Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    Numerical Analysis of Bacterial Meningitis Stochastic Delayed Epidemic Model through Computational Methods

    Umar Shafique1,*, Mohamed Mahyoub Al-Shamiri2, Ali Raza3, Emad Fadhal4,*, Muhammad Rafiq5,6, Nauman Ahmed5,7

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 311-329, 2024, DOI:10.32604/cmes.2024.052383 - 20 August 2024

    Abstract Based on the World Health Organization (WHO), Meningitis is a severe infection of the meninges, the membranes covering the brain and spinal cord. It is a devastating disease and remains a significant public health challenge. This study investigates a bacterial meningitis model through deterministic and stochastic versions. Four-compartment population dynamics explain the concept, particularly the susceptible population, carrier, infected, and recovered. The model predicts the nonnegative equilibrium points and reproduction number, i.e., the Meningitis-Free Equilibrium (MFE), and Meningitis-Existing Equilibrium (MEE). For the stochastic version of the existing deterministic model, the two methodologies studied are transition… More >

  • Open Access

    ARTICLE

    An Efficient Computational Method for Differential Equations of Fractional Type

    Mustafa Turkyilmazoglu1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.1, pp. 47-65, 2022, DOI:10.32604/cmes.2022.020781 - 18 July 2022

    Abstract An effective solution method of fractional ordinary and partial differential equations is proposed in the present paper. The standard Adomian Decomposition Method (ADM) is modified via introducing a functional term involving both a variable and a parameter. A residual approach is then adopted to identify the optimal value of the embedded parameter within the frame of L2 norm. Numerical experiments on sample problems of open literature prove that the presented algorithm is quite accurate, more advantageous over the traditional ADM and straightforward to implement for the fractional ordinary and partial differential equations of the recent focus More >

  • Open Access

    ARTICLE

    Comparison of Structural Probabilistic and Non-Probabilistic Reliability Computational Methods under Big Data Condition

    Yongfeng Fang1,3, Kong Fah Tee2,*

    Structural Durability & Health Monitoring, Vol.16, No.2, pp. 129-143, 2022, DOI:10.32604/sdhm.2022.020301 - 25 April 2022

    Abstract In this article, structural probabilistic and non-probabilistic reliability have been evaluated and compared under big data condition. Firstly, the big data is collected via structural monitoring and analysis. Big data is classified into different types according to the regularities of the distribution of data. The different stresses which have been subjected by the structure are used in this paper. Secondly, the structural interval reliability and probabilistic prediction models are established by using the stress-strength interference theory under big data of random loads after the stresses and structural strength are comprehensively considered. Structural reliability is computed More >

  • Open Access

    ARTICLE

    Bio-Inspired Computational Methods for the Polio Virus Epidemic Model

    Fatimah Abdulrahman Alrawajeh1, F. M. Allehiany2, Ali Raza3,*, Shaimaa A. M. Abdelmohsen4, Tahir Nawaz Cheema5, Muhammad Rafiq6, Muhammad Mohsin7

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2357-2374, 2022, DOI:10.32604/cmc.2022.024604 - 29 March 2022

    Abstract In 2021, most of the developing countries are fighting polio, and parents are concerned with the disabling of their children. Poliovirus transmits from person to person, which can infect the spinal cord, and paralyzes the parts of the body within a matter of hours. According to the World Health Organization (WHO), 18 million currently healthy people could have been paralyzed by the virus during 1988–2020. Almost all countries but Pakistan, Afghanistan, and a few more have been declared polio-free. The mathematical modeling of poliovirus is studied in the population by categorizing it as susceptible individuals… More >

  • Open Access

    ARTICLE

    Healthcare Device Security Assessment through Computational Methodology

    Masood Ahmad1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Sabita Khatri2, Adil Hussain Seh1, Mohd Nadeem1, Alka Agrawal1,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 811-828, 2022, DOI:10.32604/csse.2022.020097 - 25 October 2021

