This study presents the Chebyshev polynomials-based Ritz method to examine the thermal buckling and free vibration characteristics of metal foam beams.The analyses include three models for porosity distribution and tw...This study presents the Chebyshev polynomials-based Ritz method to examine the thermal buckling and free vibration characteristics of metal foam beams.The analyses include three models for porosity distribution and two scenarios for thermal distribution.The material properties are assessed under two conditions,i.e.,temperature dependence and temperature independence.The theoretical framework for the beams is based on the higher-order shear deformation theory,which incorporates shear deformations with higher-order polynomials.The governing equations are established from the Lagrange equations,and the beam displacement fields are approximated by the Chebyshev polynomials.Numerical simulations are performed to evaluate the effects of thermal load,slenderness,boundary condition(BC),and porosity distribution on the buckling and vibration behaviors of metal foam beams.The findings highlight the significant influence of temperature-dependent(TD)material properties on metal foam beams'buckling and vibration responses.展开更多
The current study examines the important class of Chebyshev’s differential equations via the application of the efficient Adomian Decomposition Method (ADM) and its modifications. We have proved the effectiveness of ...The current study examines the important class of Chebyshev’s differential equations via the application of the efficient Adomian Decomposition Method (ADM) and its modifications. We have proved the effectiveness of the employed methods by acquiring exact analytical solutions for the governing equations in most cases;while minimal noisy error terms have been observed in a particular method modification. Above all, the presented approaches have rightly affirmed the exactitude of the available literature. More to the point, the application of this methodology could be extended to examine various forms of high-order differential equations, as approximate exact solutions are rapidly attained with less computation stress.展开更多
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly...Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly hundreds of billions of devices will be linked together.These smart devices will be able to gather data,process it,and even come to decisions on their own.Security is the most essential thing in these situations.In IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange techniques.The majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation processes.The focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned above.The proposed three-party AKEP is protected from several attacks.The proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing costs.To protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client anonymity.Finally,the presented procedure offers better security features than the procedures currently available in the literature.展开更多
In expansions of arbitrary functions in Bessel functions or Spherical Bessel functions, a dual partner set of polynomials play a role. For the Bessel functions, these are the Chebyshev polynomials of first kind and fo...In expansions of arbitrary functions in Bessel functions or Spherical Bessel functions, a dual partner set of polynomials play a role. For the Bessel functions, these are the Chebyshev polynomials of first kind and for the Spherical Bessel functions the Legendre polynomials. These two sets of functions appear in many formulas of the expansion and in the completeness and (bi)-orthogonality relations. The analogy to expansions of functions in Taylor series and in moment series and to expansions in Hermite functions is elaborated. Besides other special expansion, we find the expansion of Bessel functions in Spherical Bessel functions and their inversion and of Chebyshev polynomials of first kind in Legendre polynomials and their inversion. For the operators which generate the Spherical Bessel functions from a basic Spherical Bessel function, the normally ordered (or disentangled) form is found.展开更多
文摘This study presents the Chebyshev polynomials-based Ritz method to examine the thermal buckling and free vibration characteristics of metal foam beams.The analyses include three models for porosity distribution and two scenarios for thermal distribution.The material properties are assessed under two conditions,i.e.,temperature dependence and temperature independence.The theoretical framework for the beams is based on the higher-order shear deformation theory,which incorporates shear deformations with higher-order polynomials.The governing equations are established from the Lagrange equations,and the beam displacement fields are approximated by the Chebyshev polynomials.Numerical simulations are performed to evaluate the effects of thermal load,slenderness,boundary condition(BC),and porosity distribution on the buckling and vibration behaviors of metal foam beams.The findings highlight the significant influence of temperature-dependent(TD)material properties on metal foam beams'buckling and vibration responses.
文摘The current study examines the important class of Chebyshev’s differential equations via the application of the efficient Adomian Decomposition Method (ADM) and its modifications. We have proved the effectiveness of the employed methods by acquiring exact analytical solutions for the governing equations in most cases;while minimal noisy error terms have been observed in a particular method modification. Above all, the presented approaches have rightly affirmed the exactitude of the available literature. More to the point, the application of this methodology could be extended to examine various forms of high-order differential equations, as approximate exact solutions are rapidly attained with less computation stress.
文摘Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological developments.As a result,tens of billions or possibly hundreds of billions of devices will be linked together.These smart devices will be able to gather data,process it,and even come to decisions on their own.Security is the most essential thing in these situations.In IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange techniques.The majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation processes.The focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned above.The proposed three-party AKEP is protected from several attacks.The proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing costs.To protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client anonymity.Finally,the presented procedure offers better security features than the procedures currently available in the literature.
文摘In expansions of arbitrary functions in Bessel functions or Spherical Bessel functions, a dual partner set of polynomials play a role. For the Bessel functions, these are the Chebyshev polynomials of first kind and for the Spherical Bessel functions the Legendre polynomials. These two sets of functions appear in many formulas of the expansion and in the completeness and (bi)-orthogonality relations. The analogy to expansions of functions in Taylor series and in moment series and to expansions in Hermite functions is elaborated. Besides other special expansion, we find the expansion of Bessel functions in Spherical Bessel functions and their inversion and of Chebyshev polynomials of first kind in Legendre polynomials and their inversion. For the operators which generate the Spherical Bessel functions from a basic Spherical Bessel function, the normally ordered (or disentangled) form is found.