Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (88)
  • Open Access

    ARTICLE

    Research on Defect Detection of Wind Turbine Blades Based on Morphology and Improved Otsu Algorithm Using Infrared Images

    Shuang Kang1, Yinchao He1,2, Wenwen Li1,*, Sen Liu2

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 933-949, 2024, DOI:10.32604/cmc.2024.056614 - 15 October 2024

    Abstract To address the issues of low accuracy and high false positive rate in traditional Otsu algorithm for defect detection on infrared images of wind turbine blades (WTB), this paper proposes a technique that combines morphological image enhancement with an improved Otsu algorithm. First, mathematical morphology’s differential multi-scale white and black top-hat operations are applied to enhance the image. The algorithm employs entropy as the objective function to guide the iteration process of image enhancement, selecting appropriate structural element scales to execute differential multi-scale white and black top-hat transformations, effectively enhancing the detail features of defect… More >

  • Open Access

    ARTICLE

    Path Planning of Multi-Axis Robotic Arm Based on Improved RRT*

    Juanling Liang1, Wenguang Luo1,2,*, Yongxin Qin1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1009-1027, 2024, DOI:10.32604/cmc.2024.055883 - 15 October 2024

    Abstract An improved RRT* algorithm, referred to as the AGP-RRT* algorithm, is proposed to address the problems of poor directionality, long generated paths, and slow convergence speed in multi-axis robotic arm path planning. First, an adaptive biased probabilistic sampling strategy is adopted to dynamically adjust the target deviation threshold and optimize the selection of random sampling points and the direction of generating new nodes in order to reduce the search space and improve the search efficiency. Second, a gravitationally adjustable step size strategy is used to guide the search process and dynamically adjust the step-size to… More >

  • Open Access

    PROCEEDINGS

    Solving Advection-Diffusion Equation by Proper Generalized Decomposition with Coordinate Transformation

    Xinyi Guan1, Shaoqiang Tang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.29, No.1, pp. 1-1, 2024, DOI:10.32604/icces.2024.010869

    Abstract Inheriting a convergence difficulty explained by the Kolmogorov N-width [1], the advection-diffusion equation is not effectively solved by the Proper Generalized Decomposition [2] (PGD) method. In this paper, we propose a new strategy: Proper Generalized Decomposition with Coordinate Transformation (CT-PGD). Converting the mixed hyperbolic-parabolic equation to a parabolic one, it resumes the efficiency of convergence for advection-dominant problems. Combining PGD with CT-PGD, we solve advection-diffusion equation by much fewer degrees of freedom, hence improve the efficiency. The advection-dominant regime and diffusion-dominant regime are quantitatively classified by a threshold, computed numerically. Moreover, we find that appropriate More >

  • Open Access

    ARTICLE

    A Microseismic Signal Denoising Algorithm Combining VMD and Wavelet Threshold Denoising Optimized by BWOA

    Dijun Rao1,2,3,4, Min Huang1,2,3,5, Xiuzhi Shi4, Zhi Yu6,*, Zhengxiang He7

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 187-217, 2024, DOI:10.32604/cmes.2024.051402 - 20 August 2024

    Abstract The denoising of microseismic signals is a prerequisite for subsequent analysis and research. In this research, a new microseismic signal denoising algorithm called the Black Widow Optimization Algorithm (BWOA) optimized Variational Mode Decomposition (VMD) joint Wavelet Threshold Denoising (WTD) algorithm (BVW) is proposed. The BVW algorithm integrates VMD and WTD, both of which are optimized by BWOA. Specifically, this algorithm utilizes VMD to decompose the microseismic signal to be denoised into several Band-Limited Intrinsic Mode Functions (BLIMFs). Subsequently, these BLIMFs whose correlation coefficients with the microseismic signal to be denoised are higher than a threshold… More >

  • Open Access

    ARTICLE

    Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance

    Linghong Kuang1,2, Wenlong Shi1,2, Jing Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3193-3219, 2024, DOI:10.32604/cmc.2024.054377 - 15 August 2024

    Abstract The Advanced Metering Infrastructure (AMI), as a crucial subsystem in the smart grid, is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers. However, with the advancement of information and communication technology, new security and privacy challenges have emerged for AMI. To address these challenges and enhance the security and privacy of user data in the smart grid, a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance (HPPM-AMICFA) is proposed in this paper. The proposed model integrates cloud and fog computing… More >

  • Open Access

    ARTICLE

    Multi-Level Image Segmentation Combining Chaotic Initialized Chimp Optimization Algorithm and Cauchy Mutation

