Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,799)
  • Open Access

    ARTICLE

    Quantifying Uncertainty in Dielectric Solids’ Mechanical Properties Using Isogeometric Analysis and Conditional Generative Adversarial Networks

    Shuai Li1, Xiaodong Zhao1,2,*, Jinghu Zhou1, Xiyue Wang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2587-2611, 2024, DOI:10.32604/cmes.2024.052203

    Abstract Accurate quantification of the uncertainty in the mechanical characteristics of dielectric solids is crucial for advancing their application in high-precision technological domains, necessitating the development of robust computational methods. This paper introduces a Conditional Generation Adversarial Network Isogeometric Analysis (CGAN-IGA) to assess the uncertainty of dielectric solids’ mechanical characteristics. IGA is utilized for the precise computation of electric potentials in dielectric, piezoelectric, and flexoelectric materials, leveraging its advantage of integrating seamlessly with Computer-Aided Design (CAD) models to maintain exact geometrical fidelity. The CGAN method is highly efficient in generating models for piezoelectric and flexoelectric materials, More >

  • Open Access

    ARTICLE

    Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications

    Li-Woei Chen1, Kun-Lin Tsai2,*, Fang-Yie Leu3, Wen-Cheng Jiang2, Shih-Ting Tseng2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2779-2794, 2024, DOI:10.32604/cmes.2024.052124

    Abstract Various mobile devices and applications are now used in daily life. These devices require high-speed data processing, low energy consumption, low communication latency, and secure data transmission, especially in 5G and 6G mobile networks. High-security cryptography guarantees that essential data can be transmitted securely; however, it increases energy consumption and reduces data processing speed. Therefore, this study proposes a low-energy data encryption (LEDE) algorithm based on the Advanced Encryption Standard (AES) for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things (IoT) devices. In the proposed LEDE algorithm, the system time More >

  • Open Access

    ARTICLE

    MADDPG-D2: An Intelligent Dynamic Task Allocation Algorithm Based on Multi-Agent Architecture Driven by Prior Knowledge

    Tengda Li, Gang Wang, Qiang Fu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2559-2586, 2024, DOI:10.32604/cmes.2024.052039

    Abstract Aiming at the problems of low solution accuracy and high decision pressure when facing large-scale dynamic task allocation (DTA) and high-dimensional decision space with single agent, this paper combines the deep reinforcement learning (DRL) theory and an improved Multi-Agent Deep Deterministic Policy Gradient (MADDPG-D2) algorithm with a dual experience replay pool and a dual noise based on multi-agent architecture is proposed to improve the efficiency of DTA. The algorithm is based on the traditional Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm, and considers the introduction of a double noise mechanism to increase the action exploration… More >

  • Open Access

    ARTICLE

    Influence of High-Density Bedding Plane Characteristics on Hydraulic Fracture Propagation in Shale Oil Reservoir

    Xiao Yan1,2,3, Di Wang1,2,4, Haitao Yu1,2,3,5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3051-3071, 2024, DOI:10.32604/cmes.2024.051832

    Abstract The existence of high-density bedding planes is a typical characteristic of shale oil reservoirs. Understanding the behavior of hydraulic fracturing in high-density laminated rocks is significant for promoting shale oil production. In this study, a hydraulic fracturing model considering tensile failure and frictional slip of the bedding planes is established within the framework of the unified pipe-interface element method (UP-IEM). The model developed for simulating the interaction between the hydraulic fracture and the bedding plane is validated by comparison with experimental results. The hydraulic fracturing patterns in sealed and unsealed bedding planes are compared. Additionally,… More >

  • Open Access

    ARTICLE

    In-Depth Study of Potential-Based Routing and New Exploration of Its Scheduling Integration

    Jihoon Sung1, Yeunwoong Kyung2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2891-2911, 2024, DOI:10.32604/cmes.2024.051772

    Abstract Industrial wireless mesh networks (WMNs) have been widely deployed in various industrial sectors, providing services such as manufacturing process monitoring, equipment control, and sensor data collection. A notable characteristic of industrial WMNs is their distinct traffic pattern, where the majority of traffic flows originate from mesh nodes and are directed towards mesh gateways. In this context, this paper adopts and revisits a routing algorithm known as ALFA (autonomous load-balancing field-based anycast routing), tailored specifically for anycast (one-to-one-of-many) networking in WMNs, where traffic flows can be served through any one of multiple gateways. In essence, the… More >

