-
Fourth-order phase-field models with a novel family of degradation functions for brittle fracture in magneto-electro-elastic materials Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-31
Changyu Wang, Liming ZhouIn this paper, a thermodynamically consistent fourth-order phase-field model for brittle fracture in magneto-electro-elastic (MEE) materials is developed. The multi-physics fracture problem is decoupled and solved sequentially using a multi-physics hybrid staggered (MPHS) scheme. A novel family of logarithmic degradation functions (DF) is proposed, the superiority of which over other popular DFs is
-
Zonal free element method for solving 2D elastoplastic dynamic problems Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-31
Yi-Fan Wang, Hai-Feng Peng, Xiao-Wei GaoIn this paper, an elastoplastic dynamic analysis method based on the zonal free element method (ZFrEM) is introduced to solve material nonlinearity problems in dynamic systems. By integrating the collocation element technique with the generalized smoothed Galerkin weak form, a robust and computationally efficient numerical analysis framework is developed As a meshfree method, the ZFrEM discretizes
-
A 2D quadratically convergent boundary element formulation for crack nucleation and propagation Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-31
Gabriela R. Fernandes, José J.C. Pituba, Eduardo A. de Souza NetoA Boundary Element formulation, named Boundary Element Model with Quadratic convergence applied to Strong Discontinuities (BEMQ-SD), incorporating the nucleation and propagation of cracks is proposed. It relies crucially on the description of the fractured body as a continuum medium with embedded strong discontinuities, treated by means of a well-established regularization approach. The (quasi-brittle)
-
Corrigendum to ‘A stable numerical investigation based on geometric greedy points for 2D time-fractional partial integro-differential equations with singular kernels’ Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-31
Mojtaba Fardi, Banafsheh Raeisi, Mohammadreza Ahmadi Darani -
The 3D FMIBEM-FEM coupled method for full-process damage assessment of mountain tunnels induced by active faults Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-30
Zhongxian Liu, Jiaqiao Liu, Zhenen Huang, Weiguo He, Chao MaThis paper establishes a novel full-process numerical simulation framework for analyzing the 3D seismic response of mountain tunnels induced by active faults. The framework employs a two-step approach to achieve wavefield transmission through equivalent seismic load: first, a highly efficient and accurate FMIBEM (Fast multipole indirect boundary element method) is used for large-scale 3D numerical
-
Coupling of poro-electro-elastic effects in a conical shell under various loadings at its apex Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-30
Muzammal Hameed Tariq, Aneela Bibi, Jianzhou Ge, Lihua Wang, Yue-Ting ZhouPorous materials, with intricate structures and high permeability, play a crucial role in applications requiring enhanced conductivity, stability, and adaptability. This study, for the first time, comprehensively investigates the coupling of poro-electro-elastic (PEE) effects in a conical shell. We derive three-dimensional solutions using potential theory and Green’s function methods to address diverse
-
A fast directional boundary element method for solving wideband three-dimensional half-space acoustic problems Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-28
Haoyang Li, Yijun LiuThis paper presents a novel wideband fast multipole boundary element method (BEM) based on a fast directional algorithm (FDA) for solving large-scale three-dimensional (3-D) half-space acoustic wave problems. The method employs the half-space Green’s function in the boundary integral equations, eliminating the need to discretize the infinite plane and avoiding truncation errors. An improved FDA is
-
Carleson Measures for Slice Regular Hardy and Bergman Spaces in Quaternions Adv. Appl. Clifford Algebras (IF 1.1) Pub Date : 2025-05-26
Wenwan Yang, Cheng YuanWe study the quaternionic Carleson measure, which provides an embedding of the slice regular Hardy space \({\mathcal {H}}^p({\mathbb {B}})\) into \(L^s({\mathbb {B}}, \text {d}\mu )\) with \(s>p.\) A new criterion is needed for a finite positive Borel measure to be an \(({\mathcal {H}}^p({\mathbb {B}}),s)\)-Carleson measure, given by the uniform integrability of slice Cauchy kernels. It turns out that
