|
|
|
Swati Kumari, Vatsal Tulshyan and Hitesh Tewari
Due to rising cyber threats, IoT devices? security vulnerabilities are expanding. However, these devices cannot run complicated security algorithms locally due to hardware restrictions. Data must be transferred to cloud nodes for processing, giving attac...
ver más
|
|
|
|
|
|
Jintao Zhao, Wenlei Sun, Cheng Lu, Xuedong Zhang, Lixin Wang and Dajiang Wang
Wire and cable are important industrial products involving the national economy and people?s livelihood, which are hailed as the ?blood vessel? and ?nerve? of the national economy, providing the basic guarantee for the normal operation of modern economy ...
ver más
|
|
|
|
|
|
Ruslans Babajans, Darja Cirjulina, Filips Capligins, Deniss Kolosovs and Anna Litvinenko
The current work is focused on studying the performance of the Pecora?Carroll synchronization technique to achieve synchronization between the analog and discrete chaos oscillators. The importance of this study is supported by the growing applications of...
ver más
|
|
|
|
|
|
Zhu Li, Chengen Qi, Rui Gao, Bin Yu, Yiran Zhu, Hong Zhang and Jingyu Zhang
Fracturing hard roofs by ground hydraulic action is an important control technology for the strong mine pressure in the stope. In this paper, a new simulation method, ?separate + interface,? is proposed, and two physical simulation experiments are conduc...
ver más
|
|
|
|
|
|
Haoran Zhu, Liping Zhu, Lun Luo and Jiao Li
Based on 360 event-based precipitation samples collected at six stations on the North Tibetan Plateau (NTP) in 2019?2020, we analyzed the influence of meteorological parameters, sub-cloud evaporation, moisture sources, and moisture transmission pathways ...
ver más
|
|
|