Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    Numerical Exploration of Asymmetrical Impact Dynamics: Unveiling Nonlinearities in Collision Problems and Resilience of Reinforced Concrete Structures

    AL-Bukhaiti Khalil1, Yanhui Liu1,*, Shichun Zhao1, Daguang Han2

    Structural Durability & Health Monitoring, Vol.18, No.3, pp. 223-254, 2024, DOI:10.32604/sdhm.2024.044751 - 15 May 2024

    Abstract This study provides a comprehensive analysis of collision and impact problems’ numerical solutions, focusing on geometric, contact, and material nonlinearities, all essential in solving large deformation problems during a collision. The initial discussion revolves around the stress and strain of large deformation during a collision, followed by explanations of the fundamental finite element solution method for addressing such issues. The hourglass mode’s control methods, such as single-point reduced integration and contact-collision algorithms are detailed and implemented within the finite element framework. The paper further investigates the dynamic response and failure modes of Reinforced Concrete (RC)… More >

  • Open Access

    ARTICLE

    Modeling Geometrically Nonlinear FG Plates: A Fast and Accurate Alternative to IGA Method Based on Deep Learning

    Se Li1, Tiantang Yu1,*, Tinh Quoc Bui2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2793-2808, 2024, DOI:10.32604/cmes.2023.030278 - 15 December 2023

    Abstract Isogeometric analysis (IGA) is known to show advanced features compared to traditional finite element approaches. Using IGA one may accurately obtain the geometrically nonlinear bending behavior of plates with functional grading (FG). However, the procedure is usually complex and often is time-consuming. We thus put forward a deep learning method to model the geometrically nonlinear bending behavior of FG plates, bypassing the complex IGA simulation process. A long bidirectional short-term memory (BLSTM) recurrent neural network is trained using the load and gradient index as inputs and the displacement responses as outputs. The nonlinear relationship between More >

  • Open Access

    PROCEEDINGS

    Nonlinear Dynamics of a Flexible Tether-Net System for Space Debris Capture

    Weicheng Huang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.26, No.3, pp. 1-1, 2023, DOI:10.32604/icces.2023.09017

    Abstract Here, a flexible tether-net system is applied to capture the space debris and a numerical framework is established to explore its nonlinear dynamic behaviors, which comprises four principal phases: folding, spreading, contacting, and closing [1]. Based on the discretization of the whole structure into multiple nodes and connected edges, elastic force vectors and associated Jacobian matrix are derived analytically to solve a series of equations of motion. With a fully implicit method applied to analyze the nonlinear dynamics of a slender rod network, the involved mechanical responses are investigated numerically accounting for the interactions. Contact… More >

  • Open Access

    ARTICLE

    Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking

    Amjad Hussain Zahid1, Muhammad Junaid Arshad2, Musheer Ahmad3,*, Naglaa F. Soliman4, Walid El-Shafai5,6

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3011-3026, 2023, DOI:10.32604/cmc.2023.037516 - 31 March 2023

    Abstract A substitution box (S-Box) is a crucial component of contemporary cryptosystems that provide data protection in block ciphers. At the moment, chaotic maps are being created and extensively used to generate these S-Boxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical attempts. In this paper, the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking approach. The projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their working… More >

  • Open Access

    ARTICLE

    Geometrically Nonlinear Flutter Analysis Based on CFD/CSD Methods and Wind Tunnel Experimental Verification

    Changrong Zhang, Hongtao Guo, Li Yu, Binbin Lv, Hongya Xia*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1743-1758, 2023, DOI:10.32604/cmes.2023.025528 - 06 February 2023

    Abstract This study presents a high-speed geometrically nonlinear flutter analysis calculation method based on the high-precision computational fluid dynamics/computational structural dynamics methods. In the proposed method, the aerodynamic simulation was conducted based on computational fluid dynamics, and the structural model was established using the nonlinear finite element model and tangential stiffness matrix. First, the equilibrium position was obtained using the nonlinear static aeroelastic iteration. Second, the structural modal under a steady aerodynamic load was extracted. Finally, the generalized displacement time curve was obtained by coupling the unsteady aerodynamics and linearized structure motion equations. Moreover, if the… More > Graphic Abstract

    Geometrically Nonlinear Flutter Analysis Based on CFD/CSD Methods and Wind Tunnel Experimental Verification

  • Open Access

    ARTICLE

    2D Minimum Compliance Topology Optimization Based on a Region Partitioning Strategy

    Chong Wang1, Tongxing Zuo1,2, Haitao Han1,2, Qianglong Wang1,2, Han Zhang1, Zhenyu Liu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 655-683, 2023, DOI:10.32604/cmes.2023.025153 - 05 January 2023

