Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    Chaotic CS Encryption: An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing

    Mingliang Sun, Jie Yuan*, Xiaoyong Li, Dongxiao Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2625-2646, 2024, DOI:10.32604/cmc.2024.050337 - 15 May 2024

    Abstract Images are the most important carrier of human information. Moreover, how to safely transmit digital images through public channels has become an urgent problem. In this paper, we propose a novel image encryption algorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiency of image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSE can fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks, such as differential attacks, and exhibit robustness. First, we use a sparse… More >

  • Open Access

    ARTICLE

    An Efficient Three-Party Authenticated Key Exchange Procedure Using Chebyshev Chaotic Maps with Client Anonymity

    Akshaykumar Meshram1,2, Monia Hadj Alouane-Turki3, N. M. Wazalwar2, Chandrashekhar Meshram4,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5337-5353, 2023, DOI:10.32604/cmc.2023.037324 - 29 April 2023

    Abstract Internet of Things (IoT) applications can be found in various industry areas, including critical infrastructure and healthcare, and IoT is one of several technological developments. As a result, tens of billions or possibly hundreds of billions of devices will be linked together. These smart devices will be able to gather data, process it, and even come to decisions on their own. Security is the most essential thing in these situations. In IoT infrastructure, authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit (e.g., via client identification… More >

  • Open Access

    REVIEW

    Numerical Analysis of the Mixed Flow of a Non-Newtonian Fluid over a Stretching Sheet with Thermal Radiation

    Nourhan I. Ghoneim1,*, Ahmed M. Megahed2

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.2, pp. 407-419, 2023, DOI:10.32604/fdmp.2022.020508 - 29 August 2022

    Abstract A mathematical model is elaborated for the laminar flow of an Eyring-Powell fluid over a stretching sheet. The considered non-Newtonian fluid has Prandtl number larger than one. The effects of variable fluid properties and heat generation/absorption are also discussed. The balance equations for fluid flow are reduced to a set of ordinary differential equations through a similarity transformation and solved numerically using a Chebyshev spectral scheme. The effect of various parameters on the rate of heat transfer in the thermal boundary regime is investigated, i.e., thermal conductivity, the heat generation/absorption ratio and the mixed convection More >

  • Open Access

    ARTICLE

    A Mathematical Model for COVID-19 Image Enhancement based on Mittag-Leffler-Chebyshev Shift

    Ibtisam Aldawish1, Hamid A. Jalab2,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 1307-1316, 2022, DOI:10.32604/cmc.2022.029445 - 18 May 2022

    Abstract The lungs CT scan is used to visualize the spread of the disease across the lungs to obtain better knowledge of the state of the COVID-19 infection. Accurately diagnosing of COVID-19 disease is a complex challenge that medical system face during the pandemic time. To address this problem, this paper proposes a COVID-19 image enhancement based on Mittag-Leffler-Chebyshev polynomial as pre-processing step for COVID-19 detection and segmentation. The proposed approach comprises the Mittag-Leffler sum convoluted with Chebyshev polynomial. The idea for using the proposed image enhancement model is that it improves images with low gray-level… More >

  • Open Access

    ARTICLE

    An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

    Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Parkash Tambare5, Adel R. Alharbi6, Iqtadar Hussain7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1373-1389, 2022, DOI:10.32604/cmc.2022.024996 - 24 February 2022

    Abstract The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of More >

  • Open Access

    ARTICLE

    Optimal Control and Spectral Collocation Method for Solving Smoking Models

    Amr M. S. Mahdy1,*, Mohamed S. Mohamed1, Ahoud Y. Al Amiri2, Khaled A. Gepreel1

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 899-915, 2022, DOI:10.32604/iasc.2022.017801 - 22 September 2021

