|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
Herman Mawengkang, Muhammad Romi Syahputra, Sutarman Sutarman and Gerhard Wilhelm Weber
Water distribution networks (WDNs) are defined as the planning for the development, distribution, and utilization of water resources. The main challenge of WDNs is to preserve limited water resources while providing effective benefits from these resource...
ver más
|
|
|
|
|
|
Guilin Liu, Bokai Yang, Xiuxiu Nong, Yi Kou, Fang Wu, Daniel Zhao and Pubing Yu
In the context of climate change with frequent natural disasters, disaster risk assessment can provide great help for related risk decision-making. Based on the theory of loss expectation, this paper presents a quantitative method to assess typhoon disas...
ver más
|
|
|
|
|
|
Haichao Chang, Chengjun Wang, Zuyuan Liu, Baiwei Feng, Chengsheng Zhan and Xide Cheng
Hull form optimization becomes prone to the curse of dimensionality as the number of design variables increases. The traditional sensitivity analysis method requires massive computational fluid dynamics (CFD) computations and analyzing the effects of all...
ver más
|
|
|
|
|
|
Guilin Liu, Jingyi Yin, Shichun Song, Wenjin Yang, Yuhang Tian, Liping Wang and Yu Xu
In the context of the increasing frequency and intensity of natural disasters, assessing the risk of typhoon disasters can provide significant assistance for risk control and emergency management of typhoon disasters. In this paper, based on the three-di...
ver más
|
|
|