Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (93)
  • Open Access

    PROCEEDINGS

    Deformation Behaviour and Strengthening Mechanism of High-Entropy Alloys Using Model and Simulation

    Jia Li1, Yang Chen1, Baobin Xie1, Weizheng Lu1, Qihong Fang1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.25, No.3, pp. 1-2, 2023, DOI:10.32604/icces.2023.010064

    Abstract The high-profile high-entropy alloy shows outstanding mechanical properties. However, the accurate and reasonable models for describing the mechanical behavior of HEAs are still scarce due to their distinctive characteristics such as serious lattice distortion, which limit the engineering application. We have developed a new general framework combining atomic simulation, discrete dislocation dynamics and crystal plasticity finite element method, to study the deformation behaviour and strengthening mechanism of HEAs, and realized the influence of complex cross-scale factors on material deformation [1-3]. Compared with the classic crystal plasticity finite element, the bottom-up hierarchical multiscale model could couple the underlying physical mechanisms from… More >

  • Open Access

    ARTICLE

    NUMERICAL INVESTIGATION AND ANALYSIS OF HEAT TRANSFER ENHANCEMENT IN A MICROCHANNEL USING NANOFLUIDS BY THE LATTICE BOLTZMANN METHOD

    Rahouadja Zarita*, Madjid Hachemi

    Frontiers in Heat and Mass Transfer, Vol.12, pp. 1-12, 2019, DOI:10.5098/hmt.12.5

    Abstract In this work, heat transfer enhancement in a microchannel using water-Ag nanofluid has been investigated numerically by the lattice Boltzmann method (LBM) by adopting the stream and collide algorithm, with the (BGK) approximation. The base fluid and the suspended nanoparticles are considered as a homogeneous mixture. And single phase model with first order slip and jump boundary conditions has been adopted. Thermophysical properties of water-Ag nanofluid are estimated by the theoretical models. Effects of change in nanoparticle volume fractions, Reynolds number and Knudsen number are considered. It was concluded that change in nanoparticle volume fractions did not have significant effects… More >

  • Open Access

    ARTICLE

    Numerical Stability and Accuracy of Contact Angle Schemes in Pseudopotential Lattice Boltzmann Model for Simulating Static Wetting and Dynamic Wetting

    Dongmin Wang1,2,*, Gaoshuai Lin1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 299-318, 2023, DOI:10.32604/cmes.2023.027280

    Abstract There are five most widely used contact angle schemes in the pseudopotential lattice Boltzmann (LB) model for simulating the wetting phenomenon: The pseudopotential-based scheme (PB scheme), the improved virtual-density scheme (IVD scheme), the modified pseudopotential-based scheme with a ghost fluid layer constructed by using the fluid layer density above the wall (MPB-C scheme), the modified pseudopotential-based scheme with a ghost fluid layer constructed by using the weighted average density of surrounding fluid nodes (MPB-W scheme) and the geometric formulation scheme (GF scheme). But the numerical stability and accuracy of the schemes for wetting simulation remain unclear in the past. In… More >

  • Open Access

    ARTICLE

    Effect of Particle Orientation on Heat Transfer in Arrays of Prolate Particles

    Romana Basit1, Xinyang Li1, Zheqing Huang1, Qiang Zhou1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1509-1526, 2023, DOI:10.32604/cmes.2023.025308

    Abstract Direct Numerical Simulations have been carried out to study the forced convection heat transfer of flow through fixed prolate particles for a variety of aspect ratios ar = {5/4, 5/3, 5/1} with Reynolds number (Re) up to 100. Three variations of the solid volume fraction c = {0.1, 0.2, 0.3} with four Hermans orientation factors S = {−0.5, 0, 0.5, 1} are studied. It has been found that changes in S cause prominent variations in the Nusselt number. In general, Nusselt number increases with the decrease of S. For all three aspect ratios, the Nusselt number remains a linear function… More > Graphic Abstract

    Effect of Particle Orientation on Heat Transfer in Arrays of Prolate Particles

  • Open Access

    ARTICLE

    Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment

    Naveed Khan1, Zhang Jianbiao1, Intikhab Ullah2, Muhammad Salman Pathan3, Huhnkuk Lim4,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 35-49, 2023, DOI:10.32604/cmc.2023.036189

