Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21,896)
  • Open Access

    ARTICLE

    The Localized Method of Fundamental Solution for Two Dimensional Signorini Problems

    Zhuowan Fan1, Yancheng Liu1, Anyu Hong1,*, Fugang Xu1,*, Fuzhang Wang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 341-355, 2022, DOI:10.32604/cmes.2022.019715

    Abstract In this work, the localized method of fundamental solution (LMFS) is extended to Signorini problem. Unlike the traditional fundamental solution (MFS), the LMFS approximates the field quantity at each node by using the field quantities at the adjacent nodes. The idea of the LMFS is similar to the localized domain type method. The fictitious boundary nodes are proposed to impose the boundary condition and governing equations at each node to formulate a sparse matrix. The inequality boundary condition of Signorini problem is solved indirectly by introducing nonlinear complementarity problem function (NCP-function). Numerical examples are carried out to validate the reliability… More >

  • Open Access

    ARTICLE

    Fluid Analysis and Structure Optimization of Impeller Based on Surrogate Model

    Huanwei Xu*, Wenzhang Wei, Hanjin He, Xuerui Yang

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 173-199, 2022, DOI:10.32604/cmes.2022.019424

    Abstract The surrogate model technology has a good performance in solving black-box optimization problems, which is widely used in multi-domain engineering optimization problems. The adaptive surrogate model is the mainstream research direction of surrogate model technology, which can realize model fitting and global optimization of engineering problems by infilling criteria. Based on the idea of the adaptive surrogate model, this paper proposes an efficient global optimization algorithm based on the local remodeling method (EGO-LR), which aims at improving the accuracy and optimization efficiency of the model. The proposed algorithm firstly constructs the expectation improvement (EI) function in the local area and… More >

  • Open Access

    ARTICLE

    Seed-Oriented Local Community Detection Based on Influence Spreading

    Shenglong Wang1,*, Jing Yang1,*, Xiaoyu Ding2, Jianpei Zhang1, Meng Zhao1

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 215-249, 2022, DOI:10.32604/cmes.2022.018050

    Abstract In recent years, local community detection algorithms have developed rapidly because of their nearly linear computing time and the convenience of obtaining the local information of real-world networks. However, there are still some issues that need to be further studied. First, there is no local community detection algorithm dedicated to detecting a seed-oriented local community, that is, the local community with the seed as the core. The second and third issues are that the quality of local communities detected by the previous local community detection algorithms are largely dependent on the position of the seed and predefined parameters, respectively. To… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Electromagnetic Shield Constructed from Open-Cell Metal Foam Based on Sphere Functions

    Yuya Hanaoka1,*, Taku Itoh2, Kohei Tateyama3, Susumu Nakata4, Keiko Watanabe3

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 43-53, 2022, DOI:10.32604/cmes.2022.016831

    Abstract This study evaluates the performance of a model of open-cell metal foams generated by sphere functions. To this end, an electromagnetic shield constructed from the model was inserted between two horn antennas in an electromagnetic wave propagation simulation. The foam-hole diameter in the electromagnetic shield model was varied as d = 2.5 and 5.0 mm, and the frequency of the electromagnetic waves was varied from 3 to 13 GHz. In the numerical experiments of shield effectiveness, the shields with foam holes of both diameters attenuated the electromagnetic waves across the studied frequency range. The shield effectiveness was enhanced at low… More >

  • Open Access

    ARTICLE

    Low Carbon Economic Dispatch of Integrated Energy System Considering Power Supply Reliability and Integrated Demand Response

    Jian Dong, Haixin Wang, Junyou Yang*, Liu Gao, Kang Wang, Xiran Zhou

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 319-340, 2022, DOI:10.32604/cmes.2022.020394

    Abstract Integrated energy system optimization scheduling can improve energy efficiency and low carbon economy. This paper studies an electric-gas-heat integrated energy system, including the carbon capture system, energy coupling equipment, and renewable energy. An energy scheduling strategy based on deep reinforcement learning is proposed to minimize operation cost, carbon emission and enhance the power supply reliability. Firstly, the low-carbon mathematical model of combined thermal and power unit, carbon capture system and power to gas unit (CCP) is established. Subsequently, we establish a low carbon multi-objective optimization model considering system operation cost, carbon emissions cost, integrated demand response, wind and photovoltaic curtailment,… More >

  • Open Access

    ARTICLE

    Interval-Valued Neutrosophic Soft Expert Set from Real Space to Complex Space

    Faisal Al-Sharqi1,2, Abd Ghafur Ahmad1,*, Ashraf Al-Quran3

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 267-293, 2022, DOI:10.32604/cmes.2022.019684

