|
|
|
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
ver más
|
|
|
|
|
|
|
Vladimir S. Aslanov and Daria V. Neryadovskaya
This paper is dedicated to identifying stable equilibrium positions of the tether systems attached to the L1 or L2 libration points of the Mars?Phobos system. The orbiting spacecraft deploying the tether is at the L1 or L2 libration point and is held at ...
ver más
|
|
|
|
|
|
|
Romain Hottois, Arnaud Châtel and Tom Verstraete
Numerical optimization methods are widely used for designing turbomachinery components due to the cost and time savings they can provide. In the available literature, the shape optimization of radial compressors mainly focuses on improving the impeller a...
ver más
|
|
|
|
|
|
|
Qiang Sun, Wenbo Li, Rundong Li, Dongsheng Peng, Qiang Guo, Yan Zhao, Qianjin Yue and Wanxie Zhong
A catenary anchor leg mooring system (CALM) is one of the main kinds of offshore transport terminals. Its buoyancy is connected by multiple anchor chains fixed on the seabed. Because a large deformation characterizes the anchor chain, it is prone to fati...
ver más
|
|
|
|
|
|
|
Yurika Pant Khanal, Abeer Alsadoon, Khurram Shahzad, Ahmad B. Al-Khalil, Penatiyana W. C. Prasad, Sabih Ur Rehman and Rafiqul Islam
Blockchain technology has been widely advocated for security and privacy in IoT systems. However, a major impediment to its successful implementation is the lack of privacy protection regarding user access policy while accessing personal data in the IoT ...
ver más
|
|
|
|
|
|
|
Jinyu Guo and Lizhen Wang
The goal of spatial co-location pattern mining is to find subsets of spatial features whose instances are often neighbors in a geographical space. In many practical cases, instances of spatial features contain not only spatial location information but al...
ver más
|
|
|
|
|
|
|
Abdullah M. Almuhaideb and Sammar S. Algothami
In the near future, using electric vehicles will almost certainly be required for the sustainability of nature and our planet. The most significant challenge that users are concerned about is the availability of electric vehicle charging stations. Theref...
ver más
|
|
|
|
|
|
|
Stefano Carletta, Mauro Pontani and Paolo Teofilatto
In this work, we investigate the behavior of low-energy trajectories in the dynamical framework of the spatial elliptic restricted 4-body problem, developed using the Hamiltonian formalism. Introducing canonical transformations, the Hamiltonian function ...
ver más
|
|
|
|
|
|
|
Bikash Poudel, Arslan Munir, Joonho Kong and Muazzam A. Khan
The elliptic curve cryptosystem (ECC) has been proven to be vulnerable to non-invasive side-channel analysis attacks, such as timing, power, visible light, electromagnetic emanation, and acoustic analysis attacks. In ECC, the scalar multiplication compon...
ver más
|
|
|
|
|
|
|
Mohamed Abdelaal and Steffen Schön
This paper considers nonlinear model predictive control for simultaneous path-following and collision avoidance of connected autonomous vehicles. For each agent, a nonlinear bicycle model is used to predict a sequence of the states and then optimize them...
ver más
|
|
|
|