46   Artículos

« Anterior     Página: 1 de 3     Siguiente »

 
en línea
Jintao Rao and Zhe Cui    
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key. In this paper, we propose a new c... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Hongfang Sun, Hao Zou, Xinwei Li, Shazim Ali Memon, Binyang Yuan, Feng Xing, Xiaogang Zhang and Jie Ren    
In this study, X-ray microcomputed tomography (XCT) and nanoindentation techniques were used to evaluate the synergistic action between sulfate and chloride ingress under cyclic drying?immersion conditions on steel-reinforced mortars. Three salt solution... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Luís M. B. C. Campos and Joaquim M. G. Marques    
The variation in stability derivatives with airspeed and angles of attack and sideslip is determined using only the dependence of the aerodynamic forces and moments on the modulus and direction of the velocity. Analytic extrapolation factors are obtained... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Yanxiong Zhao, Yun Tian and Zhiqiang Wan    
Ducted fans installed on vertical takeoff and landing vehicles experience significant ground effect during takeoff and landing. The aerodynamic characteristics of a ducted fan hovering and transitioning in the ground effect are studied using numerical si... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
José Jiménez-Varona and Gabriel Liaño    
The flow at high angles of attack over axisymmetric configurations is not symmetric. The mechanism that triggers the asymmetry may be a combination of a global or hydrodynamic instability (temporal instability) combined with a convective instability (spa... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Salekul Islam    
Since wireless sensor networks (WSNs) have been designed to be deployed in an unsecured, public environment, secured communication is really vital for their wide-spread use. Among all of the communication protocols developed for WSN, the Security Protoco... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Hanmeng Wu, Jun Wang, Ziyi Zhang, Xudong Chen and Zheng Zhu    
A multi-image encryption with super-large-capacity is proposed by using spherical diffraction and filtering diffusion. In the proposed method, initial images are processed sequentially by filtering diffusion and chaos scrambling. The images are combined ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva    
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Weizhen Xu, Chenyi Zhang, Fangzhen Zhao and Liangda Fang    
Adversarial attacks hamper the functionality and accuracy of deep neural networks (DNNs) by meddling with subtle perturbations to their inputs. In this work, we propose a new mask-based adversarial defense scheme (MAD) for DNNs to mitigate the negative e... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Lu Yang and Guangming Zhang    
Currently, influence analysis of simulation parameters, especially the trailing edge shape and the corresponding modeling method on the force coefficients of NACA0012 under a high Reynolds number, is relatively sparse. In this paper, two trailing edge sh... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ivan Chizhov,Nataliia Tashevtseva     Pág. 27 - 38
The authors propose an algorithm, which converts input for the cryptoanalyst problem of revealing secret keys of CodeBased Signature Scheme pqsigRM to an equal input for the SATISFIABILITY problem. It is proved in the paper, that the proposed attack is p... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Antonios Kritsas, Christos Ilioudis and Vasilios Katos    
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation. Combined with advanced security anal... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ivo M. Van der Werf and Marcel R.A. Van Gent    
Most guidelines on wave overtopping over coastal structures are based on conditions with waves from one direction only. Here, wave basin tests with oblique wave attack are presented where waves from one direction are combined with waves from another dire... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Ivo M. Van der Werf and Marcel R.A. Van Gent    
Most guidelines on wave overtopping over coastal structures are based on conditions with waves from one direction only. Here, wave basin tests with oblique wave attack are presented where waves from one direction are combined with waves from another dire... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Adriana Estokova, Michaela Smolakova and Alena Luptakova    
Wastewater structures, such as treatment plants or sewers can be easily affected by bio-corrosion influenced by microorganisms living in waste water. The activity of these microbes results in deterioration and can cause the reduction in structural perfor... ver más
Revista: Buildings    Formato: Electrónico

 
en línea
Marco Berci and Rauno Cavallaro    
A hybrid reduced-order model for the aeroelastic analysis of flexible subsonic wings with arbitrary planform is presented within a generalised quasi-analytical formulation, where a slender beam is considered as the linear structural dynamics model. A mod... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Marco Berci and Rauno Cavallaro    
A hybrid reduced-order model for the aeroelastic analysis of flexible subsonic wings with arbitrary planform is presented within a generalised quasi-analytical formulation, where a slender beam is considered as the linear structural dynamics model. A mod... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Ivo M. Van der Werf and Marcel R.A. Van Gent    
Most guidelines on wave overtopping over coastal structures are based on conditions with waves from one direction only. Here, wave basin tests with oblique wave attack are presented where waves from one direction are combined with waves from another dire... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Sanjay Nikhade,Suhas Kongre,S. B. Thakre,S. S. Khandare     Pág. 11 - 18
This paper presents a combined experimental and Computational Fluid Dynamics (CFD) simulation of Micro wind Turbine with 2.28 meters rotor Diameter is performed using the FLUENT 16.2 WORKBENCH. A Micro Horizontal Axis Three Blade Wind Turbine was designe... ver más
Revista: IRA-International Journal of Technology & Engineering    Formato: Electrónico

 
en línea
Siyu Wang and Jie Jia    
The large-span bridge is highly sensitive to temperature and wind loads. Therefore, it is essential to study the bridge?s fatigue life under the combined effects of temperature and static wind loads. This study focuses on the main bridge of Qiao Jia-fan ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 3     Siguiente »