Home / Journals / CMC / Vol.62, No.2, 2020
Special lssues
Table of Content
  • Open AccessOpen Access

    ARTICLE

    Analysis of Wireless Backhaul Networks Based on Aerial Platform Technology for 6G Systems

    Sooeun Song1, Minsu Choi1, Yunyeong Goh1, Jusik Yun1, Wonsuk Yoo1, Wonsik Yang1, Jaewook Jung1, Jong-Moon Chung1, *
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 473-494, 2020, DOI:10.32604/cmc.2020.09052
    Abstract As next generation communication technologies emerge, new high data rate applications and high-definition large-screen video streaming have become very popular. As a result, network traffic has been increasing so much that existing backhaul networks soon will not be able to support all traffic demands. To support these needs in future 6G mobile systems, the establishment of an additional backhaul wireless network is considered essential. As one of the solutions, a wireless backhaul network based on an aerial platform has been proposed. In order to explore the potential of aerial platforms as wireless backhaul networks, in this paper, the categories for… More >

  • Open AccessOpen Access

    REVIEW

    Review on the Prediction of Residual Stress in Welded Steel Components

    Junyan Ni1, Xincun Zhuang2, 3, Magd Abdel Wahab4, 5, *
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 495-523, 2020, DOI:10.32604/cmc.2020.08448
    Abstract Residual stress after welding has negative effects on the service life of welded steel components or structures. This work reviews three most commonly used methods for predicting residual stress, namely, empirical, semi-empirical and process simulation methods. Basic principles adopted by these methods are introduced. The features and limitations of each method are discussed as well. The empirical method is the most practical but its accuracy relies heavily on experiments. Mechanical theories are employed in the semi-empirical method, while other aspects, such as temperature variation and phase transformation, are simply ignored. The process simulation method has been widely used due to… More >

  • Open AccessOpen Access

    ARTICLE

    MHD Boundary Layer Flow of a Power-Law Nanofluid Containing Gyrotactic Microorganisms Over an Exponentially Stretching Surface

    Mohamed Abd El-Aziz1, 2, A. M. Aly1, 3, *
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 525-549, 2020, DOI:10.32604/cmc.2020.08576
    Abstract This study focusses on the numerical investigations of boundary layer flow for magnetohydrodynamic (MHD) and a power-law nanofluid containing gyrotactic microorganisms on an exponentially stretching surface with zero nanoparticle mass flux and convective heating. The nonlinear system of the governing equations is transformed and solved by Runge-Kutta-Fehlberg method. The impacts of the transverse magnetic field, bioconvection parameters, Lewis number, nanofluid parameters, Prandtl number and power-law index on the velocity, temperature, nanoparticle volume fraction, density of motile microorganism profiles is explored. In addition, the impacts of these parameters on local skin-friction coefficient, local Nusselt, local Sherwood numbers and local density number… More >

  • Open AccessOpen Access

    ARTICLE

    Propagation of a Thermoelastic Wave in a Half-Space of a Homogeneous Isotropic Material Subjected to the Effect of Rotation and Initial Stress

    Fatima Bayones1, Abdelmooty Abd-Alla2, *, Raghad Alfatta3, Hoda Al-Nefaie3
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 551-567, 2020, DOI:10.32604/cmc.2020.08420
    Abstract The propagation of thermoelastic waves in a homogeneous, isotropic elastic semi-infinite space is subjected to rotation and initial stress, which is at temperature T0 - initially, and whose boundary surface is subjected to heat source and load moving with finite velocity. Temperature and stress distribution occurring due to heating or cooling and have been determined using certain boundary conditions. Numerical results have been given and illustrated graphically in each case considered. Comparison is made with the results predicted by the theory of thermoelasticity in the absence of rotation and initial stress. The results indicate that the effect of the rotation… More >

