Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (156)
  • Open Access

    CORRECTION

    Correction: A “Parallel Universe” Scheme for Crack Nucleation in the Phase Field Method for Fracture

    Yihao Chen1, Yongxing Shen1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.2, pp. 1-1, 2024, DOI:10.32604/icces.2024.011251

    Abstract The phase field method for fracture has become mainstream for fracture simulation. It transforms the crack nucleation problem into a minimization problem of the sum of the elastic potential energy and the crack surface energy. Because of the biconvexity of its energy functional, there is an energy barrier between local minima with and without a crack, resulting it difficult for standard methods, such as the Newton method, to converge to a cracked solution when starting from a solid without crack, especially when the material and the geometry are uniform, even if current cracked solution with… More >

  • Open Access

    ARTICLE

    Optimizing Internet of Things Device Security with a Globalized Firefly Optimization Algorithm for Attack Detection

    Arkan Kh Shakr Sabonchi*

    Journal on Artificial Intelligence, Vol.6, pp. 261-282, 2024, DOI:10.32604/jai.2024.056552 - 18 October 2024

    Abstract The phenomenal increase in device connectivity is making the signaling and resource-based operational integrity of networks at the node level increasingly prone to distributed denial of service (DDoS) attacks. The current growth rate in the number of Internet of Things (IoT) attacks executed at the time of exchanging data over the Internet represents massive security hazards to IoT devices. In this regard, the present study proposes a new hybrid optimization technique that combines the firefly optimization algorithm with global searches for use in attack detection on IoT devices. We preprocessed two datasets, CICIDS and UNSW-NB15,… More >

  • Open Access

    PROCEEDINGS

    Uncertainty Quantification of Complex Engineering Structures Using PCE-HDMR

    Xinxin Yue1, Jian Zhang2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.4, pp. 1-2, 2024, DOI:10.32604/icces.2024.011344

    Abstract The "curse of dimensionality" faced by high-dimensional complex engineering problems can be tackled by a set of quantitative model evaluation and analysis tools named high-dimensional model representation (HDMR) [1,2], which has attracted much attention from researchers in various fields, such as global sensitivity analysis (GSA) [3], structural reliability analysis (SRA) [4], CFD uncertainty quantification [5] and so on [6]. In this paper, a new method for uncertainty quantification is proposed. Firstly, PCE-HDMR for SRA is developed by taking advantage of the accuracy and efficiency of PCE-HDMR for modeling high-dimensional problems [7]. Secondly, the formulas for… More >

  • Open Access

    ARTICLE

    A Dynamical Study of Modeling the Transmission of Typhoid Fever through Delayed Strategies

    Muhammad Tashfeen1, Fazal Dayan1, Muhammad Aziz Ur Rehman1, Thabet Abdeljawad2,3,4,5,*, Aiman Mukheimer2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1419-1446, 2024, DOI:10.32604/cmes.2024.053242 - 27 September 2024

    Abstract This study analyzes the transmission of typhoid fever caused by Salmonella typhi using a mathematical model that highlights the significance of delay in its effectiveness. Time delays can affect the nature of patterns and slow down the emergence of patterns in infected population density. The analyzed model is expanded with the equilibrium analysis, reproduction number, and stability analysis. This study aims to establish and explore the non-standard finite difference (NSFD) scheme for the typhoid fever virus transmission model with a time delay. In addition, the forward Euler method and Runge-Kutta method of order 4 (RK-4)… More >

  • Open Access

    ARTICLE

    Assessment of Low Global Warming Potential Refrigerants for Waste Heat Recovery in Data Center with On-Chip Two-Phase Cooling Loop

    Yuming Zhao1, Jing Wang1, Bin Sun2, Zhenshang Wang1, Huashan Li2, Jiongcong Chen2,*

    Frontiers in Heat and Mass Transfer, Vol.22, No.4, pp. 1171-1188, 2024, DOI:10.32604/fhmt.2024.054594 - 30 August 2024

    Abstract Data centers (DCs) are highly energy-intensive facilities, where about 30%–50% of the power consumed is attributable to the cooling of information technology equipment. This makes liquid cooling, especially in two-phase mode, as an alternative to air cooling for the microprocessors in servers of interest. The need to meet the increased power density of server racks in high-performance DCs, along with the push towards lower global warming potential (GWP) refrigerants due to environmental concerns, has motivated research on the selection of two-phase heat transfer fluids for cooling servers while simultaneously recovering waste heat. With this regard,… More >

  • Open Access

    ARTICLE

    BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems

    Farouq Zitouni1,*, Saad Harous2, Abdulaziz S. Almazyad3, Ali Wagdy Mohamed4,5, Guojiang Xiong6, Fatima Zohra Khechiba1, Khadidja Kherchouche1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 219-265, 2024, DOI:10.32604/cmes.2024.052001 - 20 August 2024

