We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-8 of 8 results
  1. Numerical Simulation of Hydrodynamic Forces Acting on Curved Shape Trash Intercepting Net in Nuclear Power Plant Under Regular Waves

    The occurrence of blockages of trash intercepting net in nuclear power plant due to marine biofouling has become increasingly frequent, leading to...

    Bin Wang, ** Ou in China Ocean Engineering
    Article 16 March 2024
  2. \(\lambda \)-possibility-center based MCDM technique on the control of Ganga river pollution under non-linear pentagonal fuzzy environment

    Indians regard the River Ganga as religious because it sustains the ecosystem and ecology. Over the past few decades, human activities have caused...

    Article 12 June 2024
  3. Ethical Hacking: Redefining Security in Information System

    On defining the severe status of information security in the present world, we come across a very renowned technical term known as ‘ethical hacking’....
    Sanchita Saha, Abhijeet Das, ... Subindu Saha in Proceedings of International Ethical Hacking Conference 2019
    Conference paper 2020
  4. Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope

    Recently, Multi-Robot Systems (MRS) have attained considerable recognition because of their efficiency and applicability in different types of...

    Janardan Kumar Verma, Virender Ranga in Journal of Intelligent & Robotic Systems
    Article 16 April 2021
  5. A Survey on Cyber Security Evolution and Threats: Biometric Authentication Solutions

    Cybersecurity threats are serious, costly and challenging because they are various, evolutive and easily spread. This chapter is dedicated to brief...
    Leila Benarous, Benamar Kadri, Ahmed Bouridane in Biometric Security and Privacy
    Chapter 2017
Did you find what you were looking for? Share feedback.