  • Open Access

    ARTICLE

    Composite Fractional Trapezoidal Rule with Romberg Integration

    Iqbal M. Batiha1,2,*, Rania Saadeh3, Iqbal H. Jebril1, Ahmad Qazza3, Abeer A. Al-Nana4, Shaher Momani2,5

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2729-2745, 2024, DOI:10.32604/cmes.2024.051588

    Abstract The aim of this research is to demonstrate a novel scheme for approximating the Riemann-Liouville fractional integral operator. This would be achieved by first establishing a fractional-order version of the -point Trapezoidal rule and then by proposing another fractional-order version of the -composite Trapezoidal rule. In particular, the so-called divided-difference formula is typically employed to derive the -point Trapezoidal rule, which has accordingly been used to derive a more accurate fractional-order formula called the -composite Trapezoidal rule. Additionally, in order to increase the accuracy of the proposed approximations by reducing the true errors, we incorporate More >

  • Open Access

    ARTICLE

    Enhancing Critical Path Problem in Neutrosophic Environment Using Python

    M. Navya Pratyusha, Ranjan Kumar*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2957-2976, 2024, DOI:10.32604/cmes.2024.051581

    Abstract In the real world, one of the most common problems in project management is the unpredictability of resources and timelines. An efficient way to resolve uncertainty problems and overcome such obstacles is through an extended fuzzy approach, often known as neutrosophic logic. Our rigorous proposed model has led to the creation of an advanced technique for computing the triangular single-valued neutrosophic number. This innovative approach evaluates the inherent uncertainty in project durations of the planning phase, which enhances the potential significance of the decision-making process in the project. Our proposed method, for the first time… More >

  • Open Access

    ARTICLE

    Computational Fluid Dynamics Approach for Predicting Pipeline Response to Various Blast Scenarios: A Numerical Modeling Study

    Farman Saifi1,*, Mohd Javaid1, Abid Haleem1, S. M. Anas2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2747-2777, 2024, DOI:10.32604/cmes.2024.051490

    Abstract Recent industrial explosions globally have intensified the focus in mechanical engineering on designing infrastructure systems and networks capable of withstanding blast loading. Initially centered on high-profile facilities such as embassies and petrochemical plants, this concern now extends to a wider array of infrastructures and facilities. Engineers and scholars increasingly prioritize structural safety against explosions, particularly to prevent disproportionate collapse and damage to nearby structures. Urbanization has further amplified the reliance on oil and gas pipelines, making them vital for urban life and prime targets for terrorist activities. Consequently, there is a growing imperative for computational… More >

  • Open Access

    ARTICLE

    Impact Performance Research of Re-Entrant Octagonal Negative Poisson’s Ratio Honeycomb with Gradient Design

    Yiyuan Li1, Yongjing Li1,2, Shilin Yan1,2,*, Pin Wen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 3105-3119, 2024, DOI:10.32604/cmes.2024.051375

    Abstract Based on the traditional re-entrant honeycomb, a novel re-entrant octagon honeycomb (ROH) is proposed. The deformation mode of the honeycomb under quasi-static compression is analyzed by numerical simulation, and the results are in good agreement with the experimental ones. The deformation modes, mechanical properties, and energy absorption characteristics of ROH along the impact and perpendicular directions gradient design are investigated under different velocities. The results indicated that the deformation mode of ROH is affected by gradient design along the direction of impact and impact speed. In addition, gradient design along the direction of impact can… More >

  • Open Access

    ARTICLE

    A High-Accuracy Curve Boundary Recognition Method Based on the Lattice Boltzmann Method and Immersed Moving Boundary Method

    Jie-Di Weng1, Yong-Zheng Jiang1,*, Long-Chao Chen1, Xu Zhang1, Guan-Yong Zhang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2533-2557, 2024, DOI:10.32604/cmes.2024.051232

    Abstract Applying numerical simulation technology to investigate fluid-solid interaction involving complex curved boundaries is vital in aircraft design, ocean, and construction engineering. However, current methods such as Lattice Boltzmann (LBM) and the immersion boundary method based on solid ratio (IMB) have limitations in identifying custom curved boundaries. Meanwhile, IBM based on velocity correction (IBM-VC) suffers from inaccuracies and numerical instability. Therefore, this study introduces a high-accuracy curve boundary recognition method (IMB-CB), which identifies boundary nodes by moving the search box, and corrects the weighting function in LBM by calculating the solid ratio of the boundary nodes,… More > Graphic Abstract

    A High-Accuracy Curve Boundary Recognition Method Based on the Lattice Boltzmann Method and Immersed Moving Boundary Method

Displaying 1-10 on page 1 of 3799. Per Page