Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (44)
  • Open Access


    Robust Shape Optimization of Sound Barriers Based on Isogeometric Boundary Element Method and Polynomial Chaos Expansion

    Xuhang Lin1, Haibo Chen1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.27, No.1, pp. 1-1, 2023, DOI:10.32604/icces.2023.09388

    Abstract As an important and useful tool for reducing noise, the sound barrier is of practical significance. The sound barrier has different noise reduction effects for different sizes, shapes and properties of the sound absorbing material. Liu et al. [1] have performed shape optimization of sound barriers by using isogeometric boundary element method and method of moving asymptotes (MMA). However, in engineering practice, it is difficult to determine some parameters accurately such as material properties, geometries, external loads. Therefore, it is necessary to consider these uncertainty conditions in order to ensure the rationality of the numerical calculation of engineering problems. In… More >

  • Open Access


    3D Model Encryption Algorithm by Parallel Bidirectional Diffusion and 1D Map with Sin and Logistic Coupling

    Yongsheng Hu*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1819-1838, 2023, DOI:10.32604/csse.2023.040729

    Abstract 3D models are essential in virtual reality, game development, architecture design, engineering drawing, medicine, and more. Compared to digital images, 3D models can provide more realistic visual effects. In recent years, significant progress has been made in the field of digital image encryption, and researchers have developed new algorithms that are more secure and efficient. However, there needs to be more research on 3D model encryption. This paper proposes a new 3D model encryption algorithm, called the 1D map with sin and logistic coupling (1D-MWSLC), because existing digital image encryption algorithms cannot be directly applied to 3D models. Firstly, this… More >

  • Open Access


    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network. This paper… More >

  • Open Access



    Yubing Lia , Mo Yanga,*, Jian Lib , Zhiyun Wanga

    Frontiers in Heat and Mass Transfer, Vol.13, pp. 1-8, 2019, DOI:10.5098/hmt.13.11

    Abstract Thermalsolutal convection induced by mass and heat source in horizontal cavity is investigated numerically based on SIMPLE algorithm with QUICK scheme. The high-concentration heat source is placed in the square cavity, and the cavity wall is low temperature and low concentration. The smoke is used as the diffusion medium, and the flow field, temperature and concentration of the fluid under different Rayleigh number, buoyancy ratio Nc, Soret numbers and Dufour numbers are analyzed systematically. Parameter study demonstrates that heat and mass transfer of thermosolutal convection are enhanced with increasing Rayleigh number or buoyancy ratio, and the couple-diffusive interaction has a… More >

  • Open Access


    A New Multi Chaos-Based Compression Sensing Image Encryption

    Fadia Ali Khan1, Jameel Ahmed1, Suliman A. Alsuhibany2,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 437-453, 2023, DOI:10.32604/cmc.2023.032236

    Abstract The advancements in technology have substantially grown the size of image data. Traditional image encryption algorithms have limited capabilities to deal with the emerging challenges in big data, including compression and noise toleration. An image encryption method that is based on chaotic maps and orthogonal matrix is proposed in this study. The proposed scheme is built on the intriguing characteristics of an orthogonal matrix. Gram Schmidt disperses the values of pixels in a plaintext image by generating a random orthogonal matrix using logistic chaotic map. Following the diffusion process, a block-wise random permutation of the data is performed using multi-chaos.… More >

  • Open Access


    A Chaotic Pulse Train Generator Based on Henon Map

    Babu H. Soumya1,*, N. Vijayakumar2, K. Gopakumar3

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1197-1207, 2023, DOI:10.32604/iasc.2023.031575

    Abstract The Henon map forms one of the most-studied two-dimensional discrete-time dynamical systems that exhibits chaotic behavior. The Henon map takes a point in the plane and maps it to a new point . In this paper, a chaotic pulse generator based on the chaotic Henon map is proposed. It consists of a Henon map function subcircuit to realize the Henon map and another subcircuit to perform the iterative operation. The Henon map subcircuit comprises operational amplifiers, multipliers, delay elements and resistors, whereas, the iterative subcircuit is implemented with a simple design that comprises of an edge forming circuit followed by… More >

  • Open Access


    A Speech Cryptosystem Using the New Chaotic System with a Capsule-Shaped Equilibrium Curve

    Mohamad Afendee Mohamed1, Talal Bonny2, Aceng Sambas3, Sundarapandian Vaidyanathan4, Wafaa Al Nassan2, Sen Zhang5, Khaled Obaideen2, Mustafa Mamat1, Mohd Kamal Mohd Nawawi6,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5987-6006, 2023, DOI:10.32604/cmc.2023.035668

    Abstract In recent years, there are numerous studies on chaotic systems with special equilibrium curves having various shapes such as circle, butterfly, heart and apple. This paper describes a new 3-D chaotic dynamical system with a capsule-shaped equilibrium curve. The proposed chaotic system has two quadratic, two cubic and two quartic nonlinear terms. It is noted that the proposed chaotic system has a hidden attractor since it has an infinite number of equilibrium points. It is also established that the proposed chaotic system exhibits multi-stability with two coexisting chaotic attractors for the same parameter values but differential initial states. A detailed… More >

  • Open Access


    An Improved Elite Slime Mould Algorithm for Engineering Design

    Li Yuan1, Jianping Ji1, Xuegong Liu1, Tong Liu2, Huiling Chen3, Deng Chen4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 415-454, 2023, DOI:10.32604/cmes.2023.026098

    Abstract The Swarm intelligence algorithm is a very prevalent field in which some scholars have made outstanding achievements. As a representative, Slime mould algorithm (SMA) is widely used because of its superior initial performance. Therefore, this paper focuses on the improvement of the SMA and the mitigation of its stagnation problems. For this aim, the structure of SMA is adjusted to develop the efficiency of the original method. As a stochastic optimizer, SMA mainly stimulates the behavior of slime mold in nature. For the harmony of the exploration and exploitation of SMA, the paper proposed an enhanced algorithm of SMA called… More > Graphic Abstract

    An Improved Elite Slime Mould Algorithm for Engineering Design

  • Open Access


    A Color Image Encryption Scheme Based on Singular Values and Chaos

    Adnan Malik1, Muhammad Ali1, Faisal S. Alsubaei2, Nisar Ahmed3,*, Harish Kumar4

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 965-999, 2023, DOI:10.32604/cmes.2023.022493

    Abstract The security of digital images transmitted via the Internet or other public media is of the utmost importance. Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities. This study provides an approach to color image encryption that could find practical use in various contexts. The proposed method, which combines four chaotic systems, employs singular value decomposition and a chaotic sequence, making it both secure and compression-friendly. The unified average change intensity, the number of pixels’ change rate, information entropy analysis, correlation coefficient analysis,… More >

  • Open Access


    An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher

    Ghofran Kh. Shraida1, Hameed A. Younis1, Taief Alaa Al-Amiedy2, Mohammed Anbar2,*, Hussain A. Younis3,4, Iznan H. Hasbullah2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2641-2654, 2023, DOI:10.32604/cmc.2023.035793

    Abstract Nowadays, high-resolution images pose several challenges in the context of image encryption. The encryption of huge images’ file sizes requires high computational resources. Traditional encryption techniques like, Data Encryption Standard (DES), and Advanced Encryption Standard (AES) are not only inefficient, but also less secure. Due to characteristics of chaos theory, such as periodicity, sensitivity to initial conditions and control parameters, and unpredictability. Hence, the characteristics of deoxyribonucleic acid (DNA), such as vast parallelism and large storage capacity, make it a promising field. This paper presents an efficient color image encryption method utilizing DNA encoding with two types of hyper-chaotic maps.… More >

Displaying 1-10 on page 1 of 44. Per Page