-
Elastic dental analysis of 3D layered composite structures based on the local RBF collocation method Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-27
Hong Wang, Shi Yan, Hui Zheng, Xiaoying ZhuangThe tooth consists of enamel, dentin, and pulp. The outer surface of the enamel, the interface between dentin and pulp, as well as the interface between enamel and dentin is complicated. To better capture the details of the tooth, Nano Computed Tomography (CT) is used to obtain the detailed images of the tooth, and the CT images are further imported to construct the 3D structure of the tooth. This
-
A new POD-based Reduced-Order EDM-RIBEM method for multi-domain transient heat transfer problems Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-26
Baoqi Zhang, Siqi Zhang, Wenwei Jiang, Chenhao Tan, Yuntao Zhou, Haifeng Peng, Kai Yang, Xiaowei GaoWe introduce a reduced-order coupling algorithm of Element Differential Method (EDM) and Radial Integration Boundary Element Method (RIBEM) for efficient solution of multi-domain transient heat transfer problems. An important innovation of this method is its incorporation of Proper Orthogonal Decomposition (POD) method. By applying POD for dimensionality reduction of system equations, the iterative
-
3D mesh-free modeling of buckling distortions in hollow-section steel columns with openings Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-26
Daud Ali AbdohThis paper introduces a novel three-dimensional peridynamic model to simulate buckling distortions in hollow-section steel columns (HSSC) with access openings. This research aims to improve the safety and performance of steel structures, particularly in lateral loadings such as those encountered during seismic and wind events. The peridynamic method is employed to model the excessive deformations in
-
Mechanisms of non-uniform propagation of hydraulic fractures: A comprehensive numerical investigation Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-26
Changxin Yang, Zhaozhong Yang, Hehua Wang, Liping Jiang, Liangping Yi, Yi Cheng, Duo YiBased on the displacement discontinuity method (DDM) and the finite volume method (FVM), a non-planar three-dimensional integrated simulator for simulating hydraulic fracture (HF) propagation is proposed to study the competitive propagation mechanisms of HF in the presence of stress interference and natural fractures (NFs). The embedded discrete fracture model (EDFM) is introduced to describe the fluid
-
(k, n)-Consecutive access structures Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-24
Javier Herranz, Germán SáezWe consider access structures over a set of n participants, defined by a parameter k with \(1 \le k \le n\) in the following way: a subset is authorized if it contains at least k consecutive participants. Depending on whether we consider the participants placed in a line (that is, participant 1 is not next to participant n) or in a circle, we obtain two different families, that we call (k, n)-line-consecutive
-
Hilbert series and degrees of regularity of Oil & Vinegar and mixed quadratic systems Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-24
Antonio Corbo Esposito, Rosa Fera, Francesco RomeoIn this paper, we analyze the algebraic invariants for two classes of multivariate quadratic systems: systems made by oil and vinegar quadratic polynomials and systems made by both oil and vinegar polynomials and fully-quadratic ones. For such systems, we explicitly compute the Hilbert series in the homogeneous case, and we also give bounds on the degree of regularity, solving degree and first fall
-
Rota-Baxter Operators of Nonzero Weight on the Split Octonions Adv. Appl. Clifford Algebras (IF 1.1) Pub Date : 2025-05-24
A. S. PanasenkoWe describe Rota-Baxter operators on split octonions. It turns out that up to some transformations there exists exactly one such non-splitting operator over any field. We also obtain a description of all decompositions of split octonions over a quadratically closed field of characteristic different from 2 into a sum of two subalgebras, which describes the splitting Rota-Baxter operators. It completes
-
Physics-informed neural network model using natural gradient descent with Dirichlet distribution Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-24
