This paper considers a mathematical model of a cyclic multiple access communication network. The model can be used to build specialized "flying" FANET data transmission networks. We consider a single server ...
详细信息
For establishing and sustaining scores of smarter environments such as smart buildings, retail stores, and manufacturing floors, highly unbreakable and impenetrable security solutions and services are very vital for e...
详细信息
Community detection in multi-layer networks is crucial for revealing the functions of entities and understanding their connections across dimensions. However, existing semi-supervised methods often rely on manual labe...
详细信息
Digital identity has always been one of the keystones for implementing secure and trustworthy communications among parties. The ever-evolving digital landscape has undergone numerous technological transformations that...
详细信息
The prime objective of the present communication is to examine the entropy-optimized second order velocity slip Darcy–Forchheimer hybrid nanofluid flow of viscous material between two rotating *** conducting flow is ...
详细信息
The prime objective of the present communication is to examine the entropy-optimized second order velocity slip Darcy–Forchheimer hybrid nanofluid flow of viscous material between two rotating *** conducting flow is considered and saturated through Darcy–Forchheimer *** the disks are rotating with different angular frequencies and stretches with different *** graphene oxide and titanium dioxide are considered for hybrid nanoparticles and water as a continuous phase *** heating,heat generation/absorption and viscous dissipation effects are incorporated in the mathematical modeling of energy ***,binary chemical reaction with activation energy is *** total entropy rate is calculated in the presence of heat transfer irreversibility,fluid friction irreversibility,Joule heating irreversibility,porosity irreversibility and chemical reaction irreversibility through thermodynamics second *** nonlinear governing equations are first converted into ordinary differential equations through implementation of appropriate similarity transformations and then numerical solutions are calculated through Built-in-Shooting *** of sundry flow variables on the entropy generation rate,velocity,concentration,Bejan number,temperature are discussed graphically for both graphene oxide and titanium dioxide hybrid *** engineering interest like skin friction coefficient and Nusselt number are computed numerically and presented through *** is noticed from the obtained results that entropy generation rate and Bejan number have similar effects versus diffusion *** entropy generation rate is more against the higher Brinkman number.
The advent of Industry 4.0 and the Industrial Internet of Things (IIoT) has revolutionized manufacturing and production systems, enhancing efficiency and communication through the integration of advanced technologies ...
详细信息
ISBN:
(数字)9798350377644
ISBN:
(纸本)9798350377651
The advent of Industry 4.0 and the Industrial Internet of Things (IIoT) has revolutionized manufacturing and production systems, enhancing efficiency and communication through the integration of advanced technologies such as IoT devices and AI. However, this increased digitization has also led to heightened cybersecurity risks, with a notable rise in the frequency and complexity of cyber-attacks. Cyber Ranges emerges as a critical solution in addressing these challenges, offering a controlled environment for simulating cyber-attack scenarios, training cybersecurity teams, and developing robust defense strategies. The escalating demand for cybersecurity professionals has highlighted the crucial need for effective training solutions. This article presents an open-source Cyber Range constructed on container-based architecture, meticulously engineered for efficient operation with minimal resource consumption. In response to the scarcity of cybersecurity experts, this platform prioritizes extensive scalability and robust isolation between exercises, ensuring secure learning environments, and also integrates a complex developed exercise series aimed at strengthening cybersecurity learning experiences. These exercises encompass a variety of scenarios and challenges, catering to professionals at different skill levels. Each exercise replicates real-world cyber threats, offering practical, hands-on learning opportunities. Additionally, a comprehensive questionnaire accompanies these exercises, designed to gather feedback on participants' experiences.
作者:
Kadam, Arvind H.Williamson, Sheldon S.Group
Faculty of Engineering and Applied Science Department of Electrical Computer and Software Engineeirng 2000 Simcoe Street North OshawaONL1G 0C5 Canada
Nowadays, the LCL (inductor-capacitor-inductor) filter is an integral part of every power electronic converter system operating on current control. Though higher order, the LCL filter due to its high harmonic suppress...
详细信息
Currently, Ethereum has become a public blockchain platform for developers to build and deploy smart contracts and decentralized applications (DApps). However, the fact that accounts of the user are able to trade dire...
详细信息
This work explores the deployment of active reconfigurable intelligent surfaces (A-RIS) in integrated terrestrial and non-terrestrial networks (TN-NTN) while utilizing coordinated multipoint non-orthogonal multiple ac...
详细信息
暂无评论