Journal of Computational Methods in Sciences and Engineering

Publisher: IOS Press

Current impact factor: 0.00

Impact Factor Rankings

Additional details

5-year impact 0.00
Cited half-life 0.00
Immediacy index 0.00
Eigenfactor 0.00
Article influence 0.00
ISSN 1472-7978

Publisher details

IOS Press

  • Pre-print
    • Author can archive a pre-print version
  • Post-print
    • Author can archive a post-print version
  • Conditions
    • On author's personal website, institutional website or funder's website, including PubMed Central
    • Non-commercial use only
    • Publisher copyright and source must be acknowledged
    • Author's version can be used
    • Publisher's pdf can be used on institutional website, company website or funding agency website for a fee
  • Classification
    green

Publications in this journal


  • No preview · Article · Jan 2016 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: Motivated by recent theoretical and experimental work, we study the spherical Taylor-Couette flow with a view to setting qualitative criteria of the formation of the various vortex modes in relation to certain physical variables. We work on medium and large aspect ratios, namely α 0.154, 0.18, 0.38 and 0.48 and we are able to establish in all these cases the following criterion: Transition from one vortex mode to another occurs at those Reynolds numbers at which the torque acting on the outer sphere, the work performed on each rotation by the tangential force acting on the inner sphere and the kinetic energy of the fluid vary abruptly. We propose a physical interpretation for the conditions at which the basic vortex flow is converted into 1-vortex flow. Additionally, we determine the upper limiting value of the aspect ratio, which is α 0.51, beyond which Taylor vortices do not exist in annular spherical flow and we numerically obtain for the first time Taylor vortices at large aspect ratios α 0.48-0.51. We also show that the range [Re-1, Re-2] of the Reynolds numbers within which such vortices exist decreases with increasing aspect ratio and we point out that its span is affected by three factors. The aspect ratio α, the angular velocity ωo of the outer sphere and the Grashof number Gr of the flow. The simulation of Taylor vortices in spherical flow is achieved using an efficient numerical technique and routes leading to multiple flow states are designed for large gaps. Results can be useful for the solution of such kind of boundary value physical flow problems within shell domains in several geometries.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: With the rapid development of intelligent diagnostic medical imaging, artificial intelligent methods have become a research hotspot in this field with the rapid development of medical imaging intelligent diagnosis. The new research progress of artificial intelligence in medical image processing in recent five years is discussed. This paper discussed the function of medical image mining in computer-aided diagnoses. The idea of using luminance grade as the features of CT image and the method of extracting and storing the luminance grade are proposed. The results of classification based on decision tree and clustering based on density to some brain and breast CT images and the analysis to them are introduced. Moreover, the conclusion and future work are given.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: With the development of two-dimension code in industrial manufacture, the use of Dotted Data Matrix code is becoming increasingly wider and deeper due to that it is easy to be marked on metal or glass surface. A method about processing the complexity and diversity of Dotted Data Matrix code is presented in this paper. First, the spot detection is used to get the size of data dot, then a self-adapt hazy smooth and standardization process is performed for the original image. Then, a redesigned and optimized Binarization technology is built up to improve the recognition rate of Binarization Dot-Data Matrix image by a series of self-adapt smooth changing algorithms. Finally, the recognition of Dot-Data Matrix code can be achieved by the morphological transform process. According to the experiment and simulation analysis, the method is fast and robust, and it is also fit for the requirement of mobile intelligent terminals.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: Beam is an important component of CNC double column vertical lathe, its structural design and static and dynamic characteristics have direct influence on the machining accuracy and service life of the machine tool. The test object is a machine tool beam provided by the Heng-sheng machine tool plant, using test method of single-point excitation provided by hammer force and mobile acceleration sensor. The paper employs Poly-Max, the most widely used modal parameter identification method, to analyze the measured frequency response function data so as to derive the modal parameters, including intrinsic frequency, damping ratio and mode of vibration. Beams of the modal test of beam model is set up, collecting data and setting parameters. By analyzing the intrinsic characteristics of structure, beam structure optimization strategy can be developed. The paper provides a theoretical basis for the structural optimization design and manufacturing of similar components and parts.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: This paper will introduce the new ultra-wideband filter with right/left handed transmission line structure design. Further use the microstrip line and coplanar waveguide combination to simplify the design, reduce the size. Simulation results show that the use of composite materials can produce negative permittivity and negative permeability, filter insertion loss is less than 1.0 db in the passband of 3.8 GHz to 10.6 GHz. And the group delay is about 0.20 ns near the center of the band, that is small enough to be applied to a wireless communication system.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, equivalent mathematical model is set up for a five-stage magnetic valve reactor. Equivalent magnetization curve of cores is deduced for a five-stage magnetically controlled reactor. On the basis of multistage magnetic valve reactor equivalent circuit equations, harmonic current expression is drawn for multistage magnetic valve reactor. And harmonic current of five-stage MCR is optimized. The simulation results show that the five-stage magnetically controlled reactor has better harmonic characteristics. Harmonic current maximum amplitude of 3rd, 5th and 7th does not exceed the rated fundamental wave current amplitude of 1.46%, 0.6%, 0.25% respectively. The per-unit total harmonic content is less than 1.5%. Five-stage MCR greatly reduces the every harmonic and total harmonic content.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering

