Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (360)
  • Open Access

    ARTICLE

    Probabilistic-Ellipsoid Hybrid Reliability Multi-Material Topology Optimization Method Based on Stress Constraint

    Zibin Mao1, Qinghai Zhao1,2,*, Liang Zhang1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 757-792, 2024, DOI:10.32604/cmes.2024.048016

    Abstract This paper proposes a multi-material topology optimization method based on the hybrid reliability of the probability-ellipsoid model with stress constraint for the stochastic uncertainty and epistemic uncertainty of mechanical loads in optimization design. The probabilistic model is combined with the ellipsoidal model to describe the uncertainty of mechanical loads. The topology optimization formula is combined with the ordered solid isotropic material with penalization (ordered-SIMP) multi-material interpolation model. The stresses of all elements are integrated into a global stress measurement that approximates the maximum stress using the normalized p-norm function. Furthermore, the sequential optimization and reliability assessment (SORA) is applied to… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Fuzzy C-Means Clustering and Spatial Location Constraint Prototype Loss

    Thanh-Lam Nguyen1, Hao Kao1, Thanh-Tuan Nguyen2, Mong-Fong Horng1,*, Chin-Shiuh Shieh1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2181-2205, 2024, DOI:10.32604/cmc.2024.047387

    Abstract Since its inception, the Internet has been rapidly evolving. With the advancement of science and technology and the explosive growth of the population, the demand for the Internet has been on the rise. Many applications in education, healthcare, entertainment, science, and more are being increasingly deployed based on the internet. Concurrently, malicious threats on the internet are on the rise as well. Distributed Denial of Service (DDoS) attacks are among the most common and dangerous threats on the internet today. The scale and complexity of DDoS attacks are constantly growing. Intrusion Detection Systems (IDS) have been deployed and have demonstrated… More >

  • Open Access

    ARTICLE

    Adaptive Segmentation for Unconstrained Iris Recognition

    Mustafa AlRifaee1, Sally Almanasra2,*, Adnan Hnaif3, Ahmad Althunibat3, Mohammad Abdallah3, Thamer Alrawashdeh3

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1591-1609, 2024, DOI:10.32604/cmc.2023.043520

    Abstract In standard iris recognition systems, a cooperative imaging framework is employed that includes a light source with a near-infrared wavelength to reveal iris texture, look-and-stare constraints, and a close distance requirement to the capture device. When these conditions are relaxed, the system’s performance significantly deteriorates due to segmentation and feature extraction problems. Herein, a novel segmentation algorithm is proposed to correctly detect the pupil and limbus boundaries of iris images captured in unconstrained environments. First, the algorithm scans the whole iris image in the Hue Saturation Value (HSV) color space for local maxima to detect the sclera region. The image… More >

  • Open Access

    REVIEW

    A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices

    Sunil Kumar1, Dilip Kumar1, Ramraj Dangi2, Gaurav Choudhary3, Nicola Dragoni4, Ilsun You5,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 31-63, 2024, DOI:10.32604/cmc.2023.047084

    Abstract The widespread and growing interest in the Internet of Things (IoT) may be attributed to its usefulness in many different fields. Physical settings are probed for data, which is then transferred via linked networks. There are several hurdles to overcome when putting IoT into practice, from managing server infrastructure to coordinating the use of tiny sensors. When it comes to deploying IoT, everyone agrees that security is the biggest issue. This is due to the fact that a large number of IoT devices exist in the physical world and that many of them have constrained resources such as electricity, memory,… More >

  • Open Access

    REVIEW

    AI Fairness–From Machine Learning to Federated Learning

    Lalit Mohan Patnaik1,5, Wenfeng Wang2,3,4,5,6,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1203-1215, 2024, DOI:10.32604/cmes.2023.029451

    Abstract This article reviews the theory of fairness in AI–from machine learning to federated learning, where the constraints on precision AI fairness and perspective solutions are also discussed. For a reliable and quantitative evaluation of AI fairness, many associated concepts have been proposed, formulated and classified. However, the inexplicability of machine learning systems makes it almost impossible to include all necessary details in the modelling stage to ensure fairness. The privacy worries induce the data unfairness and hence, the biases in the datasets for evaluating AI fairness are unavoidable. The imbalance between algorithms’ utility and humanization has further reinforced such worries.… More >

  • Open Access

    ARTICLE

    Distribution Line Longitudinal Protection Method Based on Virtual Measurement Current Restraint

