Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (51)
  • Open Access

    ARTICLE

    Experimental and Numerical Analysis of Particle Migration and Patterning Behavior in a Gravel Pack

    Bobo Luo1,*, Yunbin Xiong1, Zhuoyi Li2, Zhanqing Qu3, Fenggang Liu1, Tiankui Guo3, Zugui Yang1, Yina Shi1

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.4, pp. 911-928, 2023, DOI:10.32604/fdmp.2022.022761

    Abstract Due to its long lifespan and high sand-removal efficiency, gravel packing is one of the most applied sand control methods during the recovery of reservoirs with sanding problems. The blockage and retention of injected sand in a gravel pack is a complex process affected by multiple mechanisms. The majority of existing studies based on the phenomenological deep bed filtration (DBF) theory focused on the gravel pack’s overall permeability damage and failed to obtain the inner-pore particle distribution pattern. In this work, experiments and simulations were carried out to reveal the particle distribution in a gravel pack during flooding. In particular,… More >

  • Open Access

    ARTICLE

    Forecasting Future Trajectories with an Improved Transformer Network

    Wei Wu1, Weigong Zhang1,*, Dong Wang1, Lydia Zhu2, Xiang Song3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3811-3828, 2023, DOI:10.32604/cmc.2023.029787

    Abstract An increase in car ownership brings convenience to people’s life. However, it also leads to frequent traffic accidents. Precisely forecasting surrounding agents’ future trajectories could effectively decrease vehicle-vehicle and vehicle-pedestrian collisions. Long-short-term memory (LSTM) network is often used for vehicle trajectory prediction, but it has some shortages such as gradient explosion and low efficiency. A trajectory prediction method based on an improved Transformer network is proposed to forecast agents’ future trajectories in a complex traffic environment. It realizes the transformation from sequential step processing of LSTM to parallel processing of Transformer based on attention mechanism. To perform trajectory prediction more… More >

  • Open Access

    REVIEW

    Overview of Earth-Moon Transfer Trajectory Modeling and Design

    Jiye Zhang, Huichang Yu, Honghua Dai*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 5-43, 2023, DOI:10.32604/cmes.2022.022585

    Abstract The Moon is the only celestial body that human beings have visited. The design of the Earth-Moon transfer orbits is a critical issue in lunar exploration missions. In the 21st century, new lunar missions including the construction of the lunar space station, the permanent lunar base, and the Earth-Moon transportation network have been proposed, requiring low-cost, expansive launch windows and a fixed arrival epoch for any launch date within the launch window. The low-energy and low-thrust transfers are promising strategies to satisfy the demands. This review provides a detailed landscape of Earth-Moon transfer trajectory design processes, from the traditional patched… More >

  • Open Access

    ARTICLE

    Interactive Trajectory Star Coordinates i-tStar and Its Extension i-tStar (3D)

    Jing He1,2, Haonan Chen3,*, Lingxiao Li4, Yebin Zou5

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 211-237, 2023, DOI:10.32604/cmes.2022.020597

    Abstract There are many sources of geographic big data, and most of them come from heterogeneous environments. The data sources obtained in this case contain attribute information of different spatial scales, different time scales and different complexity levels. It is worth noting that the emergence of new high-dimensional trajectory data types and the increasing number of details are becoming more difficult. In this case, visualizing high-dimensional spatiotemporal trajectory data is extremely challenging. Therefore, i-tStar and its extension i-tStar (3D) proposed, a trajectory behavior feature for moving objects that are integrated into a view with less effort to display and extract spatiotemporal… More > Graphic Abstract

    Interactive Trajectory Star Coordinates i-tStar and Its Extension i-tStar (3D)

  • Open Access

    ARTICLE

    Tracking Pedestrians Under Occlusion in Parking Space

    Zhengshu Zhou1,*, Shunya Yamada2, Yousuke Watanabe2, Hiroaki Takada1,2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2109-2127, 2023, DOI:10.32604/csse.2023.029005

    Abstract Many traffic accidents occur in parking lots. One of the serious safety risks is vehicle-pedestrian conflict. Moreover, with the increasing development of automatic driving and parking technology, parking safety has received significant attention from vehicle safety analysts. However, pedestrian protection in parking lots still faces many challenges. For example, the physical structure of a parking lot may be complex, and dead corners would occur when the vehicle density is high. These lead to pedestrians’ sudden appearance in the vehicle’s path from an unexpected position, resulting in collision accidents in the parking lot. We advocate that besides vehicular sensing data, high-precision… More >

