Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Qilei Yin"'
Publikováno v:
Heliyon, Vol 10, Iss 11, Pp e32319- (2024)
This study aims to prevent ice accumulation on the surface of drilling tools by investigating the effectiveness of hydrophobic coatings, which is one of the most promising methods to solve drilling difficulties in warm ice. Herein, four types of hydr
Externí odkaz:
https://doaj.org/article/51cff6a7113546b6b2788f568f8341f2
Publikováno v:
Applied Sciences, Vol 7, Iss 1, p 5 (2016)
To reduce dust generated from drilling processes, a reverse circulation drilling method based on a supersonic nozzle is proposed. The suction performance is evaluated by the entrainment ratio. A series of preliminary laboratory experiments based on o
Externí odkaz:
https://doaj.org/article/b3ef57d522834da8922e51078f3b1820
Publikováno v:
Journal of Glaciology, Pp 1-12
Warm ice at temperatures close to the pressure melting point is often encountered in deep ice-core drilling. The heat generated by rotary cutting can melt ice chips, which seriously threatens the safety of drilling if the chips refreeze on the drill
Externí odkaz:
https://doaj.org/article/fc4d5629774a4007b324daab571d1c25
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3656-3670
In Website Fingerprinting (WF) attack, a local passive eavesdropper utilizes network flow information to identify which web pages a user is browsing. Previous researchers have demonstrated the effectiveness of WF attacks under a strong Single Page As
Publikováno v:
Rock Mechanics and Rock Engineering.
Publikováno v:
25th International Symposium on Research in Attacks, Intrusions and Defenses.
Publikováno v:
2022 International Joint Conference on Neural Networks (IJCNN).
Publikováno v:
Proceedings of the 2022 International Conference on Management of Data.
Publikováno v:
Algorithms and Architectures for Parallel Processing ISBN: 9783030389901
ICA3PP (1)
ICA3PP (1)
The botnet is one of the most dangerous threats to the Internet. The C&C channel is an essential characteristic of the botnet and has been evolved from the C&S type to the P2P type. Distinguishing the type of C&C channel correctly and timely, and the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::67d37a8eb33d013b1b2562b7fb573dfd
https://doi.org/10.1007/978-3-030-38991-8_41
https://doi.org/10.1007/978-3-030-38991-8_41