-
621
Multi-objective Optimization Design of an Aviation Split Path Transmission System
Published 2015-01-01“…The promoting the safety performance and lightweight are considered as the objectives,a multi-objective optimization design of an aviation split path transmission system is conducted.To measure the safety performance of the system,gear contact and bending fatigue strength are computed.Afterwards,a multi-objective optimization model that includes maximum safety factors and minimum mass is developed,with the system parameters selected as design variables.Considering the system requirements for load sharing,a dynamics model of the split path transmission system is established so that the load sharing characteristics can be quantifiably measured and restricted.Non-dominated Sorting Genetic Algorithm II(NSGA-II)is adopted to solve the model.The results show that the method promoted can effectively improve the safety performance and reduce the weight at the same time.…”
Get full text
Article -
622
Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network
Published 2023-04-01“…Aiming at the problem that the resources of maritime mobile terminals were limited and the network traffic was imbalanced in the MMSN (maritime meteorological sensor network) environment, which made it difficult to detect network intrusion accurately, a mobile edge computing based physical architecture of MMSN was proposed, and an intrusion detection model based on balancing generative adversarial network was proposed.First, an advanced balancing generative adversarial network was adopted to augment the imbalanced data.Then, a lightweight network based on group convolution was applied to intrusion data classification.Finally, compared with conventional data augmentation models, the computer simulation proves that the proposed model has a higher ability to recognize various attacks, especially minority class attacks on MMSN.…”
Get full text
Article -
623
Key infection and its applications in sensor networks
Published 2009-01-01“…Key management has remained a challenging issue in sensor networks due to the constraints of sensor node resources.First,a probabilistic model to analyze the security of key infection was derived.Then a group based key infection to further improve its security performance was proposed.Finally,by combining the key infection with a lightweight key pre-distribution mechanism,a more secure key distribution scheme for sensor networks,Group based Key Infection with Key Pre-distribution,was presented.Analysis results show that proposed scheme presents a viable trade-off between security and resource consumption for smart dust sensor networks.…”
Get full text
Article -
624
Optimization Design for Gear Pair Transmission with Considering Torsional Stiffness Constraint
Published 2016-01-01“…Furthermore,the mathematical model for optimal design of transmission chain is constructed,a lightweight design of the transmission chain is carried out by considering the torsional stiffness constraint. …”
Get full text
Article -
625
STUDY ON THE LOAD CONVERSION METHOD OF WHEEL-SIDE REDUCER CONSIDERING CITY LOAD CYCLE
Published 2019-01-01“…To explore the conversion method from the vehicle speed to the part load, and it provides the technological support for the lightweight design and the life analysis of parts in the reducer.…”
Get full text
Article -
626
Malware detection technology analysis and applied research of android platform
Published 2014-08-01“…For the Android platform security problem, a mobile client and server collaborative malware detection pro-posal was proposed, where mobile client application was mainly based on permission detection technology and imple-mented lightweight testing. The server-side detection system is mainly responsible for testing suspicious samples submit-ted by the mobile terminals, meanwhile implements the functions of software behavior analysis, signature library updates, and mobile client synchronization, etc. …”
Get full text
Article -
627
STRUCTURAL ANALYSIS OF VAN BODY-IN-WHITE
Published 2016-01-01“…During the lightweight process of automobile,the body structure strength cannot meet the design requirement,which leads to components failure. …”
Get full text
Article -
628
Privacy protection key distribution protocol for edge computing
Published 2021-02-01“…Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifically, based on the GGM pseudo-random number generator, the key distribution protocol with a prefix-predicate is constructed, which can effectively support lightweight and efficient key distribution.Moreover, based on the multilinear pairing, the key distribution protocol with a bit fixing predicate is constructed.This protocol can support flexible and fine-grained strategy selection and is suitable for dynamic and flexible multi-device scenarios in heterogeneous networks.Finally, the security proof of the proposed protocols is presented.…”
Get full text
Article -
629
A Cross-Stage Focused Small Object Detection Network for Unmanned Aerial Vehicle Assisted Maritime Applications
Published 2025-01-01“…Moreover, to conserve computational resources, a lightweight CED module was introduced to reduce parameters and conserve the computing resources of the UAV. …”
Get full text
Article -
630
Research on Influencing Factors of Fatigue Strength of Wind Turbine Spindles Based on Nonlinear Contact
Published 2023-11-01“…The research results have certain guiding significance for engineering practice and production, and lay a foundation for further lightweight design of spindles.…”
Get full text
Article -
631
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01“…Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete satisfiability don't care signals was demonstrated.These don't care could not be satisfied under normal operation and thus the circuit design with Trojan is functionally equivalent to the Trojan-free baseline.The attacker could activate the Trojan through simple yet effective fault injection.Experimental results on a 1024-bit RSA cryptographic core show that the proposed hardware Trojan can escape from logic synthesis optimization, and that the RSA private key can be retrieved by simply over-clocking the design.A defense technique that can effectively detect such stealthy Trojan design was provided.…”
