The formulation of a plate finite element with so called ‘physical’ shape functions is revisited. The derivation of the ‘physical’ shape functions is based on Hencky-Bollé theory of moderately thick plates. The considered finite element was assessed in the past, and the tests showed that the solution convergence was achieved in a wide range of thickness to in-plane dimensions ratios. In this paper a holistic correctness assessment is presented, which covers three criteria: the ellipticity, the consistency and the inf-sup conditions. Fulfilment of these criteria assures the existence of a unique solution, and a stable and optimal convergence to the correct solution. The algorithms of the numerical tests for each test case are presented and the tests are performed for the considered formulation. In result it is concluded that the finite element formulation passes every test and therefore is a good choice for modeling plate structural elements regardless of their thickness.
Among rapid development of wireless communication, technology cryptography plays a major role in securing the personal information of the user. As such, many authentication schemes have been proposed to ensure secrecy of wireless communication but they fail to meet all the required security goals. The proposed signcryption scheme uses multi-factor authentication techniques such as user biometrics, smart card and passwords to provide utmost security of personal information. In general, wireless devices are susceptible to various attacks and resource constraint by their very nature. To overcome these challenges a lightweight cryptographic scheme called signcryption has evolved. Signcryption is a logical combination of encryption and digital signature in a single step. Thereby it provides necessary security features in less computational and communication time. The proposed research work outlines the weaknesses of the already existing Cao et al.’s authentication scheme, which is prone to biometric recognition error, offline password guessing attack, impersonation attack and replay attack. Furthermore, the proposed study provides an enhanced multi-factor authentication scheme using signcryption based on hyper elliptic curve cryptography and bio-hash function. Security of the proposed scheme is analyzed using Burrows-Abadi-Needham logic. This analysis reveals that the proposed scheme is computational and communication-efficient and satisfies all the needed security goals. Finally, an analysis of the study results has revealed that the proposed scheme protects against biometric recognition error, password guessing attack, impersonation attack, DoS attack and dictionary attack.
Massive multiple-input-multiple-output (MIMO) and beamforming are key technologies, which significantly influence on increasing effectiveness of emerging fifth-generation (5G) wireless communication systems, especially mobile-cellular networks. In this case, the increasing effectiveness is understood mainly as the growth of network capacity resulting from better diversification of radio resources due to their spatial multiplexing in macro- and micro-cells. However, using the narrow beams in lieu of the hitherto used cell-sector brings occurring interference between the neighboring beams in the massive-MIMO antenna system, especially, when they utilize the same frequency channel. An analysis of this effect is the aim of this paper. In this case, it is based on simulation studies, where a multi-elliptical propagation model and standard 3GPP model are used. We present the impact of direction and width of the neighboring beams of 5G new radio gNodeB base station equipped with the multi-beam antenna system on the interference level between these beams. The simulations are carried out for line-of-sight (LOS) and non-LOS conditions of a typical urban environment.