|
|
|
Xiang Chen, Shouzhi Xu, Kai Ma and Peng Chen
A consortium system can leverage information to improve workflows, accountability, and transparency through setting up a backbone for these cross-company and cross-discipline solutions, which make it become a hot spot of market application. Users of a co...
ver más
|
|
|
|
|
|
Dijana Damljanovic, Ðorde Vukovic, Goran Ocokoljic, Biljana Ilic and Bo?ko Ra?uo
Published results for standard wind tunnel models at non-standard test conditions are quite rare and/or may not be available. It has been found that those results are a useful aid in preparations for a number of wind tunnel tests in the Military Technica...
ver más
|
|
|
|
|
|
Mitchell G. Borg, Qing Xiao, Steven Allsop, Atilla Incecik and Christophe Peyrard
Introducing a duct along the perimeter of a rotor has been acknowledged to augment turbine performance. The outcome causation due to a bi-directional, cylindrical shroud, however, is uncertain. This study analyses the hydrodynamic swallowing capacity of ...
ver más
|
|
|
|
|
|
Da Yu, Keren Dai, Jinming Zhang, Benqiang Yang, He Zhang and Shaojie Ma
In recent years, penetrating weapons have been used more and more to attack increasingly hard targets; therefore, the impact of such a penetrating process has increased to an extremely high level. As an important component of a fuze, the reliability of t...
ver más
|
|
|
|
|
|
Morgan Luck
Internal cyber-attacks (cyber-attacks which occur from within an organization) pose a serious threat to an organization?s security. One tool that organizations can employ to help them detect such threats is the internal cyber-sting. An internal cyber-sti...
ver más
|
|
|