Showing 721 - 740 results of 1,197 for search '"lightweight"', query time: 0.05s Refine Results
  1. 721

    Characterization of Composite RFID Antennas Based on Thermal Properties: A Survey by Chitra Varadhan, Fekadu Ashine Chamatu, S. Arulselvi

    Published 2021-01-01
    “…In this paper, a comprehensive survey on thermal and geometric design parameters of composite materials utilized in the fabrication of modern RFID systems has been discussed mainly due to its advantages such as lightweight and high strength. Designing of RF antenna setup requires careful consideration of material, geometric and fabrication parameters. …”
    Get full text
    Article
  2. 722

    Effects Of Natural Fibre Reinforcement On The Shear Strength Properties Of Soil by Jodin Makinda, Heah Yee Ling, Elsa Eka Putri

    Published 2024-03-01
    “…Moreover, these fibers are lightweight and extremely rigid, which makes them ideal for improving soil. …”
    Get full text
    Article
  3. 723

    LOW SPEED IMPACT PERFORMANCE AND APPLICATION OF FLAX-BASALT FIBER COMPOSITES (MT) by ZHANG RuHao, CUI An, CHEN Chong, YU TianMing, LIU LiYuan, HUANG XianQing

    Published 2022-01-01
    “…In order to meet the requirements of vehicle lightweight and crash safety, flax-basalt fiber composite laminates were made. …”
    Get full text
    Article
  4. 724

    Effect of Varied Cashew Nut Ash Reinforcement in Aluminum Matrix Composite by Yallamati Abshalomu, Y. Jyothi, K. Balamurugan, Rabin Selvaraj

    Published 2023-01-01
    “…CTB has the lowest density variation and increases tensile and flexion bearing capacity by 30% and 47%, respectively. The lightweight brittle increment is impact-resistant. SEM fracture analysis shows transgranular and intergranular fractures with dimples, large craters, and peak areas.…”
    Get full text
    Article
  5. 725

    Research of power preprocessing optimization-based template attack on LED by Xiao-juan WANG, Shi-ze GUO, Xin-jie ZHAO, Mei SONG, Fan ZHANG

    Published 2014-03-01
    “…The security of LED,a lightweight block cipher proposed in CHES 2011,was evaluated by the template attack (TA).Several improvements of TA from the perspective of the preprocessing optimization was proposed.Firstly,the noise offset was calculated by using the phase-only correlation factor in the frequency view of the power trace to eliminate the data interference in the template building phase.Secondly,a novel character extracting method was proposed based on calculating the cross-cluster offset of different clusters classified by the plaintexts to cut the different leakage points from the power traces automatically.Thirdly,a dynamic effective power points choosing strategy was proposed by utilizing the mean value and the noises of the of power traces to evaluate the differences between different templates and improve the utilization of side channel information.Experiment results demonstrate that the proposed techniques of data alignment and automatically data cutting enlarge the differences of templates and reduce the number of the required power trace in both the template building and attacking phase.The proposed effective power points choosing strategy reduces the data complexity of the attack and only two power traces are required to launch the attack with the success rate of 100%.…”
    Get full text
    Article
  6. 726

    Synthesis and Characterization of Nickel-Alumina Composites from Recycled Nickel Powder by V. G. Karayannis, A. K. Moutsatsou

    Published 2012-01-01
    “…By increasing the % ceramic reinforcement content, density clearly decreases while strengthening is achieved, thus leading to development of lightweight and enhanced oblong nickel-alumina composites. …”
    Get full text
    Article
  7. 727

    Emotion Monitoring for Preschool Children Based on Face Recognition and Emotion Recognition Algorithms by Guiping Yu

    Published 2021-01-01
    “…Using the deep learning approach, we design a more lightweight network structure to reduce the number of parameters and save computational resources. …”
    Get full text
    Article
  8. 728

    The Review of Beamforming Technology Based on Optical True Time Delay Line by Shiyi XIA, Guotong LI

