Objective Focusing on the s ecurity problem of authentication and confidentiality in the context of computer networks, a digital signature scheme was proposed based on the public key crypt osystem. Methods Firstly...Objective Focusing on the s ecurity problem of authentication and confidentiality in the context of computer networks, a digital signature scheme was proposed based on the public key crypt osystem. Methods Firstly, the course of digital signature based on the public key cryptosystem was given. Then, RSA and ELGamal schemes were de scribed respectively. They were the basis of the proposed scheme. Generalized EL Gamal type signature schemes were listed. After comparing with each other, one s cheme, whose Signature equation was (m+r)x=j+s modΦ(p) , was adopted in the des igning. Results Based on two well-known cryptographic assumpti ons, the factorization and the discrete logarithms, a digital signature scheme w as presented. It must be required that s' was not equal to p'q' in the signing p rocedure, because attackers could forge the signatures with high probabilities i f the discrete logarithms modulo a large prime were solvable. The variable publi c key “e” is used instead of the invariable parameter “3” in Harn's signatu re scheme to enhance the security. One generalized ELGamal type scheme made the proposed scheme escape one multiplicative inverse operation in the signing proce dure and one modular exponentiation in the verification procedure. Concl usion The presented scheme obtains the security that Harn's scheme was originally claimed. It is secure if the factorization and the discrete logarithm s are simultaneously unsolvable.展开更多
Soil nonlinear behavior displays noticeable effects on the site seismic response.This study proposes a new functional expression of the skeleton curve to replace the hyperbolic skeleton curve.By integrating shear modu...Soil nonlinear behavior displays noticeable effects on the site seismic response.This study proposes a new functional expression of the skeleton curve to replace the hyperbolic skeleton curve.By integrating shear modulus and combining the dynamic skeleton curve and the damping degradation coefficient,the constitutive equation of the logarithmic dynamic skeleton can be obtained,which considers the damping effect in a soil dynamics problem.Based on the finite difference method and the multi-transmitting boundary condition,a 1D site seismic response analysis program called Soilresp1D has been developed herein and used to analyze the time-domain seismic response in three types of sites.At the same time,this study also provides numerical simulation results based on the hyperbolic constitutive model and the equivalent linear method.The results verify the rationality of the new soil dynamic constitutive model.It can analyze the mucky soil site nonlinear seismic response,reflecting the deformation characteristics and damping effect of the silty soil.The hysteresis loop area is more extensive,and the residual strain is evident.展开更多
Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to...Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to differentiate between quantum entanglement and quantum correlation.Nonetheless,this indistinguishability is no longer holds for mixed states.To contribute to a better understanding of this differentiation,we have explored a simple model for both generating and measuring these quantum correlations.Our study concerns two macroscopic mechanical resonators placed in separate Fabry–Pérot cavities,coupled through the photon hopping process.this system offers a comprehensively way to investigate and quantify quantum correlations beyond entanglement between these mechanical modes.The key ingredient in analyzing quantum correlation in this system is the global covariance matrix.It forms the basis for computing two essential metrics:the logarithmic negativity(E_(N)^(m))and the Gaussian interferometric power(P_(G)^(m)).These metrics provide the tools to measure the degree of quantum entanglement and quantum correlations,respectively.Our study reveals that the Gaussian interferometric power(P_(G)^(m))proves to be a more suitable metric for characterizing quantum correlations among the mechanical modes in an optomechanical quantum system,particularly in scenarios featuring resilient photon hopping.展开更多
Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the comp...Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised systems.Forensic analysts are tasked with extracting and subsequently analyzing data,termed as artifacts,from these systems to gather evidence.Therefore,forensic analysts must sift through extensive datasets to isolate pertinent evidence.However,manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive.Previous studies addressed such inefficiencies by integrating artificial intelligence(AI)technologies into digital forensics.Despite the efforts in previous studies,artifacts were analyzed without considering the nature of the data within them and failed to prove their efficiency through specific evaluations.In this study,we propose a system to prioritize suspicious artifacts from compromised systems infected with malware to facilitate efficient digital forensics.Our system introduces a double-checking method that recognizes the nature of data within target artifacts and employs algorithms ideal for anomaly detection.The key ideas of this method are:(1)prioritize suspicious artifacts and filter remaining artifacts using autoencoder and(2)further prioritize suspicious artifacts and filter remaining artifacts using logarithmic entropy.Our evaluation demonstrates that our system can identify malicious artifacts with high accuracy and that its double-checking method is more efficient than alternative approaches.Our system can significantly reduce the time required for forensic analysis and serve as a reference for future studies.展开更多
In this paper,Let M_(n)denote the maximum of logarithmic general error distribution with parameter v≥1.Higher-order expansions for distributions of powered extremes M_(n)^(p)are derived under an optimal choice of nor...In this paper,Let M_(n)denote the maximum of logarithmic general error distribution with parameter v≥1.Higher-order expansions for distributions of powered extremes M_(n)^(p)are derived under an optimal choice of normalizing constants.It is shown that M_(n)^(p),when v=1,converges to the Frechet extreme value distribution at the rate of 1/n,and if v>1 then M_(n)^(p)converges to the Gumbel extreme value distribution at the rate of(loglogn)^(2)=(log n)^(1-1/v).展开更多
Letμbe a positive Borel measure on the interval[0,1).The Hankel matrix■with entriesμn,k=μn+k,whereμn=■[0,1)tndμ(t),induces,formally,the operator■where■is an analytic function in.We characterize the measuresμ...Letμbe a positive Borel measure on the interval[0,1).The Hankel matrix■with entriesμn,k=μn+k,whereμn=■[0,1)tndμ(t),induces,formally,the operator■where■is an analytic function in.We characterize the measuresμfor which■is bounded(resp.,compact)operator from the logarithmic Bloch space■into the Bergman space■,where 0≤α<∞,0<p<∞.We also characterize the measuresμfor which■is bounded(resp.,compact)operator from the logarithmic Bloch space■into the classical Bloch space■.展开更多
In this note,we prove a logarithmic Sobolev inequality which holds for compact submanifolds without a boundary in manifolds with asymptotically nonnegative sectional curvature.Like the Michale-Simon Sobolev inequality...In this note,we prove a logarithmic Sobolev inequality which holds for compact submanifolds without a boundary in manifolds with asymptotically nonnegative sectional curvature.Like the Michale-Simon Sobolev inequality,this inequality contains a term involving the mean curvature.展开更多
The paper generalizes the direct method of moving planes to the Logarithmic Laplacian system.Firstly,some key ingredients of the method are discussed,for example,Narrow region principle and Decay at infinity.Then,the ...The paper generalizes the direct method of moving planes to the Logarithmic Laplacian system.Firstly,some key ingredients of the method are discussed,for example,Narrow region principle and Decay at infinity.Then,the radial symmetry of the solution of the Logarithmic Laplacian system is obtained.展开更多
This article investigates the well posedness and asymptotic behavior of Neumann initial boundary value problems for a class of pseudo-parabolic equations with singular potential and logarithmic nonlinearity. By utiliz...This article investigates the well posedness and asymptotic behavior of Neumann initial boundary value problems for a class of pseudo-parabolic equations with singular potential and logarithmic nonlinearity. By utilizing cut-off techniques and combining with the Faedo Galerkin approximation method, local solvability was established. Based on the potential well method and Hardy Sobolev inequality, derive the global existence of the solution. In addition, we also obtained the results of decay.展开更多
In this paper, we study the global existence of the smooth solution for a reduced quantum Zakharov system in two spatial dimensions. Using energy estimates and the logarithmic type Sobolev inequality, we show the glob...In this paper, we study the global existence of the smooth solution for a reduced quantum Zakharov system in two spatial dimensions. Using energy estimates and the logarithmic type Sobolev inequality, we show the global existence of the solution to this system without any small condition on the initial data.展开更多
In order to reveal the complex network characteristics and evolution principle of China aviation network,the relationship between the node degree and the average path length of China aviation network in 1988,1994,2001...In order to reveal the complex network characteristics and evolution principle of China aviation network,the relationship between the node degree and the average path length of China aviation network in 1988,1994,2001,2008 and 2015 was studied.According to the theory and method of complex network,the network system was constructed with the city where the airport was located as the network node and the airline as the edge of the network.On the basis of the statistical data,the node average path length of China aviation network in 1988,1994,2001,2008 and 2015 was calculated.Through regression analysis,it was found that the node degree had a logarithmic relationship with the average length of node path,and the two parameters of the logarithmic relationship had linear evolutionary trace.Key word:China aviation network,complex network,node degree,average length of node path,logarithmic relationship,evolutionary trace.展开更多
