Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (39)
  • Open Access

    PROCEEDINGS

    Developing a New Computational Fluid Dynamics Model for Friction Stir Welding of Al/Mg Alloys by Explicitly Including Intermetallic Compound Phase

    Chengle Yang, Qingyu Shi, Gaoqiang Chen*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.33, No.3, pp. 1-1, 2025, DOI:10.32604/icces.2025.011530

    Abstract The dissimilar friction stir welding (FSW) of aluminum (Al) and magnesium (Mg) alloys occurs at relatively low temperatures, but how the plastic flow happens under these conditions remains unclear. In this study, a computational fluid dynamics (CFD) model was developed to investigate the thermo-mechanical-flow coupled material behavior during the dissimilar friction stir welding of AA6061-T6 Al alloy and AZ31B Mg alloy. The present work established a generation model and a constitutive model for intermetallic compound (IMC) in welding process. An iso-stress mixing model was utilized to determine the viscosity of the Al-Mg-IMC mixture by volume… More >

  • Open Access

    ARTICLE

    Lightweight Multi-Layered Encryption and Steganography Model for Protecting Secret Messages in MPEG Video Frames

    Sara H. Elsayed1, Rodaina Abdelsalam1, Mahmoud A. Ismail Shoman2, Raed Alotaibi3,*, Omar Reyad4,5,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4995-5013, 2025, DOI:10.32604/cmc.2025.068429 - 23 October 2025

    Abstract Ensuring the secure transmission of secret messages, particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security. Relying on a single-layered security approach is often insufficient for safeguarding sensitive data. This study proposes a triple-lightweight cryptographic and steganographic model that integrates the Hill Cipher Technique (HCT), Rotation Left Digits (RLD), and Discrete Wavelet Transform (DWT) to embed secret messages within video frames securely. The approach begins with encrypting the secret text using a private key matrix (PK1) of size 2 × 2 up to 6 × 6… More >

  • Open Access

    ARTICLE

    Ultrasonic Welding of Similar/Dissimilar MEX-3D Printed Parts Considering Energy Director Shape, Infill, Welding Time and Amplitude

    Vivek Kumar Tiwary1,*, Arunkumar P.1, Vinayak R. Malik1,2

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5111-5131, 2025, DOI:10.32604/cmc.2025.066129 - 30 July 2025

    Abstract Additive manufacturing (AM), a key technology in the evolution of Industry 4.0, has revolutionized production processes by enabling the precise, layer-by-layer fabrication of complex and customized components, enhancing efficiency and flexibility in smart manufacturing systems. However, one significant challenge hindering the acceptance of this technology is the limited print size, constrained by the machine’s small bed. To address this issue, a suitable polymer joining technique could be applied as a post-fabrication step. The present article examines findings on the Ultrasonic Welding (UW) of Material Extrusion (MEX)-3D printed parts made from commonly used thermoplastics, Acrylonitrile Butadiene… More >

  • Open Access

    ARTICLE

    Tamper Detection in Multimodal Biometric Templates Using Fragile Watermarking and Artificial Intelligence

    Fatima Abu Siryeh*, Hussein Alrammahi, Abdullahi Abdu İbrahim

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5021-5046, 2025, DOI:10.32604/cmc.2025.065206 - 30 July 2025

    Abstract Biometric template protection is essential for finger-based authentication systems, as template tampering and adversarial attacks threaten the security. This paper proposes a DCT-based fragile watermarking scheme incorporating AI-based tamper detection to improve the integrity and robustness of finger authentication. The system was tested against NIST SD4 and Anguli fingerprint datasets, wherein 10,000 watermarked fingerprints were employed for training. The designed approach recorded a tamper detection rate of 98.3%, performing 3–6% better than current DCT, SVD, and DWT-based watermarking approaches. The false positive rate (≤1.2%) and false negative rate (≤1.5%) were much lower compared to previous… More >

  • Open Access

    ARTICLE

    Effects of Normalised SSIM Loss on Super-Resolution Tasks

    Adéla Hamplová*, Tomáš Novák, Miroslav Žáček, Jiří Brožek

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3329-3349, 2025, DOI:10.32604/cmes.2025.066025 - 30 June 2025

    Abstract This study proposes a new component of the composite loss function minimised during training of the Super-Resolution (SR) algorithms—the normalised structural similarity index loss , which has the potential to improve the natural appearance of reconstructed images. Deep learning-based super-resolution (SR) algorithms reconstruct high-resolution images from low-resolution inputs, offering a practical means to enhance image quality without requiring superior imaging hardware, which is particularly important in medical applications where diagnostic accuracy is critical. Although recent SR methods employing convolutional and generative adversarial networks achieve high pixel fidelity, visual artefacts may persist, making the design of… More >