    Published 2022-06-01
    “…The important role satellite communications plays in next-generation communication protocols brings both opportunities and challenges.Beamforming is an essential technology for effi cient and fl exible utilization of onboard resources.To explored a better beamforming technology, the optical control beamforming composed of the optical real-time delay line and the traditional analog beam were compared in principle.The phased array beamforming technology based on optical true time delay line meets the expectations of small size, lightweight, and low power in satellite communication.Phased arrays based on optical true delay lines could easily achieved no squint during beam scanning.The technical advantages and constraints of beamforming of optical real-time delay lines under diff erent technical paths were analyzed.For example, based on micro-ring resonator arrays, based on grating delay lines, based on multi-path switching and optical switches, and based on wavelength-selective optical true time delay lines.Finally, the research status of the existing optical beamforming technology was summarized.The possibility of realization in satellite interconnection was proposed, and its future development direction was predicted.…”
    Get full text
    Article
  9. 729

    Optimizing Sustainability in High-Speed Rail Rolling Stock through CFRP Material Substitution by Rungskunroch Panrawee, Maneerat Patcharaporn

    Published 2025-01-01
    “…This study provides a foundational approach to using lightweight, recyclable materials in rail transportation, with promising implications for future sustainable developments in the industry.…”
    Get full text
    Article
  10. 730

    Zero trust management of data flow between IoT edge nodes based on SDN by XIAO Jingxu, GUO Yuanbo, CHANG Chaowen, WU Ping, YANG Chenli

    Published 2024-07-01
    “…A fixed-length header overhead was used for zero trust management of data flow, nodes, and paths to achieve lightweight packet forwarding verification and malicious node localization functions. …”
    Get full text
    Article
  11. 731

    Dynamic Crushing Analysis of Hexagonal-Kagome Combined Honeycomb with Negative Poisson’s Ratio by Wei Min Wang, Zhi Liang Yang, Jun Hu

    Published 2022-01-01
    “…In this study, a novel design was proposed by combining various cell elements to obtain better crashworthiness, providing a new concept to promote the development of lightweight materials.…”
    Get full text
    Article
  12. 732

    Secure and collaborative spectrum sensing scheme based on audit game by Yuntao WANG, Zhou SU, Qichao XU, Yiliang LIU, Haixia PENG, Hao LUAN

    Published 2023-12-01
    “…To defend against poisoning attacks and free-riding attacks conducted by malicious sensing terminals in crowd sensing-based collaborative spectrum sensing (CCSS), a novel audit game-based defense scheme was proposed, which combined the pre-deterrence and post-punishment mechanisms.Firstly, considering the audit budget constraint, a mixed-strategy audit game model under incomplete information was designed, which set a penalty strategy to deter malicious collaborators before spectrum sensing, and audited and punished them after the fusion of sensing data.Then, a lightweight audit chain model with on-chain and off-chain collaboration was designed, in which audit evidence was stored in an off-chain data warehouse and its metadata was publicly published on the blockchain.Furthermore, a distributed and intelligent audit algorithm based on reinforcement learning was devised to adaptively seek the approximate mix-strategy equilibrium of the audit game.Simulation results demonstrate that the proposed scheme can quickly obtain the stable and approximately optimal audit strategies and actively suppress the poisoning and free-riding behaviors of malicious collaborators, in comparison with conventional schemes.…”
    Get full text
    Article
  13. 733

    STUDY ON BALLISTIC IMPACT CHARACTERISTICS OF BISTABLE LAMINATED SHELLS OF PLAIN WEAVED COMPOSITES by CHANG ZhongLiang, ZHANG ZhiJun, WU ChenChen, ZOU GuangPing, WU SongYang, YAN AnShi, LI YinChen

    Published 2024-08-01
    “…The deployable laminated shell has the characteristics of deformable,lightweight,simple molding process,uniform mechanical properties,etc.…”
    Get full text
    Article
  14. 734

    Fuzzy-Based Trust Prediction Model for Routing in WSNs by X. Anita, M. A. Bhagyaveni, J. Martin Leo Manickam

    Published 2014-01-01
    “…The sensitive application environments and resource constraints of WSNs mandate the requirement of lightweight security scheme. The earlier security solutions were based on historical behavior of neighbor but the security can be enhanced by predicting the future behavior of the nodes in the network. …”
    Get full text
    Article
  15. 735

