Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2,765)
  • Open Access

    ARTICLE

    Investigation of Projectile Impact Behaviors of Graphene Aerogel Using Molecular Dynamics Simulations

    Xinyu Zhang1, Wenjie Xia2, Yang Wang3,4, Liang Wang1,*, Xiaofeng Liu1

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2023.046922

    Abstract Graphene aerogel (GA), as a novel solid material, has shown great potential in engineering applications due to its unique mechanical properties. In this study, the mechanical performance of GA under high-velocity projectile impacts is thoroughly investigated using full-atomic molecular dynamics (MD) simulations. The study results show that the porous structure and density are key factors determining the mechanical response of GA under impact loading. Specifically, the impact-induced penetration of the projectile leads to the collapse of the pore structure, causing stretching and subsequent rupture of covalent bonds in graphene sheets. Moreover, the effects of temperature on the mechanical performance of… More >

  • Open Access

    ARTICLE

    Prediction of Ground Vibration Induced by Rock Blasting Based on Optimized Support Vector Regression Models

    Yifan Huang1, Zikang Zhou1,2, Mingyu Li1, Xuedong Luo1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol., , DOI:10.32604/cmes.2024.045947

    Abstract Accurately estimating blasting vibration during rock blasting is the foundation of blasting vibration management. In this study, Tuna Swarm Optimization (TSO), Whale Optimization Algorithm (WOA), and Cuckoo Search (CS) were used to optimize two hyperparameters in support vector regression (SVR). Based on these methods, three hybrid models to predict peak particle velocity (PPV) for bench blasting were developed. Eighty-eight samples were collected to establish the PPV database, eight initial blasting parameters were chosen as input parameters for the prediction model, and the PPV was the output parameter. As predictive performance evaluation indicators, the coefficient of determination (R2), root mean square… More >

  • Open Access

    ARTICLE

    DGConv: A Novel Convolutional Neural Network Approach for Weld Seam Depth Image Detection

    Pengchao Li1,2,3,*, Fang Xu1,2,3,4, Jintao Wang1,2, Haibing Guo4, Mingmin Liu4, Zhenjun Du4

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.047057

    Abstract We propose a novel image segmentation algorithm to tackle the challenge of limited recognition and segmentation performance in identifying welding seam images during robotic intelligent operations. Initially, to enhance the capability of deep neural networks in extracting geometric attributes from depth images, we developed a novel deep geometric convolution operator (DGConv). DGConv is utilized to construct a deep local geometric feature extraction module, facilitating a more comprehensive exploration of the intrinsic geometric information within depth images. Secondly, we integrate the newly proposed deep geometric feature module with the Fully Convolutional Network (FCN8) to establish a high-performance deep neural network algorithm… More >

  • Open Access

    ARTICLE

    Attention Guided Multi Scale Feature Fusion Network for Automatic Prostate Segmentation

    Yuchun Li1,4, Mengxing Huang1,*, Yu Zhang2, Zhiming Bai3

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.046883

    Abstract The precise and automatic segmentation of prostate magnetic resonance imaging (MRI) images is vital for assisting doctors in diagnosing prostate diseases. In recent years, many advanced methods have been applied to prostate segmentation, but due to the variability caused by prostate diseases, automatic segmentation of the prostate presents significant challenges. In this paper, we propose an attention-guided multi-scale feature fusion network (AGMSF-Net) to segment prostate MRI images. We propose an attention mechanism for extracting multi-scale features, and introduce a 3D transformer module to enhance global feature representation by adding it during the transition phase from encoder to decoder. In the… More >

  • Open Access

    ARTICLE

    Weighted Forwarding in Graph Convolution Networks for Recommendation Information Systems

    Sang-min Lee, Namgi Kim*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.046346

    Abstract Recommendation Information Systems (RIS) are pivotal in helping users in swiftly locating desired content from the vast amount of information available on the Internet. Graph Convolution Network (GCN) algorithms have been employed to implement the RIS efficiently. However, the GCN algorithm faces limitations in terms of performance enhancement owing to the due to the embedding value-vanishing problem that occurs during the learning process. To address this issue, we propose a Weighted Forwarding method using the GCN (WF-GCN) algorithm. The proposed method involves multiplying the embedding results with different weights for each hop layer during graph learning. By applying the WF-GCN… More >

