Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (73)
  • Open Access

    ARTICLE

    Life-Cycle Bearing Capacity for Pre-Stressed T-beams Based on Full-Scale Destructive Test

    Yushan Ye1, Tao Gao1, Liankun Wang2, Junjie Ma2, Yingchun Cai2, Heng Liu2,*, Xiaoge Liu2

    Structural Durability & Health Monitoring, Vol.19, No.1, pp. 145-166, 2025, DOI:10.32604/sdhm.2024.053756 - 15 November 2024

    Abstract To investigate the evolution of load-bearing characteristics of pre-stressed beams throughout their service life and to provide a basis for accurately assessing the actual working state of damaged pre-stressed concrete T-beams, destructive tests were conducted on full-scale pre-stressed concrete beams. Based on the measurement and analysis of beam deflection, strain, and crack development under various loading levels during the research tests, combined with the verification coefficient indicators specified in the codes, the verification coefficients of bridges at different stages of damage can be examined. The results indicate that the T-beams experience complete, incomplete linear, and… More >

  • Open Access

    ARTICLE

    Fusion of Type-2 Neutrosophic Similarity Measure in Signatures Verification Systems: A New Forensic Document Analysis Paradigm

    Shahlaa Mashhadani1,*, Wisal Hashim Abdulsalam1, Oday Ali Hassen2, Saad M. Darwish3

    Intelligent Automation & Soft Computing, Vol.39, No.5, pp. 805-828, 2024, DOI:10.32604/iasc.2024.054611 - 31 October 2024

    Abstract Signature verification involves vague situations in which a signature could resemble many reference samples or might differ because of handwriting variances. By presenting the features and similarity score of signatures from the matching algorithm as fuzzy sets and capturing the degrees of membership, non-membership, and indeterminacy, a neutrosophic engine can significantly contribute to signature verification by addressing the inherent uncertainties and ambiguities present in signatures. But type-1 neutrosophic logic gives these membership functions fixed values, which could not adequately capture the various degrees of uncertainty in the characteristics of signatures. Type-1 neutrosophic representation is also… More >

  • Open Access

    ARTICLE

    Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks

    Vincent Omollo Nyangaresi1,2, Arkan A. Ghaib3, Hend Muslim Jasim4, Zaid Ameen Abduljabbar4,5,6,*, Junchao Ma5,*, Mustafa A. Al Sibahee7,8, Abdulla J. Y. Aldarwish4, Ali Hasan Ali9,10, Husam A. Neamah11

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1029-1057, 2024, DOI:10.32604/cmc.2024.053854 - 15 October 2024

    Abstract Vehicular ad hoc networks (VANETs) provide intelligent navigation and efficient route management, resulting in time savings and cost reductions in the transportation sector. However, the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations. To address these challenges, several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently. However, most of these schemes are limited by a long execution time and massive communication costs, which make them inefficient for on-board units (OBUs). Additionally, some… More >

  • Open Access

    ARTICLE

    Ghost Module Based Residual Mixture of Self-Attention and Convolution for Online Signature Verification

    Fangjun Luan1,2,3, Xuewen Mu1,2,3, Shuai Yuan1,2,3,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 695-712, 2024, DOI:10.32604/cmc.2024.048502 - 25 April 2024

    Abstract Online Signature Verification (OSV), as a personal identification technology, is widely used in various industries. However, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. To address these issues, we propose a novel approach for online signature verification, using a one-dimensional Ghost-ACmix Residual Network (1D-ACGRNet), which is a Ghost-ACmix Residual Network that combines convolution with a self-attention mechanism and performs improvement by using Ghost method. The Ghost-ACmix Residual structure is introduced to leverage both self-attention and convolution mechanisms for capturing global feature information and extracting local information, effectively complementing whole and… More >

  • Open Access

    ARTICLE

    Computational Verification of Low-Frequency Broadband Noise from Wind Turbine Blades Using Semi-Empirical Methods

    Vasishta Bhargava Nukala*, Chinmaya Prasad Padhy

    Sound & Vibration, Vol.58, pp. 133-150, 2024, DOI:10.32604/sv.2024.047762 - 19 March 2024

    Abstract A significant aerodynamic noise from wind turbines arises when the rotating blades interact with turbulent flows. Though the trailing edge of the blade is an important source of noise at high frequencies, the present work deals with the influence of turbulence distortion on leading edge noise from wind turbine blades which becomes significant in low-frequency regions. Four quasi-empirical methods are studied to verify the accuracy of turbulent inflow noise predicted at low frequencies for a 2 MW horizontal axis wind turbine. Results have shown that all methods exhibited a downward linear trend in noise spectra More >

