Showing 681 - 700 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 681

    Identifikasi Koi Herpesvirus pada Dosis yang Berbeda dengan Metode Imunohistokimia Streptavidin Biotin pada Ikan Nila (Oreochromis niloticus) <br><i>[Identification of Koi Herpes... by Hari Suprapto, Faricha Risma Nurani, Suwarno Suwarno

    Published 2014-11-01
    “…KHV infection triggered by a drop in ambient temperature so it is referred to as a virus that attacks when cold (a cold virus). The disease attacks the temperature range of 18-28 ° C and can cause death. …”
    Get full text
    Article
  2. 682
  3. 683

    Prediction of Anoxic Tonic Seizures due to Asthma in Children Using Machine Learning Methods by Kiomars Motarjem, Meisam Moghimbeygi

    Published 2024-11-01
    “…The objective of this study is to investigate the factors influencing asthma attacks in children under six years old using machine learning (ML) methods. …”
    Get full text
    Article
  4. 684

    Hypertension and Headache: the Effect of Antihypertensive Drugs by V. A. Parfenov, T. M. Ostroumova, O. D. Ostroumova

    Published 2019-07-01
    Subjects: “…the frequency of headaches during the treatment with arb (candesartan) is comparable to that in the placebo group. some antihypertensive drugs are used to prevent migraine attacks.…”
    Get full text
    Article
  5. 685

    Respon Beberapa Varietas Padi Terhadap Serangan Fusarium fujikuroi Penyebab Penyakit Bakanae by Darnetty Darnetty, Eri Sulyanti

    Published 2018-03-01
    “…The response of rice varieties to  F. fujikuroi attack was different with characterized by different levels of infection rates. …”
    Get full text
    Article
  6. 686

    THE INFLUENCE OF FEATURES OF VORTEX FLOW ON AERODYNAMIC CHARACTERISTICS OF THE SUPERSONIC MANEUVERABLE AIRCRAFT MODEL by K. A. Osipov

    Published 2019-02-01
    “…Moreover, its effect can be radically different at different angles of attack (a = 25-30° and 35°). …”
    Get full text
    Article
  7. 687

    FATIGUE LIFE ANALYSIS OF WING WITH HIGH ASPECT RATIO BASED ON BIDIRECTIONAL FLUID-STRUCTURE COUPLING by LI Jin Yang, WANG JunLi, LEI Shuai, FENG YuRu, DU TianWei

    Published 2022-01-01
    “…Based on the Miner linear cumulative damage theory and the finite element analysis method, the fatigue life of the wing with high aspect ratio at different angles of attack was calculated.Firstly, based on the N-S equation, the displacement, stress and strain of the wing structure in cruise state are solved by using the bidirectional fluid-structure coupling method.Secondly, the fatigue life of the wing structure is analyzed, and the fatigue life of the wing structure at the weak position and different angles of attack is obtained.The results show that the fatigue weakness of the wing with high aspect ratio tends to occur at the leading edge and the wing root, and the life of the leading edge increases from the wing tip to the wing root along the wing span.The life of the wing is closely related to the change of Angle of attack and airfoil parameters, and there is generally a maximum life Angle of attack under a given flight condition.…”
    Get full text
    Article
  8. 688

    Airflow direction influence on aerodynamic forces acting on a vehicle by А. O. Shimanovsky, V. U. Dzemyanchuk

    Published 2025-06-01
    “…The paper considers the airflow around a railway car at different directions of its speed. The main purpose of the study is to determine the values of the longitudinal and transverse forces acting on the car for the entire possible range of changes in the angle of attack of the airflow.Materials and methods. …”
    Get full text
    Article
  9. 689

    Multi-task adversarial attribution method based on hierarchical structure by SUN Xu, ZHANG Wenqiong, LONG Xianzhong, LI Yun

    Published 2025-02-01
    “…To improve the accuracy of adversarial attribution and meet the requirements for different attribution granularities, attack algorithms and victim models were layered, and the dependencies between different levels were utilized. …”
    Get full text
    Article
  10. 690

    Assessment of Mechanical Properties and Damage of High Performance Concrete Subjected to Magnesium Sulfate Environment by Sheng Cang, Xiaoli Ge, Yanlin Bao

    Published 2017-01-01
    “…Sulfate attack is one of the most important problems affecting concrete structures, especially magnesium sulfate attack. …”
    Get full text
    Article
  11. 691

