首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Additive Manufacturing (AM) is a game changing production technology for aerospace applications. Fused deposition modeling is one of the most widely used AM technologies and recently has gained much attention in the advancement of many products. This paper introduces an extensive review of fused deposition modeling and its application in the development of high performance unmanned aerial vehicles. The process methodology, materials, post processing, and properties of its products are discussed in details. Successful examples of using this technology for making functional, lightweight, and high endurance unmanned aerial vehicles are also highlighted. In addition, major opportunities, limitations, and outlook of fused deposition modeling are also explored. The paper shows that the emerge of fused deposition modeling as a robust technique for unmanned aerial vehicles represents a good opportunity to produce compact, strong, lightweight structures, and functional parts with embedded electronic.
  相似文献   

2.
Utilizing artificial intelligence (AI) to protect smart coastal cities has become a novel vision for scientific and industrial institutions. One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles (UVs) for anti-submarine attacks. This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy. The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach, and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol as a cybersecurity solution. The research’s noteworthy findings demonstrate UVs’ logistical capability to promptly detect the target and address the problem while securely keeping the drone’s geographical information. The results suggest that detecting the submarine early increases the likelihood of averting a collision. The dragonfly strategy of sensing the position of the submersible and aggregating around it demonstrates the reliability of swarm intelligence in increasing access efficiency. Securing communication between Unmanned Aerial Vehicles (UAVs) improves the level of secrecy necessary for the task. The swarm navigation is based on a peer-to-peer system, which allows each UAV to access information from its peers. This, in turn, helps the UAVs to determine the best route to take and to avoid collisions with other UAVs. The dragonfly strategy also increases the speed of the mission by minimizing the time spent finding the target.  相似文献   

3.
With the flexible deployment and high mobility of Unmanned Aerial Vehicles (UAVs) in an open environment, they have generated considerable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications. The difficulty stems from features other than mobile ad-hoc network (MANET), namely aerial mobility in three-dimensional space and often changing topology. In the UAV network, a single node serves as a forwarding, transmitting, and receiving node at the same time. Typically, the communication path is multi-hop, and routing significantly affects the network’s performance. A lot of effort should be invested in performance analysis for selecting the optimum routing system. With this motivation, this study modelled a new Coati Optimization Algorithm-based Energy-Efficient Routing Process for Unmanned Aerial Vehicle Communication (COAER-UAVC) technique. The presented COAER-UAVC technique establishes effective routes for communication between the UAVs. It is primarily based on the coati characteristics in nature: if attacking and hunting iguanas and escaping from predators. Besides, the presented COAER-UAVC technique concentrates on the design of fitness functions to minimize energy utilization and communication delay. A varied group of simulations was performed to depict the optimum performance of the COAER-UAVC system. The experimental results verified that the COAER-UAVC technique had assured improved performance over other approaches.  相似文献   

4.
Unmanned aerial vehicles (UAVs) have shown promising benefits in many applications. This has been enabled by the emergence of additive manufacturing (AM), which give the designers a large amount of geometrical freedom. In this paper, a novel design process of fused deposition modeling (FDM) combining both topology and infill optimization is introduced for AM of high performance porous structures. Tensile testing of FDM printed samples is first carried out to study the effect of the build orientation on the mechanical properties of acrylonitrile butadiene styrene (ABS) samples. It is found that samples built perpendicular to the load axis are the weakest with a tensile strength of 29 MPa and Young's modulus of 1960 MPa. The materials properties are fed to the finite elements analysis (FEA) for geometrical topology optimization, aiming to maximize stiffness and reduce weight of those parts. Afterwards, an infill optimization is carried out on the topology optimized parts using different mesostructures such as honeycomb, triangular, and rectangular to achieve high structural performance. The results showed that triangular pattern with 50% infill density had the lowest developed stresses, less mass, and strain energy when compared to other structures. Optimum UAVs parts of a quadcopter are successfully manufactured, assembled, and tested.
  相似文献   

5.
探讨了利用CATIA软件完善的曲面造型功能,进行小型无人机产品设计的问题.建立了全机高品质的理论外形数字曲面,实现了重要结构件的三维参数化实体建模(如机身头锥、翼面和整流罩等),以及模具的快速设计.还介绍了将CATIA软件的一些特殊功能应用于无人机外形设计的问题,例如翼身整流罩的自动生成等.结果表明CATIA软件的应用为小型无人机结构设计和模具制造提供了良好的三维设计手段,缩短了研发周期,节省了研制成本.  相似文献   