  • Open AccessOpen Access

    ARTICLE

    User Profile System Based on Sentiment Analysis for Mobile Edge Computing

    Sang-Min Park1, Young-Gab Kim2, *
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 569-590, 2020, DOI:10.32604/cmc.2020.08666
    Abstract Emotions of users do not converge in a single application but are scattered across diverse applications. Mobile devices are the closest media for handling user data and these devices have the advantage of integrating private user information and emotions spread over different applications. In this paper, we first analyze user profile on a mobile device by describing the problem of the user sentiment profile system in terms of data granularity, media diversity, and server-side solution. Fine-grained data requires additional data and structural analysis in mobile devices. Media diversity requires standard parameters to integrate user data from various applications. A server-side… More >

  • Open AccessOpen Access

    ARTICLE

    Dental Age Estimation Based on X-ray Images

    Noor Mualla1, Essam H Houssein2, *, M. R. Hassan1
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 591-605, 2020, DOI:10.32604/cmc.2020.08580
    Abstract Chronological age estimation using panoramic dental X-ray images is an essential task in forensic sciences. Various statistical approaches have proposed by considering the teeth and mandible. However, building automated dental age estimation based on machine learning techniques needs more research efforts. In this paper, an automated dental age estimation is proposed using transfer learning. In the proposed approach, features are extracted using two deep neural networks namely, AlexNet and ResNet. Several classifiers are proposed to perform the classification task including decision tree, k-nearest neighbor, linear discriminant, and support vector machine. The proposed approach is evaluated using a number of suitable… More >

  • Open AccessOpen Access

    ARTICLE

    Forced Vibration Analysis of Functionally Graded Anisotropic Nanoplates Resting on Winkler/Pasternak-Foundation

    Behrouz Karami1, Maziar Janghorban1, Timon Rabczuk2, *
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 607-629, 2020, DOI:10.32604/cmc.2020.08032
    Abstract This study investigates the forced vibration of functionally graded hexagonal nano-size plates for the first time. A quasi-three-dimensional (3D) plate theory including stretching effect is used to model the anisotropic plate as a continuum one where smallscale effects are considered based on nonlocal strain gradient theory. Also, the plate is assumed on a Pasternak foundation in which normal and transverse shear loads are taken into account. The governing equations of motion are obtained via the Hamiltonian principles which are solved using analytical based methods by means of Navier’s approximation. The influences of the exponential factor, nonlocal parameter, strain gradient parameter,… More >

  • Open AccessOpen Access

    ARTICLE

    Fuzzy-Based Sentiment Analysis System for Analyzing Student Feedback and Satisfaction

    Yun Wang1, Fazli Subhan2, Shahaboddin Shamshirband3, 4, *, Muhammad Zubair Asghar5, Ikram Ullah5, Ammara Habib5
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 631-655, 2020, DOI:10.32604/cmc.2020.07920
    Abstract The feedback collection and analysis has remained an important subject matter for long. The traditional techniques for student feedback analysis are based on questionnaire-based data collection and analysis. However, the student expresses their feedback opinions on online social media sites, which need to be analyzed. This study aims at the development of fuzzy-based sentiment analysis system for analyzing student feedback and satisfaction by assigning proper sentiment score to opinion words and polarity shifters present in the input reviews. Our technique computes the sentiment score of student feedback reviews and then applies a fuzzy-logic module to analyze and quantify student’s satisfaction… More >

  • Open AccessOpen Access

    ARTICLE

    A Finite Difference Method and Effective Modification of Gradient Descent Optimization Algorithm for MHD Fluid Flow Over a Linearly Stretching Surface

    Yasir Nawaz1, Muhammad Shoaib Arif 1, Mairaj Bibi2, *, Javeria Nawaz Abbasi2, Umer Javed3, Amna Nazeer2
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 657-677, 2020, DOI:10.32604/cmc.2020.08584
    Abstract Present contribution is concerned with the construction and application of a numerical method for the fluid flow problem over a linearly stretching surface with the modification of standard Gradient descent Algorithm to solve the resulted difference equation. The flow problem is constructed using continuity, and Navier Stoke equations and these PDEs are further converted into boundary value problem by applying suitable similarity transformations. A central finite difference method is proposed that gives third-order accuracy using three grid points. The stability conditions of the present proposed method using a Gauss-Seidel iterative procedure is found using VonNeumann stability criteria and order of… More >

