Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    PROCEEDINGS

    Quasi-Two-Dimensional Gold Nanosheets with Ultrahigh Strength

    Tong Zhang1, Binglun Yin1,2, Pan Wang3, Yang Gao1,2,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.25, No.3, pp. 1-2, 2023, DOI:10.32604/icces.2023.010131

    Abstract Solid gold usually holds face-centered-cubic structure and relatively low strength of 102 MPa. When the dimension is reduced to the nanoscale, the strength of metal should increase accordingly, due to size effect or complex nanostructures [1-3]. However, reported maximum strength in gold nanostructures is yet considerably lower than the ideal strength (~6 GPa), referring to the stress at elastic instability in a defectfree crystal with infinite dimensions [3-5]. Herein, the ideal strength of gold is experimentally achieved in a quasi-two-dimensional defect-free single crystalline nanosheet with hexagonal-close-packed (HCP) structure. Ultrathin gold nanosheets with a high aspect ratio (lateral size >101 μm,… More >

  • Open Access

    ARTICLE

    The Effects of the Particle Size Ratio on the Behaviors of Binary Granular Materials

    Deze Yang, Xihua Chu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 63-85, 2023, DOI:10.32604/cmes.2023.025062

    Abstract The particle size ratio (PSR) is an important parameter for binary granular materials, which may affect the microstructure and macro behaviors of granular materials. However, the effect of particle ratio on granular assemblies with different arrangements is still unclear. To explore and further clarify the effect of PSR in different packing structures, three types of numerical samples with regular, layered, and random packing are designed. Numerical results show that PSR has significant effects on binary granular samples with regular packing. The larger the PSR, the stronger the strength, the larger the modulus, and the smaller the angle between the shear… More >

  • Open Access

    ARTICLE

    Graph-Based Replication and Two Factor Authentication in Cloud Computing

    S. Lavanya1,*, N. M. Saravanakumar2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2869-2883, 2023, DOI:10.32604/csse.2023.029040

    Abstract Many cutting-edge methods are now possible in real-time commercial settings and are growing in popularity on cloud platforms. By incorporating new, cutting-edge technologies to a larger extent without using more infrastructures, the information technology platform is anticipating a completely new level of development. The following concepts are proposed in this research paper: 1) A reliable authentication method Data replication that is optimised; graph-based data encryption and packing colouring in Redundant Array of Independent Disks (RAID) storage. At the data centre, data is encrypted using crypto keys called Key Streams. These keys are produced using the packing colouring method in the… More >

  • Open Access

    ARTICLE

    A Time-Efficient and Exploratory Algorithm for the Rectangle Packing Problem

    Mohammad Bozorgi1, Morteza Mohammadi Zanjireh1,*, Mahdi Bahaghighat1, Qin Xin2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 885-898, 2022, DOI:10.32604/iasc.2022.016075

    Abstract Today, resource waste is considered as one of the most important challenges in different industries. In this regard, the Rectangle Packing Problem (RPP) can affect noticeably both time and design issues in businesses. In this study, the main objective is to create a set of non-overlapping rectangles so that they have specific dimensions within a rectangular plate with a specified width and an unlimited height. The ensued challenge is an NP-complete problem. NP-complete problem, any of a class of computational problems that still there are no efficient solution for them. Most substantial computer-science problems such as the traveling salesman problem,… More >

  • Open Access

    ARTICLE

    Unpacking the Associations between Traumatic Events and Depression among Chinese Elderly: Two Dimensions of Aging Attitudes as Mediators and Moderators

    Chaoxin Jiang*

    International Journal of Mental Health Promotion, Vol.23, No.2, pp. 231-242, 2021, DOI:10.32604/IJMHP.2021.015253

    Abstract Traumatic events have been considered significant risk factors for older adults’ mental health, but the mediating mechanism and moderating effect of aging attitudes that underlie this relationship have yet been completely investigated. The attitudes of the elderly toward aging can be divided into two closely related but conceptually different dimensions, including positive and negative. Positive aging attitudes refer to optimistic feelings and experiences about aging, whereas negative attitudes toward aging are related to detrimental thoughts and sensations experienced about the increasing age. The purpose of this study is to explore the mediating and moderating roles of these two dimensions of… More >

  • Open Access

    ARTICLE

    Protecting Android Applications with Multiple DEX Files Against Static Reverse Engineering Attacks

    Kyeonghwan Lim1, Nak Young Kim1, Younsik Jeong1, Seong-je Cho1, Sangchul Han2, Minkyu Park2