This paper is devoted to studying the existence of solutions for the following logarithmic Schrödinger problem: −div(a(x)∇u)+V(x)u=ulogu2+k(x)| u |q1−2u+h(x)| u |q2−2u, x∈ℝN.(1)We first prove that the correspon...This paper is devoted to studying the existence of solutions for the following logarithmic Schrödinger problem: −div(a(x)∇u)+V(x)u=ulogu2+k(x)| u |q1−2u+h(x)| u |q2−2u, x∈ℝN.(1)We first prove that the corresponding functional I belongs to C1(HV1(ℝN),ℝ). Furthermore, by using the variational method, we prove the existence of a sigh-changing solution to problem (1).展开更多
In order to reveal the complex network characteristics and evolution principle of China aviation network,the relationship between the average degree and the average path length of edge vertices of China aviation netwo...In order to reveal the complex network characteristics and evolution principle of China aviation network,the relationship between the average degree and the average path length of edge vertices of China aviation network in 1988,1994,2001,2008 and 2015 was studied.According to the theory and method of complex network,the network system was constructed with the city where the airport was located as the network node and the airline as the edge of the network.On the basis of the statistical data,the average degree and average path length of edge vertices of China aviation network in 1988,1994,2001,2008 and 2015 were calculated.Through regression analysis,it was found that the average degree had a logarithmic relationship with the average path length of edge vertices and the two parameters of the logarithmic relationship had linear evolutionary trace.展开更多
The discrete logarithm method is the foundation of many public key algorithms. However, one type of key, defined as a weak-key, reduces the security of public key cryptosystems based on the discrete logarithm method. ...The discrete logarithm method is the foundation of many public key algorithms. However, one type of key, defined as a weak-key, reduces the security of public key cryptosystems based on the discrete logarithm method. The weak-key occurs if the public key is a factor or multiple of the primitive element, in which case the user's private key is not needed but can be obtained based on the character of the public key. An algorithm is presented that can easily test whether there is a weak-key in the cryptosystem. An example is given to show that an attack can be completed for the Elgamal digital signature if a weak-key exists, therefore validating the danger of weak-keys. Methods are given to prevent the generation of these weak-keys.展开更多
In this paper,we study the initial boundary value problem of pseudo-parabolic p-Laplacian type equation,which be use to model some important physical and biological phenomena.By using the potential well method,we obta...In this paper,we study the initial boundary value problem of pseudo-parabolic p-Laplacian type equation,which be use to model some important physical and biological phenomena.By using the potential well method,we obtain the global existence,asymptotic behavior and blow up results of weak solution with subcritical initial energy.Then we also extend these results to the critical initial energy.展开更多
The Palu MW7.4 earthquake occurred on September 28, 2018, with the epicenter at 119.86°, 0.72°. The severe shaking caused severe damage in Central Sulawesi, especially in Palu. We conducted a postseismic def...The Palu MW7.4 earthquake occurred on September 28, 2018, with the epicenter at 119.86°, 0.72°. The severe shaking caused severe damage in Central Sulawesi, especially in Palu. We conducted a postseismic deformation study to determine the deformation pattern and reduce future earthquakes’ impact.Interferometric Synthetic Aperture Radar(In SAR) data were processed using Li CSBAS to get the time series. The time series data were fitted to exponential and logarithmic functions to determine the mechanism of postseismic deformation. The exponential model identified the influence of the viscoelastic mechanism, and the logarithm identified the afterslip mechanism. The Palu earthquake was fitted to logarithmic and exponential, but the logarithmic was more significant than an exponential function.Afterslip mechanism predominates, and viscoelastic mechanisms play a minor role in this postseismic deformation.展开更多