Get full text
Article -
632
MULTI-OBJECTIVE OPTIMAL DESIGN OF ALUMINUM CELL
Published 2021-01-01“…For the optimized nine-lattice energy absorption box,The energy absorption was increased,the peak crushing force was reduced and the lightweight is achieved.…”
Get full text
Article -
633
A survey of efficient deep neural network
Published 2020-04-01“…Recently,deep neural network (DNN) has achieved great success in the field of AI such as computer vision and natural language processing.Thanks to a deeper and larger network structure,DNN’s performance is rapidly increasing.However,deeper and lager deep neural networks require huge computational and memory resources.In some resource-constrained scenarios,it is difficult to deploy large neural network models.How to design a lightweight and efficient deep neural network to accelerate its running speed on embedded devices is a great research hotspot for advancing deep neural network technology.The research methods and work of representative high-efficiency deep neural networks in recent years were reviewed and summarized,including parameter pruning,model quantification,knowledge distillation,network search and quantification.Also,vadvantages and disadvantages of different methods as well as applicable scenarios were analyzed,and the future development trend of efficient neural network design was forecasted.…”
Get full text
Article -
634
The Art of Managing Various Ocular Defects in Different Clinical Scenarios: A Case Series
Published 2023-07-01“…A novel technique of fabricating hollow lightweight ocular prostheses having the sustained prolonged release of artificial tears has been described.…”
Get full text
Article -
635
Fabricating CAD/CAM Implant-Retained Mandibular Bar Overdentures: A Clinical and Technical Overview
Published 2017-01-01“…The Nobel Procera CAD/CAM System was utilised to produce a lightweight titanium overdenture bar with locator attachments. …”
Get full text
Article -
636
An improved RFID authentication protocol based on quadratic residue
Published 2018-04-01“…In view of the existing radio frequency identification(RFID) authentication protocol based on quadratic residue in the security and cost aspects of the loopholes and deficiencies,an improved RFID bidirectional authentication protocol based on the quadratic residue was designed.The improved protocol was mixed with random number encryption under the framework of the quadratic residue,which makes the message certification and identification more efficient and fast in database authentication and identification; the ultra-lightweight bit replacement operations and XOR encryption communication information was introduced,which reduces the cost of system computing; in database,the random number checking mechanism was added to avoid attacks such as agreement to be synchronized and denial of service attacks; finally,the GNY logical proof of the protocol was given,which shows the feasibility of the improved protocol.The protocol security and performance analysis indicate that the improved protocol has higher security and lower cost.…”
Get full text
Article -
637
A bidirectional authentication protocol for RFID based on Syn
Published 2018-12-01“…The RFID system is made up of three parts:tags,readers and databases.The information between tags and readers are transmitted through wireless channel,which is easy to be intercepted by attackers.A two-way authentication protocol based on word Synthesis operation was proposed.The two remainder theorem was used to encrypt communication messages by the proposed protocol,the difficulty of cracking was increased; In the process of each round of communication encryption,a random number was added to make the communication messages inconsistent,so that the tracking attacks could not be initiated by attackers.In the communication message encryption,the word synthesis algorithms was adopted at the same time,the total calculation of the system could be effectively reduced.A random checking mechanism was introduced at the database,enabling a synchronous attack and other attacks to be effectively resisted by the system.Security analysis shows that the protocol has high security,and performance analysis shows that the protocol has the standard of lightweight computation.…”
Get full text
Article -
638
Topology Optimization Design of the Planar 3-RPR Fully Compliant Parallel Mechanism
Published 2016-01-01“…Combining with quadratic interpolation method of topology optimization,the curve fitting of the model is carried out,and the 3D model is created in the Solidworks,the model is imported into Hyperworks for second meshing and its statics comparison and analysis are carried out,the results show that,the manipulator which based on the mapping relation of topology optimization not only has the same movement characteristic with the traditional parallel mechanism,but also the structure is more compact,lightweight,and the method provides a theoretical reference for the configuration synthesis of this kind of plane compliant parallel mechanism.…”
Get full text
Article -
639
On Fractional Diffusion Equation with Caputo-Fabrizio Derivative and Memory Term
Published 2021-01-01“…First, we establish the local existence and uniqueness of lightweight solutions under some assumptions about the input data. …”
Get full text
Article -
640
Secure contact tracing platform from simplest private set intersection cardinality
Published 2022-09-01“…In this work, we introduce SecureCT, a Secure Contact Tracing platform with strong privacy protection and lightweight cost. SecureCT prevents linkage attacks, eliminates replay and relay attacks, and allows the phone's holder to delegate their contact tracing computation to untrusted servers while maintaining the user's privacy. …”
Get full text
Article