Journal of Advanced Engineering and Computation

Issued quarterly (4 issues per year)

JAEC Annual Best Cited Paper Award


Announcement: 2019 JAEC Best Cited Paper Award

Journal of Advanced Engineering and Computation (JAEC) has announced JAEC Annual Best Cited Paper Award for research and review articles of the JAEC. The purpose of this award is to recognize the best-cited paper published in the past three (03) years that attracts the most citations. The quantity and quality of citations of papers are based on data from ISI and/or Scopus and/or Google Scholar that tracks the paper since its first publication.

From 2017 to 2019, JAEC has published 64 research/review papers in 3 volumes and 10 issues. Top five papers with high quantity and quality of citations have been evaluated by the Award Selection Committee.

Now, it is our pleasure to announce that Winner of 2019 Best Cited Paper Award is the paper entitled "Computational cardiovascular flow analysis with the variational multiscale methods" which is published in Volume 3, issue 2, pp. 366-405, 2019 by the authors K Takizawa*, Y Bazilevs, TE Tezduyar, MC Hsu.

Congratulation on the 2019 Award Winner.

The 2020 Award will be announced in early April 2021

Award Certificate

Click here to download JAEC flyer and share to friends More...

AIMS & SCOPE
Journal of Advanced Engineering and Computation (JAEC) is a forum for the presentation of innovative ideas, approaches, developments, and research projects in the area of advanced engineering and computation. It serves to facilitate the exchange of information between researchers and industry professionals. Multi-disciplinary topics that connect the core areas of advanced engineering and computation and its applications are also covered in this journal.

It also aims to promote and coordinate developments in the field of advanced engineering and computation. The international dimension is emphasized in order to foster international collaboration in advanced engineering and computation to meet the needs of broadening the applicability and scope of the current body of knowledge.

READERSHIP
The journal provides a vehicle to help professionals, academics, researchers and policy makers working in fields relevant to advanced engineering and computation to disseminate information and to learn from each other's work.

CONTENTS
JAEC publishes original research papers, review papers, case reports, technical notes and short communications. 

OPEN ACCESS
JAEC is a fully open access, single-blind peer reviewed, electronic and print, and a quarter-annual publication. Currently, Ton Duc Thang University is pleased to cover all publishing fees for the journal; as a result, authors do not have to pay any fees although their published papers are open to the reader.

TERM AND CONDITIONS 
JAEC publishes Open Access articles under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits use, distribution, and reproduction in any medium provided the original work is properly cited.

Call for Papers
Research Article Open Access
Kenji Takizawa , Yuri Bazilevs , Tayfun E. Tezduyar , Ming-Chen Hsu , Takuya Terahara
Page(s): 167-199 in Vol 6, Iss 3 (2022)
Time cited: 0

Isogeometric analysis (IGA) brought superior accuracy to computations in both fluid and solid mechanics. The increased accuracy has been in representing both the problem geometry and the variables computed. Beyond using IGA basis functions in space, with IGA basis functions in time in a space–time (ST) context, we can have increased accuracy also in representing the motion of solid surfaces. Around the core methods such as the residual-based variational multiscale (VMS), ST-VMS and arbitrary Lagrangian–Eulerian VMS methods, with complex-geometry IGA mesh generation methods and immersogeometric analysis, and with special methods targeting specific classes of computations, the IGA has been very effective in computational cardiovascular medicine. We provide an overview of these IGA-based computational cardiovascular-medicine methods and present examples of the computations performed.


Creative Commons License

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.


Research Article Open Access
Quang Dung Nguyen , Hoang Trung Le , Hoang Thien Le , Viet Hung Tran
Page(s): 200-214 in Vol 6, Iss 3 (2022)
Time cited: 0

Flooding is one of the most common natural disasters in Vietnam. Although a hydrological monitoring system has been developed in Vietnam, the adoption of a Flood Warning and Monitoring System (FWMS) is still limited. A practical issue is that the river water levels is rarely flat, but undulating with flood water ripples, which makes the measurement inaccurate. In this paper, we will design a recursive Kalman estimation for fluctuating flood water level in the Node-Red IoT network. Indeed, the low complexity of the popular Kalman filter algorithm is very suitable for a low-cost IoT system like Node-Red. In our experiments, the accuracy of our Kalman algorithm is far superior to the standard Moving Average (MA) algorithm. To our knowledge, this is the first time that the Kalman filter has been used in a practical Node-Red IoT experiment. We will show that our novel Moving-update Kalman algorithm, which combines MA and Kalman methods, can track data recursively without prior knowledge of noise’s variance. Our novel algorithm is of linear complexity and, hence, fast enough for low cost IoT and FWMS systems in developing countries like Vietnam. We also included the industrial Message Queuing Telemetry Transport (MQTT) protocol in IoT network in our Node-Red system, which means our designed Node-Red proposal is capable of transferring data to any FWMS network via internet.

