Showing 21 - 40 results of 178 for search 'attack (tree* OR three*)', query time: 0.09s Refine Results
  1. 21
  2. 22

    Cross-sector collaboration to develop a mobile health solution for promotion of physical activity after stroke or transient ischaemic attack in Sweden by Charlotte Thurston, Sverker Johansson, Lena von Koch, Coralie English, David Moulaee Conradsson

    Published 2025-06-01
    “…The development process consisted of three phases: 1) startup, prioritisation, and specifications for digitalisation; 2) development of the mHealth prototype; and 3) prototype adaptation based on feedback on end-user workshops. …”
    Get full text
    Article
  3. 23
  4. 24
  5. 25
  6. 26

    Monetary policy of the National bank of Kazakhstan: chronological analysis and assessment by D. B. Kanagatova, V. N. Sidorenko

    Published 2020-12-01
    “…The authors revealed the necessary conditions for the occurrence of speculative attacks on the currency market. Based on these patterns, three options for the Central Bank’s actions to prevent speculative attacks are proposed. …”
    Get full text
    Article
  7. 27

    Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems by Qihong Yu

    Published 2025-07-01
    “…The proposed construction has three characteristics. Firstly, our scheme achieves full security under standard model, which means that its security is independent of the number of inquiries from the attacker. …”
    Get full text
    Article
  8. 28

    Integrated intrusion detection design with discretion of leading agent using machine learning for efficient MANET system by K. S. Nirmala Bai, Dr M.V. Subramanyam

    Published 2025-08-01
    “…At first, the IDS is performed in the network using Adaptive Ensemble Tree Learning (AETL) based classification of typical nodes and malicious intrusions. …”
    Get full text
    Article
  9. 29

    THE AUTHENTICATION PROCESS USING GRAPHICAL PASSWORDS by Sergei N. Davydov, Michael Ya. Kleptsov, Larisa V. Lyubimova

    Published 2016-05-01
    “…On three examples of dynamic graphical authentication article demonstrates how with user-friendly, graphical password can be stable.…”
    Get full text
    Article
  10. 30
  11. 31

    Spectral–spatial mamba adversarial defense network for hyperspectral image classification by Zhongqiang Zhang, Ye Wang, Dahua Gao, Haoyong Li, Guangming Shi

    Published 2025-08-01
    “…The dense involution branch extracts embedding features via three dense involution layers. The spectral mamba branch can learn the spectral sequence information from HSI adversarial samples. …”
    Get full text
    Article
  12. 32
  13. 33

    Classification and identification of pest, diseases and nutrient deficiency in paddy using layer based EMD phase features with decision tree by A. Pushpa Athisaya Sakila Rani, N. Suresh Singh

    Published 2025-06-01
    “…The features are trained/classified using the decision tree classifiers that classify the pest attack, disease incidence, and nutrient deficiency categories. …”
    Get full text
    Article
  14. 34

    A DMPC-based three-dimensional cooperative guidance scheme with impact time and impact angle constraints by Zijie Jiang, Xiuxia Yang, Cong Wang, Yi Zhang, Hao Yu

    Published 2025-05-01
    “…In this paper, a distributed model predictive control (DMPC)-based three-dimensional (3D) cooperative guidance scheme is proposed for multiple interceptors with controllable thrust and constrained acceleration, to simultaneously attack a maneuvering target at desired terminal angles. …”
    Get full text
    Article
  15. 35

    Resilience evolution and optimization strategies of ecological networks in the Three Gorges Reservoir Area: A scenario-based simulation approach by Haohua Wang, Lulu Zhou, Kangchuan Su, Yun Zhou, Qingyuan Yang

    Published 2025-12-01
    “…This study focuses on the Three Gorges Reservoir Area (TGRA), addressing human-land relationship conflicts by constructing an EN system and analyzing its spatiotemporal evolution from 2001 to 2023. …”
    Get full text
    Article
  16. 36

    Three-spined sticklebacks recognize familiar individuals by facial recognition by Shumpei Sogawa, Izumi Inoue, Satoshi Awata, Koki Ikeya, Kento Kawasaka, Masanori Kohda

    Published 2025-07-01
    “…These results suggest that the three-spined stickleback exclusively distinguishes familiar neighbours from unknown fish via facial recognition. …”
    Get full text
    Article
  17. 37

    Perch Selection by Three Cooccurring Species of Celithemis (Odonata: Libellulidae): Testing for a Competitive Hierarchy among Similar Species by Wade B. Worthen, Parker H. Morrow

    Published 2016-01-01
    “…We tested for this pattern among three similar-sized species: Celithemis elisa, C. fasciata, and C. ornata. …”
    Get full text
    Article
  18. 38

    A network recovery strategy based on boundary nodes and tetrahedral approximation fermat points in three-dimensional wireless sensor networks by Bin Xu, Hongsheng Chen, Yanxu Cheng

    Published 2025-08-01
    “…Abstract Wireless Sensor Networks (WSNs) have emerged as a critical research frontier in the Internet of Things (IoT) domain, with widespread applications in three-dimensional environments. However, due to harsh environments (such as high temperature, high pressure, etc.), natural disasters (such as earthquakes, etc.), large-scale attacks (such as bombing), WSNs in a certain area is split into many isolated islands, and the regional network fails. …”
    Get full text
    Article
  19. 39
  20. 40

    Early Prediction of Stroke Risk Using Machine Learning Approaches and Imbalanced Data by Hassan Qassim

    Published 2025-03-01
    “…The findings showed that KNN outperformed the three other models with an achieved accuracy of 90%. …”
    Get full text
    Article