R. Abdulkadirov, P. Lyakhov, V. BaboshinaIn this article we propose the physics-informed neural network model which contains the natural gradient descent with Dirichlet distribution. Such an optimizer can more accurately converge in the global minimum of the loss function in a short number of iterations. Due to natural gradient, one considers not only the gradient directions but also convexity of the loss function. Using the Dirichlet distribution
-
Self-reversible generalized (L,G)-codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-23
Sergey Bezzateev, Natalia ShekhunovaWe consider a subclass of p-ary self-reversible generalized (L, G) codes with a locator set \(L=\{ \frac{2x-\alpha }{x^2-\alpha x +1},\alpha \in \mathbb {F}_q \setminus \{0\}, q=p^m \} \cup \{\frac{1}{x+1}\}\), where p is a prime number. The numerator \(2x-\alpha \) of a rational function is the formal derivative of the denominator \(x^2-\alpha x +1\). The Goppa polynomial \(G(x) \in \mathbb {F}_q[x]\)
-
-
Linear Canonical Space-Time Transform and Convolution Theorems Adv. Appl. Clifford Algebras (IF 1.1) Pub Date : 2025-05-21
Yi-Qiao Xu, Bing-Zhao LiFollowing the idea of the fractional space-time Fourier transform, a linear canonical space-time transform for 16-dimensional space-time \(C\ell _{3,1}\)-valued signals is investigated in this paper. First, the definition of the proposed linear canonical space-time transform is given, and some related properties of this transform are obtained. Second, the convolution operator and the corresponding
-
Primitive rank 3 groups, binary codes, and 3-designs Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-20
B. G. Rodrigues, Patrick SoléLet G be a primitive rank 3 permutation group acting on a set of size v. Binary codes of length v globally invariant under G are well-known to hold PBIBDs in their \(A_w\) codewords of weight w. The parameters of these designs are \(\bigg (A_w,v,w,\frac{wA_w}{v},\lambda _1,\lambda _2\bigg ).\) When \(\lambda _1=\lambda _2=\lambda ,\) the PBIBD becomes a 2-\((v,w,\lambda )\) design. We obtain computationally
-
Information-set decoding for convolutional codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-20
Niklas Gassner, Julia Lieb, Abhinaba Mazumder, Michael SchallerIn this paper, we present a framework for generic decoding of convolutional codes, which allows us to do cryptanalysis of code-based systems that use convolutional codes as public keys. We then apply this framework to information set decoding, study success probabilities and give tools to choose variables. Finally, we use this to attack two cryptosystems based on convolutional codes. In the case of
-
On Unitary Groups in Ternary and Generalized Clifford Algebras Adv. Appl. Clifford Algebras (IF 1.1) Pub Date : 2025-05-20
Dmitry ShirokovWe discuss a generalization of Clifford algebras known as generalized Clifford algebras (in particular, ternary Clifford algebras). In these objects, we have a fixed higher-degree form (in particular, a ternary form) instead of a quadratic form in ordinary Clifford algebras. We present a natural realization of unitary Lie groups, which are important in physics and other applications, using only operations
-
Investigation of hydraulic fracture propagation patterns and hydro-mechanical coupling mechanisms through DEM analysis Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-20
Qi Dong, Yuan WangAccurate prediction of fracture propagation morphology contributes to the success of hydraulic fracturing operations and the estimation of oil and gas production capacity. Various factors, including fluid injection characteristics, in-situ stresses, and pre-existing natural fractures, exert significant influence on the fracture morphology. The discrete element method (DEM) captures inter-particle interactions
-
A customized CNN architecture for detecting double and multiple JPEG compression in small blocks Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-20
Israr Hussain, Naeem Hussain, Shunquan TanDetecting double JPEG compression is crucial for verifying the authenticity and integrity of JPEG images. However, this poses significant challenges, particularly when the quality factor (QF) of the first compression is substantially higher than of the second compression, and when working with small-sized blocks. To overcome these challenges, we propose a customized convolutional neural network (CNN)
-