    Abstract In this manuscript, we solve the ordinary model of nonlinear smoking mathematically by using the second kind of shifted Chebyshev polynomials. The stability of the equilibrium point is calculated. The schematic of the model illustrates our proposition. We discuss the optimal control of this model, and formularize the optimal control smoking work through the necessary optimality cases. A numerical technique for the simulation of the control problem is adopted. Moreover, a numerical method is presented, and its stability analysis discussed. Numerical simulation then demonstrates our idea. Optimal control for the model is further discussed by More >

  • Open Access

    ARTICLE

    Resource Allocation for Throughput Maximization in Cognitive Radio Network with NOMA

    Xiaoli He1, Yu Song2,3,*, Yu Xue4, Muhammad Owais5, Weijian Yang1, Xinwen Cheng1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 195-212, 2022, DOI:10.32604/cmc.2022.017105 - 07 September 2021

    Abstract Spectrum resources are the precious and limited natural resources. In order to improve the utilization of spectrum resources and maximize the network throughput, this paper studies the resource allocation of the downlink cognitive radio network with non-orthogonal multiple access (CRN-NOMA). NOMA, as the key technology of the fifth-generation communication (5G), can effectively increase the capacity of 5G networks. The optimization problem proposed in this paper aims to maximize the number of secondary users (SUs) accessing the system and the total throughput in the CRN-NOMA. Under the constraints of total power, minimum rate, interference and SINR,… More >

  • Open Access

    ARTICLE

    Spectral Solutions of Linear and Nonlinear BVPs Using Certain Jacobi Polynomials Generalizing Third- and Fourth-Kinds of Chebyshev Polynomials

    W. M. Abd-Elhameed1,2,*, Asmaa M. Alkenedri2

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 955-989, 2021, DOI:10.32604/cmes.2021.013603 - 19 February 2021

    Abstract This paper is dedicated to implementing and presenting numerical algorithms for solving some linear and nonlinear even-order two-point boundary value problems. For this purpose, we establish new explicit formulas for the high-order derivatives of certain two classes of Jacobi polynomials in terms of their corresponding Jacobi polynomials. These two classes generalize the two celebrated non-symmetric classes of polynomials, namely, Chebyshev polynomials of third- and fourth-kinds. The idea of the derivation of such formulas is essentially based on making use of the power series representations and inversion formulas of these classes of polynomials. The derived formulas More >

  • Open Access

    ARTICLE

    A Meshless Collocation Method with Barycentric Lagrange Interpolation for Solving the Helmholtz Equation

    Miaomiao Yang, Wentao Ma, Yongbin Ge*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 25-54, 2021, DOI:10.32604/cmes.2021.012575 - 22 December 2020

    Abstract In this paper, Chebyshev interpolation nodes and barycentric Lagrange interpolation basis function are used to deduce the scheme for solving the Helmholtz equation. First of all, the interpolation basis function is applied to treat the spatial variables and their partial derivatives, and the collocation method for solving the second order differential equations is established. Secondly, the differential equations on a given test node. Finally, based on three kinds of test nodes, numerical experiments show that the present scheme can not only calculate the high wave numbers problems, but also calculate the variable wave numbers problems. More >

  • Open Access

    ARTICLE

    A CHEBYSHEV SPECTRAL METHOD FOR HEAT AND MASS TRANSFER IN MHD NANOFLUID FLOW WITH SPACE FRACTIONAL CONSTITUTIVE MODEL

    Shina D. Oloniiju , Sicelo P. Goqo, Precious Sibanda

    Frontiers in Heat and Mass Transfer, Vol.13, pp. 1-8, 2019, DOI:10.5098/hmt.13.19

    Abstract In some recent studies, it has been suggested that non–Newtonian fluid flow can be modeled by a spatially non–local velocity, whose dynamics are described by a fractional derivative. In this study, we use the space fractional constitutive relation to model heat and mass transfer in a nanofluid. We present a numerically accurate algorithm for approximating solutions of the system of fractional ordinary differential equations describing the nanofluid flow. We present numerically stable differentiation matrices for both integer and fractional order derivatives defined by the one–sided Caputo derivative. The differentiation matrices are based on the series More >

Displaying 1-10 on page 1 of 28. Per Page