An explicit form of the elastic strain-energy function for direction-dependent large elastic strain behaviors of soft fiber-reinforced composites is first presented based upon a decoupled approach for simulating compl...An explicit form of the elastic strain-energy function for direction-dependent large elastic strain behaviors of soft fiber-reinforced composites is first presented based upon a decoupled approach for simulating complex nonlinear coupling effects.From this form,the exact closed-form solutions are then obtained for the uniaxial tension responses in the fiber and cross-fiber directions.With such exact solutions,the issue of simultaneously simulating strongly coupling nonlinear responses in the fiber and cross-fiber directions may be reduced to the issue of separately treating each decoupled uniaxial stress-strain response,thus bypassing usual complexities and uncertainties involved in identifying a large number of strongly coupled adjustable parameters.The numerical examples given are in good agreement with the experimental data for large strain responses.展开更多
文摘Objective Focusing on the s ecurity problem of authentication and confidentiality in the context of computer networks, a digital signature scheme was proposed based on the public key crypt osystem. Methods Firstly, the course of digital signature based on the public key cryptosystem was given. Then, RSA and ELGamal schemes were de scribed respectively. They were the basis of the proposed scheme. Generalized EL Gamal type signature schemes were listed. After comparing with each other, one s cheme, whose Signature equation was (m+r)x=j+s modΦ(p) , was adopted in the des igning. Results Based on two well-known cryptographic assumpti ons, the factorization and the discrete logarithms, a digital signature scheme w as presented. It must be required that s' was not equal to p'q' in the signing p rocedure, because attackers could forge the signatures with high probabilities i f the discrete logarithms modulo a large prime were solvable. The variable publi c key “e” is used instead of the invariable parameter “3” in Harn's signatu re scheme to enhance the security. One generalized ELGamal type scheme made the proposed scheme escape one multiplicative inverse operation in the signing proce dure and one modular exponentiation in the verification procedure. Concl usion The presented scheme obtains the security that Harn's scheme was originally claimed. It is secure if the factorization and the discrete logarithm s are simultaneously unsolvable.
基金Major Program of the National Natural Science Foundation of China under Grant No.52192675 and the 111 Project of China under Grant No.D21001。
文摘Soil nonlinear behavior displays noticeable effects on the site seismic response.This study proposes a new functional expression of the skeleton curve to replace the hyperbolic skeleton curve.By integrating shear modulus and combining the dynamic skeleton curve and the damping degradation coefficient,the constitutive equation of the logarithmic dynamic skeleton can be obtained,which considers the damping effect in a soil dynamics problem.Based on the finite difference method and the multi-transmitting boundary condition,a 1D site seismic response analysis program called Soilresp1D has been developed herein and used to analyze the time-domain seismic response in three types of sites.At the same time,this study also provides numerical simulation results based on the hyperbolic constitutive model and the equivalent linear method.The results verify the rationality of the new soil dynamic constitutive model.It can analyze the mucky soil site nonlinear seismic response,reflecting the deformation characteristics and damping effect of the silty soil.The hysteresis loop area is more extensive,and the residual strain is evident.
文摘Quantum correlations that surpass entanglement are of great importance in the realms of quantum information processing and quantum computation.Essentially,for quantum systems prepared in pure states,it is difficult to differentiate between quantum entanglement and quantum correlation.Nonetheless,this indistinguishability is no longer holds for mixed states.To contribute to a better understanding of this differentiation,we have explored a simple model for both generating and measuring these quantum correlations.Our study concerns two macroscopic mechanical resonators placed in separate Fabry–Pérot cavities,coupled through the photon hopping process.this system offers a comprehensively way to investigate and quantify quantum correlations beyond entanglement between these mechanical modes.The key ingredient in analyzing quantum correlation in this system is the global covariance matrix.It forms the basis for computing two essential metrics:the logarithmic negativity(E_(N)^(m))and the Gaussian interferometric power(P_(G)^(m)).These metrics provide the tools to measure the degree of quantum entanglement and quantum correlations,respectively.Our study reveals that the Gaussian interferometric power(P_(G)^(m))proves to be a more suitable metric for characterizing quantum correlations among the mechanical modes in an optomechanical quantum system,particularly in scenarios featuring resilient photon hopping.
基金supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2024-RS-2024-00437494)supervised by the IITP(Institute for Information&Communications Technology Planning&Evaluation).
