Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (555)
  • Open Access

    ARTICLE

    Modularized and Parametric Modeling Technology for Finite Element Simulations of Underground Engineering under Complicated Geological Conditions

    Jiaqi Wu1, Li Zhuo1,*, Jianliang Pei1, Yao Li2, Hongqiang Xie1, Jiaming Wu1, Huaizhong Liu1

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.046398

    Abstract The surrounding geological conditions and supporting structures of underground engineering are often updated during construction, and these updates require repeated numerical modeling. To improve the numerical modeling efficiency of underground engineering, a modularized and parametric modeling cloud server is developed by using Python codes. The basic framework of the cloud server is as follows: input the modeling parameters into the web platform, implement Rhino software and FLAC3D software to model and run simulations in the cloud server, and return the simulation results to the web platform. The modeling program can automatically generate instructions that can run the modeling process in… More >

  • Open Access

    ARTICLE

    Abnormal State Detection in Lithium-ion Battery Using Dynamic Frequency Memory and Correlation Attention LSTM Autoencoder

    Haoyi Zhong, Yongjiang Zhao, Chang Gyoon Lim*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.049208

    Abstract This paper addresses the challenge of identifying abnormal states in Lithium-ion Battery (LiB) time series data. As the energy sector increasingly focuses on integrating distributed energy resources, Virtual Power Plants (VPP) have become a vital new framework for energy management. LiBs are key in this context, owing to their high-efficiency energy storage capabilities essential for VPP operations. However, LiBs are prone to various abnormal states like overcharging, over-discharging, and internal short circuits, which impede power transmission efficiency. Traditional methods for detecting such abnormalities in LiB are too broad and lack precision for the dynamic and irregular nature of LiB data.… More >

  • Open Access

    ARTICLE

    Uncertainty-Aware Physical Simulation of Neural Radiance Fields for Fluids

    Haojie Lian1, Jiaqi Wang1, Leilei Chen2,*, Shengze Li3, Ruochen Cao4, Qingyuan Hu5, Peiyun Zhao1

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.048549

    Abstract This paper presents a novel framework aimed at quantifying uncertainties associated with the 3D reconstruction of smoke from 2D images. This approach reconstructs color and density fields from 2D images using Neural Radiance Field (NeRF) and improves image quality using frequency regularization. The NeRF model is obtained via joint training of multiple artificial neural networks, whereby the expectation and standard deviation of density fields and RGB values can be evaluated for each pixel. In addition, customized physics-informed neural network (PINN) with residual blocks and two-layer activation functions are utilized to input the density fields of the NeRF into Navier-Stokes equations… More >

  • Open Access

    ARTICLE

    Deep Learning Social Network Access Control Model Based on User Preferences

    Fangfang Shan1,2,*, Fuyang Li1, Zhenyu Wang1, Peiyu Ji1, Mengyi Wang1, Huifang Sun1

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.047665

    Abstract A deep learning access control model based on user preferences is proposed to address the issue of personal privacy leakage in social networks. Firstly, social users and social data entities are extracted from the social network and used to construct homogeneous and heterogeneous graphs. Secondly, a graph neural network model is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network. Then, high-order neighbor nodes, hidden neighbor nodes, displayed neighbor nodes, and social data nodes are used to update user nodes… More >

  • Open Access

    ARTICLE

    Advanced Machine Learning Methods for Prediction of Blast-Induced Flyrock Using Hybrid SVR Methods

    Ji Zhou1,2, Yijun Lu3, Qiong Tian1,2, Haichuan Liu3, Mahdi Hasanipanah4,5,*, Jiandong Huang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.048398

    Abstract Blasting in surface mines aims to fragment rock masses to a proper size. However, flyrock is an undesirable effect of blasting that can result in human injuries. In this study, support vector regression (SVR) is combined with four algorithms: gravitational search algorithm (GSA), biogeography-based optimization (BBO), ant colony optimization (ACO), and whale optimization algorithm (WOA) for predicting flyrock in two surface mines in Iran. Additionally, three other methods, including artificial neural network (ANN), kernel extreme learning machine (KELM), and general regression neural network (GRNN), are employed, and their performances are compared to those of four hybrid SVR models. After modeling,… More >