    Abstract The current study discusses the different methods used to secure healthcare devices and proposes a quantitative framework to list them in order of significances. The study uses the Hesitant Fuzzy (HF), Analytic Hierarchy Process (AHP) integrated with Fuzzy Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to classify the best alternatives to security techniques for healthcare devices to securing the devices. The technique is enlisted to rate the alternatives based on the degree of satisfaction of their weights. The ranks of the alternatives consequently decide the order of priority for the techniques. A1… More >

  • Open Access

    ARTICLE

    Predicting Genotype Information Related to COVID-19 for Molecular Mechanism Based on Computational Methods

    Lejun Gong1,2,*, Xingxing Zhang1, Li Zhang3, Zhihong Gao4

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 31-45, 2021, DOI:10.32604/cmes.2021.016622 - 24 August 2021

    Abstract Novel coronavirus disease 2019 (COVID-19) is an ongoing health emergency. Several studies are related to COVID-19. However, its molecular mechanism remains unclear. The rapid publication of COVID-19 provides a new way to elucidate its mechanism through computational methods. This paper proposes a prediction method for mining genotype information related to COVID-19 from the perspective of molecular mechanisms based on machine learning. The method obtains seed genes based on prior knowledge. Candidate genes are mined from biomedical literature. The candidate genes are scored by machine learning based on the similarities measured between the seed and candidate More >

  • Open Access

    ARTICLE

    Computational Methods for Non-Linear Equations with Some Real-World Applications and Their Graphical Analysis

    Amir Naseem1, M.A. Rehman1, Thabet Abdeljawad2,3,4,*

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 805-819, 2021, DOI:10.32604/iasc.2021.019164 - 20 August 2021

    Abstract In this article, we propose some novel computational methods in the form of iteration schemes for computing the roots of non-linear scalar equations in a new way. The construction of these iteration schemes is purely based on exponential series expansion. The convergence criterion of the suggested schemes is also given and certified that the newly developed iteration schemes possess quartic convergence order. To analyze the suggested schemes numerically, several test examples have been given and then solved. These examples also include some real-world problems such as van der Wall’s equation, Plank’s radiation law and kinetic More >

  • Open Access

    ARTICLE

    Managing Software Security Risks through an Integrated Computational Method

    Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 179-194, 2021, DOI:10.32604/iasc.2021.016646 - 17 March 2021

    Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must… More >

  • Open Access

    ABSTRACT

    Gas Sealing Behavior of Gasketed Segmental Joints in Shield Tunnels: An Experimental and Computational Study

    Wei Wu1,2,3, Yaji Jiao2,*, Hehua Zhu1,2,3, Rui Jin2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.21, No.2, pp. 33-33, 2019, DOI:10.32604/icces.2019.05324

    Abstract When shield tunnels pass through gas-bearing strata, leakage may happen through the gasketed segmental joints, which puts threats on the safety during construction and operation process. Previous studies on sealing performance of the gasketed joints have focused on the waterproof behavior. However, differences in physical characteristics between liquid and gas, lead to different permeation properties. This paper presents a combined experimental and computational study to investigate the gas sealing behavior of the gasketed joints used for a shield tunnel project, i.e., Sutong GIL Utility Tunnel, which passes through soft soil strata rich in high-pressure biogas… More >

  • Open Access

    ARTICLE

    Computational Methods in Engineering: A Variety of Primal & Mixed Methods, with Global & Local Interpolations, for Well-Posed or Ill-Posed BCs

    L. Dong1, A. Alotaibi2, S.A. Mohiuddine2, S. N. Atluri3

    CMES-Computer Modeling in Engineering & Sciences, Vol.99, No.1, pp. 1-85, 2014, DOI:10.3970/cmes.2014.099.001

    Abstract In this expository article, a variety of computational methods, such as Collocation, Finite Volume, Finite Element, Boundary Element, MLPG (Meshless Local Petrov Galerkin), Trefftz methods, and Method of Fundamental Solutions, etc., which are often used in isolated ways in contemporary literature are presented in a unified way, and are illustrated to solve a 4th order ordinary differential equation (beam on an elastic foundation). Both the primal formulation, which considers the 4th order ODE with displacement as the primitive variable, as well as two types of mixed formulations (one resulting in a set of 2 second-order ODEs,… More >

Displaying 1-10 on page 1 of 19. Per Page