1
|
Yang G, Deng Z, Du L, Lin Z. Response Analysis of the Three-Degree-of-Freedom Vibroimpact System with an Uncertain Parameter. Entropy (Basel) 2023; 25:1365. [PMID: 37761664 PMCID: PMC10528467 DOI: 10.3390/e25091365] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/14/2023] [Revised: 09/17/2023] [Accepted: 09/19/2023] [Indexed: 09/29/2023]
Abstract
The inherent non-smoothness of the vibroimpact system leads to complex behaviors and a strong sensitivity to parameter changes. Unfortunately, uncertainties and errors in system parameters are inevitable in mechanical engineering. Therefore, investigations of dynamical behaviors for vibroimpact systems with stochastic parameters are highly essential. The present study aims to analyze the dynamical characteristics of the three-degree-of-freedom vibroimpact system with an uncertain parameter by means of the Chebyshev polynomial approximation method. Specifically, the vibroimpact system model considered is one with unilateral constraint. Firstly, the three-degree-of-freedom vibroimpact system with an uncertain parameter is transformed into an equivalent deterministic form using the Chebyshev orthogonal approximation. Then, the ensemble means responses of the stochastic vibroimpact system are derived. Numerical simulations are performed to verify the effectiveness of the approximation method. Furthermore, the periodic and chaos motions under different system parameters are investigated, and the bifurcations of the vibroimpact system are analyzed with the Poincaré map. The results demonstrate that both the restitution coefficient and the random factor can induce the appearance of the periodic bifurcation. It is worth noting that the bifurcations fundamentally differ between the stochastic and deterministic systems. The former has a bifurcation interval, while the latter occurs at a critical point.
Collapse
Affiliation(s)
- Guidong Yang
- Department of Engineering Mechanics, Northwestern Polytechnical University, Xi’an 710129, China;
- School of Mathematics and Statistics, Xidian University, Xi’an 710071, China;
| | - Zichen Deng
- Department of Engineering Mechanics, Northwestern Polytechnical University, Xi’an 710129, China;
| | - Lin Du
- School of Mathematics and Statistics, Northwestern Polytechnical University, Xi’an 710129, China;
| | - Zicheng Lin
- School of Mathematics and Statistics, Xidian University, Xi’an 710071, China;
| |
Collapse
|
2
|
Al-Shareeda MA, Manickam S, Mohammed BA, Al-Mekhlafi ZG, Qtaish A, Alzahrani AJ, Alshammari G, Sallam AA, Almekhlafi K. CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks. Sensors (Basel) 2022; 22:5026. [PMID: 35808521 PMCID: PMC9269849 DOI: 10.3390/s22135026] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 05/20/2022] [Revised: 07/01/2022] [Accepted: 07/01/2022] [Indexed: 06/15/2023]
Abstract
The security and privacy concerns in vehicular communication are often faced with schemes depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the operations used by BP and EC are time-consuming and more complicated. None of the previous studies fittingly tackled the efficient performance of signing messages and verifying signatures. Therefore, a chaotic map-based conditional privacy-preserving authentication (CM-CPPA) scheme is proposed to provide communication security in 5G-enabled vehicular networks in this paper. The proposed CM-CPPA scheme employs a Chebyshev polynomial mapping operation and a hash function based on a chaotic map to sign and verify messages. Furthermore, by using the AVISPA simulator for security analysis, the results of the proposed CM-CPPA scheme are good and safe against general attacks. Since EC and BP operations do not employ the proposed CM-CPPA scheme, their performance evaluation in terms of overhead such as computation and communication outperforms other most recent related schemes. Ultimately, the proposed CM-CPPA scheme decreases the overhead of computation of verifying the signatures and signing the messages by 24.2% and 62.52%, respectively. Whilst, the proposed CM-CPPA scheme decreases the overhead of communication of the format tuple by 57.69%.
Collapse
Affiliation(s)
- Mahmood A. Al-Shareeda
- National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Malaysia;
| | - Selvakumar Manickam
- National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Malaysia;
| | - Badiea Abdulkarem Mohammed
- College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia; (B.A.M.); (Z.G.A.-M.); (A.Q.); (A.J.A.); (G.A.)
| | - Zeyad Ghaleb Al-Mekhlafi
- College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia; (B.A.M.); (Z.G.A.-M.); (A.Q.); (A.J.A.); (G.A.)
| | - Amjad Qtaish
- College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia; (B.A.M.); (Z.G.A.-M.); (A.Q.); (A.J.A.); (G.A.)
| | - Abdullah J. Alzahrani
- College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia; (B.A.M.); (Z.G.A.-M.); (A.Q.); (A.J.A.); (G.A.)
