Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (161)
  • Open Access

    ARTICLE

    Stability and Error Analysis of Reduced-Order Methods Based on POD with Finite Element Solutions for Nonlocal Diffusion Problems

    Haolun Zhang1, Mengna Yang1, Jie Wei2, Yufeng Nie2,*

    Digital Engineering and Digital Twin, Vol.2, pp. 49-77, 2024, DOI:10.32604/dedt.2023.044180

    Abstract This paper mainly considers the formulation and theoretical analysis of the reduced-order numerical method constructed by proper orthogonal decomposition (POD) for nonlocal diffusion problems with a finite range of nonlocal interactions. We first set up the classical finite element discretization for nonlocal diffusion equations and briefly explain the difference between nonlocal and partial differential equations (PDEs). Nonlocal models have to handle double integrals when using finite element methods (FEMs), which causes the generation of algebraic systems to be more challenging and time-consuming, and discrete systems have less sparsity than those for PDEs. So we establish a reduced-order model (ROM) for… More >

  • Open Access

    ARTICLE

    A Novel Fractional Dengue Transmission Model in the Presence of Wolbachia Using Stochastic Based Artificial Neural Network

    Zeshan Faiz1, Iftikhar Ahmed1, Dumitru Baleanu2,3,4, Shumaila Javeed1,5,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1217-1238, 2024, DOI:10.32604/cmes.2023.029879

    Abstract The purpose of this research work is to investigate the numerical solutions of the fractional dengue transmission model (FDTM) in the presence of Wolbachia using the stochastic-based Levenberg-Marquardt neural network (LM-NN) technique. The fractional dengue transmission model (FDTM) consists of 12 compartments. The human population is divided into four compartments; susceptible humans (Sh), exposed humans (Eh), infectious humans (Ih), and recovered humans (Rh). Wolbachia-infected and Wolbachia-uninfected mosquito population is also divided into four compartments: aquatic (eggs, larvae, pupae), susceptible, exposed, and infectious. We investigated three different cases of vertical transmission probability (η), namely when Wolbachia-free mosquitoes persist only (η =… More >

  • Open Access

    ARTICLE

    Interval Type-2 Fuzzy Model for Intelligent Fire Intensity Detection Algorithm with Decision Making in Low-Power Devices

    Emmanuel Lule1,2,*, Chomora Mikeka3, Alexander Ngenzi4, Didacienne Mukanyiligira5

    Intelligent Automation & Soft Computing, Vol.38, No.1, pp. 57-81, 2023, DOI:10.32604/iasc.2023.037988

    Abstract Local markets in East Africa have been destroyed by raging fires, leading to the loss of life and property in the nearby communities. Electrical circuits, arson, and neglected charcoal stoves are the major causes of these fires. Previous methods, i.e., satellites, are expensive to maintain and cause unnecessary delays. Also, unit-smoke detectors are highly prone to false alerts. In this paper, an Interval Type-2 TSK fuzzy model for an intelligent lightweight fire intensity detection algorithm with decision-making in low-power devices is proposed using a sparse inference rules approach. A free open–source MATLAB/Simulink fuzzy toolbox integrated into MATLAB 2018a is used… More >

  • Open Access

    ARTICLE

    Research on Condenser Deterioration Evolution Trend Based on ANP-EWM Fusion Health Degree

    Hong Qian1,2, Haixin Wang1,*, Guangji Wang3, Qingyun Yan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 679-698, 2024, DOI:10.32604/cmes.2023.043377

    Abstract This study presents a proposed method for assessing the condition and predicting the future status of condensers operating in seawater over an extended period. The aim is to address the problems of scaling and corrosion, which lead to increased loss of cold resources. The method involves utilising a set of multivariate feature parameters associated with the condenser as input for evaluation and trend prediction. This methodology offers a precise means of determining the optimal timing for condenser cleaning, with the ultimate goal of improving its overall performance. The proposed approach involves the integration of the analytic network process with subjective… More >

  • Open Access

    REVIEW

    An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces

    Sheetal Sharma1,2, Kamali Gupta1, Deepali Gupta1, Shalli Rani1,*, Gaurav Dhiman3,4,5,6,7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2029-2059, 2024, DOI:10.32604/cmes.2023.029997