文摘Digital forensics aims to uncover evidence of cybercrimes within compromised systems.These cybercrimes are often perpetrated through the deployment of malware,which inevitably leaves discernible traces within the compromised systems.Forensic analysts are tasked with extracting and subsequently analyzing data,termed as artifacts,from these systems to gather evidence.Therefore,forensic analysts must sift through extensive datasets to isolate pertinent evidence.However,manually identifying suspicious traces among numerous artifacts is time-consuming and labor-intensive.Previous studies addressed such inefficiencies by integrating artificial intelligence(AI)technologies into digital forensics.Despite the efforts in previous studies,artifacts were analyzed without considering the nature of the data within them and failed to prove their efficiency through specific evaluations.In this study,we propose a system to prioritize suspicious artifacts from compromised systems infected with malware to facilitate efficient digital forensics.Our system introduces a double-checking method that recognizes the nature of data within target artifacts and employs algorithms ideal for anomaly detection.The key ideas of this method are:(1)prioritize suspicious artifacts and filter remaining artifacts using autoencoder and(2)further prioritize suspicious artifacts and filter remaining artifacts using logarithmic entropy.Our evaluation demonstrates that our system can identify malicious artifacts with high accuracy and that its double-checking method is more efficient than alternative approaches.Our system can significantly reduce the time required for forensic analysis and serve as a reference for future studies.
文摘In this paper,Let M_(n)denote the maximum of logarithmic general error distribution with parameter v≥1.Higher-order expansions for distributions of powered extremes M_(n)^(p)are derived under an optimal choice of normalizing constants.It is shown that M_(n)^(p),when v=1,converges to the Frechet extreme value distribution at the rate of 1/n,and if v>1 then M_(n)^(p)converges to the Gumbel extreme value distribution at the rate of(loglogn)^(2)=(log n)^(1-1/v).
基金supported by Zhejiang Provincial Natural Science Foundation of China(LY23A010003).
文摘Letμbe a positive Borel measure on the interval[0,1).The Hankel matrix■with entriesμn,k=μn+k,whereμn=■[0,1)tndμ(t),induces,formally,the operator■where■is an analytic function in.We characterize the measuresμfor which■is bounded(resp.,compact)operator from the logarithmic Bloch space■into the Bergman space■,where 0≤α<∞,0<p<∞.We also characterize the measuresμfor which■is bounded(resp.,compact)operator from the logarithmic Bloch space■into the classical Bloch space■.
基金Supported by the NSFC(11771087,12171091 and 11831005)。
文摘In this note,we prove a logarithmic Sobolev inequality which holds for compact submanifolds without a boundary in manifolds with asymptotically nonnegative sectional curvature.Like the Michale-Simon Sobolev inequality,this inequality contains a term involving the mean curvature.
基金Supported by the National Natural Science Foundation of China(11501342,12001344)。
文摘The paper generalizes the direct method of moving planes to the Logarithmic Laplacian system.Firstly,some key ingredients of the method are discussed,for example,Narrow region principle and Decay at infinity.Then,the radial symmetry of the solution of the Logarithmic Laplacian system is obtained.
文摘This article investigates the well posedness and asymptotic behavior of Neumann initial boundary value problems for a class of pseudo-parabolic equations with singular potential and logarithmic nonlinearity. By utilizing cut-off techniques and combining with the Faedo Galerkin approximation method, local solvability was established. Based on the potential well method and Hardy Sobolev inequality, derive the global existence of the solution. In addition, we also obtained the results of decay.
文摘In this paper, we study the global existence of the smooth solution for a reduced quantum Zakharov system in two spatial dimensions. Using energy estimates and the logarithmic type Sobolev inequality, we show the global existence of the solution to this system without any small condition on the initial data.
文摘In order to reveal the complex network characteristics and evolution principle of China aviation network,the relationship between the node degree and the average path length of China aviation network in 1988,1994,2001,2008 and 2015 was studied.According to the theory and method of complex network,the network system was constructed with the city where the airport was located as the network node and the airline as the edge of the network.On the basis of the statistical data,the node average path length of China aviation network in 1988,1994,2001,2008 and 2015 was calculated.Through regression analysis,it was found that the node degree had a logarithmic relationship with the average length of node path,and the two parameters of the logarithmic relationship had linear evolutionary trace.Key word:China aviation network,complex network,node degree,average length of node path,logarithmic relationship,evolutionary trace.