  • No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a data reduction algorithm to increase the efficiency of radar simulation. The features of artificial and natural shoreline data are analyzed on the basis of original shoreline data, and the characteristic points of shoreline data are extracted on the whole by identifying the direction and curvature of the vector shorelines and using the topology controlling algorithm. Characteristic points of shoreline data are also extracted locally using an optimization algorithm of area loss ratio control. Therefore, all data points that represent shoreline features are extracted as the reduction result. Theoretical analysis of the results indicates that the proposed algorithm has a high data reduction rate. Moreover, the reduced data retains the shoreline’s geometric features and fits well with the shoreline. Further, the accuracy analysis results show that the geometric accuracy of the algorithm is sufficiently precise for radar simulation.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: The presence of inter-symbol interference (ISI) can significantly degrade the performance of digital communication systems. Generally, an ISI channel can be modeled as a time-varying FIR filter. The ISI effect can thus be removed by inverse-filtering the distorted signal at the receiver. This paper, however, presents a different approach, which, other than recovering the source signal directly, attempts to adapt the decision rule in accordance with the channel statistics, so as to retrieve the loss of BER performance caused by ISI.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: Orthogonal Multi Matching Pursuit (OMMP) is a super greedy-type algorithm for sparse approximation. We analyze the convergence property of OMMP based on Restricted Isometry Property (RIP). Our main conclusion is that if the sampling matrix Φ satisfies the Restricted Isometry Property of order [sK] with isometry constant δ < 1 + - K/s-1/2 K/s + 4K/s, then OMMP (s) can exactly recover an arbitrary K-sparse signal x from y Φ x in at most K$ steps.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: This paper presents a downlink proportional fairness centralized processing resource allocation algorithm to enhance the throughput and guarantee the fairness in wireless networks for the C-RAN (Collaborative Radio Access Network) systems. The proposed sub-carrier allocation algorithm utilizes the baseband resource pool of C-RAN to achieve the centralized allocation of sub-carriers. In order to reduce the interference of edge users that share the same sub-carrier, and enhance the system throughput, the most shared sub-carriers are allocated to the user of central cell. The system throughput can be improved at the sacrifice of fairness decrement. Simulation results show that the proposed algorithm can obtain better performance in throughput than conventional downlink algorithms.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: The elevator door protection system is one of the most important system in the elevator, the elevator door protection system based on image processing technology has good application prospects. Oriented to large storage capacity and strong dynamic characteristics of image technology in the process of elevator door protection, in this paper, a kind of elevator door protection system based on dynamic image recognition is brought forward. Modified median filtering method is established to filter the image noise and to hold on the boundary clearly. Otsu method is adopted for global threshold segmentation. Relying on background subtraction method and temporal difference method, the dynamic target identification model is set up. Combined with region growing segmentation algorithm, the dynamic target's movement is detected on time. The test platform is built up for the elevator door protection system. The experimental results show that the image identified process would be finished by detecting 3 frames of images. And the reliability of system is proved out with different velocity of moving.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: Steganalysis analyzes the existence of embedded secret information in cover. It can be divided into two categories, special steganalysis and blind steganalysis, according to the feature extraction and classification. Steganalysis can be assigned to classification problems, which based on the training set to determine the suspicious cover's class label. Essentially, it is two-class problem in pattern recognition or machine learning. Selecting the right feature for classification is very important and difficult. There has been little research that deals with the feature selection and feature extraction problem with specific respect to steganalysis. This paper studies the influence of selected feature to the steganalysis. It is crucial that selected features are very sensitive to the embedding changes, but insensitive to the image content. First, the basic framework is described for image steganalysis, which includes five parts: training/testing images set, feature search/selection, feature extraction/feature vectors, training classifier, training model and classifier parameter estimator. We then classify the existing feature according to the domain which belonging to. Finally, we do the experiment to compare the performance of different feature by use different classifier, such as ANN and SVM. Through our experiment, although we use small data set, but we find out the optimized features for classification.