| | - Gharbi Alshammari
- College of Computer Science and Engineering, University of Ha’il, Ha’il 81481, Saudi Arabia; (B.A.M.); (Z.G.A.-M.); (A.Q.); (A.J.A.); (G.A.)
| | - Amer A. Sallam
- Engineering and Information Technology College, Taiz University, Taiz 6803, Yemen;
| | | |
Collapse
|
3
|
Huang SG, Chung MK, Qiu A. Revisiting convolutional neural network on graphs with polynomial approximations of Laplace-Beltrami spectral filtering. Neural Comput Appl 2021; 33:13693-13704. [PMID: 34937994 DOI: 10.1007/s00521-021-06006-6] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
Abstract
This paper revisits spectral graph convolutional neural networks (graph-CNNs) given in Defferrard (2016) and develops the Laplace-Beltrami CNN (LB-CNN) by replacing the graph Laplacian with the LB operator. We define spectral filters via the LB operator on a graph and explore the feasibility of Chebyshev, Laguerre, and Hermite polynomials to approximate LB-based spectral filters. We then update the LB operator for pooling in the LB-CNN. We employ the brain image data from Alzheimer's Disease Neuroimaging Initiative (ADNI) and Open Access Series of Imaging Studies (OASIS) to demonstrate the use of the proposed LB-CNN. Based on the cortical thickness of two datasets, we showed that the LB-CNN slightly improves classification accuracy compared to the spectral graph-CNN. The three polynomials had a similar computational cost and showed comparable classification accuracy in the LB-CNN or spectral graph-CNN. The LB-CNN trained via the ADNI dataset can achieve reasonable classification accuracy for the OASIS dataset. Our findings suggest that even though the shapes of the three polynomials are different, deep learning architecture allows us to learn spectral filters such that the classification performance is not dependent on the type of the polynomials or the operators (graph Laplacian and LB operator).
Collapse
Affiliation(s)
- Shih-Gu Huang
- Department of Biomedical Engineering, National University of Singapore, Singapore 117583, Singapore
| | - Moo K Chung
- Department of Biostatistics and Medical Informatics, University of Wisconsin, Madison, WI 53706, USA
| | - Anqi Qiu
- Department of Biomedical Engineering, The N.1 Institute for Health and Institute of Data Science, National University of Singapore, Singapore 117583, Singapore
| | | |
Collapse
|
4
|
Meshram C, Imoize AL, Aljaedi A, Alharbi AR, Jamal SS, Barve SK. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments. Sensors (Basel) 2021; 21:7227. [PMID: 34770535 DOI: 10.3390/s21217227] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/29/2021] [Revised: 10/20/2021] [Accepted: 10/27/2021] [Indexed: 11/16/2022]
Abstract
The place of public key cryptography (PKC) in guaranteeing the security of wireless networks under human-centered IoT environments cannot be overemphasized. PKC uses the idea of paired keys that are mathematically dependent but independent in practice. In PKC, each communicating party needs the public key and the authorized digital certificate of the other party to achieve encryption and decryption. In this circumstance, a directory is required to store the public keys of the participating parties. However, the design of such a directory can be cost-prohibitive and time-consuming. Recently, identity-based encryption (IBE) schemes have been introduced to address the vast limitations of PKC schemes. In a typical IBE system, a third-party server can distribute the public credentials to all parties involved in the system. Thus, the private key can be harvested from the arbitrary public key. As a result, the sender could use the public key of the receiver to encrypt the message, and the receiver could use the extracted private key to decrypt the message. In order to improve systems security, new IBE schemes are solely desired. However, the complexity and cost of designing an entirely new IBE technique remain. In order to address this problem, this paper presents a provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under the human-centered IoT environment. In particular, we offer a robust and secure IBE transformation model and provide extensive performance analysis and security proofs of the model. Finally, we demonstrate the superiority of the proposed IBE transformation model over the existing IBE schemes. Overall, results indicate that the proposed scheme posed excellent security capabilities compared to the preliminary IBE-based schemes.