    Abstract A fuzzy system is a novel computing technique that accesses uncertain information by fuzzy representation. In the decision-making process, fuzzy system and soft computing are effective tools that are tolerant to imprecision, uncertainty, and partial truths. Evolutionary fuzzy systems have been developed with the appearance of interval fuzzy, dual fuzzy, hesitant fuzzy, neutrosophic, plithogenic representations, etc. Moreover, by capturing compound features and convey multi-dimensional data, complex numbers are utilized to generalize fuzzy and neutrosophic fuzzy sets. In this paper, a representation of neutrosophic soft expert systems based on the real and complex numbers in the interval form is proposed. The… More >

  • Open Access

    ARTICLE

    A Frost Heaving Prediction Approach for Ground Uplift Simulation Due to Freeze-Sealing Pipe Roof Method

    Shengjun Deng1,2,3, Haolin Chen1, Xiaonan Gong2, Jiajin Zhou2, Xiangdong Hu4, Gang Jiang1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 251-266, 2022, DOI:10.32604/cmes.2022.020388

    Abstract Freeze-sealing pipe roof method is applied in the Gongbei tunnel, which causes the ground surface uplift induced by frost heave. A frost heaving prediction approach based on the coefficient of cold expansion is proposed to simulate the ground deformation of the Gongbei tunnel. The coefficient of cold expansion in the model and the frost heaving rate from the frost heave test under the hydration condition can achieve a good correspondence making the calculation result closer to the actual engineering. The ground surface uplift along the lateral and longitudinal direction are respectively analyzed and compared with the field measured data to… More >

  • Open Access

    ARTICLE

    Foundation Treatment in Urban Underground Engineering Using Big Data Analysis for Smart City Applications

    Fei Liu1,2, Yunkai Zhang1,2, Jian Zhang3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 153-172, 2022, DOI:10.32604/cmes.2022.017967

    Abstract A core element of the sustainable approach to global living quality improvement can now become the intensive and organized usage of underground space. There is a growing interest in underground building and growth worldwide. The reduced consumption of electricity, effective preservation of green land, sustainable wastewater and sewage treatment, efficient reverse degradation of the urban environment, and reliable critical infrastructure management can improve the quality of life. At the same time, technological innovations such as artificial intelligence (AI), cloud computing (CC), the internet of things (IoT), and big data analytics (BDA) play a significant role in improved quality of life.… More >

  • Open Access

    ARTICLE

    Asymptotic Approximations of Apostol-Tangent Polynomials in Terms of Hyperbolic Functions

    Cristina B. Corcino1,2, Wilson D. Castañeda Jr.3, Roberto B. Corcino1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 133-151, 2022, DOI:10.32604/cmes.2022.019965

    Abstract The tangent polynomials Tn (z) are generalization of tangent numbers or the Euler zigzag numbers Tn. In particular, Tn (0) = Tn. These polynomials are closely related to Bernoulli, Euler and Genocchi polynomials. One of the extensions and analogues of special polynomials that attract the attention of several mathematicians is the Apostoltype polynomials. One of these Apostol-type polynomials is the Apostol-tangent polynomials Tn(z, λ). When λ = 1, Tn (z, 1) = Tn(z). The use of hyperbolic functions to derive asymptotic approximations of polynomials together with saddle point method was applied to the Bernoulli and Euler polynomials by Lopez and… More >

  • Open Access

    ARTICLE

    Image Encryption Algorithm Based on New Fractional Beta Chaotic Maps

    Rabha W. Ibrahim1,*, Hayder Natiq2, Ahmed Alkhayyat3, Alaa Kadhim Farhan4, Nadia M. G. Al-Saidi5, Dumitru Baleanu6,7,8

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 119-131, 2022, DOI:10.32604/cmes.2022.018343

    Abstract In this study, a new algorithm of fractional beta chaotic maps is proposed to generate chaotic sequences for image encryption. The proposed technique generates multi random sequences by shuffling the image pixel position. This technique is used to blur the pixels connecting the input and encrypted images and to increase the attack resistance. The proposed algorithm makes the encryption process sophisticated by using fractional chaotic maps, which hold the properties of pseudo-randomness. The fractional beta sequences are utilized to alter the image pixels to decryption attacks. The experimental results proved that the proposed image encryption algorithm successfully encrypted and decrypted… More >

Displaying 7441-7450 on page 745 of 21896. Per Page