نتایج جستجو برای: sinkhole density
تعداد نتایج: 410563 فیلتر نتایج به سال:
In this article a new neural network based method for automatic classification of ground penetrating radar (GPR) traces is proposed. The presented approach is based on a new representation of GPR signals by polynomials approximation. The coefficients of the polynomial (the feature vector) are neural network inputs for automatic classification of a special kind of geologic structure—a sinkhole. ...
Sinkholes are the most abundant surface features in karst areas worldwide. Understanding sinkhole occurrences and characteristics is critical for studying aquifers mitigating sinkhole-related hazards. Most sinkholes appear on land as depressions or cover collapses commonly mapped from elevation data, such digital models (DEMs). Existing methods identifying DEMs often require two steps: locating...
Sinkholes are sudden disasters that usually small in size and occur at unexpected locations. They may cause serious damage to life property. Sinkhole-prone areas can be monitored using Interferometric Synthetic Aperture Radar (InSAR) time series. Defining a pattern InSAR-derived spatio-temporal deformations, this study presents sinkhole detector, called the Sinkhole Scanner. The Scanner include...
The present research investigates the morphology and genetical mechanism of a sinkhole which occurred in 2019 Murisengo (NW Italy). This landform is representative several subsidence phenomena that often concern Monferrato area In concomitance with appearance at surface, cone detrital material was found drifts nearby underground quarry. A geological survey performed quarry order to understand i...
In the Internet of Things (IoT), resource-constrained things are connected to the unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are secured with encryption and authentication, these things are exposed both to wireless attacks from inside the 6LoWPAN network and from the Internet. Since these attacks may succeed, Intrusion Detection Systems (IDS) are necessary. ...
Intrinsic resource constraints and vulnerability to a variety of malicious attacks hinders the widespread deployment of wireless sensor networks (WSNs). One of the malicious attacks is the so-called sinkhole attack where one or more compromised nodes, pretending to be closer to the base station, disseminates a false advertisement. The event reporting nodes start forwarding their reports to thes...
Research on botnet mitigation has focused predominantly on methods to technically disrupt the commandand-control infrastructure. Much less is known about the effectiveness of large-scale efforts to clean up infected machines. We analyze longitudinal data from the sinkhole of Conficker, one the largest botnets ever seen, to assess the impact of what has been emerging as a best practice: national...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید