|
|
|
Junqiang Chen, Guang Cheng and Hantao Mei
Tor is widely used to protect users? privacy, which is the most popular anonymous tool. Tor introduces multiple pluggable transports (PT) to help users avoid censorship. A number of traffic analysis methods have been devoted to de-anonymize these PT. Sno...
ver más
|
|
|
|
|
|
|
Fengping Liu, Xu Wang, Yuhu Chang, Ye Xu, Yinan Zheng, Ning Sun and Wei Li
This study analyzed the multivariate drought risks for the Wei River basin by characterizing the interdependence between the standardized precipitation index (SPI) and the standardized precipitation evapotranspiration index (SPEI). Both parametric and no...
ver más
|
|
|
|
|
|
|
Immaculada Argemí-Armengol, Marc Tor, Diego Bottegal, Maria A. Latorre, Beatriz Serrano-Pérez and Javier Álvarez-Rodríguez
Peas are an alternative to soybeans to supply protein in livestock feeds. Immunocastration avoids surgical castration of male pigs and increases fat deposition in female pigs. This work aimed to assess the effects of pea inclusion on the amount of fat an...
ver más
|
|
|
|
|
|
|
Qian Zhang, Yanrong Li, Kai Liao, Deshui Chen, Yangyang Qiu, Xiaojun Yan and Jilin Xu
The mammalian target of rapamycin (mTOR) has been shown to play a central role in regulating cell growth and metabolism. However, little is known about the function of mTOR in nutrient metabolism in bivalve mollusks. In this study, the role of mTOR in th...
ver más
|
|
|
|
|
|
|
Rafael Cirino Gonçalves, Tyron Louw, Yee Mun Lee, Ruth Madigan, Jonny Kuo, Mike Lenné and Natasha Merat
The aim of this study was to compare the success of two different Human Machine Interfaces (HMIs) in attracting drivers? attention when they were engaged in a Non-Driving-Related Task (NDRT) during SAE Level 3 driving. We also assessed the value of each ...
ver más
|
|
|
|
|
|
|
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr...
ver más
|
|
|
|
|
|
|
Yongxin Chen, Yongjun Wang and Luming Yang
Tor serves better at protecting users? privacy than other anonymous communication tools. Even though it is resistant to deep packet inspection, Tor can be de-anonymized by the website fingerprinting (WF) attack, which aims to monitor the website users ar...
ver más
|
|
|
|
|
|
|
Tor Viscor, Landon Kamps, Kazuo Yonekura, Hikaru Isochi and Harunori Nagata
An understanding of the scalability of hybrid rocket regression models is critical for the enlargement and commercialization of small-scale engines developed within universities and similar research institutions. This paper investigates the fuel regressi...
ver más
|
|
|
|
|
|
|
Elahe Fazeldehkordi and Tor-Morten Grønli
The Internet of Things (IoT) is an innovative scheme providing massive applications that have become part of our daily lives. The number of IoT and connected devices are growing rapidly. However, transferring the corresponding huge, generated data from t...
ver más
|
|
|
|
|
|
|
Joakim Aalstad Alslie, Aril Bernhard Ovesen, Tor-Arne Schmidt Nordmo, Håvard Dagenborg Johansen, Pål Halvorsen, Michael Alexander Riegler and Dag Johansen
Video monitoring and surveillance of commercial fisheries in world oceans has been proposed by the governing bodies of several nations as a response to crimes such as overfishing. Traditional video monitoring systems may not be suitable due to limitation...
ver más
|
|
|
|