Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (25)
  • Open Access

    ARTICLE

    Modeling Geometrically Nonlinear FG Plates: A Fast and Accurate Alternative to IGA Method Based on Deep Learning

    Se Li1, Tiantang Yu1,*, Tinh Quoc Bui2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2793-2808, 2024, DOI:10.32604/cmes.2023.030278

    Abstract Isogeometric analysis (IGA) is known to show advanced features compared to traditional finite element approaches. Using IGA one may accurately obtain the geometrically nonlinear bending behavior of plates with functional grading (FG). However, the procedure is usually complex and often is time-consuming. We thus put forward a deep learning method to model the geometrically nonlinear bending behavior of FG plates, bypassing the complex IGA simulation process. A long bidirectional short-term memory (BLSTM) recurrent neural network is trained using the load and gradient index as inputs and the displacement responses as outputs. The nonlinear relationship between the outputs and the inputs… More >

  • Open Access

    PROCEEDINGS

    Nonlinear Dynamics of a Flexible Tether-Net System for Space Debris Capture

    Weicheng Huang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.3, pp. 1-1, 2023, DOI:10.32604/icces.2023.09017

    Abstract Here, a flexible tether-net system is applied to capture the space debris and a numerical framework is established to explore its nonlinear dynamic behaviors, which comprises four principal phases: folding, spreading, contacting, and closing [1]. Based on the discretization of the whole structure into multiple nodes and connected edges, elastic force vectors and associated Jacobian matrix are derived analytically to solve a series of equations of motion. With a fully implicit method applied to analyze the nonlinear dynamics of a slender rod network, the involved mechanical responses are investigated numerically accounting for the interactions. Contact between the deformable net and… More >

  • Open Access

    ARTICLE

    Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking

    Amjad Hussain Zahid1, Muhammad Junaid Arshad2, Musheer Ahmad3,*, Naglaa F. Soliman4, Walid El-Shafai5,6

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3011-3026, 2023, DOI:10.32604/cmc.2023.037516

    Abstract A substitution box (S-Box) is a crucial component of contemporary cryptosystems that provide data protection in block ciphers. At the moment, chaotic maps are being created and extensively used to generate these S-Boxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical attempts. In this paper, the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking approach. The projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their working makes both of these dynamic… More >

  • Open Access

    ARTICLE

    Geometrically Nonlinear Flutter Analysis Based on CFD/CSD Methods and Wind Tunnel Experimental Verification

    Changrong Zhang, Hongtao Guo, Li Yu, Binbin Lv, Hongya Xia*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1743-1758, 2023, DOI:10.32604/cmes.2023.025528

    Abstract This study presents a high-speed geometrically nonlinear flutter analysis calculation method based on the high-precision computational fluid dynamics/computational structural dynamics methods. In the proposed method, the aerodynamic simulation was conducted based on computational fluid dynamics, and the structural model was established using the nonlinear finite element model and tangential stiffness matrix. First, the equilibrium position was obtained using the nonlinear static aeroelastic iteration. Second, the structural modal under a steady aerodynamic load was extracted. Finally, the generalized displacement time curve was obtained by coupling the unsteady aerodynamics and linearized structure motion equations. Moreover, if the flutter is not at a… More > Graphic Abstract

    Geometrically Nonlinear Flutter Analysis Based on CFD/CSD Methods and Wind Tunnel Experimental Verification

  • Open Access

    ARTICLE

    2D Minimum Compliance Topology Optimization Based on a Region Partitioning Strategy

    Chong Wang1, Tongxing Zuo1,2, Haitao Han1,2, Qianglong Wang1,2, Han Zhang1, Zhenyu Liu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 655-683, 2023, DOI:10.32604/cmes.2023.025153

    Abstract This paper presents an extended sequential element rejection and admission (SERA) topology optimization method with a region partitioning strategy. Based on the partitioning of a design domain into solid regions and weak regions, the proposed optimization method sequentially implements finite element analysis (FEA) in these regions. After standard FEA in the solid regions, the boundary displacement of the weak regions is constrained using the numerical solution of the solid regions as Dirichlet boundary conditions. This treatment can alleviate the negative effect of the material interpolation model of the topology optimization method in the weak regions, such as the condition number… More > Graphic Abstract

    2D Minimum Compliance Topology Optimization Based on a Region Partitioning Strategy

  • Open Access

    ARTICLE

    Classification of Nonlinear Confusion Component Using Hybrid Multi-Criteria Decision Making

