Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (80)
  • Open Access

    ARTICLE

    EFFECTS OF BLOCKAGE LOCATIONS FOR ENHANCED HEAT TRANSFER AND FLOW VISUALIZATION IN A TESTED DUCT WITH DUAL-INCLINED BAFFLES (DIB): A CFD ANALYSIS

    Amnart Boonloia, Withada Jedsadaratanachaib,*

    Frontiers in Heat and Mass Transfer, Vol.18, pp. 1-15, 2022, DOI:10.5098/hmt.18.20

    Abstract Numerical analysis of fluid flow mechanism and heat transfer in a heat exchanger duct (HXD) with dual-inclined baffles (DIB) are reported. Three DIB types are examined: 1. “Type A” is located at the center of the HXD, 2. “Type B” is located on the upper-lower duct walls (as an orifice) and 3. “Type C” is a combination of the type A and B (as double orifices). The impacts of the ratio of DIB heights (b) to the square duct height (H; b/H) on increased heat transfer and friction loss are analyzed. Laminar flow (Re =… More >

  • Open Access

    ARTICLE

    VISUALIZATION OF INDUCED COUNTER-ROTATING VORTICES FOR ELECTRIC VEHICLES BATTERY MODULE THERMAL MANAGEMENT

    A.C. Budimana,*, S. M. Hasheminejadb, Sudirjaa, A. Mitayanic, S. H. Winotod

    Frontiers in Heat and Mass Transfer, Vol.19, pp. 1-6, 2022, DOI:10.5098/hmt.19.9

    Abstract Streamwise development of counter-rotating vortices induced by three different types of chevron Vortex Generators (VGs) placed upstream an Electric Vehicles (EV) dummy battery module is experimentally visualized using a smoke-wire method. From the single chevron reference case, the mushroom-like vortices do not collapse until passing the module. When more chevrons are used in line, the vortices become more prominent. It can also be observed that the vortex sizes and shapes are significantly influenced by the spanwise base length of the chevron. The induced vortices from all three VGs suggest a potential heat transfer augmentation for More >

  • Open Access

    ARTICLE

    A Survey on Visualization-Based Malware Detection

    Ahmad Moawad*, Ahmed Ismail Ebada, Aya M. Al-Zoghby

    Journal of Cyber Security, Vol.4, No.3, pp. 169-184, 2022, DOI:10.32604/jcs.2022.033537 - 01 February 2023

    Abstract In computer security, the number of malware threats is increasing and causing damage to systems for individuals or organizations, necessitating a new detection technique capable of detecting a new variant of malware more efficiently than traditional anti-malware methods. Traditional anti-malware software cannot detect new malware variants, and conventional techniques such as static analysis, dynamic analysis, and hybrid analysis are time-consuming and rely on domain experts. Visualization-based malware detection has recently gained popularity due to its accuracy, independence from domain experts, and faster detection time. Visualization-based malware detection uses the image representation of the malware binary More >

  • Open Access

    ARTICLE

    Design of a Web Crawler for Water Quality Monitoring Data and Data Visualization

    Ziwen Yu1, Jianjun Zhang1,*, Wenwu Tan1, Ziyi Xiong1, Peilun Li1, Liangqing Meng2, Haijun Lin1, Guang Sun3, Peng Guo4

    Journal on Big Data, Vol.4, No.2, pp. 135-143, 2022, DOI:10.32604/jbd.2022.031024 - 31 October 2022

    Abstract Many countries are paying more and more attention to the protection of water resources at present, and how to protect water resources has received extensive attention from society. Water quality monitoring is the key work to water resources protection. How to efficiently collect and analyze water quality monitoring data is an important aspect of water resources protection. In this paper, python programming tools and regular expressions were used to design a web crawler for the acquisition of water quality monitoring data from Global Freshwater Quality Database (GEMStat) sites, and the multi-thread parallelism was added to More >

  • Open Access

    ARTICLE

    Pedestrian Physical Education Training Over Visualization Tool

    Tamara al Shloul1, Israr Akhter2, Suliman A. Alsuhibany3, Yazeed Yasin Ghadi4, Ahmad Jalal2, Jeongmin Park5,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2389-2405, 2022, DOI:10.32604/cmc.2022.027007 - 16 June 2022

