A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice +2 more
wiley +1 more source
Quantum Chosen-Cipher Attack on Camellia
The Feistel structure represents a fundamental architectural component within the domain of symmetric cryptographic algorithms, with a substantial body of research conducted within the context of classical computing environments.
Yanjun Li +4 more
doaj +1 more source
Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels.
Moumen Abdelkader, Sissaoui Hocine
doaj +1 more source
Numerical Modeling of Tank Cars Carrying Hazardous Materials With and Without Composite Metal Foam
Large‐scale puncture models consisting of hazardous materials (HAZMATs) tank car with protective steel–steel composite metal foam (S–S CMF) are solved numerically. Tank car plate with added 10.91–13.33 mm thick S–S CMF layer does not puncture. Protective S–S CMF absorbs impact energy, reduces plate deformation, and prevents shear bands formation ...
Aman Kaushik, Afsaneh Rabiei
wiley +1 more source
Experimental authentication of quantum key distribution with post-quantum cryptography
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang +11 more
doaj +1 more source
On Quasi-Newton Forward--Backward Splitting: Proximal Calculus and Convergence [PDF]
We introduce a framework for quasi-Newton forward--backward splitting algorithms (proximal quasi-Newton methods) with a metric induced by diagonal $\pm$ rank-$r$ symmetric positive definite matrices.
Becker, Stephen +2 more
core +1 more source
Phase Field Failure Modeling: Brittle‐Ductile Dual‐Phase Microstructures under Compressive Loading
The approach by Amor and the approach by Miehe and Zhang for asymmetric damage behavior in the phase field method for fracture are compared regarding their fitness for microcrack‐based failure modeling. The comparison is performed for the case of a dual‐phase microstructure with a brittle and a ductile constituent.
Jakob Huber, Jan Torgersen, Ewald Werner
wiley +1 more source
A New Encryption Algorithm Using Symmetric Key Cryptography
Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography.
Gowtham Tumati +3 more
openaire +2 more sources
Multimodal Data‐Driven Microstructure Characterization
A self‐consistent autonomous workflow for EBSP‐based microstructure segmentation by integrating PCA, GMM clustering, and cNMF with information‐theoretic parameter selection, requiring no user input. An optimal ROI size related to characteristic grain size is identified.
Qi Zhang +4 more
wiley +1 more source
A Symmetric Encryption Method for Transmitting IEC 62351 Communicaiton Keys in Substations
With the improvement of the information level of the substation, the cyber security problem of information communication has become increasingly prominent.
Fang FANG +3 more
doaj +1 more source