    Nabilah Abughazalah1, Iqra Ishaque2, Majid Khan2,*, Ammar S. Alanazi3, Iqtadar Hussain4,5

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1451-1463, 2023, DOI:10.32604/iasc.2023.031855

    Abstract In today’s digital world, the most inevitable challenge is the protection of digital information. Due to the weak confidentiality preserving techniques, the existing world is facing several digital information breaches. To make our digital data indecipherable to the unauthorized person, a technique for finding a cryptographically strong Substitution box (S-box) have presented. An S-box with sound cryptographic assets such as nonlinearity (NL), strict avalanche criterion (SAC), bit independence criteria (BIC), bit independence criteria of nonlinearity (BIC-NL), Bit independence criteria of Strict avalanche criteria (BIC-SAC), and Input/output XOR is considered as the robust S-box. The Decision-Making Trial and Evaluation Laboratory (DEMATEL)… More >

  • Open Access

    ARTICLE

    Impairments Approximations in Assembled mmWave and Radio Over Fiber Network

    Muhammad Irfan1, Farman Ali2, Fazal Muhammad3,*, Saifur Rahman1, Ammar Armghan4, Yousaf Khan5, Faisal Althobiani6, Rehan Shafiq7, Mohammed Alshareef8, Mohammad E. Gommosani9

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4885-4895, 2022, DOI:10.32604/cmc.2022.030157

    Abstract The fiber nonlinearity and phase noise (PN) are the focused impairments in the optical communication system, induced by high-capacity transmission and high laser input power. The channels include high-capacity transmissions that cannot be achieved at the end side without aliasing because of fiber nonlinearity and PN impairments. Thus, addressing of these distortions is the basic objective for the 5G mobile network. In this paper, the fiber nonlinearity and PN are investigated using the assembled methodology of millimeter-wave and radio over fiber (mmWave-RoF). The analytical model is designed in terms of outage probability for the proposed mmWave-RoF system. The performance of… More >

  • Open Access

    ARTICLE

    Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher

    Hafeez ur Rehman1,*, Tariq Shah1, Mohammad Mazyad Hazzazi2, Ali Alshehri3, Bassfar Zaid4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2913-2930, 2022, DOI:10.32604/cmc.2022.028765

    Abstract Elliptic curves (ECs) are deemed one of the most solid structures against modern computational attacks because of their small key size and high security. In many well-known cryptosystems, the substitution box (S-box) is used as the only nonlinear portion of a security system. Recently, it has been shown that using dynamic S-boxes rather than static S-boxes increases the security of a cryptosystem. The conferred study also extends the practical application of ECs in designing the nonlinear components of block ciphers in symmetric key cryptography. In this study, instead of the Mordell elliptic curve (MEC) over the prime field, the Galois… More >

  • Open Access

    ARTICLE

    Design of Nonlinear Components Over a Mordell Elliptic Curve on Galois Fields

    Hafeez ur Rehman1,*, Tariq Shah1, Amer Aljaedi2, Mohammad Mazyad Hazzazi3, Adel R. Alharbi2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1313-1329, 2022, DOI:10.32604/cmc.2022.022224

    Abstract Elliptic curve cryptography ensures more safety and reliability than other public key cryptosystems of the same key size. In recent years, the use of elliptic curves in public-key cryptography has increased due to their complexity and reliability. Different kinds of substitution boxes are proposed to address the substitution process in the cryptosystems, including dynamical, static, and elliptic curve-based methods. Conventionally, elliptic curve-based S-boxes are based on prime field but in this manuscript; we propose a new technique of generating S-boxes based on mordell elliptic curves over the Galois field . This technique affords a higher number of possibilities to generate… More >

  • Open Access

    ARTICLE

    Non-Associative Algebra Redesigning Block Cipher with Color Image Encryption

    Nazli Sanam1,*, Asif Ali1, Tariq Shah1, Ghazanfar Farooq2

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1-21, 2021, DOI:10.32604/cmc.2021.014442

    Abstract The substitution box (S-box) is a fundamentally important component of symmetric key cryptosystem. An S-box is a primary source of non-linearity in modern block ciphers, and it resists the linear attack. Various approaches have been adopted to construct S-boxes. S-boxes are commonly constructed over commutative and associative algebraic structures including Galois fields, unitary commutative rings and cyclic and non-cyclic finite groups. In this paper, first a non-associative ring of order 512 is obtained by using computational techniques, and then by this ring a triplet of 8 × 8 S-boxes is designed. The motivation behind the designing of these S-boxes is… More >

Displaying 1-10 on page 1 of 25. Per Page