Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5,350)
  • Open Access

    ARTICLE

    Transient Response in Cross-Ply Laminated Cylinders and Its Application to Reconstruction of Elastic Constants

    X. Han1,2,3, G. R. Liu1,2, G. Y. Li 1

    CMC-Computers, Materials & Continua, Vol.1, No.1, pp. 39-50, 2004, DOI:10.3970/cmc.2004.001.039

    Abstract An efficient hybrid numerical method is presented for investigating transient response of cross-ply laminated axisymmetric cylinders subjected to an impact load. In this hybrid numerical method, the laminated cylinder is divided into layered cylindrical elements in the thickness direction. The Hamilton principle is used to develop governing equations of the structure. The displacement response is determined by employing the Fourier transformations and the modal analysis. Numerical examples for analyzing transient waves have been provided in axisymmetric laminated cylindrical structures, both for thin cylindrical shells and thick cylinders.
    A computational inverse technique is also presented for reconstructing elastic constants of… More >

  • Open Access

    REVIEW

    Trefftz Methods for Time Dependent Partial Differential Equations

    Hokwon A. Cho1, M. A. Golberg2, A. S. Muleshkov1, Xin Li1

    CMC-Computers, Materials & Continua, Vol.1, No.1, pp. 1-38, 2004, DOI:10.3970/cmc.2004.001.001

    Abstract In this paper we present a mesh-free approach to numerically solving a class of second order time dependent partial differential equations which include equations of parabolic, hyperbolic and parabolic-hyperbolic types. For numerical purposes, a variety of transformations is used to convert these equations to standard reaction-diffusion and wave equation forms. To solve initial boundary value problems for these equations, the time dependence is removed by either the Laplace or the Laguerre transform or time differencing, which converts the problem into one of solving a sequence of boundary value problems for inhomogeneous modified Helmholtz equations. These boundary value problems are then… More >

  • Open Access

    ARTICLE

    Street-Level Landmarks Acquisition Based on SVM Classifiers

    Ruixiang Li1,2, Yingying Liu3, Yaqiong Qiao1,2, Te Ma1,2, Bo Wang4, Xiangyang Luo1,2,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 591-606, 2019, DOI:10.32604/cmc.2019.05208

    Abstract High-density street-level reliable landmarks are one of the important foundations for street-level geolocation. However, the existing methods cannot obtain enough street-level landmarks in a short period of time. In this paper, a street-level landmarks acquisition method based on SVM (Support Vector Machine) classifiers is proposed. Firstly, the port detection results of IPs with known services are vectorized, and the vectorization results are used as an input of the SVM training. Then, the kernel function and penalty factor are adjusted for SVM classifiers training, and the optimal SVM classifiers are obtained. After that, the classifier sequence is constructed, and the IPs… More >

  • Open Access

    ARTICLE

    Developing a New Security Framework for Bluetooth Low Energy Devices

    Qiaoyang Zhang1, Zhiyao Liang1,*, Zhiping Cai2

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 457-471, 2019, DOI:10.32604/cmc.2019.03758

    Abstract Wearable devices are becoming more popular in our daily life. They are usually used to monitor health status, track fitness data, or even do medical tests, etc. Since the wearable devices can obtain a lot of personal data, their security issues are very important. Motivated by the consideration that the current pairing mechanisms of Bluetooth Low Energy (BLE) are commonly impractical or insecure for many BLE based wearable devices nowadays, we design and implement a security framework in order to protect the communication between these devices. The security framework is a supplement to the Bluetooth pairing mechanisms and is compatible… More >

  • Open Access

    ARTICLE

    Quantitative Analysis of Crime Incidents in Chicago Using Data Analytics Techniques

    Daniel Rivera Ruiz1,*, Alisha Sawant1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 389-396, 2019, DOI:10.32604/cmc.2019.06433