Cut-cell Cartesian meshes for incompressible laminar and turbulent flows based on n-sided Cell-based Smoothed FEM Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-19
Chen Jiang, Chen Hong, Guo Zhou, Zhi-yang Song, Ming-yang LiuThe cut-cell Cartesian mesh is widely favored in Computational Fluid Dynamics (CFD) due to its ease of generation, body fitting and high quality. However, the presence of hanging nodes and irregular body-fitted polygonal elements makes it challenging to construct shape functions in traditional Finite Element Methods (FEM). In this work, the n-sided Cell-based Smoothed Finite Element Method (nCS-FEM)
-
Comparison theorems for splittings of different M-tensors Linear Multilinear Algebra (IF 0.9) Pub Date : 2025-05-19
Yan-Cun Li, Shu-Xin Miao -
A novel hybrid machine learning and optimization approach for stochastic free vibration analysis of graphene platelets reinforced functionally graded triply periodic minimal surface microplates Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-17
Van-Thien Tran, Trung-Kien Nguyen, Thuc P. VoThis paper proposes a new hybrid deep neural network and optimization approach for stochastic vibration analysis of graphene platelets reinforced functionally graded triply periodic minimal surface (GPLR-FG-TPMS) microplates with material properties uncertainties. A combination of the bidirectional long short-term memory model (BiLSTM), the Shrimp and Goby Association Search Algorithm (SGA) and Chebyshev
-
Numerical investigation on shear mechanical characteristics of rock joints filled with clay-rich fillings Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-17
Congcong Hou, Yongshui Kang, Bin Liu, Jiancheng XiaoThe clay filling layer can significantly influences the shear behavior of rock joints. In this study, a numerical model for the direct shear test on clay-rich filling rock masses under constant normal stress was developed using the Continuum Discontinuum Element Method (CDEM), and validated through compression-shear experiments. Subsequently, the influence mechanism of water content and various normal
-
More on codes for combinatorial composite DNA Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-15
Zuo Ye, Omer Sabary, Ryan Gabrys, Eitan Yaakobi, Ohad ElishcoIn this paper, we focus on constructing unique-decodable and list-decodable codes for the recently studied (t, e)-composite-asymmetric error-correcting codes ((t, e)-CAECCs). Let \(\mathcal {X}\) be an \(m \times n\) binary matrix in which each row has Hamming weight w. If at most t rows of \(\mathcal {X}\) contain errors, and in each erroneous row, there are at most e occurrences of \(1 \rightarrow
-
A combinatorial approach to avoiding weak keys in the BIKE cryptosystem Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-14
Gretchen L. Matthews, Emily McMillonBit Flipping Key Encapsulation (BIKE) is a code-based cryptosystem that was considered in Round 4 of the NIST Post-Quantum Cryptography Standardization process. It is based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes paired with an iterative decoder. While (low-density) parity-check codes have been shown to perform well in practice, their capabilities are governed by the code’s graphical
-
An improved MLS-based numerical manifold method for saturated-unsaturated seepage in porous media Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-14
Yuanqiang Chen, Cheng Liu, Hong Zheng, Xiaocheng Huang, Shunkai Liu, Jian PengThe moving least squares (MLS) based numerical manifold method (abbreviated as MLS-NMM) inherits the individual merits of MLS and NMM, which not only gets rid of the shackles of meshes but also can unitedly solve both continuity and discontinuity problems. This paper presents an improved MLS-NMM model for saturated-unsaturated seepage in both homogeneous and heterogeneous porous media. In the improved
-
A novel hybrid contact detection algorithm for 2D FDEM: Balancing efficiency and memory consumption Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-14
He Liu, Panpan Zhu, Quansheng Liu, Yongchao Tian, Yiming Lei, Xin Yin, Zuliang Shao, Guicheng HeIn this paper, a novel hybrid contact detection algorithm, AGS (Adaptive grid-based search) & GJK (Gilbert-Johnson-Keerthi), is proposed to accelerate 2D FDEM (Combined finite-discrete element method) simulations. AGS algorithm maintains computational efficiency comparable to traditional broad search methods based on uniform grid decomposition, while significantly reducing memory consumption by utilizing