  • Open AccessOpen Access

    ARTICLE

    A Deep Convolutional Architectural Framework for Radiograph Image Processing at Bit Plane Level for Gender & Age Assessment

    N. Shobha Rani1, *, M. Chandrajith2, B. R. Pushpa1, B. J. Bipin Nair1
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 679-694, 2020, DOI:10.32604/cmc.2020.08552
    Abstract Assessing the age of an individual via bones serves as a fool proof method in true determination of individual skills. Several attempts are reported in the past for assessment of chronological age of an individual based on variety of discriminative features found in wrist radiograph images. The permutation and combination of these features realized satisfactory accuracies for a set of limited groups. In this paper, assessment of gender for individuals of chronological age between 1-17 years is performed using left hand wrist radiograph images. A fully automated approach is proposed for removal of noise persisted due to non-uniform illumination during… More >

  • Open AccessOpen Access

    ARTICLE

    Optimal Coverage Multi-Path Scheduling Scheme with Multiple Mobile Sinks for WSNs

    Jin Wang1, 2, 3, Yu Gao2, Chang Zhou2, R. Simon Sherratt4, Lei Wang5, *
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 695-711, 2020, DOI:10.32604/cmc.2020.08674
    Abstract Wireless Sensor Networks (WSNs) are usually formed with many tiny sensors which are randomly deployed within sensing field for target monitoring. These sensors can transmit their monitored data to the sink in a multi-hop communication manner. However, the ‘hot spots’ problem will be caused since nodes near sink will consume more energy during forwarding. Recently, mobile sink based technology provides an alternative solution for the long-distance communication and sensor nodes only need to use single hop communication to the mobile sink during data transmission. Even though it is difficult to consider many network metrics such as sensor position, residual energy… More >

  • Open AccessOpen Access

    ARTICLE

    An Optimized Resource Scheduling Strategy for Hadoop Speculative Execution Based on Non-cooperative Game Schemes

    Yinghang Jiang1, Qi Liu2,3,*, Williams Dannah1, Dandan Jin2, Xiaodong Liu3, Mingxu Sun4,*
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 713-729, 2020, DOI:10.32604/cmc.2020.04604
    Abstract Hadoop is a well-known parallel computing system for distributed computing and large-scale data processes. “Straggling” tasks, however, have a serious impact on task allocation and scheduling in a Hadoop system. Speculative Execution (SE) is an efficient method of processing “Straggling” Tasks by monitoring real-time running status of tasks and then selectively backing up “Stragglers” in another node to increase the chance to complete the entire mission early. Present speculative execution strategies meet challenges on misjudgement of “Straggling” tasks and improper selection of backup nodes, which leads to inefficient implementation of speculative executive processes. This paper has proposed an Optimized Resource… More >

  • Open AccessOpen Access

    ARTICLE

    A Novel Combinational Convolutional Neural Network for Automatic Food-Ingredient Classification

    Lili Pan1, Cong Li1, *, Samira Pouyanfar2, Rongyu Chen1, Yan Zhou1
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 731-746, 2020, DOI:10.32604/cmc.2020.06508
    Abstract With the development of deep learning and Convolutional Neural Networks (CNNs), the accuracy of automatic food recognition based on visual data have significantly improved. Some research studies have shown that the deeper the model is, the higher the accuracy is. However, very deep neural networks would be affected by the overfitting problem and also consume huge computing resources. In this paper, a new classification scheme is proposed for automatic food-ingredient recognition based on deep learning. We construct an up-to-date combinational convolutional neural network (CBNet) with a subnet merging technique. Firstly, two different neural networks are utilized for learning interested features.… More >

  • Open AccessOpen Access

    ARTICLE

    Cooperative Perception Optimization Based on Self-Checking Machine Learning

    Haoxiang Sun1, *, Changxing Chen1, Yunfei Ling1, Mu Yang1
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 747-761, 2020, DOI:10.32604/cmc.2020.05625
    Abstract In the process of spectrum perception, in order to realize accurate perception of the channel state, the method of multi-node cooperative perception can usually be used. However, the first problem to be considered is how to complete information fusion and obtain more accurate and reliable judgment results based on multi-node perception results. The ideas put forward in this paper are as follows: firstly, the perceived results of each node are obtained on the premise of limiting detection probability and false alarm probability. Then, on the one hand, the weighted fusion criterion of decision-making weight optimization of each node is realized… More >