    Abstract The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making them more intelligent and connected. However, this advancement comes with challenges related to the effectiveness of IoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensure their proper functionality. The success of smart systems relies on their seamless operation and ability to handle faults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore, sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments. To address these concerns, various techniques and… More > Graphic Abstract

    An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces

  • Open Access

    ARTICLE

    Modelling and Performance Analysis of Visible Light Communication System in Industrial Implementations

    Mohammed S. M. Gismalla1,2, Asrul I. Azmi1,2, Mohd R. Salim1,2, Farabi Iqbal1,2, Mohammad F. L. Abdullah3, Mosab Hamdan4,5, Muzaffar Hamzah4,*, Abu Sahmah M. Supa’at1,2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2189-2204, 2023, DOI:10.32604/cmc.2023.035250

    Abstract Visible light communication (VLC) has a paramount role in industrial implementations, especially for better energy efficiency, high speed-data rates, and low susceptibility to interference. However, since studies on VLC for industrial implementations are in scarcity, areas concerning illumination optimisation and communication performances demand further investigation. As such, this paper presents a new modelling of light fixture distribution for a warehouse model to provide acceptable illumination and communication performances. The proposed model was evaluated based on various semi-angles at half power (SAAHP) and different height levels for several parameters, including received power, signal to noise ratio (SNR), and bit error rate… More >

  • Open Access

    ARTICLE

    Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset

    Mohammed Abdalsalam1,*, Chunlin Li1, Abdelghani Dahou2, Natalia Kryvinska3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1427-1467, 2024, DOI:10.32604/cmes.2023.029911

    Abstract One of the biggest dangers to society today is terrorism, where attacks have become one of the most significant risks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) have become the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management, medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related, initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terrorist attacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database… More >

  • Open Access

    ARTICLE

    A Robust Conformer-Based Speech Recognition Model for Mandarin Air Traffic Control

    Peiyuan Jiang1, Weijun Pan1,*, Jian Zhang1, Teng Wang1, Junxiang Huang2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 911-940, 2023, DOI:10.32604/cmc.2023.041772

    Abstract

    This study aims to address the deviation in downstream tasks caused by inaccurate recognition results when applying Automatic Speech Recognition (ASR) technology in the Air Traffic Control (ATC) field. This paper presents a novel cascaded model architecture, namely Conformer-CTC/Attention-T5 (CCAT), to build a highly accurate and robust ATC speech recognition model. To tackle the challenges posed by noise and fast speech rate in ATC, the Conformer model is employed to extract robust and discriminative speech representations from raw waveforms. On the decoding side, the Attention mechanism is integrated to facilitate precise alignment between input features and output characters. The Text-To-Text… More >

  • Open Access

    ARTICLE

    Energy Efficient and Intelligent Mosquito Repellent Fuzzy Control System

    Aaqib Inam1, Zhu Li1,*, Salah-ud-din Khokhar2, Zubia Zafar3, Muhammad Imran4

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 699-715, 2023, DOI:10.32604/cmc.2023.039707

    Abstract Mosquitoes are of great concern for occasionally carrying noxious diseases (dengue, malaria, zika, and yellow fever). To control mosquitoes, it is very crucial to effectively monitor their behavioral trends and presence. Traditional mosquito repellent works by heating small pads soaked in repellant, which then diffuses a protected area around you, a great alternative to spraying yourself with insecticide. But they have limitations, including the range, turning them on manually, and then waiting for the protection to kick in when the mosquitoes may find you. This research aims to design a fuzzy-based controller to solve the above issues by automatically determining… More >

  • Open Access

    ARTICLE

    Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services

    Jinqiu Hou1, Changgen Peng1,*, Weijie Tan1,2, Hongfa Ding3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 917-938, 2024, DOI:10.32604/cmes.2023.027276

    Abstract Cloud-based services have powerful storage functions and can provide accurate computation. However, the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight. Although the attribute-based proxy re-encryption (ABPRE) schemes based on number theory can solve this problem, it is still difficult to resist quantum attacks and have limited expression capabilities. To address these issues, we present a novel linear secret sharing schemes (LSSS) matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research. Additionally, to detect the activities of illegal proxies, homomorphic signature (HS) technology is… More >

Displaying 1-10 on page 1 of 161. Per Page