Showing 541 - 560 results of 1,197 for search '"lightweight"', query time: 0.11s Refine Results
  1. 541

    Precipitation 3D printing of all-aramid materials for high-strength, heat-resistant applications by Ruowen Tu, Hyun Chan Kim, Henry A. Sodano

    Published 2025-01-01
    “…Additive manufacturing (AM) of lightweight, high-performance engineering polymers is an important research focus in the automotive, electronics and aerospace industries. …”
    Get full text
    Article
  2. 542

    Efficient Polarization Demosaicking Via Low-Cost Edge-Aware and Inter-Channel Correlation by Guangsen Liu, Peng Rao, Xin Chen, Yao Li, Haixin Jiang

    Published 2025-01-01
    “…The proposed algorithm is available in both lightweight and full versions, designed for different application requirements. …”
    Get full text
    Article
  3. 543

    DESIGN AND STRESS ANALYSIS OF RX-122 ROCKET MOTOR TUBE USING NUMERICAL METHOD by Lasinta Ari Nendra Wibawa, Iyus Rusyana, Dinar Koswara, Gagan Nugraha, Diyat Muhdiyat, Dedi Irawan

    Published 2024-12-01
    “…The RX-122 rocket is an experimental rocket series developed by the Technology Centre for Rocket-BRIN. The lightweight design of the RX-122 rocket motor tube is an essential requirement for improving the rocket's flight performance. …”
    Get full text
    Article
  4. 544

    Is your medical device “easy to use”? Supplemental oxygen patients’ experiences and tradeoffs around portable oxygen concentrators and tanks by Marc Egeth, Naomi Cherne, Nichole Breeland, Samantha Sye, Jennifer Soosaar, Frederic Seifer, Stanislav Glezer

    Published 2025-06-01
    “…We also know that patients want a lightweight and long-lasting device, but we challenged patients to choose from specific lighter and heavier options associated with various battery lives. …”
    Get full text
    Article
  5. 545

    Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks by Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI

    Published 2023-02-01
    “…With the characteristics of large space-time and satellite-ground network integration, the space integrated ground network has attracted much attention.Satellites can not only be used as emergency communication supplements, but also serve as air stations to expand the coverage of terrestrial networks, occupying an important position in both military and civilian scenarios.The entity authentication and key negotiation mechanism can prevent the malicious entities from joining the integrated network to steal users’ privacy, and guarantee network information security.In view of the characteristics of the high satellite-ground transmission delays, exposed links, limited processing capability and dynamic topology of the integrated network, a lightweight authentication scheme between satellites and ground suitable for double-layer satellite network was proposed to achieve a secure satellite networking architecture with session keys to protect data transmission.The scheme was based on symmetric cryptographic system, using lightweight cryptographic algorithms and introducing group key and hierarchical management mechanisms.The proposed scheme included three parts: inter-satellite authentication for geostationary earth orbit satellites, layer and inter-satellite authentication for same low earth orbit, and inter-satellite authentication for adjacent low earth orbit satellites.The group key and hierarchical management mechanism improved the efficiency of inter-group information transfer, reduced the authentication pressure on the ground control center, and enhanced the authentication security strength by realizing double verification in the three-entities authentication protocol.Different from the previous single scene authentication, the proposed authentication protocol took the form of multiplexing authentication parameters, which can realize the authentication requirements of dual scenes in one process.The results of Scyther, a protocol formal security simulation tool, show that the proposed scheme achieves secure access authentication.Compared with existing protocols, the proposed scheme improves authentication security and reduces communication and computational overhead.…”
    Get full text
    Article
  6. 546

    Data Augmentation-Based Enhancement for Efficient Network Traffic Classification by Chang-Yui Shin, Yang-Seo Choi, Myung-Sup Kim

    Published 2025-01-01
    “…We used them as the same inputs for lightweight deep learning and tree-based machine learning models, analyzed their performance, and identified efficient models. …”
    Get full text
    Article
  7. 547

    Numerical and Experimental Failure Analysis of Carbon Fiber-Reinforced Polymer-Based Pyrotechnic Separation Device by Mingfa Ren, Fei Weng, Jing Sun, Zhifeng Zhang, Zhiguo Ma, Tong Li

    Published 2020-01-01
    “…Current pyrotechnic separation devices are mainly made of metal materials, limiting the capacity of lightweight design in advanced launching vehicles. With the outstanding mechanical properties, such as high mass-specific strength and modulus, carbon fiber-reinforced polymers (CFRPs) have the potential to replace metal materials in pyrotechnic seperaton devices. …”
    Get full text
    Article
  8. 548

    An improved DeepLabv3 + railway track extraction algorithm based on densely connected and attention mechanisms by Yanbin Weng, Jie Yang, Changfan Zhang, Jing He, Cheng Peng, Lin Jia, Hui Xiang

    Published 2025-01-01
    “…In response to these problems, this paper presents a lightweight algorithm DA-DeepLabv3 + based on densely connected and attention mechanisms. …”
    Get full text
    Article
  9. 549

    SVDD: SAR Vehicle Dataset Construction and Detection by Dan Gao, Xiaofang Wu, Zhijin Wen, Yue Xu, Zhengchao Chen

