Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,589)
  • Open Access

    REVIEW

    A Review of Test Methods for the Determination of the Permeability Coefficient of Gravelly Soils Used for Embankment Dams

    Zhenggang Zhan1, Han Chen2,3, Yanyi Zhang2,3, Ruilin Cheng1, Gang Deng2,3,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.1, pp. 131-144, 2022, DOI:10.32604/fdmp.2022.017536 - 10 November 2021

    Abstract The factors influencing the permeability coefficient of gravelly soils used for the development of embankment dams (core wall) are analyzed. Such factors include (but are not limited to) soil size, anisotropy, density and boundary effects. A review of the literature is conducted and new directions of research are proposed. In such a framework, it is shown that gravelly soil with controlled density and vertical stress should be used to optimize the measurement of the vertical and horizontal permeability coefficients, respectively. More >

  • Open Access

    ARTICLE

    An Experimental and Numerical Study on the Cleaning of Pleated Bag Filters Using Low-Pressure Pulsed-Jets

    Lumin Chen1, Wanying Sun2, Fuping Qian1,*, Can Fang2, Zhimin Zheng1, Qianshuang Zhuang3, Yunlong Han2, Jinli Lu2

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.1, pp. 41-56, 2022, DOI:10.32604/fdmp.2022.017523 - 10 November 2021

    Abstract Pulsed-jet cleaning is recognized as the most efficient method to regenerate bag dust collectors traditionally used in industrial processes to control the emission of particulates. In this study, non-woven needle felt filter bags with and without a film coating material have been analyzed considering different geometries (different number N of pairs of pleated filter bag sides) in the frame of dedicated low-pressure pulsed-jet cleaning experiments. The flow structure inside the bag and the response characteristics of its wall have also been analyzed numerically through a computational fluid-dynamics/structural-dynamics (CFD-CSD) unidirectional fluid-solid coupling method. As shown by the… More >

  • Open Access

    ARTICLE

    Experimental Study on Heavy Oil Drag Reduction in Horizontal Pipelines by Water Annular Conveying

    Mingjun Du1,2, Jiaqiang Jing1,*, Xinqiang Xiong3, Bingbing Lang2, Xuan Wang2, Shiying Shi4,*

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.1, pp. 81-91, 2022, DOI:10.32604/fdmp.2022.016640 - 10 November 2021

    Abstract Transportation of heavy oil by the so-called water-ring technique is a very promising method by which pressure drop and pollution can be significantly reduced. Dedicated experiments have been carried out by changing the phase’s density, viscosity, velocity and interfacial tension to systematically analyze the characteristics of the water ring. On the basis of such experimental data, a mathematical model for pressure drop prediction has been introduced. This research shows that as long as the density of oil and water remains the same, a concentric water ring can effectively be formed. In such conditions, the oil-water More >

  • Open Access

    ARTICLE

    LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec

    Jin Wang1, Changqing Zhao1, Shiming He1,*, Yu Gu2, Osama Alfarraj3, Ahed Abugabah4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1207-1222, 2022, DOI:10.32604/csse.2022.022365 - 10 November 2021

    Abstract System logs record detailed information about system operation and are important for analyzing the system's operational status and performance. Rapid and accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more and more complex, and the number of system logs gradually increases, which brings challenges to analyze system logs. Some recent studies show that logs can be unstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a long time to train models.… More >

  • Open Access

    ARTICLE

    Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain

    Hao Yan1,2, Yanan Liu1, Shuo Qiu1, Shengzhou Hu3, Weijian Zhang4,*, Jinyue Xia5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1129-1142, 2022, DOI:10.32604/csse.2022.022317 - 10 November 2021

    Abstract With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be outsourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third… More >

  • Open Access

    ARTICLE

    A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection

    Xiaorui Zhang1,3,*, Wenfang Zhang1, Wei Sun2, Xingming Sun1, Sunil Kumar Jha4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1043-1056, 2022, DOI:10.32604/csse.2022.022305 - 10 November 2021

    Abstract In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of medical data, a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper. The proposed algorithm employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between the extracted components and the original data in the mean square sense. Especially, this algorithm helps to create a bacterial foraging More >

  • Open Access

    ARTICLE

    A Novel Post-Quantum Blind Signature for Log System in Blockchain

    Gang Xu1,2, Yibo Cao1, Shiyuan Xu1, Ke Xiao1, Xin Liu3, Xiubo Chen4,*, Mianxiong Dong5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 945-958, 2022, DOI:10.32604/csse.2022.022100 - 10 November 2021

    Abstract In recent decades, log system management has been widely studied for data security management. System abnormalities or illegal operations can be found in time by analyzing the log and provide evidence for intrusions. In order to ensure the integrity of the log in the current system, many researchers have designed it based on blockchain. However, the emerging blockchain is facing significant security challenges with the increment of quantum computers. An attacker equipped with a quantum computer can extract the user's private key from the public key to generate a forged signature, destroy the structure of… More >

  • Open Access

    ARTICLE

    Interactive Middleware Services for Heterogeneous Systems

    Vasanthi Raghupathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, Sudhakar Sengan4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1241-1253, 2022, DOI:10.32604/csse.2022.021997 - 10 November 2021

    Abstract Computing has become more invisible, widespread and ubiquitous since the inception of the Internet of Things (IoT) and Web of Things. Multiple devices that surround us meet user’s requirements everywhere. Multiple Middleware Framework (MF) designs have come into existence because of the rapid development of interactive services in Heterogeneous Systems. This resulted in the delivery of interactive services throughout Heterogeneous Environments (HE). Users are given free navigation between devices in a widespread environment and continuously interact with each other from any chosen device. Numerous interactive devices with recent interactive platforms (for example, Smart Phones, Mobile… More >

  • Open Access

    ARTICLE

    X-Ray Covid-19 Detection Based on Scatter Wavelet Transform and Dense Deep Neural Network

    Ali Sami Al-Itbi*, Ahmed Bahaaulddin A. Alwahhab, Ali Mohammed Sahan

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1255-1271, 2022, DOI:10.32604/csse.2022.021980 - 10 November 2021

    Abstract Notwithstanding the discovery of vaccines for Covid-19, the virus's rapid spread continues due to the limited availability of vaccines, especially in poor and emerging countries. Therefore, the key issues in the present COVID-19 pandemic are the early identification of COVID-19, the cautious separation of infected cases at the lowest cost and curing the disease in the early stages. For that reason, the methodology adopted for this study is imaging tools, particularly computed tomography, which have been critical in diagnosing and treating the disease. A new method for detecting Covid-19 in X-rays and CT images has… More >

  • Open Access

    ARTICLE

    Defect Prediction Using Akaike and Bayesian Information Criterion

    Saleh Albahli1,*, Ghulam Nabi Ahmad Hassan Yar2

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1117-1127, 2022, DOI:10.32604/csse.2022.021750 - 10 November 2021

    Abstract Data available in software engineering for many applications contains variability and it is not possible to say which variable helps in the process of the prediction. Most of the work present in software defect prediction is focused on the selection of best prediction techniques. For this purpose, deep learning and ensemble models have shown promising results. In contrast, there are very few researches that deals with cleaning the training data and selection of best parameter values from the data. Sometimes data available for training the models have high variability and this variability may cause a… More >

Displaying 15721-15730 on page 1573 of 31589. Per Page