6.
In recent times, Unmanned Aerial Vehicles (UAVs) popularly known as drone technology have gradually gained widespread adoption all over the world. UAVs’ relevance within modern society stems from it being able to solve socio-economic issues as well as improve productivity. Sub-Saharan Africa has become a region of global interest with regards to technological development, leapfrogging and foreign investment, despite the lag in socio-economic development in comparison with other regions. Backed by socio-technical theory, the aim of this paper is to investigate UAV adoption and its usage in Sub-Saharan Africa by means of a systematic literature review methodology. Selected papers were reviewed, assessed and results were categorized according to the domain within which UAVs have been and are being deployed in Sub-Saharan Africa. We also determined whether the research reported on existing projects or rather made proposals on the use of UAVs.Our results reveal that UAV adoption in the sub-region is still in its early phase, with a number of implemented cases primarily focusing on healthcare and crop farming. The study makes theoretical and practical contributions to the topic of UAVs/drone technology within the sphere of Sub-Saharan Africa from a socio-technical perspective.  相似文献   

7.
Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) architecture to ensure that sensitive information is protected and kept secure throughout the communication. Simultaneously, efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource constrained. This study proposes a lightweight and efficient authentication scheme for the UAV-assisted MEC environment. The proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardware-based solution with a simple implementation. The proposed scheme works in four stages: system initialization, EU registration, EU authentication, and session establishment. It is implemented as a single hardware chip comprising registers and XOR gates, and it can run the entire process in one clock cycle. Consequently, the proposed scheme has significantly higher efficiency in terms of runtime and memory consumption compared to other prevalent methods in the area. Simulations are conducted to evaluate the proposed authentication algorithm. The results show that the scheme has an average execution time of 0.986 ms and consumes average memory of 34 KB. The hardware execution time is approximately 0.39 ns, which is a significantly less than the prevalent schemes, whose execution times range in milliseconds. Furthermore, the security of the proposed scheme is examined, and it is resistant to brute-force attacks. Around 1.158 × 1077 trials are required to overcome the system’s security, which is not feasible using fastest available processors.  相似文献   

8.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view.  相似文献   

9.
The controlled quantum secure direct communication (CQSDC) with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed. It is found that there are some serious security issues in this protocol. An eavesdropper (Eve) can eavesdrop on some information of the identity strings of the receiver and the controller without being detected by the selective-CNOT-operation (SCNO) attack. By the same attack, Eve can also steal some information of the secret message that the sender transmits. In addition, the receiver can take the same kind of attack to eavesdrop on some information of the secret message out of the control of the controller. This means that the requirements of CQSDC are not satisfied. At last, we improve the original CQSDC protocol to a secure one.  相似文献   

10.
通过对30名现役战士操作某型无人机仿真器与态势感知问卷调查相结合,对无人机操作员态势感知与工作负倚的关系进行了研究。实验结果表明:工作负荷越高,操作员态势感知能力越低;同工作负荷情况下,操作次数越多,操作员态势感知能力越高。  相似文献   

11.
通过以自由口无线通讯方式实现台州发电厂输煤程控主系统和斗轮机间通讯的成功范例,阐述了无线通讯在工程实践中如何解决实时性和可靠性的方法。  相似文献   

12.
Quantum secure direct communication (QSDC) can transmit secret messages directly from one user to another without first establishing a shared secret key, which is different from quantum key distribution. In this paper, we propose a novel quantum secure direct communication protocol based on signal photons and Bell states. Before the execution of the proposed protocol, two participants Alice and Bob exchange their corresponding identity IDA and IDB through quantum key distribution and keep them secret, respectively. Then the message sender, Alice, encodes each secret message bit into two single photons (| 01〉or|10〉) or a Bell state , and composes an ordered secret message sequence. To insure the security of communication, Alice also prepares the decoy photons and inserts them into secret message sequence on the basis of the values of IDA and IDB. By the secret identity IDA and IDB, both sides of the communication can check eavesdropping and identify each other. The proposed protocol not only completes secure direct communication, but also realizes the mutual authentication. The security analysis of the proposed protocol is presented in the paper. The analysis results show that this protocol is secure against some common attacks, and no secret message leaks even if the messages are broken. Compared with the two-way QSDC protocols, the presented protocol is a one-way quantum communication protocol which has the immunity to Trojan horse attack. Furthermore, our proposed protocol can be realized without quantum memory.  相似文献   

13.
Technological advances can significantly transform agrarian rural areas by increasing productivity and efficiency while reducing labour intensive processes. For instance, the usage of Unmanned Aerial Vehicles (UAVs) can offer flexibility collecting real-time information of the crops enabling farmers to take timely decisions. However, little is known about the barriers to the adoption of such technologies by rural farmers in emerging economies like India. Building on an extensive literature review, focussed group discussions, and field visits, the barriers impacting the adoption are identified and classified into technical, social, behavioural, operational, economic, and implementation categories. The relevance of each barrier and its importance is evaluated using a hybrid multi-criteria framework built on the theory of Fuzzy Delphi and Fuzzy Analytical Hierarchy Process to identify the most crucial barriers to the adoption of UAVs to implement precision agriculture in rural India. The paper suggests new avenues for accelerating technology adoption in rural areas of emerging economies.  相似文献   

