|
|
|
Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu and Anna Kobusinska
The rapid advancement of internet technologies has dramatically increased the number of connected devices. This has created a huge attack surface that requires the deployment of effective and practical countermeasures to protect network infrastructures f...
ver más
|
|
|
|
|
|
Faham Tahmasebinia, Linda Zhang, Sangwoo Park and Samad Sepasgozar
Reinforced concrete (RC) members in critical structures, such as bridge piers, high-rise buildings, and offshore facilities, are vulnerable to impact loads throughout their service life. For example, vehicle collisions, accidental loading, or unpredicted...
ver más
|
|
|
|
|
|
Zoe Marchment, Michael J. Frith, John Morrison and Paul Gill
This paper uses graph theoretical measures to analyse the relationship between street network usage, as well as other street- and area-level factors, and dissident Republican violence in Belfast. A multi-level statistical model is used. Specifically, we ...
ver más
|
|
|
|
|
|
Jianhua Liu and Zibo Wu
The cloud-based Internet of Things (IoT-Cloud) combines the advantages of the IoT and cloud computing, which not only expands the scope of cloud computing but also enhances the data processing capability of the IoT. Users always seek affordable and effic...
ver más
|
|
|
|
|
|
Igor M. Coelho, Vitor N. Coelho, Rodolfo P. Araujo, Wang Yong Qiang and Brett D. Rhodes
Consensus mechanisms are a core feature for handling negotiation and agreements. Blockchain technology has seen the introduction of different sorts of consensus mechanism, ranging from tasks of heavy computation to the subtle mathematical proofs of Byzan...
ver más
|
|
|