Buffer overflow is the most dangerous attack method that can be exploited. According to the statistics of Computer Emergency Readiness Team(CERT), buffer overfl
A new kind of solvent for deacidification of distillate oils was introduced in this paper. After successful laboratory study this technology had been applied in
A new type of in-pipe mobile robot was designed and developed on the basis of wheel in-pipe robot and crawler in-pipe robot. The three sets of driving wheels ci
Two ID-based authenticated group key agreement schemes, proposed by Choi et al and Du et al, are insecure against an impersonation attack and they only discusse
A digital model is presented for the purpose of design, manufacture and measurement of hypoid gear, based on the non-uniform rational B-spline surface (NURBS) m
Feedforward control is the core to control function in the cooling process of hot strip. One of the most important tasks in feedforward control is to determine
Effects of graphite nodule diameter on the water embrittlement of austempered ductile iron (ADI) is studied. The water embrittlement mechanism is discussed. Due