Showing 201 - 220 results of 1,160 for search 'attack three', query time: 0.13s Refine Results
  1. 201
  2. 202
  3. 203

    Corrosion inhibition mechanisms of 2-mercaptobenzothiazole on AA2024 T3 aluminium alloy by Vishant Garg, Maxime Magnan, Sandrine Zanna, Antoine Seyeux, Frédéric Wiame, Vincent Maurice, Philippe Marcus

    Published 2025-08-01
    “…It is shown that 2-MBT effectively inhibits corrosion of the alloy, reducing its susceptibility to corrosion attack and its corrosion rate. Surface analysis, including the use of ToF-SIMS 3-D chemical mapping, confirms 2-MBT adsorption on partially dealloyed intermetallic particles (IMPs) along with the presence of a thin 2-MBT layer on the top-most alloy surface. …”
    Get full text
    Article
  4. 204

    Resilience evolution and optimization strategies of ecological networks in the Three Gorges Reservoir Area: A scenario-based simulation approach by Haohua Wang, Lulu Zhou, Kangchuan Su, Yun Zhou, Qingyuan Yang

    Published 2025-12-01
    “…To evaluate network resilience, this study employs node attack simulation methods, we dynamically assessed EN resilience through four functional and structural indicators. …”
    Get full text
    Article
  5. 205
  6. 206
  7. 207
  8. 208
  9. 209

    Reversible steganographic method based on interpolation by bivariate linear box-spline on the three directional mesh by Amine Benhfid, El Bachir Ameur, Youssef Taouil

    Published 2020-09-01
    “…This paper proposes a reversible steganographic method based on interpolation by linear box-splines on the three directional mesh. Secret data is hidden in the error between the cover and interpolated pixels. …”
    Get full text
    Article
  10. 210
  11. 211

    Between geometric schemes and mnemonic images: The three paradigmatic figures of Giordano Bruno’s Articuli adversus mathematicos by Marco Matteoli

    Published 2024-10-01
    “… Giordano Bruno’s Articuli adversus mathematicos (Prague 1588) is an emblematic text for more than one reason: it contains a harsh critique of the astronomical measurement techniques in use at the time, but also a radical attack on the theoretical foundations of geometry itself, proposing a discrete notion of basic geometric objects such as the point, the line, the plane, and solid figures. …”
    Get full text
    Article
  12. 212

    A DMPC-based three-dimensional cooperative guidance scheme with impact time and impact angle constraints by Zijie Jiang, Xiuxia Yang, Cong Wang, Yi Zhang, Hao Yu

    Published 2025-05-01
    “…In this paper, a distributed model predictive control (DMPC)-based three-dimensional (3D) cooperative guidance scheme is proposed for multiple interceptors with controllable thrust and constrained acceleration, to simultaneously attack a maneuvering target at desired terminal angles. …”
    Get full text
    Article
  13. 213

    NLRP3 Inflammasome — a new universal target of asymptomatic hyperuricemia and gout management by P. A. Lebedev, L. T. Volova, N. K. Osina, E. V. Paranina

    Published 2024-07-01
    “…The key mediator of gout attacks is recognized as IL-1β, a product of NLRP3 (NLR family pyrin domain containing 3) inflammasome activation (complex multiprotein), responsible for local inflammatory response in synovial membrane and periarticular tissues with participation of macrophages and neutrophils. …”
    Get full text
    Article
  14. 214

    An enhanced DPoS consensus mechanism using quadratic voting in Web 3.0 ecosystem by Tianyu Lei, Qinnan Zhang, Wangjie Qiu, Hongwei Zheng, Shuyi Miao, Wanqing Jie, Jianming Zhu, Jin Dong, Zhiming Zheng

    Published 2025-01-01
    “…With the advent of Web 3.0, blockchain has revealed limitations of traditional Delegated Proof of Stake (DPoS) consensus mechanisms. …”
    Get full text
    Article
  15. 215

    Corrugation at the Trailing Edge Enhances the Aerodynamic Performance of a Three-Dimensional Wing During Gliding Flight by Kaipeng Li, Na Xu, Licheng Zhong, Xiaolei Mou

    Published 2025-05-01
    “…This study investigates the aerodynamic effects of three corrugation parameters on gliding performance at a Reynolds number of 1350 and angles of attack ranging from 0° to 20°: (1) chordwise corrugation position, (2) linear variation in corrugation amplitude toward the trailing edge, and (3) the number of trailing-edge corrugations. …”
    Get full text
    Article
  16. 216
  17. 217

    A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare by Mamta Kumari, Mahendra Gaikwad, Salim A. Chavan

    Published 2025-05-01
    “…The aim of research is to propose and evaluate an attack detection algorithm for IoMT, focusing on improving detection performance against man-in-the-middle attacks. …”
    Get full text
    Article
  18. 218

    The Legal Issues of Firearms Trafficking in the United States of America by A. V. Ravnyushkin

    Published 2023-01-01
    “…The norms of the Federal Law of February 7, 2011 No. 3-FZ “About the Police” (hereinafter referred to as the Law “About the Police”) refer to the achievements of domestic administrative science as a result of the work of specialists. …”
    Get full text
    Article
  19. 219

    A network recovery strategy based on boundary nodes and tetrahedral approximation fermat points in three-dimensional wireless sensor networks by Bin Xu, Hongsheng Chen, Yanxu Cheng

    Published 2025-08-01
    “…Abstract Wireless Sensor Networks (WSNs) have emerged as a critical research frontier in the Internet of Things (IoT) domain, with widespread applications in three-dimensional environments. However, due to harsh environments (such as high temperature, high pressure, etc.), natural disasters (such as earthquakes, etc.), large-scale attacks (such as bombing), WSNs in a certain area is split into many isolated islands, and the regional network fails. …”
    Get full text
    Article
  20. 220