Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,225)
  • Open Access

    ARTICLE

    Probabilistic Life Calculation Method of NdFeB Based on Brittle Fatigue Damage Model

    Lei Li, Guolai Yang*, Jiahao Li

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 865-884, 2020, DOI:10.32604/cmes.2020.010720

    Abstract This paper proposes a probabilistic life calculation method of NdFeB based on brittle fatigue damage model. Firstly, Zhu-Wang-Tang (ZWT) constitutive model considering strain rate is established, and based on this, a numerical co-simulation model for NdFeB life calculation is constructed. The life distribution diagram of NdFeB under different stress levels is obtained after simulation. Secondly, a new model of brittle fatigue damage based on brittle damage mechanism is proposed. Then the parameters in the model are identified according to the life distribution diagram of NdFeB and the parameter distribution of the damage evolution model when applied to NdFeB is obtained.… More >

  • Open Access

    ARTICLE

    Predicting Human Mobility via Long Short-Term Patterns

    Jianwei Chen, Jianbo Li*, Ying Li

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 847-864, 2020, DOI:10.32604/cmes.2020.010240

    Abstract Predicting human mobility has great significance in Location based Social Network applications, while it is challenging due to the impact of historical mobility patterns and current trajectories. Among these challenges, historical patterns tend to be crucial in the prediction task. However, it is difficult to capture complex patterns from long historical trajectories. Motivated by recent success of Convolutional Neural Network (CNN)-based methods, we propose a Union ConvGRU (UCG) Net, which can capture long short-term patterns of historical trajectories and sequential impact of current trajectories. Specifically, we first incorporate historical trajectories into hidden states by a shared-weight layer, and then utilize… More >

  • Open Access

    ARTICLE

    Fractional Analysis of Thin Film Flow of Non-Newtonian Fluid

    Farnaz Ismail1, Mubashir Qayyum2, *, Syed Inayat Ali Shah1

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 825-845, 2020, DOI:10.32604/cmes.2020.011073

    Abstract Modeling and analysis of thin film flow with respect to magneto hydro dynamical effect has been an important theme in the field of fluid dynamics, due to its vast industrial applications. The analysis involves studying the behavior and response of governing equations on the basis of various parameters such as thickness of the film, film surface profile, shear stress, liquid velocity, volumetric flux, vorticity, gravity, viscosity among others, along with different boundary conditions. In this article, we extend this analysis in fractional space using a homotopy based scheme, considering the case of a Non-Newtonian Pseudo-Plastic fluid for lifting and drainage… More >

  • Open Access

    EDITORIAL

    Introduction to the Special Issue on Recent Developments of Isogeometric Analysis and Its Applications in Structural Optimization

    Yingjun Wang1,*, Zhenpei Wang2, Xiaowei Deng3, David J. Benson4, Damiano Pasini5, Shuting Wang6

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 783-785, 2020, DOI:10.32604/cmes.2020.013234

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    An Improved Binary Search Anti-Collision Protocol for RFID Tag Identification

    Guozhong Dong1, Weizhe Zhang1, 2, *, Sichang Xuan3, Feng Qin4, Haowen Tan5

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1855-1868, 2020, DOI:10.32604/cmc.2020.09919

    Abstract Radio frequency identification (RFID) has been widespread used in massive items tagged domains. However, tag collision increases both time and energy consumption of RFID network. Tag collision can seriously affect the success of tag identification. An efficient anti-collision protocol is very crucially in RFID system. In this paper, an improved binary search anti-collision protocol namely BRTP is proposed to cope with the tag collision concern, which introduces a Bi-response mechanism. In Biresponse mechanism, two groups of tags allowed to reply to the reader in the same slot. According to Bi-response mechanism, the BRTP strengthens the tag identification of RFID network… More >

  • Open Access

    ARTICLE

    Research on Data Extraction and Analysis of Software Defect in IoT Communication Software

    Wenbin Bi1, Fang Yu2, Ning Cao3, Wei Huo3, Guangsheng Cao4, *, Xiuli Han5, Lili Sun6, Russell Higgs7