    Abstract In this paper we aim to identify certain social factors that influence, and thus can be used to predict, the occurrence of crimes. The factors under consideration for this analytic are social demographics such as age, sex, poverty, etc., train ridership, traffic density and the number of business licenses per community area in Chicago, IL. A factor will be considered pertinent if there is high correlation between it and the number of crimes of a particular type in that community area. More >

  • Open Access

    ARTICLE

    Privacy-Preserving Content-Aware Search Based on Two-Level Index

    Zhangjie Fu1,*, Lili Xia1, Yuling Liu2, Zuwei Tian3

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 473-491, 2019, DOI:10.32604/cmc.2019.03785

    Abstract Nowadays, cloud computing is used more and more widely, more and more people prefer to using cloud server to store data. So, how to encrypt the data efficiently is an important problem. The search efficiency of existed search schemes decreases as the index increases. For solving this problem, we build the two-level index. Simultaneously, for improving the semantic information, the central word expansion is combined. The purpose of privacy-preserving content-aware search by using the two-level index (CKESS) is that the first matching is performed by using the extended central words, then calculate the similarity between the trapdoor and the secondary… More >

  • Open Access

    ARTICLE

    A Deep Collocation Method for the Bending Analysis of Kirchhoff Plate

    Hongwei Guo3, Xiaoying Zhuang3,4,5, Timon Rabczuk1,2,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 433-456, 2019, DOI:10.32604/cmc.2019.06660

    Abstract In this paper, a deep collocation method (DCM) for thin plate bending problems is proposed. This method takes advantage of computational graphs and backpropagation algorithms involved in deep learning. Besides, the proposed DCM is based on a feedforward deep neural network (DNN) and differs from most previous applications of deep learning for mechanical problems. First, batches of randomly distributed collocation points are initially generated inside the domain and along the boundaries. A loss function is built with the aim that the governing partial differential equations (PDEs) of Kirchhoff plate bending problems, and the boundary/initial conditions are minimised at those collocation… More >

  • Open Access

    REVIEW

    A Review on Fretting Wear Mechanisms, Models and Numerical Analyses

    Tongyan Yue1,2, Magd Abdel Wahab3,4,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 405-432, 2019, DOI:10.32604/cmc.2019.04253

    Abstract Fretting wear is a material damage in contact surfaces due to micro relative displacement between them. It causes some general problems in industrial applications, such as loosening of fasteners or sticking in components supposed to move relative to each other. Fretting wear is a complicated problem involving material properties of tribo-system and working conditions of them. Due to these various factors, researchers have studied the process of fretting wear by experiments and numerical modelling methods. This paper reviews recent literature on the numerical modelling method of fretting wear. After a briefly introduction on the mechanism of fretting wear, numerical models,… More >

  • Open Access

    ARTICLE

    A Hierarchical Trust Model for Peer-to-Peer Networks

    Nehal Al-Otaiby1, Heba Kurdi1,*, Shiroq Al-Megren1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 397-404, 2019, DOI:10.32604/cmc.2019.06236

    Abstract Trust has become an increasingly important issue given society’s growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem’s scale and complexity, more research is necessary.… More >

  • Open Access

    ARTICLE

    A Data Download Method from RSUs Using Fog Computing in Connected Vehicles

    Dae-Young Kim1, Seokhoon Kim2,*

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 375-387, 2019, DOI:10.32604/cmc.2019.06077

    Abstract Communication is important for providing intelligent services in connected vehicles. Vehicles must be able to communicate with different places and exchange information while driving. For service operation, connected vehicles frequently attempt to download large amounts of data. They can request data downloading to a road side unit (RSU), which provides infrastructure for connected vehicles. The RSU is a data bottleneck in a transportation system because data traffic is concentrated on the RSU. Therefore, it is not appropriate for a connected vehicle to always attempt a high speed download from the RSU. If the mobile network between a connected vehicle and… More >

Displaying 4471-4480 on page 448 of 5350. Per Page