-
Evaluation codes arising from symmetric polynomials Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-12
Barbara Gatti, Gábor Korchmáros, Gábor P. Nagy, Vincenzo Pallozzi Lavorante, Gioia SchulteDatta and Johnsen (Des Codes Cryptogr 91:747–761, 2023) introduced a new family of evaluation codes in an affine space of dimension \(\ge 2\) over a finite field \({\mathbb {F}}_q\) where linear combinations of elementary symmetric polynomials are evaluated on the set of all points with pairwise distinct coordinates. In this paper, we propose a generalization by taking low dimensional linear systems
-
A Burton & Miller type FM/BEM for the solution of 3D stokes flow problems in scaffolds in perfusion bioreactor settings Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-13
Euripides J. Sellountos, Demosthenes Polyzos, Theodore V. GortsasPerfusion bioreactors involve the continuous flow of culture medium through the scaffold. While sophisticated experimental setups exist for measuring flow parameters, a deep understanding of the three-dimensional (3D) flow throughout a scaffold mounted in a bioreactor can be accomplished via computational methods. The flow in a bioreactor is characterized by low Reynold numbers and can be modeled as
-
A meshless finite point method for a class of parabolic differential equation of neutral delay Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-13
Yanxia Zhang, Xiaolin LiIn this paper, a meshless finite point method (FPM) is proposed to solve a class of parabolic differential equation of neutral delay. By using difference techniques and Taylor expansions in time, a second-order accurate time semi-discrete system is established for the neutral delay initial–boundary value problem. Then, by combining the moving least squares approximation and the collocation technique
-
On flag-transitive symmetric (v, k, 4) designs Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-11
Seyed Hassan AlaviIn this paper, we study nontrivial symmetric (v, k, 4) designs admitting a flag-transitive and point-primitive affine automorphism group. In conclusion, all symmetric (v, k, 4) designs admitting flag-transitive automorphism groups are known apart from those admitting one-dimensional automorphisms, and hence the classification of flag-transitive symmetric (v, k, 4) designs reduces to the case of one-dimensional
-
On tweakable correlation robust hashing against key leakages Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-12
Chun Guo, Xiao Wang, Kang Yang, Yu YuWe continue the study of blockcipher-based (tweakable) correlation robust hash functions, which are central building blocks of circuit garbling and oblivious-transfer extension schemes. Motivated by Roy (CRYPTO 2022), we first enhance the multi-user tweakable correlation robust notion of Guo et al. (CRYPTO 2020) with a key leaking oracle that tells the adversary whether a certain user key satisfies
-
On the equivalence of all notions of generalized derivations whose domain is a C*-algebra Linear Multilinear Algebra (IF 0.9) Pub Date : 2025-05-12
Amin Hosseini, Antonio M. Peralta, Shanshan Su -
Characterizations for minimal codes: graph theory approach and algebraic approach over finite chain rings Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-10
Makhan Maji, Sihem Mesnager, Santanu Sarkar, Kalyan HansdaThe concept of minimal linear codes was introduced by Ashikhmin and Barg in 1998, leading to the development of various methods for constructing these codes over finite fields. In this context, minimality is defined as a codeword u in a linear code \(\mathcal {C}\) is considered minimal if u covers the codeword cu for all c in the finite field \(\mathbb {F}_{q}\) of order q but no other codewords in
-
On the coding capacity of reverse-complement and palindromic duplication-correcting codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-10
Lev Yohananov, Moshe SchwartzWe derive the coding capacity for duplication-correcting codes capable of correcting any number of duplications. We do so both for reverse-complement duplications, as well as palindromic (reverse) duplications. We show that except for duplication-length 1, the coding capacity is 0. When the duplication length is 1, the coding capacity depends on the alphabet size, and we construct optimal codes.
