This study compares subtractive manufacturing (SM) and additive manufacturing (AM) techniques in the production of stainless-steel parts with non-stick coatings. While subtractive manufacturing involves the machining of rolled products, additive manufacturing employs the FFF (fused filament fabrication) technique with metal filament and sintering. The applied non-stick coatings are commercially available and are manually sprayed with a spray gun, followed by a curing process.
View Article and Find Full Text PDFThe aim of this work was to conduct a dimensional study, in terms of microgeometry, using parts from an additive manufacturing process with fused filament fabrication (FFF) technology. As in most cases of additive manufacturing processes, curved surfaces were obtained via approximation of planes with different inclinations. The focus of this experimental study was to analyze the surface roughness of curve geometry from surface-roughness measurements of the plane surfaces that generate it.
View Article and Find Full Text PDFOne of the worst traffic problems today is the existence of huge traffic jams in almost any big city, produced by the large number of commuters using private cars. This problem has led to an increase in research on the optimization of vehicle occupancy in urban areas as this would help to solve the problem that most cars are occupied by single passengers. The solution of sharing the available seats in cars, known as carpooling, is already available in major cities around the world.
View Article and Find Full Text PDFThis paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key.
View Article and Find Full Text PDF