Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    New Perspective to Isogeometric Analysis: Solving Isogeometric Analysis Problem by Fitting Load Function

    Jingwen Ren1, Hongwei Lin1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2957-2984, 2023, DOI:10.32604/cmes.2023.025983

    Abstract Isogeometric analysis (IGA) is introduced to establish the direct link between computer-aided design and analysis. It is commonly implemented by Galerkin formulations (isogeometric Galerkin, IGA-G) through the use of nonuniform rational B-splines (NURBS) basis functions for geometric design and analysis. Another promising approach, isogeometric collocation (IGA-C), working directly with the strong form of the partial differential equation (PDE) over the physical domain defined by NURBS geometry, calculates the derivatives of the numerical solution at the chosen collocation points. In a typical IGA, the knot vector of the NURBS numerical solution is only determined by the physical domain. A new perspective… More > Graphic Abstract

    New Perspective to Isogeometric Analysis: Solving Isogeometric Analysis Problem by Fitting Load Function

  • Open Access

    ARTICLE

    Feature Point Detection for Repacked Android Apps

    M. A. Rahim Khan*, Manoj Kumar Jain

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1359-1373, 2020, DOI:10.32604/iasc.2020.013849

    Abstract Repacked mobile applications and obfuscation attacks constitute a significant threat to the Android technological ecosystem. A novel method using the Constant Key Point Selection and Limited Binary Pattern Feature (CKPS: LBP) extraction-based Hashing has been proposed to identify repacked Android applications in previous works. Although the approach was efficient in detecting the repacked Android apps, it was not suitable for detecting obfuscation attacks. Additionally, the time complexity needed improvement. This paper presents an optimization technique using Scalable Bivariant Feature Transformation extract optimum feature-points extraction, and the Harris method applied for optimized image hashing. The experiments produced better results than the… More >

Displaying 1-10 on page 1 of 2. Per Page