|
|
|
Jintao Rao and Zhe Cui
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a new c...
ver más
|
|
|
|
|
|
|
Hongfang Sun, Hao Zou, Xinwei Li, Shazim Ali Memon, Binyang Yuan, Feng Xing, Xiaogang Zhang and Jie Ren
In this study, X-ray microcomputed tomography (XCT) and nanoindentation techniques were used to evaluate the synergistic action between sulfate and chloride ingress under cyclic drying?immersion conditions on steel-reinforced mortars. Three salt solution...
ver más
|
|
|
|
|
|
|
Luís M. B. C. Campos and Joaquim M. G. Marques
The variation in stability derivatives with airspeed and angles of attack and sideslip is determined using only the dependence of the aerodynamic forces and moments on the modulus and direction of the velocity. Analytic extrapolation factors are obtained...
ver más
|
|
|
|
|
|
|
Yanxiong Zhao, Yun Tian and Zhiqiang Wan
Ducted fans installed on vertical takeoff and landing vehicles experience significant ground effect during takeoff and landing. The aerodynamic characteristics of a ducted fan hovering and transitioning in the ground effect are studied using numerical si...
ver más
|
|
|
|
|
|
|
José Jiménez-Varona and Gabriel Liaño
The flow at high angles of attack over axisymmetric configurations is not symmetric. The mechanism that triggers the asymmetry may be a combination of a global or hydrodynamic instability (temporal instability) combined with a convective instability (spa...
ver más
|
|
|
|
|
|
|
Salekul Islam
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protoco...
ver más
|
|
|
|
|
|
|
Hanmeng Wu, Jun Wang, Ziyi Zhang, Xudong Chen and Zheng Zhu
A multi-image encryption with super-large-capacity is proposed by using spherical diffraction and filtering diffusion. In the proposed method, initial images are processed sequentially by filtering diffusion and chaos scrambling. The images are combined ...
ver más
|
|
|
|
|
|
|
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru...
ver más
|
|
|
|
|
|
|
Weizhen Xu, Chenyi Zhang, Fangzhen Zhao and Liangda Fang
Adversarial attacks hamper the functionality and accuracy of deep neural networks (DNNs) by meddling with subtle perturbations to their inputs. In this work, we propose a new mask-based adversarial defense scheme (MAD) for DNNs to mitigate the negative e...
ver más
|
|
|
|
|
|
|
Lu Yang and Guangming Zhang
Currently, influence analysis of simulation parameters, especially the trailing edge shape and the corresponding modeling method on the force coefficients of NACA0012 under a high Reynolds number, is relatively sparse. In this paper, two trailing edge sh...
ver más
|
|
|
|
|
|
|
Ivan Chizhov,Nataliia Tashevtseva
Pág. 27 - 38
The authors propose an algorithm, which converts input for the cryptoanalyst problem of revealing secret keys of CodeBased Signature Scheme pqsigRM to an equal input for the SATISFIABILITY problem. It is proved in the paper, that the proposed attack is p...
ver más
|
|
|
|
|
|
|
Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis and Vasilios Katos
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security anal...
ver más
|
|
|
|
|
|
|
Ivo M. Van der Werf and Marcel R.A. Van Gent
Most guidelines on wave overtopping over coastal structures are based on conditions with waves from one direction only. Here, wave basin tests with oblique wave attack are presented where waves from one direction are combined with waves from another dire...
ver más
|
|
|
|
|
|
|
Ivo M. Van der Werf and Marcel R.A. Van Gent
Most guidelines on wave overtopping over coastal structures are based on conditions with waves from one direction only. Here, wave basin tests with oblique wave attack are presented where waves from one direction are combined with waves from another dire...
ver más
|
|
|
|
|
|
|
Adriana Estokova, Michaela Smolakova and Alena Luptakova
Wastewater structures, such as treatment plants or sewers can be easily affected by bio-corrosion influenced by microorganisms living in waste water. The activity of these microbes results in deterioration and can cause the reduction in structural perfor...
ver más
|
|
|
|
|
|
|
Marco Berci and Rauno Cavallaro
A hybrid reduced-order model for the aeroelastic analysis of flexible subsonic wings with arbitrary planform is presented within a generalised quasi-analytical formulation, where a slender beam is considered as the linear structural dynamics model. A mod...
ver más
|
|
|
|
|
|
|
Marco Berci and Rauno Cavallaro
A hybrid reduced-order model for the aeroelastic analysis of flexible subsonic wings with arbitrary planform is presented within a generalised quasi-analytical formulation, where a slender beam is considered as the linear structural dynamics model. A mod...
ver más
|
|
|
|
|
|
|
Ivo M. Van der Werf and Marcel R.A. Van Gent
Most guidelines on wave overtopping over coastal structures are based on conditions with waves from one direction only. Here, wave basin tests with oblique wave attack are presented where waves from one direction are combined with waves from another dire...
ver más
|
|
|
|
|
|
|
Sanjay Nikhade,Suhas Kongre,S. B. Thakre,S. S. Khandare
Pág. 11 - 18
This paper presents a combined experimental and Computational Fluid Dynamics (CFD) simulation of Micro wind Turbine with 2.28 meters rotor Diameter is performed using the FLUENT 16.2 WORKBENCH. A Micro Horizontal Axis Three Blade Wind Turbine was designe...
ver más
|
|
|
|
|
|
|
Siyu Wang and Jie Jia
The large-span bridge is highly sensitive to temperature and wind loads. Therefore, it is essential to study the bridge?s fatigue life under the combined effects of temperature and static wind loads. This study focuses on the main bridge of Qiao Jia-fan ...
ver más
|
|
|
|