  • Open AccessOpen Access

    ARTICLE

    Strategy Selection for Moving Target Defense in Incomplete Information Game

    Huan Zhang1, Kangfeng Zheng1, *, Xiujuan Wang2, Shoushan Luo1, Bin Wu1
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 763-786, 2020, DOI:10.32604/cmc.2020.06553
    Abstract As a core component of the network, web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers. Although the moving target defense (MTD) has been proposed to increase the attack difficulty for the attackers, there is no solo approach can cope with different attacks; in addition, it is impossible to implement all these approaches simultaneously due to the resource limitation. Thus, the selection of an optimal defense strategy based on MTD has become the focus of research. In general, the confrontation of two players in… More >

  • Open AccessOpen Access

    ARTICLE

    A Modified Three-Term Conjugate Gradient Algorithm for Large-Scale Nonsmooth Convex Optimization

    Wujie Hu1, Gonglin Yuan1, *, Hongtruong Pham2
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 787-800, 2020, DOI:10.32604/cmc.2020.02993
    Abstract It is well known that Newton and quasi-Newton algorithms are effective to small and medium scale smooth problems because they take full use of corresponding gradient function’s information but fail to solve nonsmooth problems. The perfect algorithm stems from concept of ‘bundle’ successfully addresses both smooth and nonsmooth complex problems, but it is regrettable that it is merely effective to small and medium optimization models since it needs to store and update relevant information of parameter’s bundle. The conjugate gradient algorithm is effective both large-scale smooth and nonsmooth optimization model since its simplicity that utilizes objective function’s information and the… More >

  • Open AccessOpen Access

    ARTICLE

    Scalable Skin Lesion Multi-Classification Recognition System

    Fan Liu1, Jianwei Yan2, Wantao Wang2, Jian Liu2, *, Junying Li3, Alan Yang4
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 801-816, 2020, DOI:10.32604/cmc.2020.07039
    Abstract Skin lesion recognition is an important challenge in the medical field. In this paper, we have implemented an intelligent classification system based on convolutional neural network. First of all, this system can classify whether the input image is a dermascopic image with an accuracy of 99%. And then diagnose the dermoscopic image and the non-skin mirror image separately. Due to the limitation of the data, we can only realize the recognition of vitiligo by non-skin mirror. We propose a vitiligo recognition based on the probability average of three structurally identical CNN models. The method is more efficient and robust than… More >

  • Open AccessOpen Access

    ARTICLE

    Difference of Visual Information Metric Based on Entropy of Primitive

    Yanghong Zhang1, Feng Sun2, Liwei Tian1, Jinfeng Li3, Longqing Zhang3, Shengfu Lan3
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 817-831, 2020, DOI:10.32604/cmc.2020.06076
    Abstract Image sparse representation is a method of efficient compression and coding of image signal in the process of digital image processing. Image after sparse representation, to enhance the transmission efficiency of the image signal. Entropy of Primitive (EoP) is a statistical representation of the sparse representation of the image, which indicates the probability of each base element. Based on the EoP, this paper presents an image quality evaluation method-Difference of Visual Information Metric (DVIM). The principle of this method is to evaluate the image quality with the difference between the original image and the distorted image. The comparative experiments between… More >

  • Open AccessOpen Access

    ARTICLE

    Stability of Nonlinear Feedback Shift Registers with Periodic Input

    Bo Gao1, *, Xuan Liu1, Xiaobo Wu1, *, Shudong Li2, *, Zhongzhou Lan1, Hui Lu2, *, Boyan Liu1
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 833-847, 2020, DOI:10.32604/cmc.2020.06702
    Abstract The stability of Non-Linear Feedback Shift Registers (NFSRs) plays an important role in the cryptographic security. Due to the complexity of nonlinear systems and the lack of efficient algebraic tools, the theorems related to the stability of NFSRs are still not well-developed. In this paper, we view the NFSR with periodic inputs as a Boolean control network. Based on the mathematical tool of semi-tensor product (STP), the Boolean network can be mapped into an algebraic form. Through these basic theories, we analyze the state space of non-autonomous NFSRs, and discuss the stability of an NFSR with periodic inputs of limited… More >

