Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 3
- Sociolinguistics 2
- ARCHITECTURE / Urban & Land Use Planning 1
- Agriculture 1
- Beauty operators 1
- Celebrities 1
- Collectors and collecting 1
- Coming of Age 1
- Community development 1
- Criticism 1
- Economic aspects 1
- Economic development 1
- FICTION 1
- Fashion 1
- History 1
- History and criticism 1
- Humorous 1
- Image consultants 1
- LITERARY CRITICISM / General 1
- LITERARY CRITICISM / Semiotics & Theory 1
- Literature 1
- Methodology 1
- Philosophy 1
- Research 1
- Research methods 1
- Social aspects 1
- Social research 1
- Social sciences 1
- Soil chemistry 1
- Sound recording industry 1
-
1701
Networked Closed-Loop Model for Smart On-Site Maintenance of Substation Equipment Using Mobile Networks
Published 2018-01-01“…This paper introduces a networked closed-loop model for smart on-site maintenance of substation equipment using mobile networks, which is composed of a field-side Smart Operation and Maintenance (SOM) box with its related APP and a centre-side system platform for Operation and Maintenance (OM). …”
Get full text
Article -
1702
Improvement Differential fault attack on TWINE
Published 2017-11-01“…A new method of differential fault attack was proposed,which was based on the nibble-group differential diffusion property of the lightweight block cipher TWINE.On the basis of the statistical regularity of the S-box differential distribution,the lower bound of the probability of recovering round key was calculated.Then expectation of number of fault injections when restoring seed key can be estimated.Theoretical proof and experimental results both show that an average of nine times of fault injections in 33,34 and 35 rounds bring about the seed key recovered completely.Finally,the improvement of the fault injection location was proposed,which enhances the feasibility of the genuine attack.…”
Get full text
Article -
1703
Performance evaluation of designated containerization and virtualization solutions using a synthetic benchmark
Published 2024-09-01“…The following virtualization technologies were selected for the study: VirtualBox, VMware and QEMU, as well as containerization technologies: Docker, Podman and LXD. …”
Get full text
Article -
1704
Arboreal Burials in Nicrophorus spp. (Coleoptera: Silphidae)
Published 2012-01-01“…However, the arboreal use of carrion has not been previously investigated. Nest boxes were suspended in the canopy of two forest habitats in Nova Scotia, Canada, to determine if this microhabitat fostered the same behaviour. …”
Get full text
Article -
1705
Study on the Vibration Characteristic and Modal Analysis of Automobile Transmission Shell
Published 2017-01-01“…A type of automobile gearbox has box cracking problem,in order to make a structure optimization and precise modal analysis of the automobile transmission shell,with this type of automobile transmission shell as the research object,the automobile characteristics are studied,the optimal excitation direction and frequency band of the dynamic response of the gearbox are obtained,understanding of the inherent characteristics of the transmission shell. …”
Get full text
Article -
1706
Study on Modification Technology and Meshing Performance of Locomotive Traction Gear
Published 2017-01-01“…Considering the factors such as the deformation of the box body,the bearing and the shaft and the assembling clearance,the finite element method is used to analyze the contact state and load distribution of the traction gear. …”
Get full text
Article -
1707
Endogenous security architecture of Ethernet switch based on mimic defense
Published 2020-05-01“…Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed,a prototype of mimic switch was designed and implemented,and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios.…”
Get full text
Article -
1708
Morphometric relations of fractal-skeletal based channel network model
Published 1998-01-01“…The fractal dimensions of these fractal basins, channel networks, and main channel lengths (computed through box counting method) are compared with those of estimated length–area measures. …”
Get full text
Article -
1709
Dynamic Characteristic Testing Device and Experiment Analysis of Non-circular Gear
Published 2015-01-01“…For the study of the dynamic characteristics of non- circular gear,a transmission box of non-circular gear is designed. According to its dynamic characteristics,a measurement scheme is put forward and the electric parts of its relevant power system,breaking system and detection system are selected,which are used for the putting up of the dynamic testing experimental platform of non- circular gear. …”
Get full text
Article -
1710
Peer Review in the Artificial Intelligence Era: A Call for Developing Responsible Integration Guidelines
Published 2025-01-01“…Ahmed Salem BaHammam1– 3 1Editor-in-Chief Nature and Science of Sleep; 2Department of Medicine, University Sleep Disorders Center and Pulmonary Service, King Saud University, Riyadh, Saudi Arabia; 3King Saud University Medical City, Riyadh, Saudi ArabiaCorrespondence: Ahmed Salem BaHammam, University Sleep Disorders Center, Department of Medicine, College of Medicine, King Saud University, Box 225503, Riyadh, 11324, Saudi Arabia, Tel +966-11-467-9495, Fax +966-11-467-9179, Email ashammam2@gmail.com…”
Get full text
Article -
1711
Risky is the New Safe
Published 2023-06-01“…Written by Randy Gage, Risky is the New Safe is an accessible, easy-to-read book that provides out-of-the-box insights on how to approach life, become successful, and live unconventionally through risking. …”
Get full text
Article -
1712
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01“…Aiming at the problem of image privacy leakage and computing efficiency in edge environment,a lightweight and secure region proposal network (SecRPN) was proposed.A series of secure computing protocols were designed based on the additive secret sharing scheme.Two non-collusive edge servers cooperate to perform calculation modules such as secure feature processing,secure anchor transformation,secure bounding-box correction,and secure non-maximum suppression.Theoretical analysis guarantees the correctness and security of SecRPN.The actual performance evaluation shows that SecRPN is outstanding in the computational cost and communication overhead compared with the existing works.…”
Get full text
Article -
1713
The Deer Hunter : essai de topologie imaginaire américaine
Published 2006-06-01“…Cimino’s heroes find out that the otherness of evil may turn out to be very familiar--but in the end the lid is back on Pandora’s box.…”
Get full text
Article -
1714
-
1715
Characterization of Morphological Diversity of Jute Mallow (Corchorus spp.)
Published 2017-01-01Get full text
Article -
1716
-
1717
Bioethanol production from water hyacinth with isolated thermophilic microbial consortium from Kenya
Published 2024-02-01Get full text
Article -
1718
-
1719
-
1720