  • Open Access

    ARTICLE

    A Traceable Capability-based Access Control for IoT

    Chao Li1, Fan Li1,2, Cheng Huang3, Lihua Yin1,*, Tianjie Luo1,2, Bin Wang4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4967-4982, 2022, DOI:10.32604/cmc.2022.023496

    Abstract Delegation mechanism in Internet of Things (IoT) allows users to share some of their permissions with others. Cloud-based delegation solutions require that only the user who has registered in the cloud can be delegated permissions. It is not convenient when a permission is delegated to a large number of temporarily users. Therefore, some works like CapBAC delegate permissions locally in an offline way. However, this is difficult to revoke and modify the offline delegated permissions. In this work, we propose a traceable capability-based access control approach (TCAC) that can revoke and modify permissions by tracking the trajectories of permissions delegation.… More >

  • Open Access

    ARTICLE

    Generating Synthetic Trajectory Data Using GRU

    Xinyao Liu1, Baojiang Cui1,*, Lantao Xing2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 295-305, 2022, DOI:10.32604/iasc.2022.020032

    Abstract With the rise of mobile network, user location information plays an increasingly important role in various mobile services. The analysis of mobile users’ trajectories can help develop many novel services or applications, such as targeted advertising recommendations, location-based social networks, and intelligent navigation. However, privacy issues limit the sharing of such data. The release of location data resulted in disclosing users’ privacy, such as home addresses, medical records, and other living habits. That promotes the development of trajectory generators, which create synthetic trajectory data by simulating moving objects. At current, there are some disadvantages in the process of generation. The… More >

  • Open Access

    ARTICLE

    The Intelligent Trajectory Optimization of Multistage Rocket with Gauss Pseudo-Spectral Method

    Lihua Zhu1,*, Yu Wang1, Zhiqiang Wu1, Cheire Cheng2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 291-303, 2022, DOI:10.32604/iasc.2022.024252

    Abstract The rapid developments of artificial intelligence in the last decade are influencing aerospace engineering to a great extent and research in this context is proliferating. In this paper, the trajectory optimization of a three-stage launch vehicle in the powering phase subject to the sun-synchronous orbit is considered. To solve the optimal control problem, the Gauss pseudo-spectral method (GPM) is used to transform the optimization model to a nonlinear programming (NLP) problem and sequential quadratic programming is applied to find the optimal solution. However, the sensitivity of the initial guess may cost the solver significant time to do the Newton iteration… More >

  • Open Access

    ARTICLE

    A Novel Method of User Identity Recognition Based on Finger Trajectory

    Xia Zhou1, Zijian Wang2, Tianyu Wang2, Jin Han2,*, Zhiling Wang2, Yannan Qian3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 473-481, 2022, DOI:10.32604/iasc.2022.022493

    Abstract User identity recognition is the key shield to protect users’ privacy data from disclosure and embezzlement. The user identity of mobile devices such as mobile phones mainly includes fingerprint recognition, nine-grid password, face recognition, digital password, etc. Due to the requirements of computing resources and convenience of mobile devices, these verification methods have their own shortcomings. In this paper, a user identity recognition technology based on finger trajectory is proposed. Based on the analysis of the users’ finger trajectory data, the feature of the user's finger movement trajectory is extracted to realize the identification of the user. Also, in this… More >

  • Open Access

    ARTICLE

    SOINN-Based Abnormal Trajectory Detection for Efficient Video Condensation

    Chin-Shyurng Fahn1, Chang-Yi Kao2,*, Meng-Luen Wu3, Hao-En Chueh4

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 451-463, 2022, DOI:10.32604/csse.2022.022368

    Abstract With the evolution of video surveillance systems, the requirement of video storage grows rapidly; in addition, safe guards and forensic officers spend a great deal of time observing surveillance videos to find abnormal events. As most of the scene in the surveillance video are redundant and contains no information needs attention, we propose a video condensation method to summarize the abnormal events in the video by rearranging the moving trajectory and sort them by the degree of anomaly. Our goal is to improve the condensation rate to reduce more storage size, and increase the accuracy in abnormal detection. As the… More >

Displaying 11-20 on page 2 of 51. Per Page