-
Commutative cryptanalysis as a generalization of differential cryptanalysis Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-10
Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas StennesRecently, Baudrin et al. analyzed a special case of Wagner’s commutative diagram cryptanalysis, referred to as commutative cryptanalysis. For a family \((E_k)_k\) of permutations on a finite vector space G, commutative cryptanalysis exploits the existence of affine permutations \(A,B :G \rightarrow G\), \(I \notin \{A,B\}\) such that \(E_k \circ A (x) = B \circ E_k(x)\) holds with high probability
-
Introducing Multidimensional Dirac–Hestenes Equation Adv. Appl. Clifford Algebras (IF 1.1) Pub Date : 2025-05-09
Sofia Rumyantseva, Dmitry ShirokovIt is easier to investigate phenomena in particle physics geometrically by exploring a real solution to the Dirac–Hestenes equation instead of a complex solution to the Dirac equation. The current research presents a formulation of the multidimensional Dirac–Hestenes equation. Since the matrix representation of the complexified (Clifford) geometric algebra \(\mathbb {C}\otimes C \hspace{-1.00006pt}\ell
-
Neural network-driven adaptive parameter selection for the Local Method of Fundamental Solutions Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-09
L. Han, M. Lei, C.T. Wu, R.P. Niu, H.E. Jia, H.B. WangIn the Local Method of Fundamental Solutions (LMFS), the selection of parameters {Ri}i=1∗, representing the radii of circle-type source points of each local approximation domain is crucial for the accuracy and stability of the algorithm. Traditionally, all the Ri are set to be a same constant which can be determined through a trial-and-error process (TRP). This process is always inflexible and not
-
An adaptive method of fundamental solutions using physics-informed neural networks Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-09
Fajie Wang, Xin Li, Hanqing Liu, Lin Qiu, Xingxing YueIn the traditional method of fundamental solutions (MFS), the selection of the sources is the most crucial task. Despite numerous studies dedicated to addressing this challenge, it remains an open problem. By introducing the physics-informed neural networks to automatically determine the optimal distribution of source points, this paper proposes a novel adaptive method of fundamental solutions (AMFS)
-
Some $$\mathbb {H}$$ -Banach Modules and Fiber Bundles Adv. Appl. Clifford Algebras (IF 1.1) Pub Date : 2025-05-08
José Oscar González-CervantesThis work presents a coordinate sphere bundle defined from theory of slice regular functions whose bundle projection and some real Banach spaces induce coordinate sphere bundles in which the quaternionic Banach modules of the slice regular functions of Bloch, Besov and Dirichlet are the base spaces. Finally, this work shows that Möbius invariant property of these quaternionic Banach modules defines
-
An integrated workflow for production simulation of non-planar complex fracture networks in fractured shale oil reservoirs Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-08
Songze Liao, Ziming Zhang, Dingfei Guo, Jinghong Hu, Yuan Zhang, Haopeng Zhao, Zhenjie ZhangModelling the production dynamics of fractured shale reservoirs remains a complex task, particularly when characterizing the connectivity of matrix, hydraulic fractures, and natural fractures during production simulation. This study aims to predict the production of non-planar hydraulic fractures in deep fractured shale reservoirs. An integrated numerical model for hydraulic fracturing and development
-
LMM-DPIM-based neural network model for the efficient stochastic shakedown and reliability analyses of printed circuit heat exchangers Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-08
Hanshu Chen, Zhiyuan Ma, Haofeng Chen, Shi Li, Zhuojia FuThe randomness in structural parameters of printed circuit heat exchangers (PCHEs) is unavoidable and can significantly impact shakedown limit and reliability. However, studies on the influence of random structural parameters are limited due to the expensive computation burden. Therefore, this paper aims to achieve efficient stochastic shakedown and reliability analyses of PCHEs with multiple random
-
Code-verification techniques for an arbitrary-depth electromagnetic slot model Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-08
Brian A. Freno, Neil R. Matula, Robert A. Pfeiffer, Vinh Q. DangElectromagnetic slot models are employed to efficiently simulate electromagnetic penetration through openings in an otherwise closed electromagnetic scatterer. Such models, which incorporate varying assumptions about the geometry of the openings, are typically coupled with electromagnetic surface integral equations that model electromagnetic scattering. In this paper, we introduce novel code-verification
-
Trace representation of a family of generalized cyclotomic binary sequences with period $$p^n$$ Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-07
Zibi Xiao, Yaya Ye, Zhiye Yang, Xiangyong ZengThe trace representation of sequences is useful for implementing the generator of sequences and analyzing their cryptographic properties. In this paper, we focus on investigating the trace representation for a family of generalized cyclotomic binary sequences with period \(p^n\). On the basis of the properties of the generalized cyclotomic classes, a trace representation of this family of sequences
