Showing 301 - 320 results of 416 for search 'error attacks', query time: 0.08s Refine Results
  1. 301

    Precision distribution of fire command system based on an air-to-surface laser-guided weapons by LIANG Jiaqi, LIU Xingyu, LI Shucheng, BAI Jing, ZHANG Jiawei

    Published 2025-06-01
    “…The experimental results show that the model models the tactical indicators of low-speed targets with a CEP of 2 m, a long-range attack distance of 10 km, and a ground attack of less than 10 m/s.…”
    Get full text
    Article
  2. 302

    The effectiveness of paliperidone palmitate at the stage of stabilizing treatment of schizophrenia in the outpatient department. Clinical observation by M. R. Bagautdinov

    Published 2020-01-01
    “…The article presents a clinical observation when, as a result of errors in receiving supportive therapy, the patient ended up in a hospital with developed attacks of schizophrenia and after long-term treatment was discharged with residual psychotic symptoms, indicating resistance and an increase in the defect. …”
    Get full text
    Article
  3. 303

    A differentially-private mechanism for multi-level data publishing by Wen-jing ZHANG, Hui LI

    Published 2015-12-01
    “…Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .…”
    Get full text
    Article
  4. 304

    A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations by Aihab Khan, Syed Afaq Husain

    Published 2013-01-01
    “…Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. …”
    Get full text
    Article
  5. 305

    Theistical deontology suggested by Mohammad Baqir al-Sadr by hasan lahootiyan, Behrouz muhammadimunfared

    Published 2020-02-01
    “…Nevertheless, he accepted a destination called the divine paradise to be equal to the deontological criterion and regard defects and errors of practical reason to be compensable through this way. …”
    Get full text
    Article
  6. 306

    A Comprehensive Analysis of the Security of ML Integrated CPS as Autonomous Vehicles by Kesava reddy, Kumudham R

    Published 2025-04-01
    “…The complexity of these systems often results in connected devices undergoing errors, and there is an occurrence of risk at various cyber-attacks. …”
    Get full text
    Article
  7. 307

    Documentation of management processes in information institutions: New challenges and prospects by Berezanska Iryna, Drok Pavlo, Pluzhnyk Oksana

    Published 2024-01-01
    “…Implementation of modern document management systems enables fast data exchange, reduces the risk of errors and improves customer service, which is the ultimate goal of any management process.…”
    Get full text
    Article
  8. 308

    BISGA: Recalculating the Entire Boolean-Valued Information System from Aggregates Using a Genetic Algorithm by Salman Ali, Muhammad Sadiq Khan, Habib Shah, Harish Garg, Abdullah Alsheddy

    Published 2023-01-01
    “…BIS may be lost for several reasons including virus attacks, improper entry, and machine errors. A concept was presented that the entire lost BIS can be regenerated from four aggregate sets through supposition. …”
    Get full text
    Article
  9. 309

    Multi-Domain Multi-Level Optical Encryption Transmission Scheme Based on Memristor Rulkov Neuron Chaos by Zhiruo Guo, Bo Liu, Jianxin Ren, Qing Zhong, Yaya Mao, Xiangyu Wu, Wenchao Xia, Xiumin Song, Shuaidong Chen, Ying Li, Feng Wang, Yongfeng Wu

    Published 2024-01-01
    “…The results show that the encryption scheme can effectively resist illegal attacks and improve the security performance of the system.…”
    Get full text
    Article
  10. 310

    Legal Challenges of Marine Insurance Laws in the Use of Unmanned Ships by Mahsa Bahadoran- Baghbaderani, Masoud Shirani, Reza Soltani

    Published 2025-03-01
    “…These include remote control centers and the existence of new risks such as cyber-attacks, hazards from design and programming errors, as well as novel hardware and software components. …”
    Get full text
    Article
  11. 311

    A Cluster-Based Secure Synchronization Protocol for Underwater Wireless Sensor Networks by Ming Xu, Guangzhong Liu, Daqi Zhu, Huafeng Wu

    Published 2014-04-01
    “…This paper presents a CLUster-based Secure Synchronization (CLUSS) protocol that ensures the security of synchronization under harsh underwater environments against various attacks, including Sybil attack, replay attack, message manipulation attack, and delay attack. …”
    Get full text
    Article
  12. 312

    Forecasting of Tropical Storm Wind Speeds Based on Multi-Step Differencing and Artificial Neural Network by Tianyou Tao, Peng Deng, Fan Xu, Yichao Xu