  • Open Access

    ARTICLE

    Analysis and Verification of the Conserved MYB Binding Element in the DFR Promoter in Compositae

    Jialei Guo1,2, Fengzhen Li2, Guomin Shi3, Weimin Zhao2, Tao He1,2,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.2, pp. 343-353, 2024, DOI:10.32604/phyton.2024.047429 - 27 February 2024

    Abstract Anthocyanins, ubiquitous in the Compositae family, are regulated by MYB (v-myb avian myeloblastosis viral oncogene homolog), playing an important role in anthocyanin synthesis. In this study, we analyzed the regulation pathway in which the MYB protein of subgroup 6 promotes dihydroflavonol reductase (DFR) expression in Compositae, and validated this law in Saussurea medusa through yeast one-hybrid experiments. Our results showed that MYB and DFR underwent purification selection, DFR promoter analysis revealed the presence of MYB binding site (GAGTTGAATGG) and bHLH binding site (CANNTG) at the sense strand of 84–116 nucleotide residues from the start codon. These two More >

  • Open Access

    ARTICLE

    A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems

    Jingyu Zhang1,2, Pian Zhou1, Jin Wang1, Osama Alfarraj3, Saurabh Singh4, Min Zhu5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1613-1633, 2024, DOI:10.32604/cmes.2023.044418 - 29 January 2024

    Abstract Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system. This technology has been widely used and has developed rapidly in big data systems across various fields. An increasing number of users are participating in application systems that use blockchain as their underlying architecture. As the number of transactions and the capital involved in blockchain grow, ensuring information security becomes imperative. Addressing the verification of transactional information security and privacy has emerged as a critical challenge. Blockchain-based verification methods can effectively eliminate the need… More >

  • Open Access

    ARTICLE

    Meter-Scale Thin-Walled Structure with Lattice Infill for Fuel Tank Supporting Component of Satellite: Multiscale Design and Experimental Verification

    Xiaoyu Zhang1,2, Huizhong Zeng2, Shaohui Zhang2, Yan Zhang3,*, Mi Xiao4, Liping Liu2, Hao Zhou2,*, Hongyou Chai2, Liang Gao4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 201-220, 2024, DOI:10.32604/cmes.2023.029389 - 22 September 2023

    Abstract Lightweight thin-walled structures with lattice infill are widely desired in satellite for their high stiffness-to-weight ratio and superior buckling strength resulting from the sandwich effect. Such structures can be fabricated by metallic additive manufacturing technique, such as selective laser melting (SLM). However, the maximum dimensions of actual structures are usually in a sub-meter scale, which results in restrictions on their appliance in aerospace and other fields. In this work, a meter-scale thin-walled structure with lattice infill is designed for the fuel tank supporting component of the satellite by integrating a self-supporting lattice into the thickness More >

  • Open Access

    ARTICLE

    Dynamic Testing of Elastic Modulus, Shear Modulus, and Poisson’s Ratio of Bamboo Scrimber

    Xiaoyu Gu1, Linbi Chen2, Seithati Mapesela3, Zheng Wang1,*, Aijin Zhou4

    Journal of Renewable Materials, Vol.11, No.12, pp. 4197-4210, 2023, DOI:10.32604/jrm.2023.028768 - 10 November 2023

    Abstract The bamboo scrimber is an anisotropic material. The elastic constant values of the bamboo scrimber specimens measured by the dynamic and static methods are consistent, and the dynamic test method has the advantages of rapidity, simplicity, good repeatability, and high precision. Bamboo scrimber has strong potential as a building material, and its elastic constant is an important index to measure its mechanical properties. To quickly, simply, non-destructively, and accurately detect the elastic constant of the bamboo scrimber, they were dynamically tested by the free plate transient excitation method and cantilever plate torsional vibration method. The More >

  • Open Access

    ARTICLE

    VeriFace: Defending against Adversarial Attacks in Face Verification Systems

    Awny Sayed1, Sohair Kinlany2, Alaa Zaki2, Ahmed Mahfouz2,3,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3151-3166, 2023, DOI:10.32604/cmc.2023.040256 - 08 October 2023

    Abstract Face verification systems are critical in a wide range of applications, such as security systems and biometric authentication. However, these systems are vulnerable to adversarial attacks, which can significantly compromise their accuracy and reliability. Adversarial attacks are designed to deceive the face verification system by adding subtle perturbations to the input images. These perturbations can be imperceptible to the human eye but can cause the system to misclassify or fail to recognize the person in the image. To address this issue, we propose a novel system called VeriFace that comprises two defense mechanisms, adversarial detection,… More >

Displaying 1-10 on page 1 of 73. Per Page