The mismatch between the structured peer-to-peer (P2P) overlay network, which is based on Hashing, and the actual physical network, leads to query repeatedly pa
The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the
The fracture behavior of a ceramic reinforced metal-base coating prepared by high velocity arc spraying (HVAS)technology in three-point bending test was studied
On the basis of the results derived from pseudopotential method and ensemble theory,thermal stability of a weakly interacting Fermi gas in a weak magnetic field
In this article, a design for the adaptive deblocking filter is proposed. To understand the real-time performance, a FILTER unit that can process eight pixels b
Based on the comprehensive forces balance model,a modified model of the formation of a single bubble in non-Newtonian fluid under constant flowrate was develope
Many ant colony routing (ACR) algorithms have been presented in recent years, but few have studied the problem that ants will get stuck with probability in any
To overcome the limitations of traditional monitoring methods, based on vibration parameter image of rotating machinery, this paper presents an abnormality onli