hybrid scheme
Recently Published Documents


TOTAL DOCUMENTS

493
(FIVE YEARS 129)

H-INDEX

25
(FIVE YEARS 5)

2022 ◽  
pp. 103391
Author(s):  
Bin Wu ◽  
Dong Xie ◽  
Fulong Chen ◽  
Xueli Wang ◽  
Yangyang Zeng

2021 ◽  
Vol 90 (1) ◽  
Author(s):  
Raynold Tan ◽  
Andrew Ooi

AbstractIn this article, a quasi-linear semi-discrete analysis of shock capturing schemes in two dimensional wavenumber space is proposed. Using the dispersion relation of the two dimensional advection and linearized Euler equations, the spectral properties of a spatial scheme can be quantified in two dimensional wavenumber space. A hybrid scheme (HYB-MDCD-TENO6) which combines the merits of the minimum dispersion and controllable dissipation (MDCD) scheme with the targeted essentially non-oscillatory (TENO) scheme was developed and tested. Using the two dimensional analysis framework, the scheme was spectrally optimized in such a way that the linear part of the scheme can be separately optimized for its dispersion and dissipation properties. In order to compare its performance against existing schemes, the proposed scheme as well as the baseline schemes were tested against a series of benchmark test cases. It was found that the HYB-MDCD-TENO6 scheme provides similar or better resolution as compared to the baseline TENO6 schemes for the same grid size.


2021 ◽  
Author(s):  
Jean Belo KLAMTI ◽  
Anwar Hasan

A key encapsulation mechanism (KEM) that takes as input an arbitrary string, i.e., a tag, is known as tag-KEM, while a scheme that combines signature and encryption is called signcryption. In this paper, we present a code-based signcryption tag-KEM scheme. We utilize a code-based signature and a CCA2 (adaptive chosen ciphertext attack) secure version of McEliece's {encryption} scheme. The proposed scheme uses an equivalent subcode as a public code for the receiver, making the NP-completeness of the equivalent subcode problem be one of our main security assumptions. We then base the signcryption tag-KEM to design a code-based hybrid signcryption scheme. A hybrid scheme deploys an asymmetric- as well as a symmetric-key encryption. We give security analyses of both our schemes in the standard model and prove that they are secure against IND-CCA2 (indistinguishability under adaptive chosen ciphertext attack) and SUF-CMA (strong existential unforgeability under chosen message attack).


2021 ◽  
Author(s):  
Jean Belo KLAMTI ◽  
Anwar Hasan

A key encapsulation mechanism (KEM) that takes as input an arbitrary string, i.e., a tag, is known as tag-KEM, while a scheme that combines signature and encryption is called signcryption. In this paper, we present a code-based signcryption tag-KEM scheme. We utilize a code-based signature and a CCA2 (adaptive chosen ciphertext attack) secure version of McEliece's {encryption} scheme. The proposed scheme uses an equivalent subcode as a public code for the receiver, making the NP-completeness of the equivalent subcode problem be one of our main security assumptions. We then base the signcryption tag-KEM to design a code-based hybrid signcryption scheme. A hybrid scheme deploys an asymmetric- as well as a symmetric-key encryption. We give security analyses of both our schemes in the standard model and prove that they are secure against IND-CCA2 (indistinguishability under adaptive chosen ciphertext attack) and SUF-CMA (strong existential unforgeability under chosen message attack).


2021 ◽  
Vol 14 (1) ◽  
pp. 109
Author(s):  
Jingchao Liu ◽  
Lixue Mei ◽  
Akbar Maleki ◽  
Roghayeh Ghasempour ◽  
Fathollah Pourfayaz

The type of solar panels has a great impact on the optimal sizing of a hybrid photovoltaic–battery scheme. The optimization of these schemes based on a powerful optimization approach results in more cost-effective schemes. In this paper, a new global dynamic harmony search method, as an optimization method, is presented for the optimal sizing of a hybrid photovoltaic–battery scheme. The new optimization method is aimed at minimizing the total cost and loss of load supply probability of the scheme at the same time. In this regard, the effect of the type of solar panels on the optimal sizing of the hybrid scheme is investigated. Furthermore, performance optimizations are performed with an original global dynamic harmony search, an original harmony search, and simulated annealing to determine the effectiveness of the suggested optimization method. The effects of the initial costs and efficiency of monocrystalline and polycrystalline solar panels on the optimization of hybrid systems are analyzed. The superiority of the suggested method in terms of time and cost indicators of the hybrid scheme is presented comparing the other algorithm.


Algorithms ◽  
2021 ◽  
Vol 14 (12) ◽  
pp. 358
Author(s):  
Robertas Damaševičius ◽  
Rytis Maskeliūnas

This paper describes a unique meta-heuristic technique for hybridizing bio-inspired heuristic algorithms. The technique is based on altering the state of agents using a logistic probability function that is dependent on an agent’s fitness rank. An evaluation using two bio-inspired algorithms (bat algorithm (BA) and krill herd (KH)) and 12 optimization problems (cross-in-tray, rotated hyper-ellipsoid (RHE), sphere, sum of squares, sum of different powers, McCormick, Zakharov, Rosenbrock, De Jong No. 5, Easom, Branin, and Styblinski–Tang) is presented. Furthermore, an experimental evaluation of the proposed scheme using the industrial three-bar truss design problem is presented. The experimental results demonstrate that the hybrid scheme outperformed the baseline algorithms (mean rank for the hybrid BA-KH algorithm is 1.279 vs. 1.958 for KH and 2.763 for BA).


2021 ◽  
pp. 100037
Author(s):  
Md Nahidul Islam ◽  
Norizam Sulaiman ◽  
Bifta Sama Bari ◽  
Mamunur Rashid ◽  
Mahfuzah Mustafa

2021 ◽  
pp. 100151
Author(s):  
Qingqing Yang ◽  
Jianwei Li ◽  
Ruixin Yang ◽  
Jin Zhu ◽  
Xuechao Wang ◽  
...  

2021 ◽  
Author(s):  
Xiaolei Luo ◽  
Sen Xiang ◽  
Yingfeng Wang ◽  
Qiong Liu ◽  
You Yang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document