|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|
|
|
Xuguo Jiao, Daoyuan Zhang, Dongran Song, Dongdong Mu, Yanbing Tian and Haotian Wu
As one of the fastest-growing new energy sources, wind power technology has attracted widespread attention from all over the world. In order to improve the quality of wind power generation, wind speed prediction is an indispensable task. In this paper, a...
ver más
|
|
|
|
|
|
Hui Wan, Shanshan Fu, Mingyang Zhang and Yingjie Xiao
With the advancement of intelligent shipping, current traffic management systems have become inadequate to meet the requirements of intelligent supervision. In particular, with regard to ship violations, on-site boarding is still necessary for inspection...
ver más
|
|
|
|
|
|
S. Velliangiri, P. Karthikeyan, Vinayakumar Ravi, Meshari Almeshari and Yasser Alzamil
Medical service providers generate many healthcare records containing sensitive and private information about a patient?s health. The patient can allow healthcare service providers to generate healthcare data, which can be stored with healthcare service ...
ver más
|
|
|
|
|
|
Xiaobin Xu, Baojie Liu, Xianjun Yu and Guangfeng An
The geometry of a compressor leading edge has an important effect on the aerodynamic performance at an off-designed incidence angle. The current geometric design methods of the leading edge are usually developed based on the flow characteristics at the d...
ver más
|
|
|