Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Yihao Jia"'
Publikováno v:
Machines, Vol 11, Iss 2, p 134 (2023)
As vane inlet temperatures and turbine loadings are increasing, the aerodynamic and thermal management for the endwalls of gas turbines have received increased attention. Non-axisymmetric endwalls are becoming popular due to their proficient capabili
Externí odkaz:
https://doaj.org/article/cf52ee96c33945ae9810d90cde1749cc
Publikováno v:
BCP Business & Management. 13:309-312
In the environment of omni-media era with new media technology as the mainstream information communication channel, the Cross-border marketing method of IP industry and makeup joint name can not only enhance brand visibility and visibility, but also
Publikováno v:
Volume 6A: Heat Transfer — Combustors; Film Cooling.
With advantageous thermal, strength, and weight properties at high temperatures, Ceramic Matrix Composite (CMC) is regarded as the potential structural material for modern aeroengines with the extreme increase of operating temperature. However, the a
Publikováno v:
CCRIS
Along with the popularization and adoption of IP in various emerging scenarios, challenges also arise with the ossified address structures. The reason is that conventional IP address is designed with fixed length and lacking extensibility, while the
Publikováno v:
IWQoS
Source IP address spoofing has been a major vulnerability of the Internet for many years. Although much work has been done to study the problem extensively, spoofing continues to occur frequently and has led to many serious network attacks. Inter-AS
Publikováno v:
Intelligent Equipment, Robots, and Vehicles ISBN: 9789811672125
This paper proposes a new wrapper feature selection method based on the modified adaptive Human Learning Optimization (MAHLO) algorithm and Support Vector Machine (SVM). To achieve better results, the initialization and random learning strategies are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::90c599d57b26f4dbe0da30181b9b849e
https://doi.org/10.1007/978-981-16-7213-2_76
https://doi.org/10.1007/978-981-16-7213-2_76
Publikováno v:
ICNP
The Internet of Things (IoT), which has been rapidly implemented in the smart home, city, and industry, keeps shaping the way we live. However, the constrained resource of IoT leads to a constant vulnerability for its’ resident network and the whol
Publikováno v:
Computer Networks. 203:108700
Publikováno v:
Tsinghua Science and Technology. 23:1-12
IP source address spoofing is regarded as one of the most prevalent components when launching an anonymous invasion, especially a Distributed Denial-of-Service (DDoS) attack. Although Source Address Validations (SAVs) at the access network level are
Autor:
Yihao Jia, Aleksandar Kuzmanovic
Publikováno v:
INFOCOM
Anomalies are a ubiquitous and inevitable phenomenon associated with a complex and large-scale system such as the Internet. While measuring and analyzing network anomalies is as old as the Internet itself, comprehensively detecting anomalies at a glo