-
Maps preserving the mean transforms of pairs of unitarily similar operators Linear Multilinear Algebra (IF 0.9) Pub Date : 2025-05-07
Abdellatif Bourhim, Mostafa Mbekhta -
Fatigue growth modelling of three-dimensional cracks with the extended isogeometric boundary element method Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-05-05
Matheus Rocha, Jon Trevelyan, Edson Denner LeonelThis paper proposes the fatigue crack growth modelling of three-dimensional geometries with the eXtended Isogeometric Boundary Element Method (XIGABEM). The formulation combines the advantages of the dual Boundary Element Method (BEM), the isogeometric approach, and an enrichment strategy for surfaces containing the crack front. The dual BEM approach relies on a boundary-only mesh, eliminating a re-meshing
-
Avoiding trusted setup in isogeny-based commitments Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-02
Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Célestin Nkuimi-JugniaIn 2021, Sterner proposed a commitment scheme based on supersingular isogenies. For this scheme to be binding, one relies on a trusted party to generate a starting supersingular elliptic curve of unknown endomorphism ring. In fact, the knowledge of the endomorphism ring allows one to compute an endomorphism of degree a power of a given small prime. Such an endomorphism can then be split into two to
-
New results on subdirect sums of Nekrasov matrices Linear Multilinear Algebra (IF 0.9) Pub Date : 2025-05-02
Wenlong Zeng, Qing-Wen Wang -
Lattice codes for CRYSTALS-Kyber Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-01
Shuiyin Liu, Amin SakzadThis paper describes a constant-time lattice encoder for the National Institute of Standards and Technology (NIST) recommended post-quantum encryption algorithm: Kyber. The first main contribution of this paper is to refine the analysis of Kyber decoding noise and prove that Kyber decoding noise can be bounded by a sphere. This result shows that the Kyber encoding problem is essentially a sphere packing
-
Weak colourings of Kirkman triple systems Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-05-01
Andrea C. Burgess, Nicholas J. Cavenagh, Peter Danziger, David A. PikeA \(\delta \)-colouring of the point set of a block design is said to be weak if no block is monochromatic. The chromatic number \(\chi (S)\) of a block design S is the smallest integer \(\delta \) such that S has a weak \(\delta \)-colouring. It has previously been shown that any Steiner triple system has chromatic number at least 3 and that for each \(v\equiv 1\) or \(3\pmod {6}\) there exists a
-
A generalized finite difference approach and splitting technique for the Kuramoto–Tsuzuki equation in multi-dimensional applications Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-04-30
Maedeh Nemati, Mostafa Abbaszadeh, Mahmoud A. Zaky, Mehdi DehghanThis study investigates the numerical solution of the Kuramoto–Tsuzuki equation in one, two and three dimensions. To effectively handle the equation’s nonlinear component, we employ a splitting technique, while the linear component is addressed using the Crank–Nicolson method for temporal discretization. Spatial discretization is achieved through the generalized finite difference method with a convergence
-
Elastodynamic analysis of aligned particulate composites with the inclusion-based boundary element method (iBEM) Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-04-30
Chunlin Wu, Linfei Zhang, Jinming Zhang, Huiming YinThis paper extends the inclusion-based boundary element method (iBEM) to conduct elastodynamic analysis of chain-structured composites with aligned spherical inhomogeneities and predict the effective material properties depending on the frequency and specimen-particle size ratio (SPR). The iBEM algorithm utilizes boundary integral equations to handle the boundary conditions of the specimen. Using Eshelby’s
-
A metric function for dual quaternion matrices and related least-squares problems Linear Multilinear Algebra (IF 0.9) Pub Date : 2025-04-30
Chen Ling, Chenjian Pan, Liqun Qi -
A scattering matrix method for analyzing acoustic plane-wave scattering by rigid objects in semi-infinite media Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-04-29
Jincheng Qin, Kei MatsushimaVarious applications are related to the plane-wave scattering by an obstacle near the interface between two different kinds of isotropic and homogeneous media. The analysis of such a problem asks for an efficient numerical method. To this end, this study proposes a scattering matrix method for evaluating scattering fields by acoustically rigid scatterers with arbitrary shapes. The basic idea is to
-
FloodCNN-BiLSTM: Predicting flood events in urban environments Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-04-28
Vinay Dubey, Rahul KataryaA disaster is a severe event that occurs on a short period but has highly damaging and long-lasting effects on society. Disasters can be broadly categorized into natural and man-made events. Among natural disasters, floods are some of the most common disaster. As climate change accelerates, floods are expected to become more frequent and severe, highlighting the need for a deeper understanding of their