 

Creative Commons License

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.

Research Article Open Access
Majdi Mustafa Sukkar , Dinesh Kumar , Jigneshsinh Sindha
Page(s): 215-223 in Vol 6, Iss 3 (2022)
Time cited: 0

There are sub-classes of pedestrians that can be defined and it is important to distinguish between them for the detection in autonomous vehicle applications, such as elderly, and children, to reduce the risk of collision. It is necessary to talk about effective pedestrian tracking besides detection so that object remains accurately monitored, here the effective pre-trained algorithms come to achieve this goal in real-time. In this paper, we make a comparison between the detection and tracking algorithms, we applied the transfer learning technique to train the detection model on new sub-classes, after making Images augmentation in previous work, we got better results in detection, reached 0.81 mAP in real-time by using Yolov5 model, with a good tracking performance by the tracking algorithm dependent on detection Deep-SORT.


Creative Commons License

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.


Research Article Open Access
Quoc Tuan Pham , Duc-Toan Nguyen
Page(s): 224-232 in Vol 6, Iss 3 (2022)
Time cited: 0

Springback prediction is one of the most challenging in finite element analysis for sheet metal forming processes. The demand requests the development of a kinematic hardening model and parameter identification. This study presents a schematic strategy to identify parameters of Chaboche’s kinematic hardening model based on a differential evolution optimization method. To this goal, several tension-compression (TC) tests were conducted to observe the Bauchinger’s effects and kinematic hardening behaviors of two aluminum alloy sheets: AA6022-T6 and AA7075-T76. A Python code is developed to apply the proposed method in identifying parameters of the kinematic hardening model. The calibrated material models were implemented in Abaqus software to simulate V-bending and U-bending tests for the investigated materials. The predictions for springback amount match well with the experimental measurements, which verifies the effectiveness of the presented identification
strategy.


Creative Commons License

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.


Research Article Open Access
Ibrahim Ademola Fetuga , Olabode Thomas Olakoyejo , Adeola S Shote , Gbeminiyi Mike Sobamowo , Omotayo Oluwatusin , Joshua Kolawole Gbegudu
Page(s): 233-247 in Vol 6, Iss 3 (2022)
Time cited: 0

This current work mainly focuses on the enhancement of the heat transfer and fluid flow characteristics of shell-and-tube heat exchangers by incorporating dimples on the smooth or conventional tubes. With the aid of the ANSYS (Fluent) commercial software package, Computational Fluid Dynamics (CFD) simulations under a steady-state condition were conducted on heat exchanger having a single shell and 12 tubes (with or without dimples), 50% baffle cut, 100mm baffle spacing and turbulent flow. The temperature, velocity, and pressure fields at the shell and tube zone in both cases are analyzed. The computational fluid dynamics results of the heat exchanger with dimpled tubes are compared with conventional (smooth) tubes. However, the results show that a shell and tube heat exchanger with dimpled tubes has a higher overall heat transfer coefficient than that of conventional (smooth) tubes.

 

Creative Commons License

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.

Research Article Open Access (3659 views since : Nov 30, 2017)
Filip Zatloukal , Jiri Znoj
Page(s): 153-161 in Vol 1, Iss 2 (2017)
Time cited: 0

This paper follows our previous research in which we made a basic experiment to find out if it is possible to detect malware by multiple PE header detection. The previous results show us that there is a considerable amount of malwares that connect themselves to another file. This paper summarizes our previous results, updates the results and also expands them by adding an optimization method and also by including the scan of another (specific) types of data.

 

Creative Commons License
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Research Article Open Access (1792 views since : Sep 30, 2019)
Du Dinh-Cong , Linh Vo-Van , Dung Nguyen-Quoc , Trung Nguyen-Thoi
Page(s): 452-463 in Vol 3, Iss 3 (2019)
Time cited: 0

Modal kinetic energy (MKE) feature has been mostly employed for optimal sensor layout strategies; nevertheless, little attention is paid to use the feature to the field of structural damage detection. The article presents the extensive applicability of MKE change ratio (MKECR), a good damage sensitive parameter, to damage localization and quantification of laminated composite beams. The formulation of the parameter is based on the closed-form of element MKE sensitivity. The performance of the offered damage detection method is numerically verified by a clamped-clamped composite beam and a two-span continuous composite beam with different hypothetical damage scenarios. The influence of incomplete mode shapes, various noise levels as well as damage magnitudes on damage prediction results are also investigated. The obtained results from these numerical examples indicate that the offered method reliably localize the actually damaged elements and approximately estimate their severities, even under incomplete measurements at a high noise level.


Creative Commons License
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.

