Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31,561)
  • Open Access

    ARTICLE

    Bearing Fault Diagnosis Based on Deep Discriminative Adversarial Domain Adaptation Neural Networks

    Jinxi Guo1, Kai Chen1,2, Jiehui Liu1, Yuhao Ma2, Jie Wu2,*, Yaochun Wu2, Xiaofeng Xue3, Jianshen Li1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2619-2640, 2024, DOI:10.32604/cmes.2023.031360 - 15 December 2023

    Abstract Intelligent diagnosis driven by big data for mechanical fault is an important means to ensure the safe operation of equipment. In these methods, deep learning-based machinery fault diagnosis approaches have received increasing attention and achieved some results. It might lead to insufficient performance for using transfer learning alone and cause misclassification of target samples for domain bias when building deep models to learn domain-invariant features. To address the above problems, a deep discriminative adversarial domain adaptation neural network for the bearing fault diagnosis model is proposed (DDADAN). In this method, the raw vibration data are… More >

  • Open Access

    ARTICLE

    Influences of the Fresh Air Volume on the Removal of Cough-Released Droplets in a Passenger Car of a High-Speed Train Using CFD

    Jun Xu1, Kai Bi1, Yibin Lu2,*, Tiantian Wang2,3, Hang Zhang2, Zeyuan Zheng3, Fushan Shi3, Yaxin Zheng3, Xiaoying Li2, Jingping Yang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2727-2748, 2024, DOI:10.32604/cmes.2023.031341 - 15 December 2023

    Abstract The spread and removal of pollution sources, namely, cough-released droplets in three different areas (front, middle, and rear areas) of a fully-loaded passenger car in a high-speed train under different fresh air flow volume were studied using computational fluid dynamics (CFD) method. In addition, the structure of indoor flow fields was also analysed. The results show that the large eddies are more stable and flow faster in the air supply under Mode 2 (fresh air volume: 2200 m3/h) compared to Mode 1 (fresh air volume: 1100 m3/h). By analysing the spreading process of droplets sprayed at different locations… More >

  • Open Access

    ARTICLE

    Examining the Use of Scott’s Formula and Link Expiration Time Metric for Vehicular Clustering

    Fady Samann1,2,*, Shavan Askar3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2421-2444, 2024, DOI:10.32604/cmes.2023.031265 - 15 December 2023

    Abstract Implementing machine learning algorithms in the non-conducive environment of the vehicular network requires some adaptations due to the high computational complexity of these algorithms. K-clustering algorithms are simplistic, with fast performance and relative accuracy. However, their implementation depends on the initial selection of clusters number (K), the initial clusters’ centers, and the clustering metric. This paper investigated using Scott’s histogram formula to estimate the K number and the Link Expiration Time (LET) as a clustering metric. Realistic traffic flows were considered for three maps, namely Highway, Traffic Light junction, and Roundabout junction, to study the… More >

  • Open Access

    ARTICLE

    Development and Application of a Power Law Constitutive Model for Eddy Current Dampers

    Longteng Liang1,2,3, Zhouquan Feng2,4,*, Hongyi Zhang2,4, Zhengqing Chen2,4, Changzhao Qian1,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2403-2419, 2024, DOI:10.32604/cmes.2023.031260 - 15 December 2023

    Abstract Eddy current dampers (ECDs) have emerged as highly desirable solutions for vibration control due to their exceptional damping performance and durability. However, the existing constitutive models present challenges to the widespread implementation of ECD technology, and there is limited availability of finite element analysis (FEA) software capable of accurately modeling the behavior of ECDs. This study addresses these issues by developing a new constitutive model that is both easily understandable and user-friendly for FEA software. By utilizing numerical results obtained from electromagnetic FEA, a novel power law constitutive model is proposed to capture the nonlinear More >

  • Open Access

    ARTICLE

    An Improved CREAM Model Based on DS Evidence Theory and DEMATEL

    Zhihui Xu1, Shuwen Shang2, Yuntong Pu3, Xiaoyan Su2,*, Hong Qian2, Xiaolei Pan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2597-2617, 2024, DOI:10.32604/cmes.2023.031247 - 15 December 2023

    Abstract Cognitive Reliability and Error Analysis Method (CREAM) is widely used in human reliability analysis (HRA). It defines nine common performance conditions (CPCs), which represent the factors that may affect human reliability and are used to modify the cognitive failure probability (CFP). However, the levels of CPCs are usually determined by domain experts, which may be subjective and uncertain. What’s more, the classic CREAM assumes that the CPCs are independent, which is unrealistic. Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability More > Graphic Abstract