    Adversarial example defense algorithm for MNIST based on image reconstruction by Zhongyuan QIN, Zhaoxiang HE, Tao LI, Liquan CHEN

    Published 2022-02-01
    “…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&amp;W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
    Get full text
    Article
  12. 692

    Cryptographic secrecy of steganographic matrix encoding by Jia-yong CHEN, Jiu-fen LIU, Yue-fei ZHU, Wei-ming ZHANG

    Published 2012-06-01
    “…Based on an information theory model,the cryptographic security of matrix encoding,which can be applied in steganographic codes or wet paper codes,under different attack conditions was studied.The cryptographic security about matrix encoding under the condition of known-cover attack with key equivocation,message equivocation and unicity distance of stego-key was presented.The result that n groups of differential equations could sufficiently recover the share key of matrix encoding under the condition of chosen-stego attack was pointed out.…”
    Get full text
    Article
  13. 693

    Security, usability, and biometric authentication scheme for electronic voting using multiple keys by Masood Ahmad, Ateeq Ur Rehman, Nighat Ayub, MD Alshehri, Muazzam A Khan, Abdul Hameed, Halil Yetgin

    Published 2020-07-01
    “…We examine the authentication of electronic voting authentication scheme on numerous attack models. The measurement demonstrates that electronic voting authentication scheme is very operative in protecting against numerous elegant attacks such as wormhole attack, Sybil attack, and HELLO Flood attack. …”
    Get full text
    Article
  14. 694

    Estimation of wind deflection of high-speed railway catenary based on nonlinear finite element method by CHU Wenping

    Published 2023-07-01
    “…The wind deflection of the contact wire under the static wind load of different wind speeds and different initial wind attack angles was obtained by applying wind loads. …”
    Get full text
    Article
  15. 695

    July 22nd a window of opportunity for police reform? by Paul Larsson

    Published 2022-12-01
    “…A reform that had been in the cupboard  for more than a decade since the previous reform of 2000 and was simply dusted off and presented as a neat and fresh general solution to many different problems facing the police. The article argues that the terror attack on July 22nd and the subsequent July 22nd Report (The Gjørv Report, NOU 2012:14) presented “a window of opportunity”or police management to make changes not only in the organization of the police, but also in regard to basic ideals of policing. …”
    Get full text
    Article
  16. 696

    Analysis of Offensive Efficiency and Goal Scoring in the Stanley Cup Finals 2023 and 2024 by Sami Luimula

    Published 2025-07-01
    “…The data consisted of (n=) 1477 shots, (n=) 79 goals, and (n=) 3619 even-strength attacks. Results: Teams had (n=) 181 even-strength attacks per game. …”
    Get full text
    Article
  17. 697

    Lightweight authentication for IoT devices (LAID) in sustainable smart cities by Aqeel Khalique, Farheen Siddiqui, Mohd Abdul Ahad, Imran Hussain

    Published 2025-07-01
    “…We perform a formal security analysis of the proposed algorithm using AVISPA tool and informal semantic analysis to demonstrate that our algorithm is secure against different types of attacks including MITM attack, insider attack, replay attack smart device capture attack and others. …”
    Get full text
    Article
  18. 698

    Dynamic Analysis of the Effectiveness of Emergency Collaboration Networks for Public Health Emergencies from a Systems Thinking Perspective by Jun Xu, Xiao Li, Xiulai Wang

    Published 2024-11-01
    “…A new method for identifying key organization nodes and different network attack strategies is proposed, assessing network effectiveness from two dimensions: efficiency and resilience. …”
    Get full text
    Article
  19. 699

    Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment by Sikha S. Bagui, Germano Correa Silva De Carvalho, Asmi Mishra, Dustin Mink, Subhash C. Bagui, Stephanie Eager

    Published 2025-06-01
    “…The labeled data, however, was used in the evaluation phase, to determine the attack clusters post-clustering. In order to identify APTs as well as zero-day attack clusters, three different labeling heuristics were evaluated to determine the attack clusters. …”
    Get full text
    Article
  20. 700

    Central auditory and cognitive functions in patients suffering from migraine: case–control study by Weaam Noaman M. Alhawy, Mohamed S. Bakr, Amira Mohammad Eloseily, Shady Safwat Hassan, Maha Abdelgaber A. Aly

    Published 2025-05-01
    “…Abstract Purpose Assess the effect of migraine on different central auditory and cognitive abilities, compare the findings in migraine with aura versus without aura, and during the headache phase of the attack versus interictally. …”
    Get full text
    Article