  • Open AccessOpen Access

    ARTICLE

    Two-Dimensional Interpolation Criterion Using DFT Coefficients

    Yuan Chen1, Liangtao Duan1, Weize Sun2, *, Jingxin Xu3
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 849-859, 2020, DOI:10.32604/cmc.2020.07115
    Abstract In this paper, we address the frequency estimator for 2-dimensional (2-D) complex sinusoids in the presence of white Gaussian noise. With the use of the sinc function model of the discrete Fourier transform (DFT) coefficients on the input data, a fast and accurate frequency estimator is devised, where only the DFT coefficient with the highest magnitude and its four neighbors are required. Variance analysis is also included to investigate the accuracy of the proposed algorithm. Simulation results are conducted to demonstrate the superiority of the developed scheme, in terms of the estimation performance and computational complexity. More >

  • Open AccessOpen Access

    ARTICLE

    MFPL: Multi-Frequency Phase Difference Combination Based Device-Free Localization

    Zengshan Tian1, Weiqin Yang1, Yue Jin1, Liangbo Xie1, *, Zhengwen Huang2
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 861-876, 2020, DOI:10.32604/cmc.2020.07297
    Abstract With the popularity of indoor wireless network, device-free indoor localization has attracted more and more attention. Unlike device-based localization where the target is required to carry an active transmitter, their frequent signal scanning consumes a large amount of energy, which is inconvenient for devices with limited energy. In this work, we propose the MFPL, device-free localization (DFL) system based on WiFi distance measurement. First, we combine multi-subcarrier characteristic of Channel State Information (CSI) with classical Fresnel reflection model to get the linear relationship between the change of the length of reflection path and the subcarrier phase difference. Then we calculate… More >

  • Open AccessOpen Access

    ARTICLE

    Maintaining Complex Formations and Avoiding Obstacles for Multi-Agents

    Yali Wang1, Youqian Feng1, Zhonghai Yin1, Cheng Zhou1, *
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 877-891, 2020, DOI:10.32604/cmc.2020.06423
    Abstract This paper researches some problems in complex formation for multi-agents, in which two matrices are proposed to record the formation. The pattern matrix is used to describe the pattern of the formation; meanwhile, the location matrix is used to record the location of each agent. Thus, all desired positions of each agent will be obtained by geometrical relationship on the basis of two matrices above. In addition a self-adaptation flocking algorithm is proposed to control all agents to form a desired formation and avoid obstacles. The main idea is as follows: agents will form a desired formation through the method… More >

  • Open AccessOpen Access

    ARTICLE

    A Formal Method for Service Choreography Verification Based on Description Logic

    Tingting Zhang1, 2, 3, *, Yushi Lan2, Minggang Yu1, Changyou Zheng1, Kun Liu1
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 893-904, 2020, DOI:10.32604/cmc.2020.06216
    Abstract Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model. This paper presents a new approach of choreography model verification based on Description Logic. A meta model of service choreography is built to provide a conceptual framework to capture the formal syntax and semantics of service choreography. Based on the framework, a set of rules and constraints are defined in Description Logic for choreography model verification. To automate model verification, the UML-based service choreography model will be transformed, by the given algorithms, into the… More >

  • Open AccessOpen Access

    ARTICLE

    Edge Computing-Based Tasks Offloading and Block Caching for Mobile Blockchain

    Yong Yan1, Yao Dai2, *, Zhiqiang Zhou3, Wei Jiang4, Shaoyong Guo2
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 905-915, 2020, DOI:10.32604/cmc.2020.07425
    Abstract Internet of Things (IoT) technology is rapidly evolving, but there is no trusted platform to protect user privacy, protect information between different IoT domains, and promote edge processing. Therefore, we integrate the blockchain technology into constructing trusted IoT platforms. However, the application of blockchain in IoT is hampered by the challenges posed by heavy computing processes. To solve the problem, we put forward a blockchain framework based on mobile edge computing, in which the blockchain mining tasks can be offloaded to nearby nodes or the edge computing service providers and the encrypted hashes of blocks can be cached in the… More >

