Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,212)
  • Open Access

    ARTICLE

    Generalized Normalized Euclidean Distance Based Fuzzy Soft Set Similarity for Data Classification

    Rahmat Hidayat1,2,*, Iwan Tri Riyadi Yanto1,3, Azizul Azhar Ramli1, Mohd Farhan Md. Fudzee1, Ansari Saleh Ahmar4

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 119-130, 2021, DOI:10.32604/csse.2021.015628

    Abstract

    Classification is one of the data mining processes used to predict predetermined target classes with data learning accurately. This study discusses data classification using a fuzzy soft set method to predict target classes accurately. This study aims to form a data classification algorithm using the fuzzy soft set method. In this study, the fuzzy soft set was calculated based on the normalized Hamming distance. Each parameter in this method is mapped to a power set from a subset of the fuzzy set using a fuzzy approximation function. In the classification step, a generalized normalized Euclidean distance is used to determine… More >

  • Open Access

    ARTICLE

    Smart Contract: Security and Privacy

    Leena S. Alotaibi, Sultan S. Alshamrani*

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 93-101, 2021, DOI:10.32604/csse.2021.015547

    Abstract Smart contracts are simply self-activated contracts between two parties. The idea behind their implementation relies on the concept of blockchain, wherein the details and execution of the contract are turned into code and distributed among users of a network. This process controls counterfeiting and money laundering by its ability to trace who owes whom. It also boosts the general economy. This research paper shows how smart contracts in modern-day systems have changed the approach to money tracing. We present case studies about the uses of smart contracts with high levels of security and privacy. As a building block of smart… More >

  • Open Access

    ARTICLE

    Optimization of Bio-Implantable Power Transmission Efficiency Based on Input Impedance

    Bassm H. Abed1, Jaber H. Majeed1,*, Najma Abed Habeeb2

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 17-24, 2021, DOI:10.32604/csse.2021.015544

    Abstract Recently, the inductive coupling link is the most robust method for powering implanted biomedical devices, such as micro-system stimulators, cochlear implants, and retinal implants. This research provides a novel theoretical and mathematical analysis to optimize the inductive coupling link efficiency driven by efficient proposed class-E power amplifiers using high and optimum input impedance. The design of the coupling link is based on two pairs of aligned, single-layer, planar spiral circular coils with a proposed geometric dimension, operating at a resonant frequency of 13.56 MHz. Both transmitter and receiver coils are small in size. Implanted device resistance varies from 200 Ω… More >

  • Open Access

    ARTICLE

    A New Generalized Weibull Model: Classical and Bayesian Estimation

    Mi Zichuan1, Saddam Hussain1, Zubair Ahmad2,*, Omid Kharazmi3, Zahra Almaspoor2

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 79-92, 2021, DOI:10.32604/csse.2021.015146

    Abstract Statistical distributions play a prominent role in applied sciences, particularly in biomedical sciences. The medical data sets are generally skewed to the right, and skewed distributions can be used quite effectively to model such kind of data sets. In the present study, therefore, we propose a new family of distributions suitable for modeling right-skewed medical data sets. The proposed family may be called a new generalized-X family. A special sub-model of the proposed family called a new generalized-Weibull distribution is discussed in detail. The maximum likelihood estimators of the model parameters are obtained. A brief Monte Carlo simulation study is… More >

  • Open Access

    ARTICLE

    Human-Animal Affective Robot Touch Classification Using Deep Neural Network

    Mohammed Ibrahim Ahmed Al-mashhadani1, Theyazn H. H. Aldhyani2,*, Mosleh Hmoud Al-Adhaileh3, Alwi M. Bamhdi4, Mohammed Y. Alzahrani5, Fawaz Waselallah Alsaade6, Hasan Alkahtani1,6

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 25-37, 2021, DOI:10.32604/csse.2021.014992

    Abstract Touch gesture recognition is an important aspect in human–robot interaction, as it makes such interaction effective and realistic. The novelty of this study is the development of a system that recognizes human–animal affective robot touch (HAART) using a deep learning algorithm. The proposed system was used for touch gesture recognition based on a dataset provided by the Recognition of the Touch Gestures Challenge 2015. The dataset was tested with numerous subjects performing different HAART gestures; each touch was performed on a robotic animal covered by a pressure sensor skin. A convolutional neural network algorithm is proposed to implement the touch… More >

