Showing 141 - 160 results of 229 for search 'complex optimization vulnerabilities', query time: 0.08s Refine Results
  1. 141

    Fair Energy Trading in Blockchain-Inspired Smart Grid: Technological Barriers and Future Trends in the Age of Electric Vehicles by Sameer Qazi, Bilal A. Khawaja, Abdullah Alamri, Abdulrahman AlKassem

    Published 2024-10-01
    “…As EVs become more prevalent, they introduce additional complexity to the SG landscape, with EVs not only consuming energy, but also potentially supplying it back to the grid through vehicle-to-grid (V2G) technologies. …”
    Get full text
    Article
  2. 142

    Risk Assessment and Management Strategy of Coastal Erosion in the Red River Delta, Vietnam by Thi Hong Hanh Nguyen, Guanxun Wang, Wenyue Chen, Jing Yu, Ruonan Liu, Xu Huang, Xun Jiang, Van Vuong Bui, Dinh Nam Le, Van Phach Phung

    Published 2025-06-01
    “…In Vietnam’s Red River Delta (RRD), the dynamic interplay between erosion and accretion presents a highly complex challenge, necessitating effective risk assessment and management to safeguard communities and resources. …”
    Get full text
    Article
  3. 143

    GAB-YOLO: a lightweight deep learning model for real-time detection of abnormal behaviors in juvenile greater amberjack fish by Mingxin Liu, Mingxin Liu, Chun Zhang, Cong Lin, Cong Lin

    Published 2025-05-01
    “…As a key species for sashimi, Greater Amberjack faces significant potential in aquaculture but is also vulnerable to temperature fluctuations, particularly during its juvenile stage, which can lead to abnormal behaviors. …”
    Get full text
    Article
  4. 144

    Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF by Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI

    Published 2022-06-01
    “…Objectives: In the face of the complex and changing network security environment, how to fight against Advanced Persistent Threat (APT) attacks has become an urgent problem for the entire security community. …”
    Get full text
    Article
  5. 145

    Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF by Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI

    Published 2022-06-01
    “…Objectives: In the face of the complex and changing network security environment, how to fight against Advanced Persistent Threat (APT) attacks has become an urgent problem for the entire security community. …”
    Get full text
    Article
  6. 146

    Does discontinuous Mesoscale Convective System produce stronger precipitation? by Aoqi Zhang, Yilun Chen

    Published 2025-06-01
    “…The findings provide critical insights for improving flood early-warning systems and optimizing agricultural water management in monsoon-vulnerable regions, directly supporting climate adaptation strategies and sustainable development goals.…”
    Get full text
    Article
  7. 147

    Assessment of pan coefficient performance: A comparative study of empirical and model-driven approaches using a hill-climbing-based alternating model tree and MOORA by Saad Javed Cheema, Aitazaz A. Farooque, Mehdi Jamei, Khabat Khasravi, Farhat Abbas, Suqi Liu, Travis J. Esau, Kuljeet Singh Grewal

    Published 2025-12-01
    “…Overall, the outcomes revealed that the primary model (BF-AMT) outperformed all the data-driven and empirical models in terms of optimal metrics (RMSE=0.0143, Vulnerability=6.3260, and MOORA=0), followed by BF-Elastic net (RMSE=0.7891, Vulnerability=28.1081, and MOORA=0.073) and BF-Bi-LSTM (RMSE=0.0169, Vulnerability=64.8649, and MOORA=0.128), respectively. …”
    Get full text
    Article
  8. 148

    Performance Analysis of Blockchain Consensus Algorithm in Unmanned Aerial Vehicle Ad Hoc Networks by Xuan Huang, Dongyan Huang

    Published 2025-04-01
    “…However, wireless communication links between UAV nodes are vulnerable to electromagnetic interference and competition due to limited spectrum resources. …”
    Get full text
    Article
  9. 149

    Microbial Interactions in Nature: The Impact of Gram-Negative Bacilli on the Hyphal Growth of <i>Candida albicans</i> by Madalina Adriana Bordea, Benjamin Thomas Georg Nutz, Alin-Dan Chiorean, Gabriel Samasca, Iulia Lupan, Laura Mihaela Simon, Lia Pepelea

    Published 2025-03-01
    “…Achieving a comprehensive understanding of these complex relationships is paramount for informing effective clinical management strategies for infectious diseases, and the accurate identification of fungal–bacterial co-infections holds substantial implications for optimizing clinical treatment paradigms, especially in vulnerable immunocompromised hosts.…”
    Get full text
    Article
  10. 150

    Partial immunity of two-photon correlation against wavefront distortion for spatially entangled photons by Kiran Bajar, Rounak Chatterjee, Vikas S. Bhat, Sushil Mujumdar

