-
541
Precipitation 3D printing of all-aramid materials for high-strength, heat-resistant applications
Published 2025-01-01“…Additive manufacturing (AM) of lightweight, high-performance engineering polymers is an important research focus in the automotive, electronics and aerospace industries. …”
Get full text
Article -
542
Efficient Polarization Demosaicking Via Low-Cost Edge-Aware and Inter-Channel Correlation
Published 2025-01-01“…The proposed algorithm is available in both lightweight and full versions, designed for different application requirements. …”
Get full text
Article -
543
DESIGN AND STRESS ANALYSIS OF RX-122 ROCKET MOTOR TUBE USING NUMERICAL METHOD
Published 2024-12-01“…The RX-122 rocket is an experimental rocket series developed by the Technology Centre for Rocket-BRIN. The lightweight design of the RX-122 rocket motor tube is an essential requirement for improving the rocket's flight performance. …”
Get full text
Article -
544
Is your medical device “easy to use”? Supplemental oxygen patients’ experiences and tradeoffs around portable oxygen concentrators and tanks
Published 2025-06-01“…We also know that patients want a lightweight and long-lasting device, but we challenged patients to choose from specific lighter and heavier options associated with various battery lives. …”
Get full text
Article -
545
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
Get full text
Article -
546
Data Augmentation-Based Enhancement for Efficient Network Traffic Classification
Published 2025-01-01“…We used them as the same inputs for lightweight deep learning and tree-based machine learning models, analyzed their performance, and identified efficient models. …”
Get full text
Article -
547
Numerical and Experimental Failure Analysis of Carbon Fiber-Reinforced Polymer-Based Pyrotechnic Separation Device
Published 2020-01-01“…Current pyrotechnic separation devices are mainly made of metal materials, limiting the capacity of lightweight design in advanced launching vehicles. With the outstanding mechanical properties, such as high mass-specific strength and modulus, carbon fiber-reinforced polymers (CFRPs) have the potential to replace metal materials in pyrotechnic seperaton devices. …”
Get full text
Article -
548
An improved DeepLabv3 + railway track extraction algorithm based on densely connected and attention mechanisms
Published 2025-01-01“…In response to these problems, this paper presents a lightweight algorithm DA-DeepLabv3 + based on densely connected and attention mechanisms. …”
Get full text
Article -
549
SVDD: SAR Vehicle Dataset Construction and Detection
Published 2025-01-01“…To solve these problems, we proposed a lightweight SAR vehicle detection algorithm, aiming to improve the vehicle detection accuracy and simplify the model complexity. …”
Get full text
Article -
550
Mechanical and microstructural characteristics of recycled aluminium matrix reinforced with rice husk ash
Published 2024-10-01“…This study provides a significant boost to the attainment of lightweight materials in the automobile and other allied industries. …”
Get full text
Article -
551
GroupFound: An effective approach to detect suspicious accounts in online social networks
Published 2017-07-01“…Thus, it is necessary to propose a lightweight algorithm which is hard to be evaded. In this article, we propose a lightweight algorithm GroupFound , which focuses on the structure of the local graph. …”
Get full text
Article -
552
Consensus Mechanism of IoT Based on Blockchain Technology
Published 2020-01-01“…This method can be used in a lightweight IoT system.…”
Get full text
Article -
553
Effect of Depth Band Replacement on Red, Green and Blue Image for Deep Learning Weed Detection
Published 2024-12-01“…In this study, we examined the effect of band substitution on the performance of lightweight YOLOv8 models using precision, recall and mAP50 metrics. …”
Get full text
Article -
554
Post-quantum encryption technology based on BRLWE for internet of things
Published 2022-10-01“…With the development of quantum computers, the classical public key encryption system is not capable enough to guarantee the communication security of internet of things (IoT).Because the mathematical puzzles which post-quantum encryption algorithms are based on cannot yet be broken by quantum computers, these new algorithms have good anti-quantum computing security.In particular, the lattice-based cryptography is expected to become the main technology of the next generation public key cryptosystem.However, post-quantum encryption algorithms have the disadvantages of large amount of computation and high storage space.The communication efficiency of IoT will be affected if post-quantum encryption algorithms are directly applied to the lightweight device under IoT environment.In order to better guarantee the communication security and improve the commutation efficiency of IoT, Sym-BRLWE (symmetrical binary RLWE) encryption scheme was proposed.Sym-BRLWE was improved from the existing post-quantum encryption scheme based on BRLWE (binary ringlearning with errors) problem.Specifically, Sym-BRLWE encryption algorithm met the efficiency requirements of IoT via improving the random number selection on the discrete uniform distribution and the calculation of the polynomial multiplication.Sym-BRLWE encryption algorithm achieved high efficiency and high security via adding encryption security precautions, then it is more suitable for IoT lightweight devices.From the security analysis, the proposed Sym-BRLWE encryption scheme had high security.It could theoretically resist lattice attacks, timing attacks, simple power analysis (SPA) and differential power analysis (DPA).From simulation experiments, which were carried out in a binary computing environment simulating an 8-bit micro-device, the proposed Sym-BRLWE encryption scheme has high efficiency and small key size in encryption and decryption.It could reduce the total encryption time by 30% to 40% when compared with other BRLWE-based encryption schemes with the parameter selection of the 140 bit quantum security level.…”
Get full text
Article -
555
Multiobjective Optimization of Composite Material Seat Plate for Mortar Based on the Hybrid Surrogate Model
Published 2024-01-01“…While ensuring shooting stability, the weight of the seat plate is reduced by 18.43% compared to the metal seat plate, which has important application value for lightweight design of mortars.…”
Get full text
Article -
556
Damage-tolerant mechanical metamaterials designed by fail-safe topology optimization
Published 2025-01-01“…Mechanical metamaterials are celebrated for their remarkable properties and advances in additive manufacturing, yet their damage tolerance in aerospace and other demanding environments remains underexplored despite their lightweight and high-strength design. This work proposes a novel approach to design damage-tolerant metamaterials using fail-safe topology optimization to ensure their mechanical performance remains resilient to local damages. …”
Get full text
Article -
557
FEVT-SAR: Multicategory Oriented SAR Ship Detection Based on Feature Enhancement Vision Transformer
Published 2025-01-01“…FEViT includes two innovative lightweight modules: localized feature interactive convolution block (LFICB) and dual-granularity attention transformer block (DGTB). …”
Get full text
Article -
558
Preparation and Sound Insulation Performance of Superfine Metal Powder/Nitrile-Butadiene Rubber-Polyvinyl Chloride Microcellular Foaming Material
Published 2019-01-01“…Lightweight sound insulation materials have received much attention. …”
Get full text
Article -
559
-
560
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01“…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
Get full text
Article