Results 71 to 80 of about 8,786 (262)

A Numerical–Experimental Approach for Multi‐Matrix Fiber‐Reinforced Plastics Characterization Using Finite Element Model Updating

open access: yesAdvanced Engineering Materials, EarlyView.
A numerical–experimental framework is developed for characterizing multi‐matrix fiber‐reinforced polymers (MM‐FRPs) combining epoxy and polyurethane matrices. Harmonic bending tests are integrated with finite element model updating (FEMU) to simultaneously identify elastic and viscoelastic material parameters.
Rodrigo M. Dartora   +4 more
wiley   +1 more source

Optimal Checkpointing for Secure Intermittently-Powered IoT Devices

open access: yes, 2017
Energy harvesting is a promising solution to power Internet of Things (IoT) devices. Due to the intermittent nature of these energy sources, one cannot guarantee forward progress of program execution.
Garg, Siddharth   +2 more
core   +1 more source

Optimized Implementation of PIPO Block Cipher on 32-Bit ARM and RISC-V Processors

open access: yesIEEE Access, 2022
A lightweight block cipher PIPO-64/128 was presented in ICISC’2020. PIPO of the 8-bit unit using an unbalanced-bridge S-box showed better performance than other lightweight block cipher algorithms on an 8-bit AVR environment.
Youngbeom Kim, Seog Chung Seo
doaj   +1 more source

Enhancing Strength and Electrical Conductivity in Al–Zr–Sc Conductor Alloys Through Sn and Sr Microalloying and Two‐Step Aging Treatment

open access: yesAdvanced Engineering Materials, EarlyView.
Trace additions of Sn and Sr combined with a two‐step aging treatment are shown to enhance the microstructure and performance of Al–Zr–Sc conductor alloys. Strength and electrical conductivity increase concurrently through accelerated precipitation of fine Al3(Sc, Zr) precipitates and improved dislocation resistance, offering a cost‐effective pathway ...
Quan Shao   +3 more
wiley   +1 more source

Serial Lightweight Implementation Techniques for Block Ciphers

open access: yes, 2021
Most of the cryptographic protocols that we use frequently on the internet are designed in a fashion that they are not necessarily suitable to run in constrained environments. Applications that run on limited-battery, with low computational power, or area constraints, therefore requires the new designs as well as improved implementations of ...
openaire   +1 more source

Air‐Pressure–Actuated Vibroacoustic Metamaterial With Tunable Bandgap: Design, Modeling, and Characterization

open access: yesAdvanced Engineering Materials, EarlyView.
This article presents the design, modeling, and characterization of air‐pressure–actuated programmable vibroacoustic metamaterials (PVAMM). The study focuses on leveraging air pressure to dynamically tune resonance frequencies for effective noise attenuation.
William Kaal   +2 more
wiley   +1 more source

Light block cipher algorithm for electric power industry

open access: yesDianxin kexue, 2015
With the development of computer technology,cryptographic algorithms were applied more and more widely in the field of information security.However,it has been a very important problem that how to achieve high performance,high security encryption ...
Tao WANG
doaj   +2 more sources

Random Permutation Statistics and An Improved Slide-Determine Attack on KeeLoq [PDF]

open access: yes, 2011
KeeLoq is a lightweight block cipher which is extensively used in the automotive industry. Its periodic structure, and overall simplicity makes it vulnerable to many different attacks.
Bard, GV, Courtois, NT
core  

Sol–Gel Derived Polymer Precursors for Stereolithography of ZrC

open access: yesAdvanced Engineering Materials, EarlyView.
ZrC is a critical material target for extreme temperature conditions. This report describes a protocol for preparing ZrC ceramics via stereolithography and examines the impact of the polymer matrix on carbothermal reduction and mechanical stability of 3D printed ZrC.
Charles J. Rafalko   +2 more
wiley   +1 more source

Grover on Korean Block Ciphers

open access: yesApplied Sciences, 2020
The Grover search algorithm reduces the security level of symmetric key cryptography with n-bit security level to O(2n/2). In order to evaluate the Grover search algorithm, the target block cipher should be efficiently implemented in quantum circuits ...
Kyoungbae Jang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy