86   Artículos

 
en línea
Junqiang Chen, Guang Cheng and Hantao Mei    
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fengping Liu, Xu Wang, Yuhu Chang, Ye Xu, Yinan Zheng, Ning Sun and Wei Li    
This study analyzed the multivariate drought risks for the Wei River basin by characterizing the interdependence between the standardized precipitation index (SPI) and the standardized precipitation evapotranspiration index (SPEI). Both parametric and no... ver más
Revista: Water    Formato: Electrónico

 
en línea
Immaculada Argemí-Armengol, Marc Tor, Diego Bottegal, Maria A. Latorre, Beatriz Serrano-Pérez and Javier Álvarez-Rodríguez    
Peas are an alternative to soybeans to supply protein in livestock feeds. Immunocastration avoids surgical castration of male pigs and increases fat deposition in female pigs. This work aimed to assess the effects of pea inclusion on the amount of fat an... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Qian Zhang, Yanrong Li, Kai Liao, Deshui Chen, Yangyang Qiu, Xiaojun Yan and Jilin Xu    
The mammalian target of rapamycin (mTOR) has been shown to play a central role in regulating cell growth and metabolism. However, little is known about the function of mTOR in nutrient metabolism in bivalve mollusks. In this study, the role of mTOR in th... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Rafael Cirino Gonçalves, Tyron Louw, Yee Mun Lee, Ruth Madigan, Jonny Kuo, Mike Lenné and Natasha Merat    
The aim of this study was to compare the success of two different Human Machine Interfaces (HMIs) in attracting drivers? attention when they were engaged in a Non-Driving-Related Task (NDRT) during SAE Level 3 driving. We also assessed the value of each ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo    
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yongxin Chen, Yongjun Wang and Luming Yang    
Tor serves better at protecting users? privacy than other anonymous communication tools. Even though it is resistant to deep packet inspection, Tor can be de-anonymized by the website fingerprinting (WF) attack, which aims to monitor the website users ar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Tor Viscor, Landon Kamps, Kazuo Yonekura, Hikaru Isochi and Harunori Nagata    
An understanding of the scalability of hybrid rocket regression models is critical for the enlargement and commercialization of small-scale engines developed within universities and similar research institutions. This paper investigates the fuel regressi... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Elahe Fazeldehkordi and Tor-Morten Grønli    
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from t... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Joakim Aalstad Alslie, Aril Bernhard Ovesen, Tor-Arne Schmidt Nordmo, Håvard Dagenborg Johansen, Pål Halvorsen, Michael Alexander Riegler and Dag Johansen    
Video monitoring and surveillance of commercial fisheries in world oceans has been proposed by the governing bodies of several nations as a response to crimes such as overfishing. Traditional video monitoring systems may not be suitable due to limitation... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

« Anterior     Página: 1 de 7     Siguiente »