Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Applying the Shearlet-Based Complexity Measure for Analyzing Mass Transfer in Continuous-Flow Microchannels

    Elena Mosheva1,*, Ivan Krasnyakov2

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.8, pp. 1743-1758, 2024, DOI:10.32604/fdmp.2024.049146

    Abstract Continuous-flow microchannels are widely employed for synthesizing various materials, including nanoparticles, polymers, and metal-organic frameworks (MOFs), to name a few. Microsystem technology allows precise control over reaction parameters, resulting in purer, more uniform, and structurally stable products due to more effective mass transfer manipulation. However, continuous-flow synthesis processes may be accompanied by the emergence of spatial convective structures initiating convective flows. On the one hand, convection can accelerate reactions by intensifying mass transfer. On the other hand, it may lead to non-uniformity in the final product or defects, especially in MOF microcrystal synthesis. The ability… More > Graphic Abstract

    Applying the Shearlet-Based Complexity Measure for Analyzing Mass Transfer in Continuous-Flow Microchannels

  • Open Access

    ARTICLE

    Towards Improving Predictive Statistical Learning Model Accuracy by Enhancing Learning Technique

    Ali Algarni1, Mahmoud Ragab2,3,4,*, Wardah Alamri5, Samih M. Mostafa6

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 303-318, 2022, DOI:10.32604/csse.2022.022152

    Abstract The accuracy of the statistical learning model depends on the learning technique used which in turn depends on the dataset’s values. In most research studies, the existence of missing values (MVs) is a vital problem. In addition, any dataset with MVs cannot be used for further analysis or with any data driven tool especially when the percentage of MVs are high. In this paper, the authors propose a novel algorithm for dealing with MVs depending on the feature selection (FS) of similarity classifier with fuzzy entropy measure. The proposed algorithm imputes MVs in cumulative order.… More >

  • Open Access

    ARTICLE

    Emergency Decision-Making Based on q-Rung Orthopair Fuzzy Rough Aggregation Information

    Ahmed B. Khoshaim1, Saleem Abdullah2, Shahzaib Ashraf3,*, Muhammad Naeem4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 4077-4094, 2021, DOI:10.32604/cmc.2021.016973

    Abstract With the frequent occurrences of emergency events, emergency decision making (EDM) plays an increasingly significant role in coping with such situations and has become an important and challenging research area in recent times. It is essential for decision makers to make reliable and reasonable emergency decisions within a short span of time, since inappropriate decisions may result in enormous economic losses and social disorder. To handle emergency effectively and quickly, this paper proposes a new EDM method based on the novel concept of q-rung orthopair fuzzy rough (q-ROPR) set. A novel list of q-ROFR aggregation… More >

  • Open Access

    ARTICLE

    Active Detecting DDoS Attack Approach Based on Entropy Measurement for the Next Generation Instant Messaging App on Smartphones

    Hsing‐Chung Chen1,2, Shyi‐Shiun Kuo1,3

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 217-228, 2019, DOI:10.31209/2018.100000057

    Abstract Nowadays, more and more smartphones communicate to each other’s by using some popular Next Generation Instant Messaging (NGIM) applications (Apps) which are based on the blockchain (BC) technologies, such as XChat, via IPv4/IPv6 dual stack network environments. Owing to XChat addresses are soon to be implemented as stealth addresses, any DoS attack activated form malicious XChat node will be treated as a kind of DDoS attack. Therefore, the huge NGIM usages with stealth addresses in IPv4/IPv6 dual stack mobile networks, mobile devices will suffer the Distributed Denial of Service (DDoS) attack from Internet. The probing More >

Displaying 1-10 on page 1 of 4. Per Page