Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (654)
  • Open Access

    ARTICLE

    Dynamic Interaction Analysis of Coupled Axial-Torsional-Lateral Mechanical Vibrations in Rotary Drilling Systems

    Sabrina Meddah1,2,*, Sid Ahmed Tadjer3, Abdelhakim Idir4, Kong Fah Tee5,6,*, Mohamed Zinelabidine Doghmane1, Madjid Kidouche1

    Structural Durability & Health Monitoring, Vol.19, No.1, pp. 77-103, 2025, DOI:10.32604/sdhm.2024.053541 - 15 November 2024

    Abstract Maintaining the integrity and longevity of structures is essential in many industries, such as aerospace, nuclear, and petroleum. To achieve the cost-effectiveness of large-scale systems in petroleum drilling, a strong emphasis on structural durability and monitoring is required. This study focuses on the mechanical vibrations that occur in rotary drilling systems, which have a substantial impact on the structural integrity of drilling equipment. The study specifically investigates axial, torsional, and lateral vibrations, which might lead to negative consequences such as bit-bounce, chaotic whirling, and high-frequency stick-slip. These events not only hinder the efficiency of drilling… More >

  • Open Access

    ARTICLE

    Rapid Parameter-Optimizing Strategy for Plug-and-Play Devices in DC Distribution Systems under the Background of Digital Transformation

    Zhi Li1, Yufei Zhao2, Yueming Ji2, Hanwen Gu2, Zaibin Jiao2,*

    Energy Engineering, Vol.121, No.12, pp. 3899-3927, 2024, DOI:10.32604/ee.2024.055899 - 22 November 2024

    Abstract By integrating advanced digital technologies such as cloud computing and the Internet of Things in sensor measurement, information communication, and other fields, the digital DC distribution network can efficiently and reliably access Distributed Generator (DG) and Energy Storage Systems (ESS), exhibiting significant advantages in terms of controllability and meeting requirements of Plug-and-Play (PnP) operations. However, during device plug-in and -out processes, improper system parameters may lead to small-signal stability issues. Therefore, before executing PnP operations, conducting stability analysis and adjusting parameters swiftly is crucial. This study introduces a four-stage strategy for parameter optimization to enhance… More >

  • Open Access

    ARTICLE

    Modeling, Simulation, and Risk Analysis of Battery Energy Storage Systems in New Energy Grid Integration Scenarios

    Xiaohui Ye1,*, Fucheng Tan1, Xinli Song2, Hanyang Dai2, Xia Li2, Shixia Mu2, Shaohang Hao2

    Energy Engineering, Vol.121, No.12, pp. 3689-3710, 2024, DOI:10.32604/ee.2024.055200 - 22 November 2024

    Abstract Energy storage batteries can smooth the volatility of renewable energy sources. The operating conditions during power grid integration of renewable energy can affect the performance and failure risk of battery energy storage system (BESS). However, the current modeling of grid-connected BESS is overly simplistic, typically only considering state of charge (SOC) and power constraints. Detailed lithium (Li)-ion battery cell models are computationally intensive and impractical for real-time applications and may not be suitable for power grid operating conditions. Additionally, there is a lack of real-time batteries risk assessment frameworks. To address these issues, in this… More >

  • Open Access

    ARTICLE

    Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

    Mohammed Amin Almaiah1,*, Leen Mohammad Saqr1, Leen Ahmad Al-Rawwash1, Layan Ahmed Altellawi1, Romel Al-Ali2,*, Omar Almomani3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3189-3220, 2024, DOI:10.32604/cmc.2024.057673 - 18 November 2024

    Abstract Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding… More >

  • Open Access

    ARTICLE

    Secure Transmission Scheme for Blocks in Blockchain-Based Unmanned Aerial Vehicle Communication Systems

    Ting Chen1, Shuna Jiang2, Xin Fan3,*, Jianchuan Xia2, Xiujuan Zhang2, Chuanwen Luo3, Yi Hong3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2195-2217, 2024, DOI:10.32604/cmc.2024.056960 - 18 November 2024

    Abstract In blockchain-based unmanned aerial vehicle (UAV) communication systems, the length of a block affects the performance of the blockchain. The transmission performance of blocks in the form of finite character segments is also affected by the block length. Therefore, it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems, especially in wireless environments involving UAVs. This paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during transmission. In our scheme, using a friendly jamming UAV… More >

