Results 31 to 40 of about 215,056 (305)

Dynamic Performance and Crashworthiness Assessment of Honeycomb Reinforced Tubular Pipe in the Jacket Platform under Ship Collision

open access: yesJournal of Marine Science and Engineering, 2022
The collision between the pipe legs of jacket platforms and bypassing ships is of great concern for the safety assessment of platforms. Honeycomb structures have been widely used owing to their unique deformation and mechanical properties under dynamic ...
Hong Lin   +7 more
doaj   +1 more source

Quantum Lightning Never Strikes the Same State Twice [PDF]

open access: yes, 2017
Public key quantum money can be seen as a version of the quantum no-cloning theorem that holds even when the quantum states can be verified by the adversary.
B Barak   +17 more
core   +2 more sources

Macromodelling for analog design and robustness boosting in bio-inspired computing models [PDF]

open access: yes, 2005
Setting specifications for the electronic implementation of biological neural-network-like vision systems on-chip is not straightforward, neither it is to simulate the resulting circuit.
Cuadri Carvajo, Jorge   +3 more
core   +1 more source

Evaluating the Parameter Influence in the Event of a Ship Collision based on the Finite Element Method Approach

open access: yesInternational Journal of Technology, 2016
The main objective of this paper is to review and examine the effects of the selected collision parameter values on the characteristics of collision energy in several ship collision scenarios.
Aditya Rio Prabowo   +3 more
doaj   +1 more source

Algebraic Collision Attacks on Keccak

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting
Rachelle Heim Boissier   +2 more
doaj   +1 more source

HMNT: Hash Function Based on New Mersenne Number Transform

open access: yesIEEE Access, 2020
In the field of information security, hash functions are considered important as they are used to ensure message integrity and authentication. Despite various available methods to design hash functions, the methods have been proven to time inefficient ...
Ali Maetouq, Salwani Mohd Daud
doaj   +1 more source

Nonlinear dynamic behaviors of outer shell and upper deck structures subjected to impact loading in maritime environment

open access: yesCurved and Layered Structures, 2019
Ship collision appears as the most threatening loading accounting for structural casualties and numbers of casualties after impact on the target ship.
Prabowo Aditya Rio, Sohn Jung Min
doaj   +1 more source

On Collision Resistance of Generalized Cellular Automata

open access: diamondScience and Education of the Bauman MSTU, 2014
P. G. Klyucharev
openalex   +2 more sources

DESIGN OF TS GRADE GUIDING ANTI-COLLISION PAD BASED ON TOPOLOGY OPTIMIZATION (MT)

open access: yesJixie qiangdu, 2023
In order to solve the problem of single design method of the existing guided anti-collision pad, the guided anti-collision pad is designed to meet the requirements of the current regulations, and based on the collision-resistant topology optimization ...
SUN YuHao, LEI ZhengBao
doaj  

Design of a wideband and tunable radar absorber

open access: yesMaterials Research Express, 2023
To effectively address the challenges posed by intricate and dynamic electromagnetic environments, we propose a wideband and tunable radar absorber in this paper.
Xin Gao   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy