This study presents the Chebyshev polynomials-based Ritz method to examine the thermal buckling and free vibration characteristics of metal foam beams.The analyses include three models for porosity distribution and tw...This study presents the Chebyshev polynomials-based Ritz method to examine the thermal buckling and free vibration characteristics of metal foam beams.The analyses include three models for porosity distribution and two scenarios for thermal distribution.The material properties are assessed under two conditions,i.e.,temperature dependence and temperature independence.The theoretical framework for the beams is based on the higher-order shear deformation theory,which incorporates shear deformations with higher-order polynomials.The governing equations are established from the Lagrange equations,and the beam displacement fields are approximated by the Chebyshev polynomials.Numerical simulations are performed to evaluate the effects of thermal load,slenderness,boundary condition(BC),and porosity distribution on the buckling and vibration behaviors of metal foam beams.The findings highlight the significant influence of temperature-dependent(TD)material properties on metal foam beams'buckling and vibration responses.展开更多
文章研究多服务器、多客户端联邦学习(federated learning,FL)场景中的激励机制,并将任务分配和定价问题建模为多个逆向拍卖问题。根据切比雪夫(Chebyshev)定理对客户端每一轮的本地模型性能进行评估,并进一步利用指数衰减函数评估其本...文章研究多服务器、多客户端联邦学习(federated learning,FL)场景中的激励机制,并将任务分配和定价问题建模为多个逆向拍卖问题。根据切比雪夫(Chebyshev)定理对客户端每一轮的本地模型性能进行评估,并进一步利用指数衰减函数评估其本地模型的总体性能;设计基于本地模型性能的逆向拍卖(local model performance based reverse auction,LPRA)算法解决任务分配和定价问题以激励更多高性能的客户端参与,并从理论上证明LPRA算法满足个体理性、真实性和计算高效性;通过仿真实验验证LPRA算法的有效性。展开更多
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly...Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly hundreds of billions of devices will be linked together.These smart devices will be able to gather data,process it,and even come to decisions on their own.Security is the most essential thing in these situations.In IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange techniques.The majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation processes.The focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned above.The proposed three-party AKEP is protected from several attacks.The proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing costs.To protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client anonymity.Finally,the presented procedure offers better security features than the procedures currently available in the literature.展开更多
The current study examines the important class of Chebyshev’s differential equations via the application of the efficient Adomian Decomposition Method (ADM) and its modifications. We have proved the effectiveness of ...The current study examines the important class of Chebyshev’s differential equations via the application of the efficient Adomian Decomposition Method (ADM) and its modifications. We have proved the effectiveness of the employed methods by acquiring exact analytical solutions for the governing equations in most cases;while minimal noisy error terms have been observed in a particular method modification. Above all, the presented approaches have rightly affirmed the exactitude of the available literature. More to the point, the application of this methodology could be extended to examine various forms of high-order differential equations, as approximate exact solutions are rapidly attained with less computation stress.展开更多
文摘This study presents the Chebyshev polynomials-based Ritz method to examine the thermal buckling and free vibration characteristics of metal foam beams.The analyses include three models for porosity distribution and two scenarios for thermal distribution.The material properties are assessed under two conditions,i.e.,temperature dependence and temperature independence.The theoretical framework for the beams is based on the higher-order shear deformation theory,which incorporates shear deformations with higher-order polynomials.The governing equations are established from the Lagrange equations,and the beam displacement fields are approximated by the Chebyshev polynomials.Numerical simulations are performed to evaluate the effects of thermal load,slenderness,boundary condition(BC),and porosity distribution on the buckling and vibration behaviors of metal foam beams.The findings highlight the significant influence of temperature-dependent(TD)material properties on metal foam beams'buckling and vibration responses.
文摘文章研究多服务器、多客户端联邦学习(federated learning,FL)场景中的激励机制,并将任务分配和定价问题建模为多个逆向拍卖问题。根据切比雪夫(Chebyshev)定理对客户端每一轮的本地模型性能进行评估,并进一步利用指数衰减函数评估其本地模型的总体性能;设计基于本地模型性能的逆向拍卖(local model performance based reverse auction,LPRA)算法解决任务分配和定价问题以激励更多高性能的客户端参与,并从理论上证明LPRA算法满足个体理性、真实性和计算高效性;通过仿真实验验证LPRA算法的有效性。
文摘Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly hundreds of billions of devices will be linked together.These smart devices will be able to gather data,process it,and even come to decisions on their own.Security is the most essential thing in these situations.In IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange techniques.The majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation processes.The focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned above.The proposed three-party AKEP is protected from several attacks.The proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing costs.To protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client anonymity.Finally,the presented procedure offers better security features than the procedures currently available in the literature.
文摘The current study examines the important class of Chebyshev’s differential equations via the application of the efficient Adomian Decomposition Method (ADM) and its modifications. We have proved the effectiveness of the employed methods by acquiring exact analytical solutions for the governing equations in most cases;while minimal noisy error terms have been observed in a particular method modification. Above all, the presented approaches have rightly affirmed the exactitude of the available literature. More to the point, the application of this methodology could be extended to examine various forms of high-order differential equations, as approximate exact solutions are rapidly attained with less computation stress.