Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security

    Sumaira Azhar1, Naveed Ahmed Azam2,*, Umar Hayat1

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 4971-4988, 2022, DOI:10.32604/cmc.2022.023685 - 14 January 2022

    Abstract The demand for data security schemes has increased with the significant advancement in the field of computation and communication networks. We propose a novel three-step text encryption scheme that has provable security against computation attacks such as key attack and statistical attack. The proposed scheme is based on the Pell sequence and elliptic curves, where at the first step the plain text is diffused to get a meaningless plain text by applying a cyclic shift on the symbol set. In the second step, we hide the elements of the diffused plain text from the attackers. More >

  • Open Access

    ARTICLE

    Graphics Evolutionary Computations in Higher Order Parametric Bezier Curves

    Monday Eze1,*, Charles Okunbor2, Deborah Aleburu3, Olubukola Adekola1, Ibrahim Ramon4, Nneka Richard-Nnabu5, Oghenetega Avwokuruaye6, Abisola Olayiwola3, Rume Yoro7, Esomu Solomon8

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 595-609, 2022, DOI:10.32604/csse.2022.020835 - 25 October 2021

    Abstract This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand More >

  • Open Access

    ARTICLE

    Numerical Solutions of a Novel Designed Prevention Class in the HIV Nonlinear Model

    Zulqurnain Sabir1, Muhammad Umar1, Muhammad Asif Zahoor Raja2,*, Dumitru Baleanu3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 227-251, 2021, DOI:10.32604/cmes.2021.016611 - 24 August 2021

    Abstract The presented research aims to design a new prevention class (P) in the HIV nonlinear system, i.e., the HIPV model. Then numerical treatment of the newly formulated HIPV model is portrayed handled by using the strength of stochastic procedure based numerical computing schemes exploiting the artificial neural networks (ANNs) modeling legacy together with the optimization competence of the hybrid of global and local search schemes via genetic algorithms (GAs) and active-set approach (ASA), i.e., GA-ASA. The optimization performances through GA-ASA are accessed by presenting an error-based fitness function designed for all the classes of the More >

  • Open Access

    ARTICLE

    Efficient Flexible M-Tree Bulk Loading Using FastMap and Space-Filling Curves

    Woong-Kee Loh*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1251-1267, 2021, DOI:10.32604/cmc.2020.012763 - 26 November 2020

    Abstract Many database applications currently deal with objects in a metric space. Examples of such objects include unstructured multimedia objects and points of interest (POIs) in a road network. The M-tree is a dynamic index structure that facilitates an efficient search for objects in a metric space. Studies have been conducted on the bulk loading of large datasets in an M-tree. However, because previous algorithms involve excessive distance computations and disk accesses, they perform poorly in terms of their index construction and search capability. This study proposes two efficient M-tree bulk loading algorithms. Our algorithms minimize More >

  • Open Access

    ARTICLE

    Operational Safety Assessment of a High-Speed Train Exposed to the Strong Gust Wind

    Mengge Yu1, 2, Zhenkuan Pan3, *, Jiali Liu4, Haiqing Li1

    FDMP-Fluid Dynamics & Materials Processing, Vol.16, No.1, pp. 55-66, 2020, DOI:10.32604/fdmp.2020.07774 - 01 February 2020

    Abstract The operational safety characteristics of trains exposed to a strong wind have caused great concern in recent years. In the present paper, the effect of the strong gust wind on a high-speed train is investigated. A typical gust wind model for any wind angle, named “Chinese hat gust wind model”, was first constructed, and an algorithm for computing the aerodynamic loads was elaborated accordingly. A vehicle system dynamic model was then set up in order to investigate the vehicle system dynamic characteristics. The assessment of the operational safety has been conducted by means of characteristic… More >

  • Open Access

    ABSTRACT

    Investigation on Energy Characteristic of RBCs Deformability: A Quantitative Analysis of Extending and Retracting Curves Based on AFM

    Dong Chen1, Xiang Wang1,*, Fuzhou Tang2, Yajin Zhao1

    Molecular & Cellular Biomechanics, Vol.16, Suppl.2, pp. 150-150, 2019, DOI:10.32604/mcb.2019.07071

    Abstract Deformability is a fundamental property of the cells and tissues of living organisms, which is commonly detected to indicate the state of the cells. And the cell deformability usually depends on the methods that we used, which is easy to be confused. The present research is designed to explore the energy characteristic of red blood cell deformability, based on a quantitative analysis of extending-retracting curves acquired from atomic force microscopy. ATP-depleted red blood cells are prepared by treatment with free-glucose Ringer solution. Our results clearly show that the Youngs’ modulus of erythrocyte is closely depended… More >

  • Open Access

    ARTICLE

    Fragility Assessment of Pre-Northridge Steel Moment Frames Using Finite-Length Plastic Hinge Elements and Concentrated Plasticity Fracture Elements

    Filipe L. A. Ribeiro1,*, Andre R. Barbosa2, Luis C. Neves3

    CMES-Computer Modeling in Engineering & Sciences, Vol.120, No.3, pp. 657-676, 2019, DOI:10.32604/cmes.2019.06296

    Abstract Although pre-Northridge earthquake steel moment resisting frame buildings have been shown to be susceptible to brittle connection failures, they still represent a large fraction of the existing steel buildings in the United States of America. In this study, the performance of the 3- and 9-story Los Angeles pre-Northridge SAC buildings are analyzed considering ductile and brittle beam-column connection failures, and their uncertainty. This paper contributes to understanding the influence of uncertainty associated with connections brittle fracture on building interstory deformation capacity and its impact on bias and variability of fragility functions and loss assessment. The More >

  • Open Access

    ARTICLE

    An Improved Integration for Trimmed Geometries in Isogeometric Analysis

    Jinlan Xu1, Ningning Sun1, Laixin Shu1, Timon Rabczuk2, Gang Xu1,*

    CMC-Computers, Materials & Continua, Vol.60, No.2, pp. 615-632, 2019, DOI:10.32604/cmc.2019.04464

    Abstract Trimming techniques are efficient ways to generate complex geometries in Computer-Aided Design (CAD). In this paper, an improved integration for trimmed geometries in isogeometric analysis (IGA) is proposed. The proposed method can improve the accuracy of the approximation and the condition number of the stiffness matrix. In addition, comparing to the traditional approaches, the trimming techniques can reduce the number of the integration elements with much fewer integration points, which improves the computational efficiency significantly. Several examples are illustrated to show the effectiveness of the proposed approach. More >

  • Open Access

    ARTICLE

    Efficient Construction of B-Spline Curves with Minimal Internal Energy

    Gang Xu1,*, Yufan Zhu1, Lishan Deng1, Guozhao Wang2, Bojian Li1, Kin-chuen Hui3

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 879-892, 2019, DOI:10.32604/cmc.2019.03752

    Abstract In this paper, we propose an efficient method to construct energy-minimizing B-spline curves by using discrete mask method. The linear relations between control points are firstly derived for different energy-minimization problems, then the construction of B-spline curve with minimal internal energy can be addressed by solving a sparse linear system. The existence and uniqueness of the solution for the linear system are also proved. Experimental results show the efficiency of the proposed approach, and its application in G1 blending curve construction is also presented. More >

  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the More >

Displaying 11-20 on page 2 of 31. Per Page