|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
Jiannong Fang
To enforce the conservation of mass principle, a pressure Poisson equation arises in the numerical solution of incompressible fluid flow using the pressure-based segregated algorithms such as projection methods. For unsteady flows, the pressure Poisson e...
ver más
|
|
|
|
|
|
Abhay Singh, Ankush Ganesh, Rutuja Rajendra Patil, Sumit Kumar, Ruchi Rani and Sanjeev Kumar Pippal
Voting is a democratic process that allows individuals to choose their leaders and voice their opinions. However, the current situation with physical voting involves long queues, paper-based ballots, and security challenges. Blockchain-based voting model...
ver más
|
|
|
|
|
|
Sana Toumi, Yassine Amirat, Elhoussin Elbouchikhi, Zhibin Zhou and Mohamed Benbouzid
This article deals with the techno-economic optimal sizing of a tidal stream turbine (TST)?battery system. In this study, the TST system consists of a turbine rotor and a permanent magnet synchronous generator (PMSG) associated with a three-phase convert...
ver más
|
|
|
|
|
|
Peng Cao, Yi Liu and Chao Yang
When natural disasters strike, users in the disaster area may be isolated and unable to transmit disaster information to the outside due to the damage of communication facilities. Unmanned aerial vehicles can be exploited as mobile edge servers to provid...
ver más
|
|
|