Results 61 to 70 of about 383,874 (285)

A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions

open access: yesAdvanced Engineering Materials, EarlyView.
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice   +2 more
wiley   +1 more source

Quantum Chosen-Cipher Attack on Camellia

open access: yesMathematics
The Feistel structure represents a fundamental architectural component within the domain of symmetric cryptographic algorithms, with a substantial body of research conducted within the context of classical computing environments.
Yanjun Li   +4 more
doaj   +1 more source

Images Encryption Method using Steganographic LSB Method, AES and RSA algorithm

open access: yesNonlinear Engineering, 2017
Vulnerability of communication of digital images is an extremely important issue nowadays, particularly when the images are communicated through insecure channels.
Moumen Abdelkader, Sissaoui Hocine
doaj   +1 more source

Numerical Modeling of Tank Cars Carrying Hazardous Materials With and Without Composite Metal Foam

open access: yesAdvanced Engineering Materials, EarlyView.
Large‐scale puncture models consisting of hazardous materials (HAZMATs) tank car with protective steel–steel composite metal foam (S–S CMF) are solved numerically. Tank car plate with added 10.91–13.33 mm thick S–S CMF layer does not puncture. Protective S–S CMF absorbs impact energy, reduces plate deformation, and prevents shear bands formation ...
Aman Kaushik, Afsaneh Rabiei
wiley   +1 more source

Experimental authentication of quantum key distribution with post-quantum cryptography

open access: yesnpj Quantum Information, 2021
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang   +11 more
doaj   +1 more source

On Quasi-Newton Forward--Backward Splitting: Proximal Calculus and Convergence [PDF]

open access: yes, 2018
We introduce a framework for quasi-Newton forward--backward splitting algorithms (proximal quasi-Newton methods) with a metric induced by diagonal $\pm$ rank-$r$ symmetric positive definite matrices.
Becker, Stephen   +2 more
core   +1 more source

Phase Field Failure Modeling: Brittle‐Ductile Dual‐Phase Microstructures under Compressive Loading

open access: yesAdvanced Engineering Materials, EarlyView.
The approach by Amor and the approach by Miehe and Zhang for asymmetric damage behavior in the phase field method for fracture are compared regarding their fitness for microcrack‐based failure modeling. The comparison is performed for the case of a dual‐phase microstructure with a brittle and a ductile constituent.
Jakob Huber, Jan Torgersen, Ewald Werner
wiley   +1 more source

A New Encryption Algorithm Using Symmetric Key Cryptography

open access: yesInternational Journal of Engineering & Technology, 2018
Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography.
Gowtham Tumati   +3 more
openaire   +2 more sources

Multimodal Data‐Driven Microstructure Characterization

open access: yesAdvanced Engineering Materials, EarlyView.
A self‐consistent autonomous workflow for EBSP‐based microstructure segmentation by integrating PCA, GMM clustering, and cNMF with information‐theoretic parameter selection, requiring no user input. An optimal ROI size related to characteristic grain size is identified.
Qi Zhang   +4 more
wiley   +1 more source

A Symmetric Encryption Method for Transmitting IEC 62351 Communicaiton Keys in Substations

open access: yesZhongguo dianli, 2019
With the improvement of the information level of the substation, the cyber security problem of information communication has become increasingly prominent.
Fang FANG   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy