Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,249)
  • Open Access

    ARTICLE

    Similarity Analytic Solutions of a 3D-Fractal Nanofluid Uncoupled System Optimized by a Fractal Symmetric Tangent Function

    Rabha W. Ibrahim1,*, Ahmed M. Ajaj2, Nadia M.G. Al-Saidi3, Dumitru Balean4,5,6

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 221-232, 2022, DOI:10.32604/cmes.2022.018348

    Abstract The science of strategy (game theory) is known as the optimal decision-making of autonomous and challenging players in a strategic background. There are different strategies to complete the optimal decision. One of these strategies is the similarity technique. Similarity technique is a generalization of the symmetric strategy, which depends only on the other approaches employed, which can be formulated by altering diversities. One of these methods is the fractal theory. In this investigation, we present a new method studying the similarity analytic solution (SAS) of a 3D-fractal nanofluid system (FNFS). The dynamic evolution is completely given by the concept of… More >

  • Open Access

    ARTICLE

    Fault Analysis of Wind Power Rolling Bearing Based on EMD Feature Extraction

    Debiao Meng1,2,3,*, Hongtao Wang1, Shiyuan Yang1, Zhiyuan Lv1, Zhengguo Hu1, Zihao Wang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 543-558, 2022, DOI:10.32604/cmes.2022.018123

    Abstract In a wind turbine, the rolling bearing is the critical component. However, it has a high failure rate. Therefore, the failure analysis and fault diagnosis of wind power rolling bearings are very important to ensure the high reliability and safety of wind power equipment. In this study, the failure form and the corresponding reason for the failure are discussed firstly. Then, the natural frequency and the characteristic frequency are analyzed. The Empirical Mode Decomposition (EMD) algorithm is used to extract the characteristics of the vibration signal of the rolling bearing. Moreover, the eigenmode function is obtained and then filtered by… More >

  • Open Access

    ARTICLE

    A Fast Small-Sample Modeling Method for Precision Inertial Systems Fault Prediction and Quantitative Anomaly Measurement

    Hongqiao Wang1,*, Yanning Cai2

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 187-203, 2022, DOI:10.32604/cmes.2022.018000

    Abstract Inertial system platforms are a kind of important precision devices, which have the characteristics of difficult acquisition for state data and small sample scale. Focusing on the model optimization for data-driven fault state prediction and quantitative degree measurement, a fast small-sample supersphere one-class SVM modeling method using support vectors pre-selection is systematically studied in this paper. By theorem-proving the irrelevance between the model's learning result and the non-support vectors (NSVs), the distribution characters of the support vectors are analyzed. On this basis, a modeling method with selected samples having specific geometry character from the training sets is also proposed. The… More >

  • Open Access

    ARTICLE

    Breast Tumor Computer-Aided Detection System Based on Magnetic Resonance Imaging Using Convolutional Neural Network

    Jing Lu1, Yan Wu2,#, Mingyan Hu1, Yao Xiong1, Yapeng Zhou1, Ziliang Zhao1, Liutong Shang1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 365-377, 2022, DOI:10.32604/cmes.2021.017897

    Abstract Background: The main cause of breast cancer is the deterioration of malignant tumor cells in breast tissue. Early diagnosis of tumors has become the most effective way to prevent breast cancer. Method: For distinguishing between tumor and non-tumor in MRI, a new type of computer-aided detection CAD system for breast tumors is designed in this paper. The CAD system was constructed using three networks, namely, the VGG16, Inception V3, and ResNet50. Then, the influence of the convolutional neural network second migration on the experimental results was further explored in the VGG16 system. Result: CAD system built based on VGG16, Inception… More >

  • Open Access

    ARTICLE

    Sensitivity Analysis of COVID-19 in Mediterranean Island

    Ahmet Savasan1, Bilgen Kaymakamzade1,2, Nezihal Gokbulut1,2,*, Evren Hincal1,2, Elcin Yoldascan3

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 133-148, 2022, DOI:10.32604/cmes.2022.017815

    Abstract The aim of this study is to examine the progress of the worldwide pandemic Covid-19. As authors, we have decided to analyze the situation of COVID-19 on Mediterranean island with accurate data. For this purpose, a mathematical model is constructed and proposed by dividing the whole population into sensible and suitable compartments. The study captures the dates February 01 till May 15, 2021. For the control of the spread of disease, vaccination and infection rates are compared and calculated. During calculations and comparison, MatLab software is used. All of the data that are used are taken from the Ministry of… More >