    Shujing Li, Zhangfei Li, Wenhui Cheng, Chenyang Qi, Linguo Li*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2049-2063, 2024, DOI:10.32604/cmc.2024.051928 - 15 August 2024

    Abstract To enhance the diversity and distribution uniformity of initial population, as well as to avoid local extrema in the Chimp Optimization Algorithm (CHOA), this paper improves the CHOA based on chaos initialization and Cauchy mutation. First, Sin chaos is introduced to improve the random population initialization scheme of the CHOA, which not only guarantees the diversity of the population, but also enhances the distribution uniformity of the initial population. Next, Cauchy mutation is added to optimize the global search ability of the CHOA in the process of position (threshold) updating to avoid the CHOA falling More >

  • Open Access

    ARTICLE

    Vector Dominance with Threshold Searchable Encryption (VDTSE) for the Internet of Things

    Jingjing Nie1,*, Zhenhua Chen2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4763-4779, 2024, DOI:10.32604/cmc.2024.051181 - 20 June 2024

    Abstract The Internet of Medical Things (IoMT) is an application of the Internet of Things (IoT) in the medical field. It is a cutting-edge technique that connects medical sensors and their applications to healthcare systems, which is essential in smart healthcare. However, Personal Health Records (PHRs) are normally kept in public cloud servers controlled by IoMT service providers, so privacy and security incidents may be frequent. Fortunately, Searchable Encryption (SE), which can be used to execute queries on encrypted data, can address the issue above. Nevertheless, most existing SE schemes cannot solve the vector dominance threshold… More >

  • Open Access

    ARTICLE

    Vehicle Abnormal Behavior Detection Based on Dense Block and Soft Thresholding

    Yuanyao Lu1,*, Wei Chen2, Zhanhe Yu1, Jingxuan Wang1, Chaochao Yang2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5051-5066, 2024, DOI:10.32604/cmc.2024.050865 - 20 June 2024

    Abstract With the rapid advancement of social economies, intelligent transportation systems are gaining increasing attention. Central to these systems is the detection of abnormal vehicle behavior, which remains a critical challenge due to the complexity of urban roadways and the variability of external conditions. Current research on detecting abnormal traffic behaviors is still nascent, with significant room for improvement in recognition accuracy. To address this, this research has developed a new model for recognizing abnormal traffic behaviors. This model employs the R3D network as its core architecture, incorporating a dense block to facilitate feature reuse. This… More >

  • Open Access

    ARTICLE

    Evaluation of Well Spacing for Primary Development of Fractured Horizontal Wells in Tight Sandstone Gas Reservoirs

    Fang Li1,*, Juan Wu1, Haiyong Yi2, Lihong Wu2, Lingyun Du1, Yuan Zeng1

    FDMP-Fluid Dynamics & Materials Processing, Vol.20, No.5, pp. 1015-1030, 2024, DOI:10.32604/fdmp.2023.043256 - 07 June 2024

    Abstract Methods for horizontal well spacing calculation in tight gas reservoirs are still adversely affected by the complexity of related control factors, such as strong reservoir heterogeneity and seepage mechanisms. In this study, the stress sensitivity and threshold pressure gradient of various types of reservoirs are quantitatively evaluated through reservoir seepage experiments. On the basis of these experiments, a numerical simulation model (based on the special seepage mechanism) and an inverse dynamic reserve algorithm (with different equivalent drainage areas) were developed. The well spacing ranges of Classes I, II, and III wells in the Q gas More > Graphic Abstract

    Evaluation of Well Spacing for Primary Development of Fractured Horizontal Wells in Tight Sandstone Gas Reservoirs

  • Open Access

    ARTICLE

    Cluster Detection Method of Endogenous Security Abnormal Attack Behavior in Air Traffic Control Network

    Ruchun Jia1, Jianwei Zhang1,*, Yi Lin1, Yunxiang Han1, Feike Yang2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2523-2546, 2024, DOI:10.32604/cmc.2024.047543 - 15 May 2024

    Abstract In order to enhance the accuracy of Air Traffic Control (ATC) cybersecurity attack detection, in this paper, a new clustering detection method is designed for air traffic control network security attacks. The feature set for ATC cybersecurity attacks is constructed by setting the feature states, adding recursive features, and determining the feature criticality. The expected information gain and entropy of the feature data are computed to determine the information gain of the feature data and reduce the interference of similar feature data. An autoencoder is introduced into the AI (artificial intelligence) algorithm to encode and… More >

Displaying 1-10 on page 1 of 88. Per Page