|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
José Jiménez-Varona
Rolling motion is the motion where a body flies at a constant pitch angle a with respect to the freestream velocity vector, while undergoing a constant angular rotation p about its longitudinal axis. An effect of this motion is the appearance of a Magnus...
ver más
|
|
|
|
|
|
|
Kun Mao, Wuxing Jing, Pan Cheng, Xiaoyan Liu, Yuchen Sun and Meihong Zhang
In this work, the enhanced correction factor technique (ECFT) is modified for a subsonic wing?body interference model, which can consider the forces on both the lifting boxes and the body elements of an idealized airplane, termed the advanced ECFT method...
ver más
|
|
|
|
|
|
|
Luiz M. B. C. Campos and Manuel J. S. Silva
The safety zone around the flight path of a rocket is determined by the fall of debris in the case of an accidental explosion or commanded termination. The trajectory of a tumbling body in a vertical plane is determined by specifying the velocity, flight...
ver más
|
|
|
|
|
|
|
Verónica Viviana Acosta and Gustavo Luis Bianchi
The corrosion rate of carbon steel under the attack of electrolytic mediums saturated by CO2 at a working temperature of 65 °C under dynamic conditions is studied in this paper. The effect of Ca2+ ions on corrosion rates and their dependency on the assoc...
ver más
|
|
|
|
|
|
|
Ahmad Reda Alzighaibi
Currently, the primary concerns on the Internet are security and privacy, particularly in encrypted communications to prevent snooping and modification of Domain Name System (DNS) data by hackers who may attack using the HTTP protocol to gain illegal acc...
ver más
|
|
|
|
|
|
|
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,...
ver más
|
|
|
|
|
|
|
Konstantinos V. Kostas and Maria Manousaridou
In this work, supervised Machine Learning (ML) techniques were employed to solve the forward and inverse problems of airfoil and hydrofoil design. The forward problem pertains to the prediction of a foil?s aerodynamic or hydrodynamic performance given it...
ver más
|
|
|
|
|
|
|
Khumbelo Muthavhine and Mbuyu Sumbwanyambe
Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL). The DL attack depends on the computation of the probability of differential-linear characterist...
ver más
|
|
|
|
|
|
|
Marco Berci
Enhanced approximate expressions for the incipient indicial lift of thin wings in subsonic potential flow are presented in this study, featuring explicit analytical corrections for the unsteady downwash. Lifting-line and acoustic-wave theories form the b...
ver más
|
|
|
|