Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (30)
  • Open Access

    ARTICLE

    Optimized Design of H-Type Vertical Axis Wind Airfoil at Multiple Angles of Attack

    Chunyan Zhang1, Shuaishuai Wang1,2, Yinhu Qiao1,*, Zhiqiang Zhang1,2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.10, pp. 2661-2679, 2023, DOI:10.32604/fdmp.2023.028059

    Abstract Numerical simulations are conducted to improve the energy acquisition efficiency of H-type vertical axis wind turbines through the optimization of the related blade airfoil aerodynamic performance. The Bézier curve is initially used to fit the curve profile of a NACA2412 airfoil, and the moving asymptote algorithm is then exploited to optimize the design of the considered H-type vertical-axis wind-turbine blade airfoil for a certain attack angle. The results show that the maximum lift coefficient of the optimized airfoil is 8.33% higher than that of the original airfoil. The maximum lift-to-drag ratio of the optimized airfoil exceeds the maximum lift-to-drag ratio… More > Graphic Abstract

    Optimized Design of H-Type Vertical Axis Wind Airfoil at Multiple Angles of Attack

  • Open Access

    ARTICLE

    A Low-Cost and High-Performance Cryptosystem Using Tripling-Oriented Elliptic Curve

    Mohammad Alkhatib*, Wafa S. Aldalbahy

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1807-1831, 2023, DOI:10.32604/iasc.2023.038927

    Abstract Developing a high-performance public key cryptosystem is crucial for numerous modern security applications. The Elliptic Curve Cryptosystem (ECC) has performance and resource-saving advantages compared to other types of asymmetric ciphers. However, the sequential design implementation for ECC does not satisfy the current applications’ performance requirements. Therefore, several factors should be considered to boost the cryptosystem performance, including the coordinate system, the scalar multiplication algorithm, and the elliptic curve form. The tripling-oriented (3DIK) form is implemented in this work due to its minimal computational complexity compared to other elliptic curves forms. This experimental study explores the factors playing an important role… More >

  • Open Access

    ARTICLE

    A Novel Contour Tracing Algorithm for Object Shape Reconstruction Using Parametric Curves

    Nihat Arslan1, Kali Gurkahraman2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 331-350, 2023, DOI:10.32604/cmc.2023.035087

    Abstract Parametric curves such as Bézier and B-splines, originally developed for the design of automobile bodies, are now also used in image processing and computer vision. For example, reconstructing an object shape in an image, including different translations, scales, and orientations, can be performed using these parametric curves. For this, Bézier and B-spline curves can be generated using a point set that belongs to the outer boundary of the object. The resulting object shape can be used in computer vision fields, such as searching and segmentation methods and training machine learning algorithms. The prerequisite for reconstructing the shape with parametric curves… More >

  • Open Access

    ARTICLE

    Modeling Date Palm Trunk Fibers (DPTF) Packed Bed Adsorption Performances for Cadmium Removal from Aqueous Wastewater

    Ahmad S. Awad1.*, Banan Hudaib2, Waid Omar2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.6, pp. 1535-1549, 2023, DOI:10.32604/fdmp.2023.024300

    Abstract In this study, the potential of a low-cost bio-adsorbent, taken directly from Date Palm Trunk Fibers (DPTF) agricultural wastes, for cadmium ions removal from wastewaters is examined. The performances of this adsorbent are evaluated by building breakthrough curves at different bed heights and flow rates while keeping other parameters, such as the initial feed concentration, pH, and particle size, constant. The results indicate that the maximum cadmium adsorption capacity of DTPF can be obtained from the Thomas model as 51.5 mg/g with the most extended mass transfer zone of 83 min at the lowest flow rate at 5 ml/min. The… More > Graphic Abstract

    Modeling Date Palm Trunk Fibers (DPTF) Packed Bed Adsorption Performances for Cadmium Removal from Aqueous Wastewater

  • Open Access

    ARTICLE

    Notes on Curves at a Constant Distance from the Edge of Regression on a Curve in Galilean 3-Space

    Ali Çakmak1,*, Sezai Kızıltuğ2, Gökhan Mumcu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 2731-2742, 2023, DOI:10.32604/cmes.2023.024517

