- Tunneling and Rock Mechanics
- Advanced Surface Polishing Techniques
- Advanced machining processes and optimization
- Drilling and Well Engineering
- Network Security and Intrusion Detection
- Metal Alloys Wear and Properties
- Advanced materials and composites
- Internet Traffic Analysis and Secure E-voting
- Vehicular Ad Hoc Networks (VANETs)
- Privacy-Preserving Technologies in Data
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
National Computer Network Emergency Response Technical Team/Coordination Center of Chinar
2022-2023
With the substantial increase in number of smart cars, vehicular ad hoc network (VANET), where data can be shared between vehicles to enrich existing vehicle services and improve driving safety, is gaining more attention, thus creating a efficient intelligent transportation system. Moreover, in-depth research development 6G AI technology further strengthen interconnection various entities VANET realize edge intelligence, which fundamentally enhances efficiency sharing. However, reliable...
This paper introduces a process route for remanufacturing repair disc cutter rings (hereinafter referred to as rings) employed in Full-face rock tunnel boring machines (TBMs) based on Metal Active Gas Arc Welding (MAG). The study centers two key thermal treatment processes, namely preheating and post-weld tempering. research finite element (FE) simulation experimental methods investigate the impact of these processes performance with uniform wear. Simulation analysis revealed that absence...
An anonymous proxy system, such as Shadowsocks, creates a secure tunnel between the user and server, effectively concealing raw traffic from any network elements along transmission path. While this enhances privacy, it also presents challenge for inspection. Identifying application associated with is crucial, but can be challenging task when dealing encrypted over Shadowsocks. Current research on analysis assumes that bi-directional used testing. However, in reality, inspection typically...