|
|
|
Karolína Bílá
We attempt here to review recent studies focusing on droughts and hydrology in the ?umava Mts. The main question is can bark beetles affect water regimes in forest and what kind of measures might be taken ? if any ? to prevent bark beetle attacks. We com...
ver más
|
|
|
|
|
|
|
Abdulghani Mohamed, Matthew Marino, Simon Watkins, Justin Jaworski and Anya Jones
There is a growing desire to operate Uncrewed Air Vehicles (UAVs) in urban environments for parcel delivery, and passenger-carrying air taxis for Advanced Air Mobility (AAM). The turbulent flows and gusts around buildings and other urban infrastructure c...
ver más
|
|
|
|
|
|
|
Sheeraz Ahmed, Zahoor Ali Khan, Syed Muhammad Mohsin, Shahid Latif, Sheraz Aslam, Hana Mujlid, Muhammad Adil and Zeeshan Najam
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and government agencies. They harm internet businesses, limit access to information and services, and damage corporate brands. Attackers use application layer DDoS attac...
ver más
|
|
|
|
|
|
|
Chen Li, Hongming Wang and Peiting Sun
It is well known that sail-assisted propulsion works under gradient wind conditions in the atmospheric boundary layer, and is an energy-saving device for fuel consumption. In order to study the aerodynamic characteristics of a wingsail in the atmospheric...
ver más
|
|
|
|
|
|
|
Haojie Zhu, Mou Chen, Zengliang Han and Mihai Lungu
This paper concerns the fire-control command calculation (FCCC) of an unmanned autonomous helicopter (UAH). It determines the final effect of the UAH attack. Although many different FCCC methods have been proposed for finding optimal or near-optimal fire...
ver más
|
|
|
|
|
|
|
Olga Papadopoulou and Panayota Vassiliou
The local patterns at the interfaces of corrosion stratification, developed on two archaeometallurgical bronzes (a Cu-Sn-Pb and a Cu-Zn-Sn-Pb alloy), in the as-cast condition, were assessed by OM and SEM-EDS systematic elemental chemical analyses. Previo...
ver más
|
|
|
|
|
|
|
Ivan Vaccari, Maurizio Aiello and Enrico Cambiaso
The security of Internet of Things environments is a critical and trending topic, due to the nature of the networks and the sensitivity of the exchanged information. In this paper, we investigate the security of the Message Queue Telemetry Transport (MQT...
ver más
|
|
|
|
|
|
|
Calum C. Hall, Lynsay A. Shepherd and Natalie Coull
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of ...
ver más
|
|
|
|
|
|
|
Rayco William,Ikhwan Ruslianto,Uray Ristian
Pág. 123 - 137
Server is a center for providing services and storing data in a computer network. A server is managed by server administrator who has a duty of monitoring security server. While on duty, there are deficiencies in detecting attacks, the slow information a...
ver más
|
|
|
|