14.
提出了在包装生产线控制系统中使用基于CAN 总线的通信网络,可以较好地满足其特定的高可靠性和实时性要求,本文对CAN 技术规范2.0A进行了深入的分析, 在帧结构的基础上对CAN通信协议的实现作了一定的分析和介绍,并结合实际应用, 给出了通信的设计结构和软件实现方法.实际应用表明, 该方法数据传输可靠, 通信速率高, 连接方便, 解决了总线冲突等问题, 取得了较好的应用效果.  相似文献   

15.
基于间隙耦合思想的全双工混沌保密通信方案   总被引:4,自引:0,他引:4  
讨论了有关混沌通信中的保密性问题及解决方案。该方案由 3个结构相同的混沌系统构成 ,采用分段耦合的思想 ,利用参数调制策略进行信息传输 ,使用非线性滤波器进行信息解调 ,实现了一种安全性能高的全双工混沌通信方案 ,并给出了保证安全性能和信息解调精度的条件。数值仿真结果表明 ,这一方法是有效的。  相似文献   

16.
With the rapid development of mobile communication technology, the application of internet of vehicles (IoV) services, such as for information services, driving safety, and traffic efficiency, is growing constantly. For businesses with low transmission delay, high data processing capacity and large storage capacity, by deploying edge computing in the IoV, data processing, encryption and decision-making can be completed at the local end, thus providing real-time and highly reliable communication capability. The roadside unit (RSU), as an important part of edge computing in the IoV, fulfils an important data forwarding function and provides an interactive communication channel for vehicles and server providers. Additional computing resources can be configured to accommodate the computing requirements of users. In this study, a virtual traffic defense strategy based on a differential game is proposed to solve the security problem of user-sensitive information leakage when an RSU is attacked. An incentive mechanism encourages service vehicles within the hot range to send virtual traffic to another RSU. By attracting the attention of attackers, it covers the target RSU and protects the system from attack. Simulation results show that the scheme provides the optimal strategy for intelligent vehicles to transmit virtual data, and ensures the maximization of users’ interests.  相似文献   

17.
基于无人机任务规划与控制站人机界面设计可靠性优劣的递阶结构,建立评价其设计可靠性优劣的指标体系.在此基础上运用模糊综合评判方法对某型无人机任务规划与控制站人机界面设计可靠性进行了综合评价.实例说明评价结果客观可靠.  相似文献   

18.
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN. In consideration of IWSN, we firstly review the security requirements and techniques in WSN data aggregation in this paper. Then, we give a holistic overview of the classical secure data aggregation protocols, which are divided into three categories: hop-by-hop encrypted data aggregation, end-to-end encrypted data aggregation and unencrypted secure data aggregation. Along this way, combining with the characteristics of industrial applications, we analyze the pros and cons of the existing security schemes in each category qualitatively, and realize that the security and the energy efficiency are suitable for IWSN. Finally, we make the conclusion about the techniques and approach in these categories, and highlight the future research directions of privacy preserving data aggregation in IWSN.  相似文献   

19.
With technological advancements in 6G and Internet of Things (IoT), the incorporation of Unmanned Aerial Vehicles (UAVs) and cellular networks has become a hot research topic. At present, the proficient evolution of 6G networks allows the UAVs to offer cost-effective and timely solutions for real-time applications such as medicine, tracking, surveillance, etc. Energy efficiency, data collection, and route planning are crucial processes to improve the network communication. These processes are highly difficult owing to high mobility, presence of non-stationary links, dynamic topology, and energy-restricted UAVs. With this motivation, the current research paper presents a novel Energy Aware Data Collection with Routing Planning for 6G-enabled UAV communication (EADCRP-6G) technique. The goal of the proposed EADCRP-6G technique is to conduct energy-efficient cluster-based data collection and optimal route planning for 6G-enabled UAV networks. EADCRP-6G technique deploys Improved Red Deer Algorithm-based Clustering (IRDAC) technique to elect an optimal set of Cluster Heads (CH) and organize these clusters. Besides, Artificial Fish Swarm-based Route Planning (AFSRP) technique is applied to choose an optimum set of routes for UAV communication in 6G networks. In order to validated whether the proposed EADCRP-6G technique enhances the performance, a series of simulations was performed and the outcomes were investigated under different dimensions. The experimental results showcase that the proposed model outperformed all other existing models under different evaluation parameters.  相似文献   

20.
分析了外部控制设备的远程数据传输要求、喷码机和条形码打印机的通信协议.根据数码物流防伪系统中用户的实际需求,自行研究了一种波浪形随机码协议,利用先进的包装标识设备结合计算机技术,通过喷印特异形状随机数码来达到假冒商品难以仿制的要求,从源头上打击了大规模的商业造假.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号