  • Open Access

    ARTICLE

    Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence

    Ali Hamid Farea1,*, Omar H. Alhazmi1, Kerem Kucuk2

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045794

    Abstract While emerging technologies such as the Internet of Things (IoT) have many benefits, they also pose considerable security challenges that require innovative solutions, including those based on artificial intelligence (AI), given that these techniques are increasingly being used by malicious actors to compromise IoT systems. Although an ample body of research focusing on conventional AI methods exists, there is a paucity of studies related to advanced statistical and optimization approaches aimed at enhancing security measures. To contribute to this nascent research stream, a novel AI-driven security system denoted as “AI2AI” is presented in this work. AI2AI employs AI techniques to… More >

  • Open Access

    ARTICLE

    Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction

    Bin Luo1,2,3, Liangguo Chen1,2,3, Shuhua Ruan1,2,3,*, Yonggang Luo2,3,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2023.045739

    Abstract Considering the stealthiness and persistence of Advanced Persistent Threats (APTs), system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a host. Rule-based provenance graph APT detection approaches require elaborate rules and cannot detect unknown attacks, and existing learning-based approaches are limited by the lack of available APT attack samples or generally only perform graph-level anomaly detection, which requires lots of manual efforts to locate attack entities. This paper proposes an APT-exploited process detection approach called ThreatSniffer, which constructs the benign provenance graph from attack-free audit logs, fits normal system entity… More >

  • Open Access

    ARTICLE

    An Experimental Study on the Effect of a Nanofluid on Oil-Water Relative Permeability

    Hui Tian1, Dandan Zhao1, Yannan Wu2,3,*, Xingyu Yi1, Jun Ma1, Xiang Zhou4

    FDMP-Fluid Dynamics & Materials Processing, Vol., , DOI:10.32604/fdmp.2023.044833

    Abstract

    The low porosity and low permeability of tight oil reservoirs call for improvements in the current technologies for oil recovery. Traditional chemical solutions with large molecular size cannot effectively flow through the nano-pores of the reservoir. In this study, the feasibility of Nanofluids has been investigated using a high pressure high temperature core-holder and nuclear magnetic resonance (NMR). The results of the experiments indicate that the specified Nanofluids can enhance the tight oil recovery significantly. The water and oil relative permeability curve shifts to the high water saturation side after Nanofluid flooding, thereby demonstrating an increase in the water wettability… More > Graphic Abstract

    An Experimental Study on the Effect of a Nanofluid on Oil-Water Relative Permeability

  • Open Access

    ARTICLE

    Movement Function Assessment Based on Human Pose Estimation from Multi-View

    Lingling Chen1,2,*, Tong Liu1, Zhuo Gong1, Ding Wang1

    Computer Systems Science and Engineering, Vol., , DOI:10.32604/csse.2023.037865

    Abstract Human pose estimation is a basic and critical task in the field of computer vision that involves determining the position (or spatial coordinates) of the joints of the human body in a given image or video. It is widely used in motion analysis, medical evaluation, and behavior monitoring. In this paper, the authors propose a method for multi-view human pose estimation. Two image sensors were placed orthogonally with respect to each other to capture the pose of the subject as they moved, and this yielded accurate and comprehensive results of three-dimensional (3D) motion reconstruction that helped capture their multi-directional poses.… More >

  • Open Access

    ARTICLE

    Robust and Trustworthy Data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration

    Jinyang Yu1,2, Xiao Zhang1,2,3,*, Jinjiang Wang1,2, Yuchen Zhang1,2, Yulong Shi1,2, Linxuan Su1,2, Leijie Zeng1,2,*

    CMC-Computers, Materials & Continua, Vol., , DOI:10.32604/cmc.2024.047340

    Abstract The proliferation of Internet of Things (IoT) systems has resulted in the generation of substantial data, presenting new challenges in reliable storage and trustworthy sharing. Conventional distributed storage systems are hindered by centralized management and lack traceability, while blockchain systems are limited by low capacity and high latency. To address these challenges, the present study investigates the reliable storage and trustworthy sharing of IoT data, and presents a novel system architecture that integrates on-chain and off-chain data manage systems. This architecture, integrating blockchain and distributed storage technologies, provides high-capacity, high-performance, traceable, and verifiable data storage and access. The on-chain system,… More >

Displaying 611-620 on page 62 of 2765. Per Page