|
|
|
Zesheng Chen, Li-Chi Chang, Chao Chen, Guoping Wang and Zhuming Bi
Speaker verification systems use human voices as an important biometric to identify legitimate users, thus adding a security layer to voice-controlled Internet-of-things smart homes against illegal access. Recent studies have demonstrated that speaker ve...
ver más
|
|
|
|
|
|
Nikita Konstantinovich Chistousov, Igor Anatolyevich Kalmykov, Daniil Vyacheslavovich Dukhovnyj, Maksim Igorevich Kalmykov and Aleksandr Anatolyevich Olenev
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Inter...
ver más
|
|
|
|
|
|
Peng Li, Yibing Fan, Zhengyang Cai, Zhiyu Lyu and Weijie Ren
Marine biological object detection is of great significance for the exploration and protection of underwater resources. There have been some achievements in visual inspection for specific objects based on machine learning. However, owing to the complex i...
ver más
|
|
|
|
|
|
Dimitrios T. Kalovelonis, Dimitrios C. Rodopoulos, Theodoros V. Gortsas, Demosthenes Polyzos and Stephanos V. Tsinopoulos
In the present work, an impressed current cathodic protection (ICCP) system for the protection against corrosion of a 399-m-length container ship throughout its service life is designed. The study is carried out with the aid of a boundary element method ...
ver más
|
|
|
|
|
|
Bart Vonk, Wouter Jan Klerk, Peter Fröhle, Berry Gersonius, Frank den Heijer, Philipp Jordan, Ulf Radu Ciocan, Jeroen Rijke, Paul Sayers and Richard Ashley
Uncertainties about climate change consequences, changing societal requirements and system complexity require flood protection asset managers to continuously evaluate their asset management policies and practice to manage risk and improve the resilience ...
ver más
|
|
|