  • Open Access

    ARTICLE

    A New Rayleigh Distribution: Properties and Estimation Based on Progressive Type-II Censored Data with an Application

    Ali Algarni, Abdullah M. Almarashi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 379-396, 2022, DOI:10.32604/cmes.2022.017714

    Abstract In this paper, we propose a new extension of the traditional Rayleigh distribution called the modified Kies Rayleigh distribution. The new distribution contains one scale and one shape parameter and its hazard rate function can be increasing and bathtub-shaped. Some mathematical properties of the new distribution are derived including quantiles and moments. The parameters of modified Kies Rayleigh distribution are estimated based on progressively Type-II censored data. For this purpose, we consider two estimation methods, namely maximum likelihood and maximum product of spacing estimation methods. To compare the efficiency of the proposed estimators, a simulation study is carried out. To… More >

  • Open Access

    ARTICLE

    Topology Optimization with Aperiodic Load Fatigue Constraints Based on Bidirectional Evolutionary Structural Optimization

    Yongxin Li1, Guoyun Zhou1, Tao Chang1,*, Liming Yang2, Fenghe Wu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 499-511, 2022, DOI:10.32604/cmes.2022.017630

    Abstract Because of descriptive nonlinearity and computational inefficiency, topology optimization with fatigue life under aperiodic loads has developed slowly. A fatigue constraint topology optimization method based on bidirectional evolutionary structural optimization (BESO) under an aperiodic load is proposed in this paper. In view of the severe nonlinearity of fatigue damage with respect to design variables, effective stress cycles are extracted through transient dynamic analysis. Based on the Miner cumulative damage theory and life requirements, a fatigue constraint is first quantified and then transformed into a stress problem. Then, a normalized termination criterion is proposed by approximate maximum stress measured by global… More >

  • Open Access

    ARTICLE

    Unsupervised Binary Protocol Clustering Based on Maximum Sequential Patterns

    Jiaxin Shi1, Lin Ye1,2,*, Zhongwei Li3, Dongyang Zhan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 483-498, 2022, DOI:10.32604/cmes.2022.017467

    Abstract With the rapid development of the Internet, a large number of private protocols emerge on the network. However, some of them are constructed by attackers to avoid being analyzed, posing a threat to computer network security. The blockchain uses the P2P protocol to implement various functions across the network. Furthermore, the P2P protocol format of blockchain may differ from the standard format specification, which leads to sniffing tools such as Wireshark and Fiddler not being able to recognize them. Therefore, the ability to distinguish different types of unknown network protocols is vital for network security. In this paper, we propose… More >

  • Open Access

    ARTICLE

    Numerical Aspects of Isogeometric Boundary Element Methods: (Nearly) Singular Quadrature, Trimmed NURBS and Surface Crack Modeling

    Xuan Peng1,*, Haojie Lian2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 513-542, 2022, DOI:10.32604/cmes.2022.017410

    Abstract This work presents some numerical aspects of isogeometric boundary element methods (IGABEM). The behavior of hyper-singular and nearly-singular integration is first explored on the distorted NURBS surface. Several numerical treatments are proposed to enhance the quadrature in the framework of isogeometric analysis. Then a numerical implementation of IGABEM on the trimmed NURBS is detailed. Based on this idea, the surface crack problem is modeled incorporation with the phantom element method. The proposed method allows the crack to intersect with the boundary of the body while preserving the original parametrization of the NURBS-based CAD geometry. More >

  • Open Access

    ARTICLE

    Approximation by Szász Type Operators Involving Apostol-Genocchi Polynomials

    Mine Menekşe Yılmaz*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 287-297, 2022, DOI:10.32604/cmes.2022.017385

    Abstract The goal of this paper is to give a form of the operator involving the generating function of Apostol-Genocchi polynomials of order α. Applying the Korovkin theorem, we arrive at the convergence of the operator with the aid of moments and central moments. We determine the rate of convergence of the operator using several tools such as -functional, modulus of continuity, second modulus of continuity. We also give a type of Voronovskaya theorem for estimating error. Moreover, we investigate some results about convergence properties of the operator in a weighted space. Finally, we give numerical examples to support our theorems… More >

Displaying 9911-9920 on page 992 of 22249. Per Page