2022
DOI: 10.1002/mma.8173
|View full text |Cite
|
Sign up to set email alerts
|

Application of the modified Fourier series method and the genetic algorithm for calibration of small‐scale parameters in the nonlocal strain gradient nanobeams

Abstract: In recent years, nonlocal strain gradient theory (NSGT) has been widely applied by researchers for the analysis of nanostructures. In this theory, the appropriate selection of small‐scale parameters and the type of high‐order boundary conditions is of great importance. In the current paper, free vibrations of carbon nanotubes are studied using a nonlocal strain gradient Timoshenko beam model, and the small‐scale parameters are calibrated based on the molecular dynamics (MD) results. The calibration process is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 75 publications
(161 reference statements)
0
7
0
Order By: Relevance
“…By analyzing Figure 2, it can be seen that Method 1 has a minimum false detection rate of 6.3% for five network vulnerabilities, namely file download vulnerabilities, and a maximum false detection rate of 8.3%, namely HTTP Header injection vulnerabilities. The false detection rate of methods is between 7.4% and 8.3% [2][3], with a relatively high false detection rate. The lowest false detection rate of the method proposed in this paper is 0.3%, which is a literature download vulnerability.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…By analyzing Figure 2, it can be seen that Method 1 has a minimum false detection rate of 6.3% for five network vulnerabilities, namely file download vulnerabilities, and a maximum false detection rate of 8.3%, namely HTTP Header injection vulnerabilities. The false detection rate of methods is between 7.4% and 8.3% [2][3], with a relatively high false detection rate. The lowest false detection rate of the method proposed in this paper is 0.3%, which is a literature download vulnerability.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…To better realize the system network security vulnerability mining, it is necessary to comprehensively perceive the system network situation and then improve the overall performance of security vulnerability mining. The network environment is composed of attack hosts, client hosts, servers, switches, routers, and hubs [2][3]. In this paper, the network system and the set attack process in the network situation awareness model are used to carry out security situation awareness, and the intrusion detection system, firewall, and security log information data of each host are obtained.…”
Section: Network Situation Awarenessmentioning
confidence: 99%
See 1 more Smart Citation
“…Particle swarm optimization generally chooses the maximum number of iterations or meets a predefined minimum classification condition. The specific algorithm flow is as follows [11][12] (1) Begin. Input the initial data of the distribution network, obtain the information of each node and branch, and determine the upper and lower limits of the voltage of each node.…”
Section: Algorithm Processmentioning
confidence: 99%
“…Arda and Aydogdu [21] studied the influence of longitudinal magnetic field on the flexural vibration problem of nonlocal strain gradient Euler‐Bernoulli nanobeams. Mohammadian [22] studied the appropriate selection of small‐scale parameters and the type of high‐order boundary conditions through free vibrations of carbon nanotubes.…”
Section: Introductionmentioning
confidence: 99%