In this paper, low-cost and two-cycle hardware structures of the PRINCE lightweight block cipher are presented. In the first structure, we proposed an area-constrained structure, and in the second structure, a high-speed implementation of the PRINCE cipher is presented. The substitution box (S-box) and the inverse of S-box (S-box−1) blocks are the most complex blocks in the PRINCE cipher. These blocks are designed by an efficient structure with low critical path delay. In the low-cost structure, the S-boxes and S-boxes−1 are shared between the round computations and the intermediate step of PRINCE cipher. Therefore, the proposed architecture is implemented based on the lowest number of computation resources. The two-cycle implementation of PRINCE cipher is designed by a processing element (PE), which is a general and reconfigurable element. This structure has a regular form with the minimum number of the control signal. Implementation results of the proposed structures in 180-nm CMOS technology and Virtex-4 and Virtex-6 FPGA families are achieved. The proposed structures, based on the results, have better critical path delay and throughput compared with other's related works. 相似文献
Highly active ReS2 nanocatalysts were prepared by CVD method and characterized by XRD, BET -BJH, Raman spectroscopy, XPS, TPR, NH3-TPD, SEM, and HRTEM techniques. Catalytic activities were used in upgrading heavy crude oil using methane as hydrogen source. The results showed a significant increase in API and decrease in sulfur and nitrogen content of crude oil. RSM technique was used to investigate the interactive effects of temperature (200–400 °C), pressure (20–40 bar) and dosage of nanocatalyst (0.5–2 wt. %) on the performance of HDS reaction. The results represent that the maximum predicted HDS activity (74.375%) was estimated under the optimal conditions (400 °C, 20 bars, and 2 wt % of nanocatalyst). Also, the effect of reaction temperature, pressure and dosage of ReS2 nanorods catalyst on HDN of heavy crude oil was investigated and highest efficiency in the HDN process (93%) occurred at 400 °C and 40 bar using 2 wt % ReS2. 相似文献
Microsystem Technologies - A force sensor utilizing a transformer concept with a ferrofluid core was developed. A ferrofluid reservoir was machined out of Teflon and the open top of the reservoir... 相似文献
Adherent and coherent deposits of nickel sponge similar to sintered nickel may be made from sulphate, chloride, fluoborate or sulphamate nickel plating solutions containing nickel powder in suspension, providing the concentration of free acid is maintained sufficiently high to inhibit co-depesition of Ni(OH) In nitrate solution, cathodic reduction of nitrate and deposition of Ni(OH)2 predominates. 相似文献
Mapping vulnerability to Saltwater Intrusion (SWI) in coastal aquifers is studied in this paper using the GALDIT framework but with a novelty of transforming the concept of vulnerability indexing to risk indexing. GALDIT is the acronym of 6 data layers, which are put consensually together to invoke a sense of vulnerability to the intrusion of saltwater against aquifers with freshwater. It is a scoring system of prescribed rates to account for local variations; and prescribed weights to account for relative importance of each data layer but these suffer from subjectivity. Another novelty of the paper is to use fuzzy logic to learn rate values and catastrophe theory to learn weight values and these together are implemented as a scheme and hence Fuzzy-Catastrophe Scheme (FCS). The GALDIT data layers are divided into two groups of Passive Vulnerability Indices (PVI) and Active Vulnerability Indices (AVI), where their sum is Total Vulnerability Index (TVI) and equivalent to GALDIT. Two additional data layers (Pumping and Water table decline) are also introduced to serve as Risk Actuation Index (RAI). The product of TVI and RAI yields Risk Indices. The paper applies these new concepts to a study area, subject to groundwater decline and a possible saltwater intrusion problem. The results provide a proof-of-concept for PVI, AVI, RAI and RI by studying their correlation with groundwater quality samples using the fraction of saltwater (fsea), Groundwater Quality Indices (GQI) and Piper diagram. Significant correlations between the appropriate values are found and these provide a new insight for the study area.
In a galvanizing process a continuous sheet of steel is passed through a bath of molten zinc around a series of rotating rollers.
One or more of these rollers are submerged in the bath of molten zinc and are supported by journal bearings that are lubricated
with molten zinc. Dynamic characteristics of these bearings influence the quality of the finished galvanized sheet and also
determine the production speed. This work presents a theoretical study of these bearings in terms of the damping, stiffness,
and inertia coefficients of the film of molten zinc separating the journal from the bearings. This work also addresses the
influence of turbulence on the bearing dynamics. The damping, stiffness, and inertia coefficients of journal bearings lubricated
with molten zinc are determined for different zinc alloys at 450,650, and 850 °F. 相似文献
The Journal of Supercomputing - On the battlefield, early detection of armored vehicles can have a positive effect. Because according to this issue, timely and appropriate reactions can be done.... 相似文献
This article tackles the problem of predicting effort (in person–hours) required to fix a software defect posted on an Issue Tracking System. The proposed method is inspired by the Nearest Neighbour Approach presented by the pioneering work of Weiss et al. (2007) [1]. We propose four enhancements to Weiss et al. (2007) [1]: Data Enrichment, Majority Voting, Adaptive Threshold and Binary Clustering. Data Enrichment infuses additional issue information into the similarity-scoring procedure, aiming to increase the accuracy of similarity scores. Majority Voting exploits the fact that many of the similar historical issues have repeating effort values, which are close to the actual. Adaptive Threshold automatically adjusts the similarity threshold to ensure that we obtain only the most similar matches. We use Binary Clustering if the similarity scores are very low, which might result in misleading predictions. This uses common properties of issues to form clusters (independent of the similarity scores) which are then used to produce the predictions. Numerical results are presented showing a noticeable improvement over the method proposed in Weiss et al. (2007) [1]. 相似文献