文摘This paper is devoted to studying the existence of solutions for the following logarithmic Schrödinger problem: −div(a(x)∇u)+V(x)u=ulogu2+k(x)| u |q1−2u+h(x)| u |q2−2u, x∈ℝN.(1)We first prove that the corresponding functional I belongs to C1(HV1(ℝN),ℝ). Furthermore, by using the variational method, we prove the existence of a sigh-changing solution to problem (1).
文摘In order to reveal the complex network characteristics and evolution principle of China aviation network,the relationship between the average degree and the average path length of edge vertices of China aviation network in 1988,1994,2001,2008 and 2015 was studied.According to the theory and method of complex network,the network system was constructed with the city where the airport was located as the network node and the airline as the edge of the network.On the basis of the statistical data,the average degree and average path length of edge vertices of China aviation network in 1988,1994,2001,2008 and 2015 were calculated.Through regression analysis,it was found that the average degree had a logarithmic relationship with the average path length of edge vertices and the two parameters of the logarithmic relationship had linear evolutionary trace.
基金Supported by the National Key Basic Research and Development (973) Program (No. 2003CB314805) and the National Natural Science Foundation of China (No. 90304014)
文摘The discrete logarithm method is the foundation of many public key algorithms. However, one type of key, defined as a weak-key, reduces the security of public key cryptosystems based on the discrete logarithm method. The weak-key occurs if the public key is a factor or multiple of the primitive element, in which case the user's private key is not needed but can be obtained based on the character of the public key. An algorithm is presented that can easily test whether there is a weak-key in the cryptosystem. An example is given to show that an attack can be completed for the Elgamal digital signature if a weak-key exists, therefore validating the danger of weak-keys. Methods are given to prevent the generation of these weak-keys.
基金Supported by the National Natural Science Foundation of China(Grant No.11271141).
文摘In this paper,we study the initial boundary value problem of pseudo-parabolic p-Laplacian type equation,which be use to model some important physical and biological phenomena.By using the potential well method,we obtain the global existence,asymptotic behavior and blow up results of weak solution with subcritical initial energy.Then we also extend these results to the critical initial energy.
基金partially supported by UGM’s Social Fund in the scheme of the RTA Project 2022
文摘The Palu MW7.4 earthquake occurred on September 28, 2018, with the epicenter at 119.86°, 0.72°. The severe shaking caused severe damage in Central Sulawesi, especially in Palu. We conducted a postseismic deformation study to determine the deformation pattern and reduce future earthquakes’ impact.Interferometric Synthetic Aperture Radar(In SAR) data were processed using Li CSBAS to get the time series. The time series data were fitted to exponential and logarithmic functions to determine the mechanism of postseismic deformation. The exponential model identified the influence of the viscoelastic mechanism, and the logarithm identified the afterslip mechanism. The Palu earthquake was fitted to logarithmic and exponential, but the logarithmic was more significant than an exponential function.Afterslip mechanism predominates, and viscoelastic mechanisms play a minor role in this postseismic deformation.
基金Project supported by the National Natural Science Foundation of China(Nos.12172151 and12172149)the Research Project of Introducing High-level Foreign Experts from the Ministry of Sicence and Technology of China(No.G20221990122)the Start-up Fund from Jinan University(Guangzhou)of China(No.88019062)。
文摘An explicit form of the elastic strain-energy function for direction-dependent large elastic strain behaviors of soft fiber-reinforced composites is first presented based upon a decoupled approach for simulating complex nonlinear coupling effects.From this form,the exact closed-form solutions are then obtained for the uniaxial tension responses in the fiber and cross-fiber directions.With such exact solutions,the issue of simultaneously simulating strongly coupling nonlinear responses in the fiber and cross-fiber directions may be reduced to the issue of separately treating each decoupled uniaxial stress-strain response,thus bypassing usual complexities and uncertainties involved in identifying a large number of strongly coupled adjustable parameters.The numerical examples given are in good agreement with the experimental data for large strain responses.