  • Open Access

    ARTICLE

    A Network Security Risk Assessment Method Based on a B_NAG Model

    Hui Wang1, Chuanhan Zhu1, Zihao Shen1,*, Dengwei Lin2, Kun Liu1, MengYao Zhao3

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 103-117, 2021, DOI:10.32604/csse.2021.014680

    Abstract Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph… More >

  • Open Access

    ABSTRACT

    Numerical Simulation of Particulate Erosion in a Single-Stage Turbine for Jet Engines

    Masaya Suzuki1,*, Manabu Ueno2, Koji Fukudome2, Yoji Okita1, Makoto Yamamoto2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.23, No.1, pp. 14-14, 2021, DOI:10.32604/icces.2021.08337

    Abstract Recently, ceramic matrix composites (CMCs) are expected to utilize for the components of gas turbine engines due to its low density, high strength, and high rigidity in the high-temperature condition. The environmental barrier coating (EBC) is a key technology for the practical application of CMC to prevent surface regression from particulate and water vapor environments. However, the anti-erosion characteristics of CMC and EBC have not been clarified. In the present study, the authors performed numerical simulations of particulate erosion phenomena in a high-pressure turbine first stage to investigate the differences in the damage pattern and the performance between particle sizes.… More >

  • Open Access

    ABSTRACT

    Coupling VEM and BEM for computational homogenization of composite materials

    Marco Lo Cascio1, Marco Grifò1, Alberto Milazzo1, Ivano Benedetti1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.23, No.1, pp. 13-13, 2021, DOI:10.32604/icces.2021.08335

    Abstract The Virtual Element Method (VEM) [1] is a recent numerical technique that is capable of dealing with very general polygonal and polyhedral mesh elements, including irregular or non-convex ones. Because of this feature, the VEM ensures noticeable simplification in the data preparation stage of the analysis, especially for problems whose analysis domain features complex geometries, as in the case of computational micromechanics problems [2]. The Boundary Element Method (BEM) [3] is a well-known, extensively used and efficient numerical technique that has been successfully employed for the computational homogenization of materials with complex morphologies [4]. Due to its underlying formulation, the… More >

  • Open Access

    ABSTRACT

    Multiscale Topology Optimization using Subspace-based Model Reduction Method

    Yuan Zhu1, 2, Xin Ning1, 2, Yao Zhang1, 2, Yuwan Yin1, 2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.23, No.1, pp. 11-12, 2021, DOI:10.32604/icces.2021.08311

    Abstract High performance of the spacecraft structure is required in the special environment, it includes mechanical performance and operational performance, etc. When performing tasks, the spaceborne equipment requires high precision. Therefore, the design of lightweight, high stability and high reliability structure is essential for spacecraft. Topology optimization is widely used in structural design. However, there are some problems in the structure after macro topology optimization, such as checkerboard, local optimal solution and other phenomena. Despite a long calculation period, the obtained structure is often not smooth enough and hard to manufacture. Aiming to this issue, this paper proposes a combined method… More >

  • Open Access

    ABSTRACT

    The Analysis of Flexoelectric Effect in Quantum-Dot system

    Miroslav Repka1,*, Jan Sladek1, Vladimir Sladek1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.23, No.1, pp. 10-10, 2021, DOI:10.32604/icces.2021.08308

    Abstract The flexoelectric effect is investigated in quantum dot (QD) nano-sized structures. The lattice mismatch between QD and matrix results in non-uniform strains and presence of the strain gradients in the structure. The strain gradients induces the change of the polarization in QD structure as a consequence of the flexoelectric effect. When the dimensions of the QDs are of the same order of magnitude as the material length scale, gradient elasticity theory should be used to account for the size dependent of such nano-sized QDs. In this work the flexoelectric theory is applied for 3D analysis of QDs with the functionally… More >

Displaying 12351-12360 on page 1236 of 22212. Per Page