PROCESSING AND ANALYSIS OF FLIGH EXPERIMENT DATA FOR DETERMINING THE CHARACTERISTICS OF THE MOTION OF A ROUND PARACHUTE ON A SPIRAL TRAJECTORY AT HIGH ALTITUDES

PROCESSING AND ANALYSIS OF Fligh experiment DATA FOR DETERMINING THE CHARACTERISTICS OF THE MOTION OF A ROUND PARACHUTE on a spiral trajectory AT HIGH ALTITUDES

The article is addressed to the analysis of the trajectory parameters and videos obtained during the flight experiment at the launch of meteo-rocket MMP-06 with the purpose to determine major parameters of motion of a round parachute at subsonic speeds in the range of altitudes from 0 to 40 km.The data analysis showed that the trajectory of the par

read more

Hausdorff Distance Model-Based Identity Authentication for IP Circuits in Service-Centric Internet-of-Things Environment

Rapid advances in the Internet-of-Things (IoT) have exposed the underlying hardware devices to security threats.As the major component of hardware devices, the integrated circuit (IC) chip also suffers the threat of illegal, malicious attacks.To protect against attacks and vulnerabilities of a chip, a credible authentication is of arla eagle rock f

read more

High IRF8 expression correlates with CD8 T cell infiltration and is a predictive biomarker of therapy response in ER-negative breast cancer

Abstract Background Characterization of breast cancer (BC) through the determination of conventional markers such as ER, PR, HER2, and Ki67 has been useful as a predictive and therapeutic tool.Also, assessment of tumor-infiltrating lymphocytes has been hippie love spray proposed as an important prognostic aspect to be considered in certain BC subty

read more

Intrusion Detection Using Transformer in Controller Area Network

The message broadcast network of the Controller Area Network (CAN) protocol is vulnerable to external attacks.The ongoing development of intrusion rogue st pro 3 iron detection systems (IDS) aims to prevent malicious attacks on vehicles.Time series analysis of language models has emerged as a new approach in this area and has significantly contribu

read more

Fraud against businesses both online and offline: crime scripts, business characteristics, efforts, and benefits

Abstract This study analyses 300 cases of fraudulent activities against Dutch businesses, minnie mouse beach umbrella 100 from each of the following three categories: CEO-fraud, fraudulent contract, and ghost invoice.We examine crime scripts, key characteristics of targeted businesses, and the relationship between input criminal effort and output f

read more