Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (69)
  • Open Access

    ARTICLE

    Geometrically Nonlinear Flutter Analysis Based on CFD/CSD Methods and Wind Tunnel Experimental Verification

    Changrong Zhang, Hongtao Guo, Li Yu, Binbin Lv, Hongya Xia*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1743-1758, 2023, DOI:10.32604/cmes.2023.025528

    Abstract This study presents a high-speed geometrically nonlinear flutter analysis calculation method based on the high-precision computational fluid dynamics/computational structural dynamics methods. In the proposed method, the aerodynamic simulation was conducted based on computational fluid dynamics, and the structural model was established using the nonlinear finite element model and tangential stiffness matrix. First, the equilibrium position was obtained using the nonlinear static aeroelastic iteration. Second, the structural modal under a steady aerodynamic load was extracted. Finally, the generalized displacement time curve was obtained by coupling the unsteady aerodynamics and linearized structure motion equations. Moreover, if the flutter is not at a… More > Graphic Abstract

    Geometrically Nonlinear Flutter Analysis Based on CFD/CSD Methods and Wind Tunnel Experimental Verification

  • Open Access

    ARTICLE

    Human Verification over Activity Analysis via Deep Data Mining

    Kumar Abhishek1,*, Sheikh Badar ud din Tahir2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1391-1409, 2023, DOI:10.32604/cmc.2023.035894

    Abstract Human verification and activity analysis (HVAA) are primarily employed to observe, track, and monitor human motion patterns using red-green-blue (RGB) images and videos. Interpreting human interaction using RGB images is one of the most complex machine learning tasks in recent times. Numerous models rely on various parameters, such as the detection rate, position, and direction of human body components in RGB images. This paper presents robust human activity analysis for event recognition via the extraction of contextual intelligence-based features. To use human interaction image sequences as input data, we first perform a few denoising steps. Then, human-to-human analyses are employed… More >

  • Open Access

    ARTICLE

    One-Class Arabic Signature Verification: A Progressive Fusion of Optimal Features

    Ansam A. Abdulhussien1,2,*, Mohammad F. Nasrudin1, Saad M. Darwish3, Zaid A. Alyasseri1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 219-242, 2023, DOI:10.32604/cmc.2023.033331

    Abstract Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection. It is also a popular biometric authentication technology in forensic and commercial transactions due to its various advantages, including noninvasiveness, user-friendliness, and social and legal acceptability. According to the literature, extensive research has been conducted on signature verification systems in a variety of languages, including English, Hindi, Bangla, and Chinese. However, the Arabic Offline Signature Verification (OSV) system is still a challenging issue that has not been investigated as much by researchers due to the Arabic script being distinguished by changing letter shapes,… More >

  • Open Access

    ARTICLE

    Biometric Verification System Using Hyperparameter Tuned Deep Learning Model

    Mohammad Yamin1, Saleh Bajaba2, Sarah B. Basahel3, E. Laxmi Lydia4,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 321-336, 2023, DOI:10.32604/csse.2023.034849

    Abstract Deep learning (DL) models have been useful in many computer vision, speech recognition, and natural language processing tasks in recent years. These models seem a natural fit to handle the rising number of biometric recognition problems, from cellphone authentication to airport security systems. DL approaches have recently been utilized to improve the efficiency of various biometric recognition systems. Iris recognition was considered the more reliable and accurate biometric detection method accessible. Iris recognition has been an active research region in the last few decades due to its extensive applications, from security in airports to homeland security border control. This article… More >

  • Open Access

    ARTICLE

    Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain

    Jin Wang1, Wei Ou1, Osama Alfarraj2, Amr Tolba2, Gwang-Jun Kim3,*, Yongjun Ren4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1805-1819, 2023, DOI:10.32604/csse.2023.029622

    Abstract Since transactions in blockchain are based on public ledger verification, this raises security concerns about privacy protection. And it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification, when the whole transaction on the chain is verified. In order to improve the efficiency and privacy protection of block data verification, this paper proposes an efficient block verification mechanism with privacy protection based on zero-knowledge proof (ZKP), which not only protects the privacy of users but also improves the speed of data block verification. There is no need to put the whole… More >

  • Open Access

    ARTICLE

    Formal Verification Platform as a Service: WebAssembly Vulnerability Detection Application