    An Improved CREAM Model Based on DS Evidence Theory and DEMATEL

  • Open Access

    ARTICLE

    Simulation of Corrosion-Induced Cracking of Reinforced Concrete Based on Fracture Phase Field Method

    Xiaozhou Xia1, Changsheng Qin1, Guangda Lu2, Xin Gu1,*, Qing Zhang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2257-2276, 2024, DOI:10.32604/cmes.2023.031238 - 15 December 2023

    Abstract Accurate simulation of the cracking process caused by rust expansion of reinforced concrete (RC) structures plays an intuitive role in revealing the corrosion-induced failure mechanism. Considering the quasi-brittle fracture of concrete, the fracture phase field driven by the compressive-shear term is constructed and added to the traditional brittle fracture phase field model. The rationality of the proposed model is verified by a mixed fracture example under a shear displacement load. Then, the extended fracture phase model is applied to simulate the corrosion-induced cracking process of RC. The cracking patterns caused by non-uniform corrosion expansion are… More >

  • Open Access

    ARTICLE

    An Improved JSO and Its Application in Spreader Optimization of Large Span Corridor Bridge

    Shude Fu1,2, Xinye Wu1,2,*, Wenjie Wang3, Yixin Hu1,3,*, Zhengke Li1, Feng Jiang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2357-2382, 2024, DOI:10.32604/cmes.2023.031118 - 15 December 2023

    Abstract In this paper, given the shortcomings of jellyfish search algorithm with low search ability in the early stage and easy to fall into local optimal solution, this paper introduces adaptive weight function and elite strategy, improving the global search scope in the early stage and the ability to refine the local development in the later stage. In the numerical study, the benchmark problem of dimensional optimization with a 10-bar truss structure and simultaneous dimensional shape optimization with a 15-bar truss structure is adopted, and the corresponding penalty method is used for constraint treatment. The test… More > Graphic Abstract

    An Improved JSO and Its Application in Spreader Optimization of Large Span Corridor Bridge

  • Open Access

    ARTICLE

    Privacy Enhanced Mobile User Authentication Method Using Motion Sensors

    Chunlin Xiong1,2, Zhengqiu Weng3,4,*, Jia Liu1, Liang Gu2, Fayez Alqahtani5, Amr Gafar6, Pradip Kumar Sharma7

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 3013-3032, 2024, DOI:10.32604/cmes.2023.031088 - 15 December 2023

    Abstract With the development of hardware devices and the upgrading of smartphones, a large number of users save privacy-related information in mobile devices, mainly smartphones, which puts forward higher demands on the protection of mobile users’ privacy information. At present, mobile user authentication methods based on human-computer interaction have been extensively studied due to their advantages of high precision and non-perception, but there are still shortcomings such as low data collection efficiency, untrustworthy participating nodes, and lack of practicability. To this end, this paper proposes a privacy-enhanced mobile user authentication method with motion sensors, which mainly… More >

  • Open Access

    ARTICLE

    Improved Convolutional Neural Network for Traffic Scene Segmentation

    Fuliang Xu, Yong Luo, Chuanlong Sun, Hong Zhao*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2691-2708, 2024, DOI:10.32604/cmes.2023.030940 - 15 December 2023

    Abstract In actual traffic scenarios, precise recognition of traffic participants, such as vehicles and pedestrians, is crucial for intelligent transportation. This study proposes an improved algorithm built on Mask-RCNN to enhance the ability of autonomous driving systems to recognize traffic participants. The algorithm incorporates long and short-term memory networks and the fused attention module (GSAM, GCT, and Spatial Attention Module) to enhance the algorithm’s capability to process both global and local information. Additionally, to increase the network’s initial operation stability, the original network activation function was replaced with Gaussian error linear unit. Experiments were conducted using More >

  • Open Access

    ARTICLE

    Enriched Constant Elements in the Boundary Element Method for Solving 2D Acoustic Problems at Higher Frequencies

    Zonglin Li1,2, Zhenyu Gao2, Yijun Liu2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2159-2175, 2024, DOI:10.32604/cmes.2023.030920 - 15 December 2023

    Abstract The boundary element method (BEM) is a popular method for solving acoustic wave propagation problems, especially those in exterior domains, owing to its ease in handling radiation conditions at infinity. However, BEM models must meet the requirement of 6–10 elements per wavelength, using the conventional constant, linear, or quadratic elements. Therefore, a large storage size of memory and long solution time are often needed in solving higher-frequency problems. In this work, we propose two new types of enriched elements based on conventional constant boundary elements to improve the computational efficiency of the 2D acoustic BEM.… More > Graphic Abstract

    Enriched Constant Elements in the Boundary Element Method for Solving 2D Acoustic Problems at Higher Frequencies

Displaying 7361-7370 on page 737 of 31561. Per Page