Endpoint users are usually viewed as the highest-risk element in the field of cybersecurity.At the same time, they need to be protected not just from the individual-level prism but also, from the states perspective, to counter threats like botnets that harvest weakly secured endpoints and forge an army of so-called zombies that are often used to at
The relationship between intimate partner behaviour control and impulsivity among college students: the chain mediating effect of autonomy needs satisfaction and intimacy quality
Abstract Using the Intimate Partner Behaviour Control Scale, the Autonomy Needs Questionnaire, the Intimacy Quality Questionnaire, and the Chinese version of the Brief Barratt Impulsiveness Scale, we conducted a survey of 416 college students (204 males and 212 females) with a mean age of 24.99 (SD = 7.94) years.The aim of this research was to expl
Measuring Resilience to Sea-Level Rise for Critical Infrastructure Systems: Leveraging Leading Indicators
There has been a growing interest in research on how to define and build indicators of resilience to address challenges associated with sea-level rise.Most of the proposed methods rely on lagging indicators constructed based on the historical performance of an infrastructure sub-system.These indicators are traditionally utilized to build curves tha
Wind and Wave Disturbances Compensation to Floating Offshore Wind Turbine Using Improved Individual Pitch Control Based on Fuzzy Control Strategy
Due to the rich and high quality of offshore wind resources, floating offshore wind turbine (FOWT) arouses the attentions of many researchers.But on a floating platform, the wave and wind induced loads can significantly affect power regulation and vibration of the structure.Therefore, reducing these loads becomes a challenging part of the design of