    Abstract This paper presents an extended sequential element rejection and admission (SERA) topology optimization method with a region partitioning strategy. Based on the partitioning of a design domain into solid regions and weak regions, the proposed optimization method sequentially implements finite element analysis (FEA) in these regions. After standard FEA in the solid regions, the boundary displacement of the weak regions is constrained using the numerical solution of the solid regions as Dirichlet boundary conditions. This treatment can alleviate the negative effect of the material interpolation model of the topology optimization method in the weak regions, More > Graphic Abstract

    2D Minimum Compliance Topology Optimization Based on a Region Partitioning Strategy

  • Open Access

    ARTICLE

    Classification of Nonlinear Confusion Component Using Hybrid Multi-Criteria Decision Making

    Nabilah Abughazalah1, Iqra Ishaque2, Majid Khan2,*, Ammar S. Alanazi3, Iqtadar Hussain4,5

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1451-1463, 2023, DOI:10.32604/iasc.2023.031855 - 05 January 2023

    Abstract In today’s digital world, the most inevitable challenge is the protection of digital information. Due to the weak confidentiality preserving techniques, the existing world is facing several digital information breaches. To make our digital data indecipherable to the unauthorized person, a technique for finding a cryptographically strong Substitution box (S-box) have presented. An S-box with sound cryptographic assets such as nonlinearity (NL), strict avalanche criterion (SAC), bit independence criteria (BIC), bit independence criteria of nonlinearity (BIC-NL), Bit independence criteria of Strict avalanche criteria (BIC-SAC), and Input/output XOR is considered as the robust S-box. The Decision-Making… More >

  • Open Access

    ARTICLE

    Impairments Approximations in Assembled mmWave and Radio Over Fiber Network

    Muhammad Irfan1, Farman Ali2, Fazal Muhammad3,*, Saifur Rahman1, Ammar Armghan4, Yousaf Khan5, Faisal Althobiani6, Rehan Shafiq7, Mohammed Alshareef8, Mohammad E. Gommosani9

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 4885-4895, 2022, DOI:10.32604/cmc.2022.030157 - 28 July 2022

    Abstract The fiber nonlinearity and phase noise (PN) are the focused impairments in the optical communication system, induced by high-capacity transmission and high laser input power. The channels include high-capacity transmissions that cannot be achieved at the end side without aliasing because of fiber nonlinearity and PN impairments. Thus, addressing of these distortions is the basic objective for the 5G mobile network. In this paper, the fiber nonlinearity and PN are investigated using the assembled methodology of millimeter-wave and radio over fiber (mmWave-RoF). The analytical model is designed in terms of outage probability for the proposed More >

  • Open Access

    ARTICLE

    Mordell Elliptic Curve Based Design of Nonlinear Component of Block Cipher

    Hafeez ur Rehman1,*, Tariq Shah1, Mohammad Mazyad Hazzazi2, Ali Alshehri3, Bassfar Zaid4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2913-2930, 2022, DOI:10.32604/cmc.2022.028765 - 16 June 2022

    Abstract Elliptic curves (ECs) are deemed one of the most solid structures against modern computational attacks because of their small key size and high security. In many well-known cryptosystems, the substitution box (S-box) is used as the only nonlinear portion of a security system. Recently, it has been shown that using dynamic S-boxes rather than static S-boxes increases the security of a cryptosystem. The conferred study also extends the practical application of ECs in designing the nonlinear components of block ciphers in symmetric key cryptography. In this study, instead of the Mordell elliptic curve (MEC) over… More >

  • Open Access

    ARTICLE

    Design of Nonlinear Components Over a Mordell Elliptic Curve on Galois Fields

    Hafeez ur Rehman1,*, Tariq Shah1, Amer Aljaedi2, Mohammad Mazyad Hazzazi3, Adel R. Alharbi2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1313-1329, 2022, DOI:10.32604/cmc.2022.022224 - 03 November 2021

    Abstract Elliptic curve cryptography ensures more safety and reliability than other public key cryptosystems of the same key size. In recent years, the use of elliptic curves in public-key cryptography has increased due to their complexity and reliability. Different kinds of substitution boxes are proposed to address the substitution process in the cryptosystems, including dynamical, static, and elliptic curve-based methods. Conventionally, elliptic curve-based S-boxes are based on prime field but in this manuscript; we propose a new technique of generating S-boxes based on mordell elliptic curves over the Galois field . This technique affords a higher More >

Displaying 1-10 on page 1 of 26. Per Page