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: It is one of the most efficient ways to develop and extend ontology database by acquiring field concepts and knowledge contained in the existing and available data resource. A semi-automatic reverse engineering approach is proposed to construct part resource ontology based on heterogeneous CAD (Computer-Aided Design) model documents. Due to offer reference to automatically acquire part resource library details, the information exchange mechanism is described between part resource library and CAD system, and then the part resource ontology extraction frame and semantic model construction process are illustrated based on reverse engineering. Additionally, the part resource ontology storage model based on relational database (RDB) is proposed to fulfill efficient storage and management to OWL (Web Ontology Language) ontology. Finally, the feasibility of this approach is verified by an example for part resource ontology construction and instance extension.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: In order to solve the problem of seismic facies classification, transductive support vector machine is improved. The improvement of transductive support vector machine model is proposed. Now the research of TSVM is only on the elementary stage, the optimization of TSVM is able to be solved theoretically, but it is quite difficult to find the exact solution. Therefore, we try to convert the optimization of TSVM into unconstraint problem, then we could able to construct smooth unconstraint problem with kernel, in order to create an optimized model which is easy to be solved by TSVM. The improvement of transductive support vector machine is applied to the seismic facies classification. This is a new method in the seismic facies classification never used. The experimental data show that the proposed algorithm can improve the seismic facies classification, economic benefit. The main positive feature of improved transductive support vector machine such as the less number of support vectors,there are the smaller training time and testing time and the higher correctly prediction.It has theoretical value and practical significance.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: An improved particle swarm optimization based on double mutation is proposed in this paper. The algorithm adopts nonlinear dynamic adjustment of inertia weight and adaptive double mutation mechanism, which makes the algorithm conducive to balancing the development and detecting ability of particles and the algorithm can effectively jump out of local minima. In order to verify the validity of the proposed algorithm, a set of representative Benchmark test functions are used to test the algorithm.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we will consider the weighted average method for heat conduction equation in one dimension. When θ ≠ 1/2 the truncation error of the scheme is O(τ + h2); if θ 1/2 the truncation error of the scheme is O(τ 2 + h2). When 0 ≤ θ ≤ 1/2, the scheme is stable if and only ifγ ≤ 1/2(1-2θ){-1} and when 1/2 ≤ θ ≤ 1, the scheme is stable for all γ. The numerical experiments are illustrated at the last.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: Building a networked part resource service platform is indeed considered essential to perform part resource reuse for complex product rapid design. In this paper, a complex product rapid design method is put forward based on general structural model and part resource reuse firstly. Then the overall architecture of the networked part resource service platform is present, and the key technologies of building web-based integrated part resource library are discussed, including the ontology meta-modeling of part resource library based on Ontology Web Language (OWL), the general classification pattern and flexible coding scheme for part resource, and the integration pattern for distributed heterogeneous part resource libraries. This service platform is applied via Windows Azure cloud platform, and its practicability is verified by an example for its application in the rapid design of the conventional beam pumping unit.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering
  • [Show abstract] [Hide abstract]
    ABSTRACT: As we know, the medium density fiberboard prepared from natural sticky matter which is generated from the lignin activated through laccase-mediator system has been an effective solution to the problem of free formaldehyde in forestry industry. Therefore, based on the premier experiments, this paper has studied the carbon reservation in medium density fiberboard through artificial accelerated aging, and drew the conclusion that the carbon reservation in medium density fiberboard prepared from the wood fiber which is activated through laccase-mediator system is relatively higher than any other board. Furthermore, when the variation during artificial accelerated aging is relatively small, the variation of chromatic value bears evident otherness with control samples. This is because laccase-mediator system has modified some chromophore and auxochrome. Meanwhile, the study found that the lower the carbon reservation, the smaller the initial contact angle, the higher the wettability, and the more perishable the board will be. Nevertheless, the initial contact angle of medium density fiberboard prepared with laccase-mediator system varies little, and begins to stabilize a while after.
    No preview · Article · Dec 2015 · Journal of Computational Methods in Sciences and Engineering