    Abstract Public cloud computing provides a variety of services to consumers via high-speed internet. The consumer can access these services anytime and anywhere on a balanced service cost. Many traditional authentication protocols are proposed to secure public cloud computing. However, the rapid development of high-speed internet and organizations’ race to develop quantum computers is a nightmare for existing authentication schemes. These traditional authentication protocols are based on factorization or discrete logarithm problems. As a result, traditional authentication protocols are vulnerable in the quantum computing era. Therefore, in this article, we have proposed an authentication protocol based on the lattice technique for… More >

  • Open Access

    ARTICLE

    Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key

    Wangke Yu, Shuhua Wang*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 67-80, 2023, DOI:10.32604/cmc.2023.035337

    Abstract Wireless network is the basis of the Internet of things and the intelligent vehicle Internet. Due to the complexity of the Internet of things and intelligent vehicle Internet environment, the nodes of the Internet of things and the intelligent vehicle Internet are more vulnerable to malicious destruction and attacks. Most of the proposed authentication and key agreement protocols for wireless networks are based on traditional cryptosystems such as large integer decomposition and elliptic curves. With the rapid development of quantum computing, these authentication protocols based on traditional cryptography will be more and more threatened, so it is necessary to design… More >

  • Open Access

    ARTICLE

    Skeleton-Based Volumetric Parameterizations for Lattice Structures

    Long Chen1,*, Shuxun Liang2, Nan Yan2, Xiangqian Yang2, Baotong Li3

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 687-709, 2023, DOI:10.32604/cmes.2022.021986

    Abstract Lattice structures with excellent physical properties have attracted great research interest. In this paper, a novel volume parametric modeling method based on the skeleton model is proposed for the construction of three-dimensional lattice structures. The skeleton model is divided into three types of nodes. And the corresponding algorithms are utilized to construct diverse types of volume parametric nodes. The unit-cell is assembled with distinct nodes according to the geometric features. The final lattice structure is created by the periodic arrangement of unit-cells. Several different types of volume parametric lattice structures are constructed to prove the stability and applicability of the… More > Graphic Abstract

    Skeleton-Based Volumetric Parameterizations for Lattice Structures

  • Open Access

    ARTICLE

    A Fixed-Point Iterative Method for Discrete Tomography Reconstruction Based on Intelligent Optimization

    Luyao Yang1,#, Hao Chen2,#, Haocheng Yu1, Jin Qiu1,*, Shuxian Zhu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 731-745, 2023, DOI:10.32604/cmes.2022.020656

    Abstract Discrete Tomography (DT) is a technology that uses image projection to reconstruct images. Its reconstruction problem, especially the binary image (0–1 matrix) has attracted strong attention. In this study, a fixed point iterative method of integer programming based on intelligent optimization is proposed to optimize the reconstructed model. The solution process can be divided into two procedures. First, the DT problem is reformulated into a polyhedron judgment problem based on lattice basis reduction. Second, the fixed-point iterative method of Dang and Ye is used to judge whether an integer point exists in the polyhedron of the previous program. All the… More >

  • Open Access

    ARTICLE

    Evaluation of Codebook Design Using SCMA Scheme Based on An and Dn Lattices

    G. Rajamanickam1,*, G. Ravi2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3037-3048, 2023, DOI:10.32604/iasc.2023.029996

    Abstract The sparse code multiple access (SCMA) scheme is a Non-Orthogonal Multiple Access (NOMA) type of scheme that is used to handle the uplink component of mobile communication in the current generation. A need of the 5G mobile network is the ability to handle more users. To accommodate this, the SCMA allows each user to deploy a variety of sub-carrier broadcasts, and several consumers may contribute to the same frequency using superposition coding. The SCMA approach, together with codebook design for each user, is used to improve channel efficiency through better management of the available spectrum. However, developing a codebook with… More >

  • Open Access

    ARTICLE

    Some Properties of Degenerate r-Dowling Polynomials and Numbers of the Second Kind

    Hye Kyung Kim1,*, Dae Sik Lee2

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.3, pp. 825-842, 2022, DOI:10.32604/cmes.2022.022103

    Abstract The generating functions of special numbers and polynomials have various applications in many fields as well as mathematics and physics. In recent years, some mathematicians have studied degenerate version of them and obtained many interesting results. With this in mind, in this paper, we introduce the degenerate r-Dowling polynomials and numbers associated with the degenerate r-Whitney numbers of the second kind. We derive many interesting properties and identities for them including generating functions, Dobinski-like formula, integral representations, recurrence relations, differential equation and various explicit expressions. In addition, we explore some expressions for them that can be derived from repeated applications… More >

Displaying 11-20 on page 2 of 93. Per Page