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 143-153, 2019, DOI:10.31209/2018.100000051

    Abstract The Android application package (APK) uses the DEX format as an executable file format. Since DEX files are in Java bytecode format, you can easily get Java source code using static reverse engineering tools. This feature makes it easy to steal Android applications. Tools such as ijiami, liapp, alibaba, etc. can be used to protect applications from static reverse engineering attacks. These tools typically save encrypted classes.dex in the APK file, and then decrypt and load dynamically when the application starts. However, these tools do not protect multidex Android applications. A multidex Android application is an APK that contains multiple… More >

  • Open Access

    ARTICLE

    Computational Simulation of Localized Damage by Finite Element Remeshing based on Bubble Packing Method

    Soon Wan Chung1, Yoo Jin Choi1, Seung Jo Kim1

    CMES-Computer Modeling in Engineering & Sciences, Vol.4, No.6, pp. 707-718, 2003, DOI:10.3970/cmes.2003.004.707

    Abstract In this paper, an automatic finite element remeshing algorithm based on the bubble packing method is utilized for the purpose of numerical simulations of localized damage, because fine meshes are needed to represent the gradually concentrated damage. The bubble packing method introduces two parameters that easily control the remeshing criterion and the new mesh size. The refined area is determined by \textit {a posteriori} error estimation utilizing the value obtained from Superconvergent Patch Recovery. The isotropic ductile damage theory, founded on continuum damage mechanics, is used for this damage analysis. It was successfully shown in the numerical examples (upsetting and… More >

  • Open Access

    ABSTRACT

    Interphase Effect on Damping in Fiber Reinforced Composites

    Pramod Kumar1, Rakesh Chandra1, S.P. Singh2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.4, No.2, pp. 67-72, 2007, DOI:10.3970/icces.2007.004.067

    Abstract Polymers composite are modeled as fiber, interphase and matrix. Interphase properties are very crucial for bonding between fiber and matrix. Interphase can be strong and weak depending upon its properties. Damping of composite material depends on interphase properties and required damping can be obtained by varying the properties of interphase. In this paper three phase mathematical model has been proposed for the evaluation of damping incorporating the effect of fiber packing. Effect of interphase has been analysed for the longitudinal loss factor, transverse loss factor, transverse shear loss factor and longitudinal shear loss factor. Results obtained by modeling fiber reinforced… More >

  • Open Access

    ARTICLE

    PHBV Crystallization under Injection Molding Conditions: Influence of Packing Pressure and Mold Temperature

    G. El hajj Sleiman1, G. Colomines1, R. Deterre1, I. Petit1, E. Leroy2, S. Belhabib1,*

    Journal of Renewable Materials, Vol.6, No.3, pp. 270-276, 2018, DOI:10.7569/JRM.2017.634179

    Abstract Poly(3-hydroxy butyrate)-co-(3-hydroxy valerate) (PHBV) is a biobased and biodegradable polyester. This semicrystalline bioplastic could be a good candidate for the replacement of some commodity plastics derived from oil. However, the control of the conditions of its processing in order to obtain optimal properties of the finished products remains a current research subject. The objective of this work is to better understand the crystallization under injection molding conditions by inline measurements during the process. We focused on the influence of two key processing parameters, namely, mold temperature and packing pressure. The modeling of inline temperature measurements allowed an inverse estimation of… More >

  • Open Access

    ARTICLE

    Modeling of Random Bimodal Structures of Composites (Application to Solid Propellants): I. Simulation of Random Packs

    V.A. Buryachenko1,2, T.L. Jackson2,3, G. Amadio3

    CMES-Computer Modeling in Engineering & Sciences, Vol.85, No.5, pp. 379-416, 2012, DOI:10.3970/cmes.2012.085.379

    Abstract We consider a composite medium, which consists of a homogeneous matrix containing a statistically homogeneous set of multimodal spherical inclusions. This model is used to represent the morphology of heterogeneous solid propellants (HSP) that are widely used in the rocket industry. The Lubachevsky-Stillinger algorithm is used to generate morphological models of HSP with large polydisperse packs of spherical inclusions. We modify the algorithm by proposing a random shaking procedure that leads to the stabilization of a statistical distribution of the simulated structure that is homogeneous, highly mixed, and protocol independent (in sense that the statistical parameters estimated do not depend… More >

Displaying 1-10 on page 1 of 15. Per Page