    Abstract In this paper, we define the curve at a constant distance from the edge of regression on a curve r(s) with arc length parameter s in Galilean 3-space. Here, d is a non-isotropic or isotropic vector defined as a vector tightly fastened to Frenet trihedron of the curve r(s) in 3-dimensional Galilean space. We build the Frenet frame of the constructed curve with respect to two types of the vector d and we indicate the properties related to the curvatures of the curve . Also, for the curve , we give the conditions to be a circular helix. Furthermore, we… More >

  • Open Access

    ARTICLE

    Multi-Features Disease Analysis Based Smart Diagnosis for COVID-19

    Sirisati Ranga Swamy1, S. Phani Praveen2, Shakeel Ahmed3,*, Parvathaneni Naga Srinivasu4, Abdulaziz Alhumam3

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 869-886, 2023, DOI:10.32604/csse.2023.029822

    Abstract Coronavirus 2019 (COVID -19) is the current global buzzword, putting the world at risk. The pandemic’s exponential expansion of infected COVID-19 patients has challenged the medical field’s resources, which are already few. Even established nations would not be in a perfect position to manage this epidemic correctly, leaving emerging countries and countries that have not yet begun to grow to address the problem. These problems can be solved by using machine learning models in a realistic way, such as by using computer-aided images during medical examinations. These models help predict the effects of the disease outbreak and help detect the… More >

  • Open Access

    ARTICLE

    Learning-Based Metaheuristic Approach for Home Healthcare Optimization Problem

    Mariem Belhor1,2,3, Adnen El-Amraoui1,*, Abderrazak Jemai2, François Delmotte1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 1-19, 2023, DOI:10.32604/csse.2023.029058

    Abstract This research focuses on the home health care optimization problem that involves staff routing and scheduling problems. The considered problem is an extension of multiple travelling salesman problem. It consists of finding the shortest path for a set of caregivers visiting a set of patients at their homes in order to perform various tasks during a given horizon. Thus, a mixed-integer linear programming model is proposed to minimize the overall service time performed by all caregivers while respecting the workload balancing constraint. Nevertheless, when the time horizon become large, practical-sized instances become very difficult to solve in a reasonable computational… More >

  • Open Access

    ARTICLE

    Frenet Curve Couples in Three Dimensional Lie Groups

    Osman Zeki Okuyucu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 653-671, 2022, DOI:10.32604/cmes.2022.021081

    Abstract In this study, we examine the possible relations between the Frenet planes of any given two curves in three dimensional Lie groups with left invariant metrics. We explain these possible relations in nine cases and then introduce the conditions that must be met to coincide with the planes of these curves in nine theorems. More >

  • Open Access

    ARTICLE

    Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm

    K. Sudharson1,*, S. Arun2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1769-1784, 2022, DOI:10.32604/iasc.2022.026483

    Abstract Quantum Computing (QC). The content of node or sink nodes is processed using the fundamental principles of quantum mechanics. However, cryptography techniques face several other issues, such as availability, integrity, and vulnerability, to name a few. The researchers have overcome many obstacles, yet security remains a crucial concern in QC. However, experimenters recently discovered that the QC has a lot more data hacking than static networks. Moreover, the bitwise error is still present in implementing the Quantum Computing Cryptography Protocol (QCCP). Because all nodes are mobile and dynamic topology occurs, the proposed research uses the Quantum Elliptical Curve Cryptography (QECC)… More >

  • Open Access

    ARTICLE

    Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security

    Sumaira Azhar1, Naveed Ahmed Azam2,*, Umar Hayat1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4971-4988, 2022, DOI:10.32604/cmc.2022.023685

    Abstract The demand for data security schemes has increased with the significant advancement in the field of computation and communication networks. We propose a novel three-step text encryption scheme that has provable security against computation attacks such as key attack and statistical attack. The proposed scheme is based on the Pell sequence and elliptic curves, where at the first step the plain text is diffused to get a meaningless plain text by applying a cyclic shift on the symbol set. In the second step, we hide the elements of the diffused plain text from the attackers. For this purpose, we use… More >

Displaying 1-10 on page 1 of 30. Per Page