  • Open Access

    ARTICLE

    DCFNet: An Effective Dual-Branch Cross-Attention Fusion Network for Medical Image Segmentation

    Chengzhang Zhu1,2, Renmao Zhang1, Yalong Xiao1,2,*, Beiji Zou1, Xian Chai1, Zhangzheng Yang1, Rong Hu3, Xuanchu Duan4

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.048453

    Abstract Automatic segmentation of medical images provides a reliable scientific basis for disease diagnosis and analysis. Notably, most existing methods that combine the strengths of convolutional neural networks (CNNs) and Transformers have made significant progress. However, there are some limitations in the current integration of CNN and Transformer technology in two key aspects. Firstly, most methods either overlook or fail to fully incorporate the complementary nature between local and global features. Secondly, the significance of integrating the multi-scale encoder features from the dual-branch network to enhance the decoding features is often disregarded in methods that combine CNN and Transformer. To address… More >

  • Open Access

    ARTICLE

    Identifying Brand Consistency by Product Differentiation Using CNN

    Hung-Hsiang Wang1, Chih-Ping Chen2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.047630

    Abstract This paper presents a new method of using a convolutional neural network (CNN) in machine learning to identify brand consistency by product appearance variation. In Experiment 1, we collected fifty mouse devices from the past thirty-five years from a renowned company to build a dataset consisting of product pictures with pre-defined design features of their appearance and functions. Results show that it is a challenge to distinguish periods for the subtle evolution of the mouse devices with such traditional methods as time series analysis and principal component analysis (PCA). In Experiment 2, we applied deep learning to predict the extent… More >

  • Open Access

    ARTICLE

    Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices

    So-Eun Jeon1, Ye-Sol Oh1, Yeon-Ji Lee1, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.047239

    Abstract With the advancement of wireless network technology, vast amounts of traffic have been generated, and malicious traffic attacks that threaten the network environment are becoming increasingly sophisticated. While signature-based detection methods, static analysis, and dynamic analysis techniques have been previously explored for malicious traffic detection, they have limitations in identifying diversified malware traffic patterns. Recent research has been focused on the application of machine learning to detect these patterns. However, applying machine learning to lightweight devices like IoT devices is challenging because of the high computational demands and complexity involved in the learning process. In this study, we examined methods… More >

  • Open Access

    ARTICLE

    Buckling Optimization of Curved Grid Stiffeners through the Level Set Based Density Method

    Zhuo Huang, Ye Tian, Yifan Zhang, Tielin Shi, Qi Xia*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.045411

    Abstract Stiffened structures have great potential for improving mechanical performance, and the study of their stability is of great interest. In this paper, the optimization of the critical buckling load factor for curved grid stiffeners is solved by using the level set based density method, where the shape and cross section (including thickness and width) of the stiffeners can be optimized simultaneously. The grid stiffeners are a combination of many single stiffeners which are projected by the corresponding level set functions. The thickness and width of each stiffener are designed to be independent variables in the projection applied to each level… More >

  • Open Access

    ARTICLE

    Intelligent Fractional-Order Controller for SMES Systems in Renewable Energy-Based Microgrid

    Aadel M. Alatwi1,2, Abualkasim Bakeer3, Sherif A. Zaid1,*, Ibrahem E. Atawi1, Hani Albalawi1,4, Ahmed M. Kassem5

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.048521

    Abstract An autonomous microgrid that runs on renewable energy sources is presented in this article. It has a superconducting magnetic energy storage (SMES) device, wind energy-producing devices, and an energy storage battery. However, because such microgrids are nonlinear and the energy they create varies with time, controlling and managing the energy inside them is a difficult issue. Fractional-order proportional integral (FOPI) controller is recommended for the current research to enhance a standalone microgrid’s energy management and performance. The suggested dedicated control for the SMES comprises two loops: the outer loop, which uses the FOPI to regulate the DC-link voltage, and the… More >

Displaying 21-30 on page 3 of 555. Per Page