|
|
|
Yuan Luo, Jiakai Lu, Yi Zhang, Qiong Qin and Yanyu Liu
This research can be applied to path planning and automatic obstacle avoidance of drone in low altitude complex environments.
|
|
|
|
|
|
|
Zhizhou Gao, Lujun Wan, Ming Cai and Xinyu Xu
This research can be applied to route planning in a complex threat environment.
|
|
|
|
|
|
|
Alexandros Deloukas, Efthymia Apostolopoulou
Pág. 459 - 466
The paper conceptualises the resilience engineering of the urban transport system (UTS) using the example of the Athens metro. Resilience management guidelines for the UTS have been developed, whereas Athens metro pilots validate the former. The pilots a...
ver más
|
|
|
|
|
|
|
Mohammad Nasim Imtiaz Khan, Shivam Bhasin, Bo Liu, Alex Yuan, Anupam Chattopadhyay and Swaroop Ghosh
Emerging Non-Volatile Memories (NVMs) such as Magnetic RAM (MRAM), Spin-Transfer Torque RAM (STTRAM), Phase Change Memory (PCM) and Resistive RAM (RRAM) are very promising due to their low (static) power operation, high scalability and high performance. ...
ver más
|
|
|
|
|
|
|
Yixin Zhang, Shansuo Zheng, Xianliang Rong, Liguo Dong and Hao Zheng
Previous research shows that freeze?thaw cycles represent one of the most dangerous threats to reinforced concrete (RC) structures. However, there is almost no experimental data on the effects of freeze?thaw cycles on the seismic behavior of RC columns s...
ver más
|
|
|
|
|
|
|
Hao Sun, Yuejin Du and Qi Li
Amid the incessant evolution of the Internet, an array of cybersecurity threats has surged at an unprecedented rate. A notable antagonist within this plethora of attacks is the SQL injection assault, a prevalent form of Internet attack that poses a signi...
ver más
|
|
|
|
|
|
|
Nikola Andelic, Sandi Baressi ?egota and Zlatan Car
Malware detection using hybrid features, combining binary and hexadecimal analysis with DLL calls, is crucial for leveraging the strengths of both static and dynamic analysis methods. Artificial intelligence (AI) enhances this process by enabling automat...
ver más
|
|
|
|
|
|
|
Aakarsh Rao, Nadir A. Carreón, Roman Lysecky and Jerzy Rozenblit
Life-critical embedded systems, including medical devices, are becoming increasingly interconnected and interoperable, providing great efficiency to the healthcare ecosystem. These systems incorporate complex software that plays a significantly integrati...
ver más
|
|
|
|
|
|
|
Ahmed Latif Yaser, Hamdy M. Mousa and Mahmoud Hussein
Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network?s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solut...
ver más
|
|
|
|
|
|
|
Dohoon Kim
Most recent cyberattacks have employed new and diverse malware. Various static and dynamic analysis methods are being introduced to detect and defend against these attacks. The malware that is detected by these methods includes advanced present threat (A...
ver más
|
|
|
|
|
|
|
Angel A. Carbonell-Barrachina,Teresa García-Ortuño,Javier Andreu-Rodríguez,María T. Ferrández-García,Manuel Ferrández-Villena,Clara E. Ferrández-García,Angel Calín-Sanchez
Pág. 149 - 160
Giant reed (Arundo donax L.) is currently one of the greatest invasive threats to Mediterranean-type river ecosystems worldwide and can be easily transformed into a cheap and sustainable material that can be used in the manufacturing of containers for th...
ver más
|
|
|
|