Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (25,958)
  • Open Access

    ARTICLE

    Primary and Secondary Flows on Unsteady MHD Free Convective Micropolar Fluid Flow Past an Inclined Plate in a Rotating System: a Finite Element Analysis

    M. D. Shamshuddin1, *, P. V. Satya Narayana2

    FDMP-Fluid Dynamics & Materials Processing, Vol.14, No.1, pp. 57-86, 2018, DOI:10.3970/fdmp.2018.014.057

    Abstract In the present paper, a numerical analysis is performed to study the primary and secondary flows of a micropolar fluid flow past an inclined plate with viscous dissipation and thermal radiation in a rotating frame. A uniform magnetic field of strength Bo is applied normal to the plane of the plate. The whole system rotates with uniform angular velocity about an axis normal to the plate. The governing partial differential equations are transformed into coupled nonlinear partial differential equations by using the appropriate dimensionless quantities. The resulting equations are then solved by the Galerkin finite More >

  • Open Access

    ARTICLE

    Numerical Visualizations of Mixing Enhancement in a 2D Supersonic Ejector

    M. Dandani1,*, V. Lepiller2, A. Ghezal3, P. Desevaux4

    FDMP-Fluid Dynamics & Materials Processing, Vol.14, No.1, pp. 23-37, 2018, DOI:10.3970/fdmp.2018.014.023

    Abstract The present study deals with the numerical visualization of the mixing process in a 2D supersonic ejector. The mixing process is visualized using two CFD flow visualization methods. The first method consists in introducing discrete particles in the secondary flow and computing their trajectories. The second method consists in modeling the diffusion of a passive scalar introduced in one of the two flows. The mixing process is investigated in the case of a conventional 2D supersonic ejector and a second case of an ejector equipped with transverse micro jets. Flow visualizations obtained show the existence More >

  • Open Access

    ARTICLE

    Numerical Study of Natural Convection in a Right Triangular Enclosure with Sinusoidal Hot Wall and Different Configurations of Cold Walls

    Manoj Kr. Triveni1,*, Rajsekhar Panua2

    FDMP-Fluid Dynamics & Materials Processing, Vol.14, No.1, pp. 1-21, 2018, DOI:10.3970/fdmp.2018.014.001

    Abstract The numerical investigation of present work examines the free convection cooling of the base hot wall of a right-angled triangular cavity filled with water. The outline of the base wall is changed from smooth to sinusoidal shapes with different heights. The width (w) of the wave is fixed at 0.2 L and the height (h) of the sinusoidal shape wall is varied from 0.01 H to 0.03 H. The hot wall is cooled from the partially active side and inclined walls which are detached from the middle and structured in four different configurations namely AB,… More >

  • Open Access

    RETRACTION

    Retraction Notice to: Mitigating Content Caching Attack in NDN

    Zhiqiang Ruan1,*, Haibo Luo1, Wenzhong Lin1, Jie Wang2

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 653-653, 2018, DOI:10.32604/cmc.2018.00653

    Abstract none More >

  • Open Access

    ARTICLE

    A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security

    Changting Shi1, *

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 635-652, 2018, DOI:10.32604/cmc.2018.03754

    Abstract In the last decade, IoT has been widely used in smart cities, autonomous driving and Industry 4.0, which lead to improve efficiency, reliability, security and economic benefits. However, with the rapid development of new technologies, such as cognitive communication, cloud computing, quantum computing and big data, the IoT security is being confronted with a series of new threats and challenges. IoT device identification via Radio Frequency Fingerprinting (RFF) extracting from radio signals is a physical-layer method for IoT security. In physical-layer, RFF is a unique characteristic of IoT device themselves, which can difficultly be tampered. More >

  • Open Access

    ARTICLE

    Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol

    Jifeng Zhong1,*, Zhihao Liu2,3,*, Juan Xu4

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 621-633, 2018, DOI:10.32604/cmc.2018.03706

    Abstract The controlled quantum secure direct communication (CQSDC) with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed. It is found that there are some serious security issues in this protocol. An eavesdropper (Eve) can eavesdrop on some information of the identity strings of the receiver and the controller without being detected by the selective-CNOT-operation (SCNO) attack. By the same attack, Eve can also steal some information of the secret message that the sender transmits. In addition, the receiver can take the same kind of attack to More >

  • Open Access

    ARTICLE

    Natural Language Semantic Construction Based on Cloud Database

    Suzhen Wang1, Lu Zhang1, Yanpiao Zhang1, Jieli Sun1, Chaoyi Pang2, Gang Tian3, Ning Cao4,*

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 603-619, 2018, DOI:10.32604/cmc.2018.03884

    Abstract Natural language semantic construction improves natural language comprehension ability and analytical skills of the machine. It is the basis for realizing the information exchange in the intelligent cloud-computing environment. This paper proposes a natural language semantic construction method based on cloud database, mainly including two parts: natural language cloud database construction and natural language semantic construction. Natural Language cloud database is established on the CloudStack cloud-computing environment, which is composed by corpus, thesaurus, word vector library and ontology knowledge base. In this section, we concentrate on the pretreatment of corpus and the presentation of background… More >

  • Open Access

    ARTICLE

    Dynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM

    Jian Xu1,2,*, Zhihao Jiang1, Andi Wang1, Chen Wang1, Fucai Zhou1

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 589-602, 2018, DOI:10.32604/cmc.2018.03820

    Abstract With the development of cloud storage, the problem of efficiently checking and proving data integrity needs more consideration. Therefore, much of growing interest has been pursed in the context of the integrity verification of cloud storage. Provable data possession (PDP) and Proofs of retrievablity (POR) are two kinds of important scheme which can guarantee the data integrity in the cloud storage environments. The main difference between them is that POR schemes store a redundant encoding of the client data on the server so as to she has the ability of retrievablity while PDP does not… More >

  • Open Access

    ARTICLE

    Seed Selection for Data Offloading Based on Social and Interest Graphs

    Ying Li1, Jianbo Li1,*, Jianwei Chen1, Minchao Lu1, Caoyuan Li2,3

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 571-587, 2018, DOI:10.32604/cmc.2018.02851

    Abstract The explosive growth of mobile data demand is becoming an increasing burden on current cellular network. To address this issue, we propose a solution of opportunistic data offloading for alleviating overloaded cellular traffic. The principle behind it is to select a few important users as seeds for data sharing. The three critical steps are detailed as follows. We first explore individual interests of users by the construction of user profiles, on which an interest graph is built by Gaussian graphical modeling. We then apply the extreme value theory to threshold the encounter duration of user More >

  • Open Access

    ARTICLE

    A Method of Identifying Thunderstorm Clouds in Satellite Cloud Image Based on Clustering

    Lili He1,2, Dantong Ouyang1,2, Meng Wang1,2, Hongtao Bai1,2, Qianlong Yang1,2, Yaqing Liu3,4, Yu Jiang1,2,*

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 549-570, 2018, DOI:10.32604/cmc.2018.03840

    Abstract In this paper, the clustering analysis is applied to the satellite image segmentation, and a cloud-based thunderstorm cloud recognition method is proposed in combination with the strong cloud computing power. The method firstly adopts the fuzzy C-means clustering (FCM) to obtain the satellite cloud image segmentation. Secondly, in the cloud image, we dispose the ‘high-density connected’ pixels in the same cloud clusters and the ‘low-density connected’ pixels in different cloud clusters. Therefore, we apply the DBSCAN algorithm to the cloud image obtained in the first step to realize cloud cluster knowledge. Finally, using the method More >

Displaying 20161-20170 on page 2017 of 25958. Per Page