|
|
|
Manar Aldaoud, Dawood Al-Abri, Medhat Awadalla and Firdous Kausar
Named Data Networking (NDN) is a future Internet architecture that requires an Inter-Domain Routing (IDR) to route its traffic globally. Address resolution is a vital component of any IDR system that relies on a Domain Name System (DNS) resolver to trans...
ver más
|
|
|
|
|
|
|
Kedong Zhang, Wenhua Wang, Yihua Liu, Linlin Wang, Yazhen Du, Hongxia Li and Yi Huang
A new type of anti-rolling device denoted as a fluid momentum wheel (FMW) is proposed to address the limitations of traditional gyrostabilizers in reducing the roll responses of floating platforms in waves. The proposed device is based on the same gyrosc...
ver más
|
|
|
|
|
|
|
Ranran Huang, Tao Xue and Jie Wu
A two-point cylindrical-focused laser differential interferometer (2P-CFLDI) system and a conventional Z-type Schlieren were used to measure the hypersonic turbulent boundary layer on a flat plate at Mach number Ma = 6 and Reynolds number Re = 1.08 × 106...
ver más
|
|
|
|
|
|
|
Chengxi Xu, Yunyi Zhang, Fan Shi, Hong Shan, Bingyang Guo, Yuwei Li and Pengfei Xue
The centralization of the global DNS ecosystem may accelerate the creation of an oligopoly market, thereby, increasing the risk of a single point of failure and network traffic manipulation. Earlier studies have revealed the level of centralization in te...
ver más
|
|
|
|
|
|
|
Yung-Li Wang, Qun-Zhan Huang and Shao-Yiu Hsu
Understanding the displacement of the resident wetting fluid in porous media is crucial to the remediation strategy. When pollutants or nutrients are dissolved in the surface wetting fluid and enter the unsaturated zone, the resident wetting fluid in the...
ver más
|
|
|
|
|
|
|
Daniel Martinez-Sanchis, Andrej Sternin, Oskar Haidn and Martin Tajmar
Direct numerical simulations of non-premixed fuel-rich methane?oxygen flames at 20 bar are conducted to investigate the turbulent mixing burning of gaseous propellants in rocket engines. The reacting flow is simulated by using an EBI-DNS solver within an...
ver más
|
|
|
|
|
|
|
Ahmad Reda Alzighaibi
Currently, the primary concerns on the Internet are security and privacy, particularly in encrypted communications to prevent snooping and modification of Domain Name System (DNS) data by hackers who may attack using the HTTP protocol to gain illegal acc...
ver más
|
|
|
|
|
|
|
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr...
ver más
|
|
|
|
|
|
|
Xiuhua Si, Junshi Wang, Haibo Dong and Jinxiang Xi
This study presents a data-driven approach to identifying anomaly-sensitive parameters through a multiscale, multifaceted analysis of simulated respiratory flows. The anomalies under consideration include a pharyngeal model with three levels of constrict...
ver más
|
|
|
|
|
|
|
M. R. Ajith Kumar, Jaan H. Pu, Prashanth R. Hanmaiahgari and Martin F. Lambert
A problem with 1-D water hammer modelling is in the application of accurate unsteady friction. Moreover, investigating the time response of fluid dynamics and unsteady turbulence structures during the water hammer is not possible with a 1-D model. This r...
ver más
|
|
|
|