-
Article
Experimental study on turbulent features in the negative transport region of asymmetric plane channel flow
Turbulent features of streamwise and vertical components of velocity in the negative transport region of asymmetric plane channel flow have been studied experimentally in details. Experiments show that turbule...
-
Article
Marginalized particle filter for spacecraft attitude estimation from vector measurements
An algorithm based on the marginalized particle filters (MPF) is given in details in this paper to solve the spacecraft attitude estimation problem: attitude and gyro bias estimation using the biased gyro and ...
-
Article
Open AccessA Lexicographic Method for Matrix Games with Payoffs of Triangular Intuitionistic Fuzzy Numbers
The intuitionistic fuzzy set (IF-set) has not been applied to matrix game problems yet since it was introduced by K.T.Atanassov. The aim of this paper is to develop a methodology for solving matrix games with ...
-
Article
Research of air-cushion isolation effects on high arch dam reservoir
A three-dimensional (3D) finite element model of air-cushion isolated arch dam is presented with the nonlinear gas-liquid-solid multi-field dynamic coupling effect taken into account. In this model, the displa...
-
Article
Adhesion behavior of endothelial progenitor cells to endothelial cells in simple shear flow
The adhesion of endothelial progenitor cells (EPCs) on endothelial cells (ECs) is one of the critical physiological processes for the regenesis of vascular vessels and the prevention of serious cardiovascular ...
-
Article
Open AccessModel-based simulation of driver expectation in mountainous road using various control strategies
Driver expectation is about driver’s objective response and expectation for various traffic environments. It might directly influence the driving safety and traffic operation. This paper discusses in enough de...
-
Article
Analytical solution for the time-fractional heat conduction equation in spherical coordinate system by the method of variable separation
In this paper, using the fractional Fourier law, we obtain the fractional heat conduction equation with a time-fractional derivative in the spherical coordinate system. The method of variable separation is use...
-
Article
Effect of chemical reactivity on the detonation initiation in shock accelerated flow in a confined space
The interactions of a spherical flame with an incident shock wave and its reflected shock wave in a confined space were investigated using the three-dimensional reactive Navier-Stokes equations, with emphasis ...
-
Article
Influences of aerodynamic loads on hunting stability of high-speed railway vehicles and parameter studies
The influences of steady aerodynamic loads on hunting stability of high-speed railway vehicles were investigated in this study. A mechanism is suggested to explain the change of hunting behavior due to actions...
-
Article
The spatial-temporal evolution of coherent structures in log law region of turbulent boundary layer
The spatial-temporal evolution of coherent structures (CS) is significant for turbulence control and drag reduction. Among the CS, low and high speed streak structures show typical burst phenomena. The analysi...
-
Article
Tomographic PIV investigation on coherent vortex structures over shark-skin-inspired drag-reducing riblets
Nature has shown us that the microstructure of the skin of fast-swimming sharks in the ocean can reduce the skin friction drag due to the well-known shark-skin effect. In the present study, the effect of shark...
-
Article
Critical node identification for complex network based on a novel minimum connected dominating set
Identifying critical nodes in complex networks aims to fragment a graph \(G = (V, E)\) ...
-
Article
Statistical learning based fully homomorphic encryption on encrypted data
Statistical learning has been widely used in many fields, such as science, engineering and finance, to extract important patterns, trends, and understand “what the data say”. Privacy of statistical learning, i...
-
Article
An Adaptive Regularization Approach to Colonoscopic Polyp Detection Using a Cascaded Structure of Encoder–Decoders
This research aims to segment colonoscopic images by automatically extracting polyp features by exploiting the strengths of convolution neural networks (CNN). The proposed model employs deep learning and adapt...
-
Article
A density-core-based clustering algorithm with local resultant force
Clustering analysis has been widely used in image segmentation, face recognition, protein identification, intrusion detection, document clustering and so on. Most of the previous clustering algorithms are not ...
-
Article
A Fuzzy Segmentation Method to Learn Classification of Mitosis
Mitotic counts are widely used as a metric for cellular proliferation for prognosis and to determine the aggressiveness of individual cancers. This study presents a less labor-intensive method to count mitotic...
-
Article
Noise reduction for temperature-sensitive paint measurement contaminated by strong background radiation in a high enthalpy hypersonic tunnel
The strong background radiation in high enthalpy hypersonic shock tunnels has posed severe challenges for measurement using luminescent coatings. We proposed a solution for reducing background radiation from t...
-
Article
Open AccessInternal field study of 21700 battery based on long-life embedded wireless temperature sensor
The safety of lithium-ion batteries is an essential concern where instant and accurate temperature sensing is critical. It is generally desired to put sensors inside batteries for instant sensing. However, the...
-
Article
Extreme transmission of elastic metasurface for deep subwavelength focusing
In this paper, elastic metasurfaces composed of zigzag units are proposed to manipulate flexural waves at a deep subwavelength scale. Through the parameter optimization of the genetic algorithm, units with ful...
-
Article
A pyramid stripe pooling-based convolutional neural network for malware detection and classification
As image classification is gaining momentum in many applications, it is a common practice for malware detection to convert each malware sample into a gray-scale image for analysis. While most existing deep lea...