  • Open AccessOpen Access

    ARTICLE

    Unsupervised Anomaly Detection via DBSCAN for KPIs Jitters in Network Managements

    Haiwen Chen1, Guang Yu1, Fang Liu2, Zhiping Cai1, *, Anfeng Liu3, Shuhui Chen1, Hongbin Huang1, Chak Fong Cheang4
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 917-927, 2020, DOI:10.32604/cmc.2020.05981
    Abstract For many Internet companies, a huge amount of KPIs (e.g., server CPU usage, network usage, business monitoring data) will be generated every day. How to closely monitor various KPIs, and then quickly and accurately detect anomalies in such huge data for troubleshooting and recovering business is a great challenge, especially for unlabeled data. The generated KPIs can be detected by supervised learning with labeled data, but the current problem is that most KPIs are unlabeled. That is a time-consuming and laborious work to label anomaly for company engineers. Build an unsupervised model to detect unlabeled data is an urgent need… More >

  • Open AccessOpen Access

    ARTICLE

    Analysis of Unsteady Heat Transfer Problems with Complex Geometries Using Isogeometric Boundary Element Method

    Weihua Fang1, Zhilin An2, Tiantang Yu2, *, Tinh Quoc Bui3, 4, *
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 929-962, 2020, DOI:10.32604/cmc.2020.05022
    Abstract Numerical analysis of unsteady heat transfer problems with complex geometries by the isogeometric boundary element method (IGABEM) is presented. The IGABEM possesses many desirable merits and features, for instance, (a) exactly represented arbitrarily complex geometries, and higher-order continuity due to nonuniform rational B-splines (NURBS) shape functions; (b) using NURBS for both field approximation and geometric description; (c) directly utilizing geometry data from computer-aided design (CAD); and (d) only boundary discretization. The formulation of IGABEM for unsteady heat transfer is derived. The domain discretization in terms of IGABEM for unsteady heat transfer is required as that in traditional BEM. The internal… More >

  • Open AccessOpen Access

    ARTICLE

    An Adaptive Image Calibration Algorithm for Steganalysis

    Xuyu Xiang1, Jiaohua Qin1, *, Junshan Tan1, Neal N. Xiong1
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 963-976, 2020, DOI:10.32604/cmc.2020.06394
    Abstract In this paper, a new adaptive calibration algorithm for image steganalysis is proposed. Steganography disturbs the dependence between neighboring pixels and decreases the neighborhood node degree. Firstly, we analyzed the effect of steganography on the neighborhood node degree of cover images. Then, the calibratable pixels are marked by the analysis of neighborhood node degree. Finally, the strong correlation calibration image is constructed by revising the calibratable pixels. Experimental results reveal that compared with secondary steganography the image calibration method significantly increased the detection accuracy for LSB matching steganography on low embedding ratio. The proposed method also has a better performance… More >

  • Open AccessOpen Access

    ARTICLE

    Bearing Failure Optimization of Composite Double-Lap Bolted Joints Based on a Three-Step Strategy Marked By Feasible Region Reduction and Model Decoupling

    Fengrui Liu1, 2, 3, Wanting Yao1, 2, Xinhong Shi4, *, Libin Zhao1, 2, Jianyu Zhang5, *
    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 977-999, 2020, DOI:10.32604/cmc.2020.07184
    Abstract To minimize the mass and increase the bearing failure load of composite doublelap bolted joints, a three-step optimization strategy including feasible region reduction, optimization model decoupling and optimization was presented. In feasible region reduction, the dimensions of the feasible design region were reduced by selecting dominant design variables from numerous multilevel parameters by sensitivity analyses, and the feasible regions of variables were reduced by influence mechanism analyses. In model decoupling, the optimization model with a large number of variables was divided into various sub-models with fewer variables by variance analysis. In the third step, the optimization sub-models were solved one… More >

Per Page:

Share Link