    Mechanical Properties of Titanium Diboride Particles Reinforced Aluminum Alloy Matrix Composites: A Comprehensive Review by V. Mohanavel, M. Ravichandran, V. Anandakrishnan, Alokesh Pramanik, M. Meignanamoorthy, Alagar Karthick, M. Muhibbullah

    Published 2021-01-01
    “…In recent decades, aluminum matrix composites (AMCs) are an advanced engineering material widely utilized in diverse engineering applications, including aircraft, automobile, marine, and shipbuilding, owing to their low density, lightweight, good stiffness, superior strength, and good tribological properties. …”
    Get full text
    Article
  16. 736

    ONE EVALUATION METHOD FOR THE CONTRIBUTION OF SUBSTRUCTURE STIFFNESS TO ARRAY FRAMEWORK STIFFNESS (MT) by WANG Chao, SUN XiaoGang, GU YeQing, Lü ZhenHua, Lü YiNing

    Published 2023-01-01
    “…Through the analysis, some improvement design suggestions were put forward for the lightweight and bearing capacity design of the array antenna frame.…”
    Get full text
    Article
  17. 737

    IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions by Yuze Wang, Peng Liu, Yingtao Jiang

    Published 2022-07-01
    “…To address this problem that may cause potentially serious security breaches, the instruction set architecture (ISA) monitor and secure cache (IMSC) is proposed. As a lightweight solution, IMSC employs an ISA monitor to discover and correct any potential threats imposed by undocumented instructions, and it relies on a secure cache to ensure the credibility of the system. …”
    Get full text
    Article
  18. 738

    Experimental Study on Static Performance of Deployable Bridge Based on Cable-Strengthened Scissor Structures by Xiaoming Yu, Yinghua Yang, Yanxia Ji, Lin Li

    Published 2021-01-01
    “…Scissor structures have the advantages of high storage rate, lightweight, and convenient storage and transportation. …”
    Get full text
    Article
  19. 739

    Feature enhancement and bilinear feature vector fusion for text detection of mobile industrial containers by Haiyang HU, Zepin LI, Zhongjin LI

    Published 2022-07-01
    “…In the real factory environment, due to factors such as dim light, irregular text, and limited equipment, text detection becomes a challenging task.Aiming at this problem, a feature vector fusion module based on bilinear operation was designed and combined with feature enhancement and semi-convolution to form a lightweight text detection network RGFFD (ResNet18 + Ghost Module + FPEM(feature pyramid enhancement module)) + FFM(feature fusion module) + DB (differentiable binarization)).Among them, the Ghost module was embedded with a feature enhancement module to improve the feature extraction capability, the bilinear feature vector fusion module fused multi-scale information, and an adaptive threshold segmentation algorithm was added to improve the segmentation capability of the DB module.In the real industrial environment, the RGFFD detection speed reached 6.5 f/s, when using the embedded device UP2 board for text detection of container numbers.At the same time, the detection speed on the public datasets ICDAR2015 and Total-text reached 39.6 f/s and 49.6 f/s, respectively.The accuracy rate on the custom dataset reached 88.9%, and the detection speed was 30.7 f/s.…”
    Get full text
    Article
  20. 740

    Multi-stage hashing network storage structure for intelligent routing by Feng ZHU, Qun HUANG

    Published 2020-10-01
    “…Network data collection and storage are fundamental for intelligent routing control,providing massive flow data for model training and decision-making.However,as the key device in network storage system,switches have very limited memory size and design flexibility,which can’t satisfy the needs of intelligent routing control for comprehensive high-precision data and lightweight storage system,thus reducing the effectiveness of intelligent routing control.A multi-stage hashing network storage structure (MHNSS) was proposed for intelligent routing control,which fully utilized the limited memory resource of switch and completed network data storage with low collision rate.The number of candidate buckets of the flow key was augmented by multi-stage hash table,thus reducing collision rate and improving memory load ratio.Hash collision was resolved via coarse-grained timestamp LRU algorithm,which always stored most recently used data and cleared least recently used data to avoid subsequent collisions as far as possible.Trace-driven experiments showed that compared with widely used single hash table,MHNSS had significant performance advantage in collision rate and load ratio.…”
    Get full text
    Article