    Abstract E-learning approaches are one of the most important learning platforms for the learner through electronic equipment. Such study techniques are useful for other groups of learners such as the crowd, pedestrian, sports, transports, communication, emergency services, management systems and education sectors. E-learning is still a challenging domain for researchers and developers to find new trends and advanced tools and methods. Many of them are currently working on this domain to fulfill the requirements of industry and the environment. In this paper, we proposed a method for pedestrian behavior mining of aerial data, using deep flow… More >

  • Open Access

    ARTICLE

    Ransomware Classification Framework Using the Behavioral Performance Visualization of Execution Objects

    Jun-Seob Kim, Ki-Woong Park*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3401-3424, 2022, DOI:10.32604/cmc.2022.026621 - 29 March 2022

    Abstract A ransomware attack that interrupted the operation of Colonial Pipeline (a large U.S. oil pipeline company), showed that security threats by malware have become serious enough to affect industries and social infrastructure rather than individuals alone. The agents and characteristics of attacks should be identified, and appropriate strategies should be established accordingly in order to respond to such attacks. For this purpose, the first task that must be performed is malware classification. Malware creators are well aware of this and apply various concealment and avoidance techniques, making it difficult to classify malware. This study focuses… More >

  • Open Access

    ARTICLE

    Visualization Detection of Solid–Liquid Two-Phase Flow in Filling Pipeline by Electrical Capacitance Tomography Technology

    Ningbo Jing1, Mingqiao Li1, Lang Liu2,*, Yutong Shen1, Peijiao Yang1, Xuebin Qin1

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 465-476, 2022, DOI:10.32604/cmes.2022.018965 - 24 January 2022

    Abstract During mine filling, the caking in the pipeline and the waste rock in the filling slurry may cause serious safety accidents such as pipe blocking or explosion. Therefore, the visualization of the inner mine filling of the solid–liquid two-phase flow in the pipeline is important. This paper proposes a method based on capacitance tomography for the visualization of the solid–liquid distribution on the section of a filling pipe. A feedback network is used for electrical capacitance tomography reconstruction. This reconstruction method uses radial basis function neural network fitting to determine the relationship between the capacitance… More >

  • Open Access

    ARTICLE

    Complex Network Formation and Analysis of Online Social Media Systems

    Hafiz Abid Mahmood Malik*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1737-1750, 2022, DOI:10.32604/cmes.2022.018015 - 30 December 2021

    Abstract To discover and identify the influential nodes in any complex network has been an important issue. It is a significant factor in order to control over the network. Through control on a network, any information can be spread and stopped in a short span of time. Both targets can be achieved, since network of information can be extended and as well destroyed. So, information spread and community formation have become one of the most crucial issues in the world of SNA (Social Network Analysis). In this work, the complex network of twitter social network has… More >

  • Open Access

    ARTICLE

    Deep Stacked Ensemble Learning Model for COVID-19 Classification

    G. Madhu1, B. Lalith Bharadwaj1, Rohit Boddeda2, Sai Vardhan1, K. Sandeep Kautish3, Khalid Alnowibet4, Adel F. Alrasheedi4, Ali Wagdy Mohamed5,6,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5467-5469, 2022, DOI:10.32604/cmc.2022.020455 - 11 October 2021

    Abstract COVID-19 is a growing problem worldwide with a high mortality rate. As a result, the World Health Organization (WHO) declared it a pandemic. In order to limit the spread of the disease, a fast and accurate diagnosis is required. A reverse transcript polymerase chain reaction (RT-PCR) test is often used to detect the disease. However, since this test is time-consuming, a chest computed tomography (CT) or plain chest X-ray (CXR) is sometimes indicated. The value of automated diagnosis is that it saves time and money by minimizing human effort. Three significant contributions are made by… More >

  • Open Access

    ARTICLE

    Empirically Modeling Enterprise Architecture Using ArchiMate

    Qiang Zhi1,*, Zhengshu Zhou2,3

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 357-374, 2022, DOI:10.32604/csse.2022.018759 - 26 August 2021

    Abstract Enterprise Architecture (EA) has evolved based on the practice of information systems architecture design and implementation. EA is a rigorous description of a structure, and the objectives of EA modeling not only include clarifying corporate strategies, visualizing business processes, and modeling information systems to manage resources but also include improving organizational structures, adjusting information strategies, and creating new business value. Therefore, EA models cover a wide scope that includes both IT and business architectures. Typically, EA modeling is the initial and most important analysis step for researchers, architects, and developers. ArchiMate is the dominant modeling… More >

Displaying 31-40 on page 4 of 80. Per Page