Collapse
|
5
|
Sun NH, Tsai MY, Liau JJ, Chiang JS. Chebyshev apodized fiber Bragg gratings. Sci Prog 2021; 104:368504221094173. [PMID: 35510898 PMCID: PMC10450710 DOI: 10.1177/00368504221094173] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
Abstract
In this paper, a new apodized fiber Bragg grating (FBG) structure, the Chebyshev apodization, is proposed. The Chebyshev polynomial distribution has been widely used for the optimal design of antennas and filters, but it has not been used for designing FBGs. Unlike the function of traditional Gaussian-apodized FBGs, the Chebyshev polynomial is a discrete function. We demonstrate a new methodology for designing Chebyshev-apodized FBGs: the grating region is divided by discrete n sections with uniform gratings, while the index change is used to express the Chebyshev polynomial. We analyze the Chebyshev-apodized FBGs by using coupled mode theory and the piecewise-uniform approach. The reflection spectrum and the dispersion of Chebyshev-apodized FBGs are calculated and compared with those of Gaussian FBGs. Moreover, a sidelobe suppression level (SSL), a parameter of the Chebyshev polynomial, along with the maximum ac-index change of FBGs are analyzed. Assume that the grating length is 20mm, SSL is 100 dB, the section number is 40, and the maximum ac-index change is 2 × 10-4. The reflection spectrum of Chebyshev apodized FBGs shows flattened sidelobes with an absolute SSL of -95.9 dB (corresponding to SSL=100 dB). The simulation results reveal that at the same full width at half maximum, the Chebyshev FBGs have lower sidelobe suppression than the Gaussian FBGs, but their dispersion is similar. We demonstrate the potential of using Chebyshev-apodized FBGs in optical filters, dispersion compensators, and sensors; Chebyshev apodization can be applied in the design of periodic dielectric waveguides.
Collapse
Affiliation(s)
- Nai-Hsiang Sun
- Department of Electrical Engineering, I-Shou University, Kaohsiung, Taiwan
| | - Min-Yu Tsai
- Department of Electrical Engineering, I-Shou University, Kaohsiung, Taiwan
| | | | - Jung-Sheng Chiang
- Department of Electrical Engineering, I-Shou University, Kaohsiung, Taiwan
| |
Collapse
|
6
|
Wang Y, Tu H, Liu W, Xiao W, Lan Q. Two Chebyshev Spectral Methods for Solving Normal Modes in Atmospheric Acoustics. Entropy (Basel) 2021; 23:705. [PMID: 34199538 DOI: 10.3390/e23060705] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/30/2021] [Revised: 05/31/2021] [Accepted: 06/01/2021] [Indexed: 11/28/2022]
Abstract
The normal mode model is important in computational atmospheric acoustics. It is often used to compute the atmospheric acoustic field under a time-independent single-frequency sound source. Its solution consists of a set of discrete modes radiating into the upper atmosphere, usually related to the continuous spectrum. In this article, we present two spectral methods, the Chebyshev-Tau and Chebyshev-Collocation methods, to solve for the atmospheric acoustic normal modes, and corresponding programs are developed. The two spectral methods successfully transform the problem of searching for the modal wavenumbers in the complex plane into a simple dense matrix eigenvalue problem by projecting the governing equation onto a set of orthogonal bases, which can be easily solved through linear algebra methods. After the eigenvalues and eigenvectors are obtained, the horizontal wavenumbers and their corresponding modes can be obtained with simple processing. Numerical experiments were examined for both downwind and upwind conditions to verify the effectiveness of the methods. The running time data indicated that both spectral methods proposed in this article are faster than the Legendre-Galerkin spectral method proposed previously.
Collapse
|
7
|
Nguyen LC, Nguyen-Xuan H. Deep learning for computational structural optimization. ISA Trans 2020; 103:177-191. [PMID: 32303352 DOI: 10.1016/j.isatra.2020.03.033] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/03/2019] [Revised: 02/08/2020] [Accepted: 03/30/2020] [Indexed: 06/11/2023]
Abstract
We investigate a novel computational approach to computational structural optimization based on deep learning. After employing algorithms to solve the stiffness formulation of structures, we used their improvement to optimize the structural computation. A standard illustration of 10 bar-truss was revisited to illustrate the mechanism of neural networks and deep learning. Several benchmark problems of 2D and 3D truss structures were used to verify the reliability of the present approach, and its extension to other engineering structures is straightforward. To enhance computational efficiency, a constant sum technique was proposed to generate data for the input of multi-similar variables. Both displacement and stress enforcements were the constraints of the optimized problem. The optimization data for cross sections with the objective function of total weight were then employed in the context of deep learning. The stochastic gradient descent (SGD) with Nesterov's accelerated gradient (NAG), root mean square propagation (RMSProp) and adaptive moment estimation (Adam) optimizers were compared in terms of convergence. In addition, this paper devised Chebyshev polynomials for a new approach to activation functions in single-layer neural networks. As expected, its convergence was quicker than the popular learning functions, especially in a short training with a small number of epochs for tested problems. Finally, a split data technique for linear regression was proposed to deal with some sensitive data.
Collapse
Affiliation(s)
- Long C Nguyen
- CIRTECH Institute, Ho Chi Minh City University of Technology (HUTECH), Ho Chi Minh City, Viet Nam
| | - H Nguyen-Xuan
- CIRTECH Institute, Ho Chi Minh City University of Technology (HUTECH), Ho Chi Minh City, Viet Nam; Department of Architectural Engineering, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, Republic of Korea.
| |
Collapse
|