-
521
Difference analysis of hypertension risk factors of residents aged 40 and above in Zhongshan
Published 2025-07-01“…Objective To analyze the risk factors for hypertension and the differences across gender and age groups among residents aged 40 years and older in Zhongshan City, to provide evidence for regional hypertension prevention and control policies.Methods Data were obtained from the National Stroke High-Risk Population Screening and Intervention Project. …”
Get full text
Article -
522
Effects of facades positioned at different angles on building thermal performance and flow behaviors
Published 2025-02-01“…Using 2D numerical analysis, twenty-four different facade and building model combinations were simulated. …”
Get full text
Article -
523
A New Topology of Three-Phase Four-Wire UPQC with a Simplified Control Algorithm
Published 2024-02-01Get full text
Article -
524
Concentric Circular Antenna Array Synthesis Using Biogeography Based Optimization
Published 2024-02-01Get full text
Article -
525
Illumination Invariant Face Recognition using SQI and Weighted LBP Histogram
Published 2024-02-01Get full text
Article -
526
Network security threat warning method based on qualitative differential game
Published 2018-08-01“…Most current network security research based on game theory adopts the static game or multi-stage dynamic game model,which does not accord with the real-time change and continuity of the actual network attack-defense process.To make security threats warning more consistent with the attack-defense process,the threat propagation process was analyzed referring to the epidemic model.Then the network attack-defense game model was constructed based on the qualitative differential game theory,by which the evolution of the network security state could be predicted.Based on the model,the qualitative differential game solution method was designed to construct the attack-defense barrier and divide the capture area.Furthermore,the threat severity in different security states were evaluated by introducing multidimensional Euclidean distance.By designing the warning algorithm,the dynamic warning of the network security threat was realized,which had better accuracy and timeliness.Finally,simulation results verify the effectiveness of the proposed algorithm and model.…”
Get full text
Article -
527
Survey on Low Energy Adaptive Clustering Hierarchical Protocol
Published 2022-09-01Get full text
Article -
528
Improving the Routing Security in Wireless Sensor Networks using Neutrosophic Set and Machine Learning Models
Published 2025-07-01“…Numerous methods have been put forth to identify and safeguard routing data because Wireless Sensor Networks (WSNs) are susceptible to attacks during data transfer. To create an artificial intelligence-based attack detection system for WSNs, we provide a unique stochastic predictive machine learning technique in this research that is intended to identify unreliable events and untrustworthy routing properties. …”
Get full text
Article -
529
Cybersecurity Governance in Large-scale Infrastructures
Published 2025-03-01“…However, this opens new opportunities for malicious actors to launch different attacks that may have a destructive impact on the important infrastructures in a city. …”
Get full text
Article -
530
-
531
Cooperative spectrum sensing scheme based on crowd trust and decision-making mechanism
Published 2014-03-01“…A distributed consensus-based scheme by simulating the crowd trust and decision-making mechanism was proposed.This scheme firstly predicts the dynamic trust value among sensing users by the previous cooperative process,and then generates the user's relative trust value,and makes the data interaction among the users by using the combination of relative trust value and decision-making mechanism.All users' state can reach a consensus as the credible and iterative data interaction.All users get the final results by the determinant algorithm.This new spectrum sensing scheme utilizes the imbalance of each users' sensing ability in the real environment.Each secondary user can maintain cooperation with others only through the local information exchange with the neighbors.It is quite different from traditional spectrum sensing scheme,such as OR-rule,1-out-of-N rule and ordinary iterative method.Three SSDF attacks were analysed,on the basis of the corresponding anti-attack policy was proposed.Theoretical analysis and simulation results show that the new scheme is better than the existing cooperative spectrum sensing algorithm in accuracy and security.New scheme not only can improve the accuracy of spectrum sensing but also has the strong anti-attack capability.…”
Get full text
Article -
532
-
533
Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling Concepts
Published 2024-01-01Get full text
Article -
534
Distribution and virulence of Orobanche cumana Wallr. in sunflower weed communities of northeastern Croatia
Published 2025-06-01“…Although, it was observed the difference between the morphometric characteristics of broomrape in the investigated area (Baranja, Syrmia, and Slavonia), the most concerning fact is a trend of increasing attack rate from 2017 to 2021, recorded in the whole region. …”
Get full text
Article -
535
Applications of BESS in Electrical Distribution Network With Cascading Failures Study: A Review
Published 2024-01-01“…After a thorough literature survey of the existing methods utilized for placement, sitting, costing, and modelling techniques, the paper concludes by providing a framework to enhance the grid resiliency against such power quality issues by improving the quality and reducing the minimum disruption area in case of any FDI attack. The proposed framework differs from the existing methodologies as it provides adaptive ancillary services and dynamic BESS response to address the operational and security challenges, based on this framework EV load penetration is estimated. …”
Get full text
Article -
536
Enhancing the Strength and Durability Behaviour of Concrete Produced with Brown-Loamy Kaolin Clay Polymer
Published 2024-06-01“…It has been established that clays geographical location presents differences in their optimum calcination temperatures and cement replacement levels. …”
Get full text
Article -
537
-
538
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
539
Research on the invulnerability of regional network based on topology analysis
Published 2021-11-01“…To measure the overall impact of different attacks a network region may encounter, an evaluation algorithm can be used to capture the difference in invulnerability of regional network topologies.Specifically, the vulnerability of regional network and that of connection topology between regions both internally and externally was analyzed.To find predictions between regions as supplemental topology data and create the Internet topology, data would be measured in various ways and verified.Using stratified probability sampling, multiple damage simulations could predict the worst-case scenarios in real conditions.Damage was simulated multiple times based on stratified probability sampling to approximate the damage situation of the area under real conditions.A significance tester was realized to measure the impact of damage from the overall level and special weak points respectively, discover the difference of the damage between the areas, and calculate the regional invulnerability ranking.Finally, the ranking and clustering results of forty-eight regions were given.…”
Get full text
Article -
540
Collective escape waves provide a generic defence against different avian predators
Published 2025-03-01“…Post-attack, all bird species triggered similarly high numbers of waves while species differed in the number and the interval between the waves they triggered pre-attack. …”
Get full text
Article