Showing 3,021 - 3,040 results of 5,905 for search 'Enfusion~', query time: 2.04s Refine Results
  1. 3021
  2. 3022
  3. 3023
  4. 3024
  5. 3025
  6. 3026
  7. 3027
  8. 3028
  9. 3029
  10. 3030
  11. 3031
  12. 3032
  13. 3033
  14. 3034
  15. 3035
  16. 3036
  17. 3037
  18. 3038

    Reo- and thixocompacting - new approaches to casting of materials in hard-fluid state by N. K. Tolochko, Ju. A. Shienok, A. Z., Mjaldun, S. E. Mozzharov

    Published 2003-05-01
    “…There are offered and examined the two new methods of casting in solid-liquid state—reo- and thixocompacting- useful for casting with the fixed fusion point. There are determined the conditions of these methods realization and experimentally analyzed on the model substances the processes and structure peculiarities of the produced casts.…”
    Get full text
    Article
  19. 3039

    Fuzzy trust model for wireless sensor networks with intrusion tolerance by WANG Liang-min1, GUO Yuan-bo2, ZHAN Yong-zhao1

    Published 2010-01-01
    “…To protect key services of wireless sensor networks of data fusion and package forward,a fuzzy trust model based on trust and confidence and its evaluation algorithms were presented,in which the value of confidence was used to describe the impreciseness of the value of the trust.Then the simulation and the example were given to show the per-formances of using the model to detect or tolerate the insidious attacks.Finally,the package drop ration of the networks with the trust evaluation system was simulated and the comparison with the related work was discussed.…”
    Get full text
    Article
  20. 3040

    Survey on SSDF attack and defense for distributed cooperative cognitive radio by Guangyue LU, Hang SU

    Published 2017-01-01
    “…Cooperative spectrum sensing (CSS) improves the reliability of spectrum sensing,however,it is susceptible to spectrum sensing data falsification (SSDF) due to the fusion mechanism.To insight into the current research and development trend of defense strategy against the SSDF attack,several typical distributed strategies were concluded and the types of distributed algorithms were analyzed in several aspects.Finally,the future research of SSDF distributed defense strategy was prospected based on the problems found in the current research.…”
    Get full text
    Article