    LiangJun Deng1, Hang Lei1, Zheng Yang1, WeiZhong Qian1,*, XiaoYu Li1, Hao Wu2, Sihao Deng3, RuChao Sha1, WeiDong Deng4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2155-2170, 2023, DOI:10.32604/csse.2023.027680

    Abstract In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service (FVPS), which aims to provide an automated report of vulnerability detections, this work builds a Hyperledger Fabric blockchain runtime model. It proposes an optimized methodology of the functional equivalent translation from source program languages to formal languages. This methodology utilizes an external application programming interface (API) table to replace the source codes in compilation, thereby pruning the part of housekeeping codes to ease code inflation. Code inflation is a significant metric in formal language translation. Namely, minor code inflation enhances verification scale… More >

  • Open Access

    ARTICLE

    Person-Dependent Handwriting Verification for Special Education Using Deep Learning

    Umut Zeki1,*, Tolgay Karanfiller2, Kamil Yurtkan1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1121-1135, 2023, DOI:10.32604/iasc.2023.032554

    Abstract Individuals with special needs learn more slowly than their peers and they need repetitions to be permanent. However, in crowded classrooms, it is difficult for a teacher to deal with each student individually. This problem can be overcome by using supportive education applications. However, the majority of such applications are not designed for special education and therefore they are not efficient as expected. Special education students differ from their peers in terms of their development, characteristics, and educational qualifications. The handwriting skills of individuals with special needs are lower than their peers. This makes the task of Handwriting Recognition (HWR)… More >

  • Open Access

    ARTICLE

    Fast Verification of Network Configuration Updates

    Jiangyuan Yao1, Zheng Jiang2, Kaiwen Zou2, Shuhua Weng1, Yaxin Li3, Deshun Li1, Yahui Li4,*, Xingcan Cao5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 293-311, 2023, DOI:10.32604/cmc.2023.031282

    Abstract With the expansion of network services, large-scale networks have progressively become common. The network status changes rapidly in response to customer needs and configuration changes, so network configuration changes are also very frequent. However, no matter what changes, the network must ensure the correct conditions, such as isolating tenants from each other or guaranteeing essential services. Once changes occur, it is necessary to verify the after-changed network. Whereas, for the verification of large-scale network configuration changes, many current verifiers show poor efficiency. In order to solve the problem of multiple global verifications caused by frequent updates of local configurations in… More >

  • Open Access

    ARTICLE

    Transcriptome Analysis and Genes Function Verification of Root Development of Paeonia suffruticosa under Sandy Loam Cultivation

    Yinglong Song1,#, Wenqian Shang1,#, Zheng Wang1,*, Songlin He1,2,*, Xinya Meng3, Liyun Shi1, Yuxiao Shen1, Dan He1, Xueyuan Lou1, Yuke Sun1

    Phyton-International Journal of Experimental Botany, Vol.91, No.12, pp. 2791-2812, 2022, DOI:10.32604/phyton.2022.023572

    Abstract Relatively poor in vitro rooting has limited the large-scale commercial production of tree peony. In this study, on the basis of transcriptome sequencing, differentially expressed genes and the associated metabolic pathways were identified in tree peony roots at different stages of root formation under sandy loam cultivation. A total of 31.63 Gb raw data were generated and 120,188 unigenes (mean length of 911.98 bp) were annotated according to six databases (NR, NT, GO, KEGG, COG, and Swiss-Prot). Analyses of the ungerminated root primordium period, induced root primordium period, and root formation period detected 8,232, 6,907, and 10,687 differentially expressed genes related… More >

  • Open Access

    ARTICLE

    Chaotic Krill Herd with Deep Transfer Learning-Based Biometric Iris Recognition System

    Harbi Al-Mahafzah1, Tamer AbuKhalil1, Bassam A. Y. Alqaralleh2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5703-5715, 2022, DOI:10.32604/cmc.2022.030399

    Abstract Biometric verification has become essential to authenticate the individuals in public and private places. Among several biometrics, iris has peculiar features and its working mechanism is complex in nature. The recent developments in Machine Learning and Deep Learning approaches enable the development of effective iris recognition models. With this motivation, the current study introduces a novel Chaotic Krill Herd with Deep Transfer Learning Based Biometric Iris Recognition System (CKHDTL-BIRS). The presented CKHDTL-BIRS model intends to recognize and classify iris images as a part of biometric verification. To achieve this, CKHDTL-BIRS model initially performs Median Filtering (MF)-based preprocessing and segmentation for… More >

Displaying 21-30 on page 3 of 69. Per Page