    Published 2025-01-01
    “…To solve these problems, we proposed a lightweight SAR vehicle detection algorithm, aiming to improve the vehicle detection accuracy and simplify the model complexity. …”
    Get full text
    Article
  10. 550

    Mechanical and microstructural characteristics of recycled aluminium matrix reinforced with rice husk ash by Olatunji P Abolusoro, Moshibudi Caroline Khoathane, Washington Washington

    Published 2024-10-01
    “…This study provides a significant boost to the attainment of lightweight materials in the automobile and other allied industries. …”
    Get full text
    Article
  11. 551

    GroupFound: An effective approach to detect suspicious accounts in online social networks by Bo Feng, Qiang Li, Xiaowen Pan, Jiahao Zhang, Dong Guo

    Published 2017-07-01
    “…Thus, it is necessary to propose a lightweight algorithm which is hard to be evaded. In this article, we propose a lightweight algorithm GroupFound , which focuses on the structure of the local graph. …”
    Get full text
    Article
  12. 552

    Consensus Mechanism of IoT Based on Blockchain Technology by Yue Wu, Liangtu Song, Lei Liu, Jincheng Li, Xuefei Li, Linli Zhou

    Published 2020-01-01
    “…This method can be used in a lightweight IoT system.…”
    Get full text
    Article
  13. 553

    Effect of Depth Band Replacement on Red, Green and Blue Image for Deep Learning Weed Detection by Jan Vandrol, Janis Perren, Adrian Koller

    Published 2024-12-01
    “…In this study, we examined the effect of band substitution on the performance of lightweight YOLOv8 models using precision, recall and mAP50 metrics. …”
    Get full text
    Article
  14. 554

    Post-quantum encryption technology based on BRLWE for internet of things by Yitian GAO, Liquan CHEN, Tianyang TU, Yuan GAO, Qianye CHEN

    Published 2022-10-01
    “…With the development of quantum computers, the classical public key encryption system is not capable enough to guarantee the communication security of internet of things (IoT).Because the mathematical puzzles which post-quantum encryption algorithms are based on cannot yet be broken by quantum computers, these new algorithms have good anti-quantum computing security.In particular, the lattice-based cryptography is expected to become the main technology of the next generation public key cryptosystem.However, post-quantum encryption algorithms have the disadvantages of large amount of computation and high storage space.The communication efficiency of IoT will be affected if post-quantum encryption algorithms are directly applied to the lightweight device under IoT environment.In order to better guarantee the communication security and improve the commutation efficiency of IoT, Sym-BRLWE (symmetrical binary RLWE) encryption scheme was proposed.Sym-BRLWE was improved from the existing post-quantum encryption scheme based on BRLWE (binary ringlearning with errors) problem.Specifically, Sym-BRLWE encryption algorithm met the efficiency requirements of IoT via improving the random number selection on the discrete uniform distribution and the calculation of the polynomial multiplication.Sym-BRLWE encryption algorithm achieved high efficiency and high security via adding encryption security precautions, then it is more suitable for IoT lightweight devices.From the security analysis, the proposed Sym-BRLWE encryption scheme had high security.It could theoretically resist lattice attacks, timing attacks, simple power analysis (SPA) and differential power analysis (DPA).From simulation experiments, which were carried out in a binary computing environment simulating an 8-bit micro-device, the proposed Sym-BRLWE encryption scheme has high efficiency and small key size in encryption and decryption.It could reduce the total encryption time by 30% to 40% when compared with other BRLWE-based encryption schemes with the parameter selection of the 140 bit quantum security level.…”
    Get full text
    Article
  15. 555

    Multiobjective Optimization of Composite Material Seat Plate for Mortar Based on the Hybrid Surrogate Model by Fengfeng Wang, Chundong Xu, Lei Li

    Published 2024-01-01
    “…While ensuring shooting stability, the weight of the seat plate is reduced by 18.43% compared to the metal seat plate, which has important application value for lightweight design of mortars.…”
    Get full text
    Article
  16. 556

    Damage-tolerant mechanical metamaterials designed by fail-safe topology optimization by Yukun Zheng, Wenke Qiu, Xuxi Liu, Zhou Huang, Liang Xia

    Published 2025-01-01
    “…Mechanical metamaterials are celebrated for their remarkable properties and advances in additive manufacturing, yet their damage tolerance in aerospace and other demanding environments remains underexplored despite their lightweight and high-strength design. This work proposes a novel approach to design damage-tolerant metamaterials using fail-safe topology optimization to ensure their mechanical performance remains resilient to local damages. …”
    Get full text
    Article
  17. 557

    FEVT-SAR: Multicategory Oriented SAR Ship Detection Based on Feature Enhancement Vision Transformer by Minding Fang, Yu Gu, Dongliang Peng

    Published 2025-01-01
    “…FEViT includes two innovative lightweight modules: localized feature interactive convolution block (LFICB) and dual-granularity attention transformer block (DGTB). …”
    Get full text
    Article
  18. 558
  19. 559
  20. 560

    Fast handover authentication scheme in 5G mobile edge computing scenarios by Weicheng ZHANG, Hongquan WEI, Shuxin LIU, Liming PU

    Published 2022-06-01
    “…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
    Get full text
    Article