Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (92)
  • Open Access


    Degenerate s-Extended Complete and Incomplete Lah-Bell Polynomials

    Hye Kyung Kim1,*, Dae Sik Lee2

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.3, pp. 1479-1495, 2022, DOI:10.32604/cmes.2022.017616

    Abstract Degenerate versions of special polynomials and numbers applied to social problems, physics, and applied mathematics have been studied variously in recent years. Moreover, the (s-)Lah numbers have many other interesting applications in analysis and combinatorics. In this paper, we divide two parts. We first introduce new types of both degenerate incomplete and complete s-Bell polynomials respectively and investigate some properties of them respectively. Second, we introduce the degenerate versions of complete and incomplete Lah-Bell polynomials as multivariate forms for a new type of degenerate s-extended Lah-Bell polynomials and numbers respectively. We investigate relations between these polynomials and degenerate incomplete and… More >

  • Open Access


    Comparative Study of Machine Learning Modeling for Unsteady Aerodynamics

    Mohammad Alkhedher*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1901-1920, 2022, DOI:10.32604/cmc.2022.025334

    Abstract Modern fighters are designed to fly at high angle of attacks reaching 90 deg as part of their routine maneuvers. These maneuvers generate complex nonlinear and unsteady aerodynamic loading. In this study, different aerodynamic prediction tools are investigated to achieve a model which is highly accurate, less computational, and provides a stable prediction of associated unsteady aerodynamics that results from high angle of attack maneuvers. These prediction tools include Artificial Neural Networks (ANN) model, Adaptive Neuro Fuzzy Logic Inference System (ANFIS), Fourier model, and Polynomial Classifier Networks (PCN). The main aim of the prediction model is to estimate the pitch… More >

  • Open Access


    An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures

    Chandrashekhar Meshram1,*, Agbotiname Lucky Imoize2,3, Sajjad Shaukat Jamal4, Parkash Tambare5, Adel R. Alharbi6, Iqtadar Hussain7

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1373-1389, 2022, DOI:10.32604/cmc.2022.024996

    Abstract The Human-Centered Internet of Things (HC-IoT) is fast becoming a hotbed of security and privacy concerns. Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement. Most of the early authenticated key agreement systems relied on pairing, hashing, or modular exponentiation processes that are computationally intensive and cost-prohibitive. In order to address this problem, this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps. The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network… More >

  • Open Access


    On Degenerate Array Type Polynomials

    Lan Wu1, Xue-Yan Chen1, Muhammet Cihat Dağli2, Feng Qi3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 295-305, 2022, DOI:10.32604/cmes.2022.018778

    Abstract In the paper, with the help of the Faá di Bruno formula and an identity of the Bell polynomials of the second kind, the authors define degenerate λ-array type polynomials, establish two explicit formulas, and present several recurrence relations of degenerate λ-array type polynomials and numbers. More >

  • Open Access


    k-Order Fibonacci Polynomials on AES-Like Cryptology

    Mustafa Asci, Suleyman Aydinyuz*

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 277-293, 2022, DOI:10.32604/cmes.2022.017898

    Abstract The Advanced Encryption Standard (AES) is the most widely used symmetric cipher today. AES has an important place in cryptology. Finite field, also known as Galois Fields, are cornerstones for understanding any cryptography. This encryption method on AES is a method that uses polynomials on Galois fields. In this paper, we generalize the AES-like cryptology on 2 × 2 matrices. We redefine the elements of k-order Fibonacci polynomials sequences using a certain irreducible polynomial in our cryptology algorithm. So, this cryptology algorithm is called AES-like cryptology on the k-order Fibonacci polynomial matrix. More >

  • Open Access


    Enhanced Mesh Network Using Novel Forgotten Polynomial Algorithm for Pharmaceutical Design

    D. Ahila Jeyanthi*, T. M. Selvarajan

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 669-680, 2022, DOI:10.32604/iasc.2022.022187

    Abstract The molecular structures are modelled as graphs which are called the molecular graphs. In these graphs, each vertex represents an atom and each edge denotes covalent bond between atoms. It is shown that the topological indices defined on the molecular graphs can reflect the chemical characteristics of chemical compounds and drugs. A large number of previous drug experiments revealed that there are strong inherent connections between the drug’s molecular structures and the bio-medical and pharmacology characteristics. The forgotten topological index is introduced to be applied into chemical compound and drug molecular structures, which is quite helpful for medical and pharmaceutical… More >

  • Open Access


    Note on a New Construction of Kantorovich Form q-Bernstein Operators Related to Shape Parameter λ

    Qingbo Cai1, Reşat Aslan2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.3, pp. 1479-1493, 2022, DOI:10.32604/cmes.2022.018338

    Abstract The main purpose of this paper is to introduce some approximation properties of a Kantorovich kind q-Bernstein operators related to Bézier basis functions with shape parameter . Firstly, we compute some basic results such as moments and central moments, and derive the Korovkin type approximation theorem for these operators. Next, we estimate the order of convergence in terms of the usual modulus of continuity, for the functions belong to Lipschitz-type class and Peetre’s K-functional, respectively. Lastly, with the aid of Maple software, we present the comparison of the convergence of these newly defined operators to the certain function with some… More >

  • Open Access


    Lacunary Generating Functions of Hybrid Type Polynomials in Viewpoint of Symbolic Approach

    Nusrat Raza1, Umme Zainab2 and Serkan Araci3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.2, pp. 903-921, 2022, DOI:10.32604/cmes.2022.017669

    Abstract In this paper, we introduce mon-symbolic method to obtain the generating functions of the hybrid class of Hermite-associated Laguerre and its associated polynomials. We obtain the series definitions of these hybrid special polynomials. Also, we derive the double lacunary generating functions of the Hermite-Laguerre polynomials and the Hermite-Laguerre-Wright polynomials. Further, we find multiplicative and derivative operators for the Hermite-Laguerre-Wright polynomials which helps to find the symbolic differential equation of the Hermite-Laguerre-Wright polynomials. Some concluding remarks are also given. More >

  • Open Access


    Approximation by Szász Type Operators Involving Apostol-Genocchi Polynomials

    Mine Menekşe Yılmaz*

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 287-297, 2022, DOI:10.32604/cmes.2022.017385

    Abstract The goal of this paper is to give a form of the operator involving the generating function of Apostol-Genocchi polynomials of order α. Applying the Korovkin theorem, we arrive at the convergence of the operator with the aid of moments and central moments. We determine the rate of convergence of the operator using several tools such as -functional, modulus of continuity, second modulus of continuity. We also give a type of Voronovskaya theorem for estimating error. Moreover, we investigate some results about convergence properties of the operator in a weighted space. Finally, we give numerical examples to support our theorems… More >

  • Open Access


    Distributed Secure Storage Scheme Based on Sharding Blockchain

    Jin Wang1,2, Chenchen Han1, Xiaofeng Yu3,*, Yongjun Ren4, R. Simon Sherratt5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4485-4502, 2022, DOI:10.32604/cmc.2022.020648

    Abstract Distributed storage can store data in multiple devices or servers to improve data security. However, in today's explosive growth of network data, traditional distributed storage scheme is faced with some severe challenges such as insufficient performance, data tampering, and data lose. A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed storage. Under this scheme, the following improvements have been made in this paper. This paper first analyzes the problems faced by distributed storage. Then proposed to build a new distributed storage blockchain scheme with sharding blockchain. The proposed scheme realizes the… More >

Displaying 21-30 on page 3 of 92. Per Page