|
|
|
Xingyuan Yang, Jie Yuan, Hao Yang, Ya Kong, Hao Zhang and Jinyu Zhao
In this paper, considering the problem that the common defensive means in the current cyber confrontation often fall into disadvantage, honeypot technology is adopted to turn reactive into proactive to deal with the increasingly serious cyberspace securi...
ver más
|
|
|
|
|
|
|
Natalia Sánchez-Patiño, Gina Gallegos-Garcia and Mario E. Rivero-Angeles
Peer-to-peer (P2P) networks are distributed systems with a communication model in which no central authority governs the behavior of individual peers. These networks currently account for a considerable percentage of all bandwidth worldwide. However, thi...
ver más
|
|
|
|
|
|
|
Yun Zhang, Hui Ma, Jianliang Xu, Hao Su and Jing Zhang
Adaptive control methods are suitable for offshore steel structures subject to harmful vibrations, as they employ reference models to adapt to coastal and nearshore physics. To decrease the dependence on the accurate characteristics of the offshore platf...
ver más
|
|
|
|
|
|
|
Hua Wang, Ling Luo and Tao Liu
Network public opinion is a mirror reflecting people?s will, and evaluating its urgency can help to find hidden social crises. Research on public opinion in the field of machine learning usually focuses on micro-sentiment judgment, which is unable to off...
ver más
|
|
|
|
|
|
|
Zhigang Zhu, Zhijian Yi, Shiyao Li and Lin Li
Radar data mining is the key module for signal analysis, where patterns hidden inside of signals are gradually available in the learning process and its superiority is significant for enhancing the security of the radar emitter classification (REC) syste...
ver más
|
|
|
|
|
|
|
Yu Zhang, Zuodong Jin, Yunlong Hou, Bingbing Han and Charles Ntakiyimana
Groundwater is abundant in soft soil areas, which has a significant impact on the excavation deformation of foundation pits. In this paper, based on the monitoring of deep foundation pits with waterproof curtains in Shanghai deep foundation pits, COMSOL ...
ver más
|
|
|
|
|
|
|
Sui Tao, Sylvia He, Dick Ettema, Shuli Luo
Pág. 375?398
Improved accessibility by transit service constitutes a critical component in removing spatial barriers in daily mobility for disadvantaged groups. However, the effects of transit accessibility on the daily mobility and activity participation of differen...
ver más
|
|
|
|
|
|
|
Nikita Konstantinovich Chistousov, Igor Anatolyevich Kalmykov, Daniil Vyacheslavovich Dukhovnyj, Maksim Igorevich Kalmykov and Aleksandr Anatolyevich Olenev
Authentication protocols are expanding their application scope in wireless information systems, among which are low-orbit satellite communication systems (LOSCS) for the OneWeb space Internet, automatic object identification systems using RFID, the Inter...
ver más
|
|
|
|
|
|
|
Abualkasim Bakeer, Mohammed Alhasheem and Saeed Peyghami
The disadvantage of finite control set-model predictive control (FCS-MPC) is that the switching frequency is variable and relies on the sampling time and operating point. This paper describes how to implement a new algorithm to achieve a fixed-switching ...
ver más
|
|
|
|
|
|
|
Maksym Lupei,Alexander Mitsa,Volodymyr Repariuk,Vasyl Sharkan
Pág. 30 - 36
The problem of development of an effective method for text authorship identification (on the material of publications of well-known Ukrainian journalists) is explored. Most existing methods require text preprocessing, which entails new costs when solving...
ver más
|
|
|
|