    Wei Wang1, Yang Yu1, Simin Luo2,*, Wenlin Liu2, Wei Tang1, Yuanbo Ye1

    Energy Engineering, Vol.121, No.2, pp. 315-337, 2024, DOI:10.32604/ee.2023.042082

    Abstract As an effective approach to achieve the “dual-carbon” goal, the grid-connected capacity of renewable energy increases constantly. Photovoltaics are the most widely used renewable energy sources and have been applied on various occasions. However, the inherent randomness, intermittency, and weak support of grid-connected equipment not only cause changes in the original flow characteristics of the grid but also result in complex fault characteristics. Traditional overcurrent and differential protection methods cannot respond accurately due to the effects of unknown renewable energy sources. Therefore, a longitudinal protection method based on virtual measurement of current restraint is proposed in this paper. The positive… More >

  • Open Access

    ARTICLE

    A Method of Integrating Length Constraints into Encoder-Decoder Transformer for Abstractive Text Summarization

    Ngoc-Khuong Nguyen1,2, Dac-Nhuong Le1, Viet-Ha Nguyen2, Anh-Cuong Le3,*

    Intelligent Automation & Soft Computing, Vol.38, No.1, pp. 1-18, 2023, DOI:10.32604/iasc.2023.037083

    Abstract Text summarization aims to generate a concise version of the original text. The longer the summary text is, the more detailed it will be from the original text, and this depends on the intended use. Therefore, the problem of generating summary texts with desired lengths is a vital task to put the research into practice. To solve this problem, in this paper, we propose a new method to integrate the desired length of the summarized text into the encoder-decoder model for the abstractive text summarization problem. This length parameter is integrated into the encoding phase at each self-attention step and… More >

  • Open Access

    PROCEEDINGS

    Fracture Behavior of Periodic Porous Structures by Phase Field Method

    Yuxuan Ying1, Wei Huang1,*, Yu-E Ma1, Fan Peng1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.4, pp. 1-3, 2023, DOI:10.32604/icces.2023.010572

    Abstract Intensive dynamic loadings are the main threats to the structural damage of protective structures and inner equipment, which has attracted a lot of attention in the field of advance impulsive resistance. Nanofluidic liquid foam (NLF) has become a novel and efficient energy absorption system due to its reusable energy absorption, ultra-high load transfer, and high energy absorption ratio. In order to solve the current problem that the energy absorption mechanism of NLF is still unclear, this paper conducted a systematic experimental study on the dynamic compression and energy absorption behaviours of NLF. The quasi-static cyclic compression experiments with different liquid… More >

  • Open Access

    PROCEEDINGS

    Effects of Friction and Strain Hardening on ELS Mode II Interlaminar Fracture Test

    Chennian Shi1, Wu Xu1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.4, pp. 1-2, 2023, DOI:10.32604/icces.2023.09634

    Abstract Accurate determination of the interlaminar mode II fracture toughness is much more difficult than that of mode I delamination, due to friction and crack closure. In this paper, A-scan is used to measure the crack growth length of end-loaded split (ELS) test through cyclic unloading and reloading. Interesting hysteresis loops are observed in the experimental load-displacement curve, which has not been fully understood by the existing literature. The frictional effect from the load fixture is analytically determined and numerically validated. It absorbs considerable energy during the creation of new crack surface, but has been overlooked. A simple method is proposed… More >

  • Open Access

    PROCEEDINGS

    Statistic Structural Damage Detection Of Functionally Graded EulerBernoulli Beams Based on Element Modal Strain Energy Sensitivity

    Zhongming Hu1,*, Leilei Chen1, Delei Yang1, Jichao Zhang1, Youyang Xin1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.4, pp. 1-3, 2023, DOI:10.32604/icces.2023.09340

    Abstract Functionally graded materials (FGMs), a kind of composite materials, were proposed to satisfy the requirements of thermal barrier materials initially [1-3]. Compared with traditional composites, the microstructure and mechanical characteristics of FGMs change continuously which make them present excellent performance in deformation resistance or toughness under extreme mechanical and thermal loadings [4]. Therefore, FGMs have been paid much attention and experienced rapid developments in the last decade. Nowadays, various structural components manufactured by FGMs have been used in extensive applications, such as aerospace, bioengineering, nuclear industries, civil constructions etc. [5-7]
    While, FG Euler-Bernoulli beams maybe suffer damage in practical… More >

Displaying 1-10 on page 1 of 360. Per Page