  • Open Access

    REVIEW

    Computing Challenges of UAV Networks: A Comprehensive Survey

    Altaf Hussain1, Shuaiyong Li2, Tariq Hussain3, Xianxuan Lin4,*, Farman Ali5,*, Ahmad Ali AlZubi6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1999-2051, 2024, DOI:10.32604/cmc.2024.056183 - 18 November 2024

    Abstract Devices and networks constantly upgrade, leading to rapid technological evolution. Three-dimensional (3D) point cloud transmission plays a crucial role in aerial computing terminology, facilitating information exchange. Various network types, including sensor networks and 5G mobile networks, support this transmission. Notably, Flying Ad hoc Networks (FANETs) utilize Unmanned Aerial Vehicles (UAVs) as nodes, operating in a 3D environment with Six Degrees of Freedom (6DoF). This study comprehensively surveys UAV networks, focusing on models for Light Detection and Ranging (LiDAR) 3D point cloud compression/transmission. Key topics covered include autonomous navigation, challenges in video streaming infrastructure, motivations for More >

  • Open Access

    REVIEW

    A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions

    Monirah Al-Ajlan*, Mourad Ykhlef

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2053-2076, 2024, DOI:10.32604/cmc.2024.055891 - 18 November 2024

    Abstract The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems (IDSs). IDSs have become a research hotspot and have seen remarkable performance improvements. Generative adversarial networks (GANs) have also garnered increasing research interest recently due to their remarkable ability to generate data. This paper investigates the application of (GANs) in (IDS) and explores their current use within this research field. We delve into the adoption of GANs within signature-based, anomaly-based, and hybrid IDSs, focusing on their objectives, methodologies, and advantages. Overall, GANs have been widely employed, mainly focused on solving the More >

  • Open Access

    PROCEEDINGS

    Bubble Dynamics Within a Droplet: A New Mechanism for Mixing in Binary Immiscible Fluid Systems

    Zhesheng Zhao1, Shuai Li1, Rui Han2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.2, pp. 1-1, 2024, DOI:10.32604/icces.2024.012080

    Abstract This study investigates the interactions between droplets and bubbles within water-in-oil (O/W) and oil-in-water (W/O) systems, a fundamental problem of bubble dynamics in binary immiscible fluid systems. Considering the density ratio between the two fluids and the bubble-to-droplet size ratio, we have refined the classical spherical bubble pulsation equation, Rayleigh collapse time, and the natural frequency. In our experimental study, we found that the Rayleigh-Taylor (RT) instability hardly develops on the surface of the droplet when the densities of the two liquids are comparable. This phenomenon is explained using the classic theory of spherical RT More >

  • Open Access

    PROCEEDINGS

    Microcarrier Systems for Cell Co-Culture Reveal Cell-Cell Interactions

    Zhanwu Hou1, Linfeng Xu2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.1, pp. 1-0, 2024, DOI:10.32604/icces.2024.012892

    Abstract The cell-cell interaction between immune cells and tumor cells in the tumor microenvironment plays an important role in the genesis and development of tumors. However, due to the lack of methods to systematically identify the interaction between the two, the specific molecular mechanisms involved are not well understood. The microfluidic platform provides a high-throughput and precise method for studying cell interactions in microreactive systems. However, the traditional platform for studying cell interactions is the closed droplet system, which is easy to cause the consumption of nutrients and the accumulation of wastes, thus interfering with cell… More >

  • Open Access

    ARTICLE

    Advanced BERT and CNN-Based Computational Model for Phishing Detection in Enterprise Systems

    Brij B. Gupta1,2,3,4,*, Akshat Gaurav5, Varsha Arya6,7, Razaz Waheeb Attar8, Shavi Bansal9, Ahmed Alhomoud10, Kwok Tai Chui11

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2165-2183, 2024, DOI:10.32604/cmes.2024.056473 - 31 October 2024

    Abstract Phishing attacks present a serious threat to enterprise systems, requiring advanced detection techniques to protect sensitive data. This study introduces a phishing email detection framework that combines Bidirectional Encoder Representations from Transformers (BERT) for feature extraction and CNN for classification, specifically designed for enterprise information systems. BERT’s linguistic capabilities are used to extract key features from email content, which are then processed by a convolutional neural network (CNN) model optimized for phishing detection. Achieving an accuracy of 97.5%, our proposed model demonstrates strong proficiency in identifying phishing emails. This approach represents a significant advancement in More >

Displaying 1-10 on page 1 of 654. Per Page