    Abstract Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization problems. This approach aims to leverage the strengths of multiple algorithms, enhancing solution quality, convergence speed, and robustness, thereby offering a more versatile and efficient means of solving intricate real-world optimization tasks. In this paper, we introduce a hybrid algorithm that amalgamates three distinct metaheuristics: the Beluga Whale Optimization (BWO), the Honey Badger Algorithm (HBA), and the Jellyfish Search (JS) optimizer. The proposed hybrid algorithm will be referred to as BHJO. Through this fusion, the BHJO algorithm aims to… More >

  • Open Access

    ARTICLE

    A Multi-Strategy-Improved Northern Goshawk Optimization Algorithm for Global Optimization and Engineering Design

    Liang Zeng1,2, Mai Hu1, Chenning Zhang1, Quan Yuan1, Shanshan Wang1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1677-1709, 2024, DOI:10.32604/cmc.2024.049717 - 18 July 2024

    Abstract Optimization algorithms play a pivotal role in enhancing the performance and efficiency of systems across various scientific and engineering disciplines. To enhance the performance and alleviate the limitations of the Northern Goshawk Optimization (NGO) algorithm, particularly its tendency towards premature convergence and entrapment in local optima during function optimization processes, this study introduces an advanced Improved Northern Goshawk Optimization (INGO) algorithm. This algorithm incorporates a multifaceted enhancement strategy to boost operational efficiency. Initially, a tent chaotic map is employed in the initialization phase to generate a diverse initial population, providing high-quality feasible solutions. Subsequently, after… More >

  • Open Access

    ARTICLE

    Enhancing Secure Development in Globally Distributed Software Product Lines: A Machine Learning-Powered Framework for Cyber-Resilient Ecosystems

    Marya Iqbal1, Yaser Hafeez1, Nabil Almashfi2, Amjad Alsirhani3, Faeiz Alserhani4, Sadia Ali1, Mamoona Humayun5,*, Muhammad Jamal6

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5031-5049, 2024, DOI:10.32604/cmc.2024.051371 - 20 June 2024

    Abstract Embracing software product lines (SPLs) is pivotal in the dynamic landscape of contemporary software development. However, the flexibility and global distribution inherent in modern systems pose significant challenges to managing SPL variability, underscoring the critical importance of robust cybersecurity measures. This paper advocates for leveraging machine learning (ML) to address variability management issues and fortify the security of SPL. In the context of the broader special issue theme on innovative cybersecurity approaches, our proposed ML-based framework offers an interdisciplinary perspective, blending insights from computing, social sciences, and business. Specifically, it employs ML for demand analysis, More >

  • Open Access

    ARTICLE

    SGT-Net: A Transformer-Based Stratified Graph Convolutional Network for 3D Point Cloud Semantic Segmentation

    Suyi Liu1,*, Jianning Chi1, Chengdong Wu1, Fang Xu2,3,4, Xiaosheng Yu1

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4471-4489, 2024, DOI:10.32604/cmc.2024.049450 - 20 June 2024

    Abstract In recent years, semantic segmentation on 3D point cloud data has attracted much attention. Unlike 2D images where pixels distribute regularly in the image domain, 3D point clouds in non-Euclidean space are irregular and inherently sparse. Therefore, it is very difficult to extract long-range contexts and effectively aggregate local features for semantic segmentation in 3D point cloud space. Most current methods either focus on local feature aggregation or long-range context dependency, but fail to directly establish a global-local feature extractor to complete the point cloud semantic segmentation tasks. In this paper, we propose a Transformer-based… More >

  • Open Access

    ARTICLE

    Path-Based Clustering Algorithm with High Scalability Using the Combined Behavior of Evolutionary Algorithms

    Leila Safari-Monjeghtapeh1, Mansour Esmaeilpour2,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 705-721, 2024, DOI:10.32604/csse.2024.044892 - 20 May 2024

    Abstract Path-based clustering algorithms typically generate clusters by optimizing a benchmark function. Most optimization methods in clustering algorithms often offer solutions close to the general optimal value. This study achieves the global optimum value for the criterion function in a shorter time using the minimax distance, Maximum Spanning Tree “MST”, and meta-heuristic algorithms, including Genetic Algorithm “GA” and Particle Swarm Optimization “PSO”. The Fast Path-based Clustering “FPC” algorithm proposed in this paper can find cluster centers correctly in most datasets and quickly perform clustering operations. The FPC does this operation using MST, the minimax distance, and… More >

Displaying 1-10 on page 1 of 156. Per Page