    Published 2025-03-01
    “…However, such high-dimensional states are vulnerable to disruption by complex disordered media, presenting significant challenges in practical applications. …”
    Get full text
    Article
  11. 151

    Legal Challenges of Marine Insurance Laws in the Use of Unmanned Ships by Mahsa Bahadoran- Baghbaderani, Masoud Shirani, Reza Soltani

    Published 2025-03-01
    “…Despite these benefits, the adoption of unmanned ships is fraught with numerous challenges. These encompass vulnerabilities to cyber-attacks, software malfunctions, ambiguity in legal frameworks, inadequate emergency response mechanisms, communication hurdles in remote maritime environments such as polar regions, security threats, operational incongruities with traditional vessels, and critically, complexities associated with insuring these ships under existing legal regimes. …”
    Get full text
    Article
  12. 152

    Keeping silent or running away. The voices of Vietnamese women survivors of Intimate Partner Violence by Raquel Herrero-Arias, Anh Ngoc Truong, Gaby Ortiz-Barreda, Erica Briones-Vozmediano

    Published 2021-01-01
    “…The women strategized within a complex set of structural constrains like poverty, cultures of honor, social stigma, and traditional gender roles. …”
    Get full text
    Article
  13. 153

    Reflections of adolescent motherhood on infant and young child feeding practices: the case of Uganda by Gözde Zeynep Yeşiloğlu, Suzan Yalçin, Sıddika Songül Yalçin

    Published 2025-01-01
    “…Targeted interventions and education programs should be implemented to promote optimal complementary feeding practices among mothers in Uganda.…”
    Get full text
    Article
  14. 154

    The Impact of Physiological and Psychological Fatigue on Work Efficiency: A Case Study of Parcel Sorting Work by Miaomiao Li, Zuqin Ma, Rui Yan, Jielin Yin

    Published 2024-09-01
    “…The demanding nature of parcel sorting work, which is characterized by intense and prolonged repetitive tasks, makes individuals particularly vulnerable to the effects of fatigue. Fatigue is a complex condition that encompasses both physiological and psychological exhaustion. …”
    Get full text
    Article
  15. 155

    Experimental analysis on residual ultimate bearing capacity of thin plate with internal explosion dent damage under biaxial compression by Lei AO, Zhizhong SHI, Lei ZHANG, Ziqi DING, Zhiyong PEI, Weiguo WU

    Published 2025-04-01
    “…The use of biaxial compression is highly relevant, as it replicates the complex stress states experienced by ship hulls in actual sea conditions. …”
    Get full text
    Article
  16. 156

    Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing by Mengdi Zhao, Huiyan Chen

    Published 2025-07-01
    “…In contrast, private verification restricts the auditing capability to the data owner, providing better privacy protection but often resulting in higher verification costs and operational complexity due to limited local resources. Moreover, most existing PDP schemes are based on classical number-theoretic assumptions, making them vulnerable to quantum attacks. …”
    Get full text
    Article
  17. 157

    Development and evaluation of a soft pneumatic muscle for elbow joint rehabilitation by Mostafa Orban, Mostafa Orban, Mostafa Orban, Kai Guo, Kai Guo, Caijun Luo, Caijun Luo, Hongbo Yang, Hongbo Yang, Karim Badr, Karim Badr, Mahmoud Elsamanty, Mahmoud Elsamanty

    Published 2024-10-01
    “…Elbow joint rehabilitation presents a formidable challenge, underscored by the joint’s complex biomechanics and high vulnerability to injuries and degenerative conditions. …”
    Get full text
    Article
  18. 158

    New Technological Revolution and Energy Requirements by Sergey Filippov

    Published 2018-12-01
    “…The current structure of the national fuel and energy complex is vulnerable to the large-scale electrification of transport and decarbonization of world energy. …”
    Get full text
    Article
  19. 159

    Recognition, management, and transport of sick cardiac children by Sontakke Sanket

    Published 2025-05-01
    “…Due to the centralization of specialized cardiology, cardiac surgery, and intensive care services in various regions worldwide, critically ill cardiac children frequently require stabilization and safe transport to tertiary centers for further management whether in terms of diagnosis or further intervention. Ensuring optimal stabilization before transport is critical, as these patients have complex circulatory physiology and are particularly vulnerable to physiological disruptions during transport, including acceleration-deceleration forces and ventilation changes. …”
    Get full text
    Article
  20. 160

    Sparse Feature-Weighted Double Laplacian Rank Constraint Non-Negative Matrix Factorization for Image Clustering by Hu Ma, Ziping Ma, Huirong Li, Jingyu Wang

    Published 2024-11-01
    “…Additionally, many NMF variants face challenges when dealing with complex data distributions and are vulnerable to noise and outliers. …”
    Get full text
    Article