|
|
|
Hao Wu, Zhezheng Wu, Weimin Song, Dongwei Chen, Mei Yang and Hang Yuan
Due to the issue of weakened adhesion between ultra-thin surface overlays, higher demands have been placed on bonding layer materials in practical engineering. This study proposed a method for preparing a one-component waterborne epoxy resin-modified emu...
ver más
|
|
|
|
|
|
|
Onur Selcukhan and Abdullah Ekinci
Cyprus is the third largest and populated island in the Mediterranean Sea, and is still rapidly expanding. Significant infrastructures, such as hotels, educational institutions, and large residential complexes, are being built. Historically, 15 destructi...
ver más
|
|
|
|
|
|
|
Junkai Yi and Xiaoyan Liu
Penetration testing is an important method to evaluate the security degree of a network system. The importance of penetration testing attack path planning lies in its ability to simulate attacker behavior, identify vulnerabilities, reduce potential losse...
ver más
|
|
|
|
|
|
|
Thomas Schiller, Bruce Caulkins, Annie S. Wu and Sean Mondesire
Internet of Things (IoT) devices are common in today?s computer networks. These devices can be computationally powerful, yet prone to cybersecurity exploitation. To remedy these growing security weaknesses, this work proposes a new artificial intelligenc...
ver más
|
|
|
|
|
|
|
Yue Wang, Kexv Li, Xing Zhuang, Xinyu Liu and Hanyu Li
The penetration of unmanned aerial vehicles (UAVs) is an important aspect of UAV games. In recent years, UAV penetration has generally been solved using artificial intelligence methods such as reinforcement learning. However, the high sample demand of th...
ver más
|
|
|
|
|
|
|
An?e Mihelic, Toma? Hovelja and Simon Vrhovec
Different activities, artifacts, and roles can be found in the literature on the agile engineering of secure software (AESS). The purpose of this paper is to consolidate them and thus identify key activities, artifacts, and roles that can be employed in ...
ver más
|
|
|
|
|
|
|
Han-eol Kim, Sang-gui Ha, Hafeezur Rehman and Han-kyu Yoo
Mechanical methods of tunnel excavation are widely used because of their high excavation output, and the selection of appropriate technology depends on ground composition and project-related features. Compared with tunnel boring machines (TBMs) and roadh...
ver más
|
|
|
|
|
|
|
Lauren?iu Constantin Vladu?oiu, Georgiana Chisiu, Andrei Tudor, Nicolae-Valentin Vladu?, Lucian Fechete Tutunaru, Eugen Marin and Iulia-Andrea Grigore
This paper presents the interaction system within the mechanical soil processing process, consisting of two large elements, the metal of the tool and the soil. Due to the two main forces acting on the chisel knives?friction and impact with the sandy soil...
ver más
|
|
|
|
|
|
|
Jing Pang, Xuwen Zhang, Xiaojun Lin, Jianghui Liu, Xinwu Du and Jiangang Han
In an analysis of the penetration resistance and tillage depth of post-tillage soil, four surface-layer discrimination methods, specifically, three machine learning algorithms?Kmeans, DBSCAN, and GMM?and a curve-fitting method, were used to analyze data ...
ver más
|
|
|
|
|
|
|
Bin Ma, Xinchao Ding and Xingzhou Chen
The excavation-unloading damage effects of western high-geostress slopes on rock were explored by testing the pre-peak confining pressure unloading sandstone reloading mechanical properties. The deformation and failure mechanisms were studied from a meso...
ver más
|
|
|
|