 

Research Article Open Access (1710 views since : Nov 30, 2017)
Thao Nguyen-Trang , Long Vu-Hoang , Trieu Nguyen-Thi , Ha Che-Ngoc
Page(s): 123-133 in Vol 1, Iss 2 (2017)
Time cited: 0

Tax consulting service is one of various professional consulting services and is interested to study by many researchers. Nevertheless, this issue has not been interested to research in Vietnam. This paper performs confirmatory factors analysis (CFA) and structural equation modeling (SEM) to identify the factors influencing the intentions of using tax consulting services of firms in Ho Chi Minh city, Vietnam. Specifically, this paper finds that the intentions depend on the “attitude toward the behavior” and “replacement”. In addition, through Chi-square test, it can be proven that the intentions also depend on type of firms and whether they have ever used tax consulting service or not. Based on the obtained results, the discussion and recommendation are also proposed.


Creative Commons License
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Research Article Open Access (1560 views since : Jun 8, 2017)
Jaroslav Pokorny
Page(s): 04-17 in Vol 1, Iss 1 (2017)
Time cited: 0

Comparing graph databases with traditional,e.g., relational databases, some important database features are often missing there. Particularly, a graph database schema including integrity constraints is mostly not explicitly defined, also a conceptual modelling is not used. It is hard to check a consistency of the graph database, because almost no integrity constraints are defined or only their very simple representatives can be specified. In the paper, we discuss these issues and present current possibilities and challenges in graph database modelling. We focus also on integrity constraints modelling and propose functional dependencies between entity types, which reminds modelling functional dependencies known from relational databases. We show a number of examples of often cited GDBMSs and their approach to database schemas and ICs specification. Also a conceptual level of a graph database design is considered. We propose a sufficient conceptual model based on a binary variant of the ER model and show its relationship to a graph database model, i.e. a mapping conceptual schemas to database schemas. An alternative based on the conceptual functions called attributes is presented.

 

Creative Commons License
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Research Article Open Access (1548 views since : Dec 31, 2019)
Ravi Teja Velpula , Barsha Jain , Ha Quoc Thang Bui , Hieu Pham Trung Nguyen
Page(s): 551-588 in Vol 3, Iss 4 (2019)
Time cited: 0

III-nitride nanowire-based light-emitting diodes (LEDs) have been intensively studied as promising candidates for future lighting technologies. Compared to conventional GaN-based planar LEDs, III-nitride nanowire LEDs exhibit numerous advantages including greatly reduced dislocation densities, polarization fields, and quantum-conned Stark effect due to the effective lateral stress relaxation, promising high-efficiency full-color LEDs. Beside these advantages, however, several issues have been identified as the limiting factors for further enhancing the nanowire LED quantum efficiency and light output power. Some of the most probable causes have been identified as due to the lack of carrier confinement in the active region, non-uniform carrier distribution, electron overflow, and the nonradiative recombination along the nanowire lateral surfaces. Moreover, the presence of large surface states and defects contribute significantly to the carrier loss in nanowire LEDs. Consequently, reported nanowire LEDs show relatively low output power. Recently, III-nitride core-shell nanowire LED structures have been reported as the most efficient nanowire white LEDs with a record-high output power which is more than 500 times stronger than that of nanowire white LEDs without using core-shell structure. In this context, we will review the current status, challenges, and approaches for the high-performance IIInitride nanowire LEDs. More specifically, we will describe the current methods for the fabrication of nanowire structures including top-down and bottom-up approaches, followed by characteristics of III-nitride nanowire LEDs. We will then discuss the carrier dynamics and loss mechanism in nanowire LEDs. The typical designs for the enhanced performance of III-nitride nanowire LEDs will be presented next. The color-tunable nanowire LEDs with emission wavelengths in the visible spectrum and phosphor-free nanowire white LEDs will be finally discussed.


Creative Commons License
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.

Research Article Open Access (1433 views since : Dec 31, 2019)
Faiza Zaamoune , Tidjani Menacer , René Lozi , Guanrong Chen
Page(s): 511-522 in Vol 3, Iss 4 (2019)
Time cited: 0

In this paper, hidden bifurcation routes to multiscroll chaotic attractors generated by saturated function series are explored. The method to nd such hidden bifurcation routes (HBR) depending upon two parameters is similar to the method introduced by Menacer, et al. (2016) for Chua multiscroll attractors. These HBR are characterized by the maximal range extension (MARE) of their attractors and coding the appearance order of the scrolls under the control of the two parameters. Moreover, these HDR have interesting symmetries with respect to the two parameters. The novelty that this article introduces, is firstly the paradigm of MARE and the formula giving their approximate value depending upon parameters p and q, which is linked to the size of the scrolls; secondly the coding of the HBR which is dened for the first time including the basic cell; and thirdly unearthing the symmetries of these routes, allowing to obtain their coding without any numerical computation.

Creative Commons License
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium provided the original work is properly cited.