzhi Cheng3, *, Min Lei1, 2, Hanwen Xu2, Yu Yang1, 2, Lei Qian4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1025-1038, 2020, DOI:10.32604/cmc.2020.09815 - 10 June 2020

    Abstract In recent years, with the continuous advancement of the intelligent process of the Internet of Vehicles (IoV), the problem of privacy leakage in IoV has become increasingly prominent. The research on the privacy protection of the IoV has become the focus of the society. This paper analyzes the advantages and disadvantages of the existing location privacy protection system structure and algorithms, proposes a privacy protection system structure based on untrusted data collection server, and designs a vehicle location acquisition algorithm based on a local differential privacy and game model. The algorithm first meshes the road… More >

  • Open Access

    ARTICLE

    Authentication of Vehicles and Road Side Units in Intelligent Transportation System

    Muhammad Waqas1, 2, Shanshan Tu1, 3, *, Sadaqat Ur Rehman1, Zahid Halim2, Sajid Anwar2, Ghulam Abbas2, Ziaul Haq Abbas4, Obaid Ur Rehman5

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 359-371, 2020, DOI:10.32604/cmc.2020.09821 - 20 May 2020

    Abstract Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents, economically damaging traffic jams, hijacking, motivating to wrong routes, and financial losses for businesses and governments. Smart and autonomous vehicles are connected wirelessly, which are more attracted for attackers due to the open nature of wireless communication. One of the problems is the rogue attack, in which the attacker pretends to be a legitimate user or access point by utilizing fake identity. To figure out the problem of a rogue attack, we propose a reinforcement learning algorithm to identify rogue nodes More >

  • Open Access

    ARTICLE

    Beam Approximation for Dynamic Analysis of Launch Vehicles Modelled as Stiffened Cylindrical Shells

    Siyang Piao1, Huajiang Ouyang1, 2, Yahui Zhang1, *

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.2, pp. 571-591, 2020, DOI:10.32604/cmes.2020.08789 - 01 February 2020

    Abstract A beam approximation method for dynamic analysis of launch vehicles modelled as stiffened cylindrical shells is proposed. Firstly, an initial beam model of the stiffened cylindrical shell is established based on the cross-sectional area equivalence principle that represents the shell skin and its longitudinal ribs as a beam with annular cross-section, and the circumferential ribs as lumped masses at the nodes of the beam elements. Then, a fine finite element model (FE model) of the stiffened cylindrical shell is constructed and a modal analysis is carried out. Finally, the initial beam model is improved through… More >

Displaying 141-150 on page 15 of 167. Per Page