  • Open Access

    REVIEW

    Understanding the Molecular Mechanisms of Nitrogen Assimilation in C3 Plants under Abiotic Stress: A Mini Review

    Saif Ullah1,2, Izhar Ali1,2,*

    Phyton-International Journal of Experimental Botany, Vol.94, No.4, pp. 1029-1045, 2025, DOI:10.32604/phyton.2025.064608 - 30 April 2025

    Abstract Nitrogen (N) assimilation is crucial for the growth and development of C3 plants, as it converts inorganic N into organic forms, important for protein synthesis, nucleic acids and other vital biomolecules. However, abiotic stressors such as drought, salinity, extreme temperatures and others significantly impact N uptake and utilization, thereby hindering plant growth and development. Recent advances in molecular biology have illuminated the complex networks that govern N assimilation under these stressful conditions, emphasizing the role of transcription factors, regulatory genes, and stress-responsive pathways. This review provides an integrated perspective on the latest research in nitrogen metabolism… More >

  • Open Access

    PROCEEDINGS

    Hybrid Inverse Modeling Technique to Determine the Fracture Properties of Intermetallic Layer Formed at Al/Steel Dissimilar Weld Interface

    Kiyoaki T. Suzuki1,*, Sylvain Dancette2, Shun Tokita3, Yutaka S. Sato4

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.2, pp. 1-1, 2024, DOI:10.32604/icces.2024.012072

    Abstract Dissimilar welding of aluminum (Al) alloy to steel has been a long-running scientific and technological problem mainly for the automotive industry. It would allow to achieve new designs of optimized vehicle structures combining strength, lightweight and energy absorption ability. However, the weld strength is limited because of a brittle intermetallic layer (IML) formed at the weld interface. In our previous study, we demonstrated a significant improvement in weld strength by the addition of Ni to aluminum alloy. However, the effect of Ni addition on the fracture properties of IML remains unexplored. Moreover, additional Ni should… More >

  • Open Access

    ARTICLE

    An Intrusion Detection Method Based on a Universal Gravitation Clustering Algorithm

    Jian Yu1,2,*, Gaofeng Yu3, Xiangmei Xiao1,2, Zhixing Lin1,2

    Journal of Cyber Security, Vol.6, pp. 41-68, 2024, DOI:10.32604/jcs.2024.049658 - 04 June 2024

    Abstract With the rapid advancement of the Internet, network attack methods are constantly evolving and adapting. To better identify the network attack behavior, a universal gravitation clustering algorithm was proposed by analyzing the dissimilarities and similarities of the clustering algorithms. First, the algorithm designated the cluster set as vacant, with the introduction of a new object. Subsequently, a new cluster based on the given object was constructed. The dissimilarities between it and each existing cluster were calculated using a defined difference measure. The minimum dissimilarity was selected. Through comparing the proposed algorithm with the traditional Back More >

  • Open Access

    ARTICLE

    Photosynthetic Gas Exchange and Nitrogen Assimilation in Green Bean Plants Supplied with Two Sources of Silicon

    Julio C. Anchondo-Páez, Esteban Sánchez*, Carlos A. Ramírez-Estrada, Alondra Salcido-Martínez, Erick H. Ochoa-Chaparro

    Phyton-International Journal of Experimental Botany, Vol.93, No.5, pp. 963-980, 2024, DOI:10.32604/phyton.2024.048742 - 28 May 2024

    Abstract Beans contain a wide range of vitamins, proteins, calcium, and zinc which make them an important food source for many countries. To meet the demand for bean production worldwide, large amounts of fertilizers and pesticides are used. However, the cost of production and environmental impact increases. To produce food sustainably, the use of beneficial nutrients such as silicon as a biostimulant has been proposed. However, information about the effect of different sources of silicon on the metabolism of bean plants is scarce. Bean plants cv. Strike were grown in pots for 60 days and the… More >

  • Open Access

    ARTICLE

    A Cooperated Imperialist Competitive Algorithm for Unrelated Parallel Batch Machine Scheduling Problem

    Deming Lei*, Heen Li

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1855-1874, 2024, DOI:10.32604/cmc.2024.049480 - 15 May 2024

    Abstract This study focuses on the scheduling problem of unrelated parallel batch processing machines (BPM) with release times, a scenario derived from the moulding process in a foundry. In this process, a batch is initially formed, placed in a sandbox, and then the sandbox is positioned on a BPM for moulding. The complexity of the scheduling problem increases due to the consideration of BPM capacity and sandbox volume. To minimize the makespan, a new cooperated imperialist competitive algorithm (CICA) is introduced. In CICA, the number of empires is not a parameter, and four empires are maintained More >

Displaying 1-10 on page 1 of 39. Per Page