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1837-1854, 2020, DOI:10.32604/cmc.2020.010420

    Abstract Software defect feature selection has problems of feature space dimensionality reduction and large search space. This research proposes a defect prediction feature selection framework based on improved shuffled frog leaping algorithm (ISFLA).Using the two-level structure of the framework and the improved hybrid leapfrog algorithm's own advantages, the feature values are sorted, and some features with high correlation are selected to avoid other heuristic algorithms in the defect prediction that are easy to produce local The case where the convergence rate of the optimal or parameter optimization process is relatively slow. The framework improves generalization of predictions of unknown data samples… More >

  • Open Access

    ARTICLE

    Who Will Come: Predicting Freshman Registration Based on Decision Tree

    Lei Yang1, Li Feng1, *, Liwei Tian1, Hongning Dai1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1825-1836, 2020, DOI:10.32604/cmc.2020.010011

    Abstract The registration rate of freshmen has been a great concern at many colleges and universities, particularly private institutions. Traditionally, there are two inquiry methods: telephone and tuition-payment-status. Unfortunately, the former is not only time-consuming but also suffers from the fact that many students tend to keep their choices secret. On the other hand, the latter is not always feasible because only few students are willing to pay their university tuition fees in advance. It is often believed that it is impossible to predict incoming freshmen’s choice of university due to the large amount of subjectivity. However, if we look at… More >

  • Open Access

    ARTICLE

    Computational Analysis of the Effect of Nano Particle Material Motion on Mixed Convection Flow in the Presence of Heat Generation and Absorption

    Muhammad Ashraf1, Amir Abbas1, Saqib Zia2, Yu-Ming Chu3, 4, Ilyas Khan5, *, Kottakkaran Sooppy Nisar6

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1809-1823, 2020, DOI:10.32604/cmc.2020.011404

    Abstract The present study is concerned with the physical behavior of the combined effect of nano particle material motion and heat generation/absorption due to the effect of different parameters involved in prescribed flow model. The formulation of the flow model is based on basic universal equations of conservation of momentum, energy and mass. The prescribed flow model is converted to non-dimensional form by using suitable scaling. The obtained transformed equations are solved numerically by using finite difference scheme. For the analysis of above said behavior the computed numerical data for fluid velocity, temperature profile, and mass concentration for several constraints that… More >

  • Open Access

    ARTICLE

    APU-D* Lite: Attack Planning under Uncertainty Based on D* Lite

    Tairan Hu1, Tianyang Zhou1, Yichao Zang1, *, Qingxian Wang1, Hang Li2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1795-1807, 2020, DOI:10.32604/cmc.2020.011071

    Abstract With serious cybersecurity situations and frequent network attacks, the demands for automated pentests continue to increase, and the key issue lies in attack planning. Considering the limited viewpoint of the attacker, attack planning under uncertainty is more suitable and practical for pentesting than is the traditional planning approach, but it also poses some challenges. To address the efficiency problem in uncertainty planning, we propose the APU-D* Lite algorithm in this paper. First, the pentest framework is mapped to the planning problem with the Planning Domain Definition Language (PDDL). Next, we develop the pentest information graph to organize network information and… More >

  • Open Access

    ARTICLE

    A Hybrid Path Planning Method Based on Articulated Vehicle Model

    Zhongping Chen1, Dong Wang1, *, Gang Chen2, Yanxi Ren3, Danjie Du4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1781-1793, 2020, DOI:10.32604/cmc.2020.010902

    Abstract Due to the unique steering mechanism and driving characteristics of the articulated vehicle, a hybrid path planning method based on the articulated vehicle model is proposed to meet the demand of obstacle avoidance and searching the path back and forth of the articulated vehicle. First, Support Vector Machine (SVM) theory is used to obtain the two-dimensional optimal zero potential curve and the maximum margin, and then, several key points are selected from the optimal zero potential curves by using Longest Accessible Path (LAP) method. Next, the Cubic Bezier (CB) curve is adopted to connect the curve that satisfies the curvature… More >

Displaying 14181-14190 on page 1419 of 22225. Per Page