    Published 2025-02-01
    “…The tropical storm is a severe wind disaster that frequently attacks coastal structures and infrastructure facilities. …”
    Get full text
    Article
  13. 313

    An AI-Driven Cybersecurity Framework for IoT: Integrating LSTM-Based Anomaly Detection, Reinforcement Learning, and Post-Quantum Encryption by Mozamel M. Saeed

    Published 2025-01-01
    “…The framework integrates four core components: Long Short-Term Memory (LSTM) networks for temporal anomaly detection, homomorphic hashing using SHA-256 with hidden salts for real-time data integrity verification, Q-learning-based reinforcement learning for automated threat response, and lattice-based encryption grounded in the Learning With Errors (LWE) problem to safeguard against quantum-era attacks. …”
    Get full text
    Article
  14. 314

    Experimentally Certified Transmission of a Quantum Message through an Untrusted and Lossy Quantum Channel via Bell’s Theorem by Simon Neves, Laura dos Santos Martins, Verena Yacoub, Pascal Lefebvre, Ivan Šupić, Damian Markham, Eleni Diamanti

    Published 2025-07-01
    “…In adversarial scenarios, a certification method can be vulnerable to attacks if too much trust is placed on the underlying system. …”
    Get full text
    Article
  15. 315

    From Accuracy to Vulnerability: Quantifying the Impact of Adversarial Perturbations on Healthcare AI Models by Sarfraz Brohi, Qurat-ul-ain Mastoi

    Published 2025-04-01
    “…As AI becomes indispensable in healthcare, its vulnerability to adversarial attacks demands serious attention. Even minimal changes to the input data can mislead Deep Learning (DL) models, leading to critical errors in diagnosis and endangering patient safety. …”
    Get full text
    Article
  16. 316

    INVARIAN AUTOMATIC CONTROL SYSTEM, USING THE INTERMEDIATE-FREQUENCY SIGNALS OF HEAT POWER PARAMETERS by G. T. Kulakov, A. N. Kukhorenko, I. M. Golinko

    Published 2015-03-01
    “…This method allow to increase essential system speed in processing of task jump and to reduce operation time of outside external disturbance up to two  values of regulated influence, and the usage of invariance principle is based on an additional measuring of the most dangerous perturbation influence and in connection with it the improvement of regulation quality is achieved.In this article the principle of invariance is applied in order to improve greatly external disturbance attack by consumption of over-heated steam. Compensation of disturbance influence on regulated value is achieving by introduction of additional signal on input of correction regulator from output of compensation device, measuring the external disturbance by consumption of over-heated steam.Modeling results of transient processes of cascade system of automatic control (CSAC), on the base of which were realized the unity of these methods, demonstrated the fact that, in processing of external disturbance by consumption of steam, the reduction of maximal dynamic regulation error is six times and cutting of regulation time by 30 % in comparison with CSAC without compensation device of external disturbance. …”
    Get full text
    Article
  17. 317

    Direct Force Control Technology for Longitudinal Trajectory of Receiver Aircraft Based on Incremental Nonlinear Dynamic Inversion and Active Disturbance Rejection Controller by Xin Bao, Yan Li, Zhong Wang

    Published 2025-06-01
    “…Under disturbance conditions, the estimation errors of true airspeed, angle of attack, pitch angle, and pitch angular velocity are less than 0.3 m/s, 0.12°, 0.1°, and 0.2°/s, respectively, demonstrating the high-precision estimation capability of the observer. …”
    Get full text
    Article
  18. 318

    Evaluation of Factors Influencing Assistant Referee Decisions in Determining "Offside" in Football by Anatoly Abdula, Stanislav Marulin

    Published 2025-03-01
    “…The human factor and referee errors are an inherent part of football. The number of mistakes can be significantly reduced, but it cannot be completely eliminated. …”
    Get full text
    Article
  19. 319

    A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure by Mostefa Kara, Mohammad Hammoudeh, Abdullah Alamri, Sultan Alamri

    Published 2025-07-01
    “…The design is inspired by modified learning-with-errors (LWE) assumptions, adapted to scalar settings, making it suitable for post-quantum applications. …”
    Get full text
    Article
  20. 320

    Advantages and disadvantages of using the Internet of Things in accounting by M.H.

    Published 2024-04-01
    “…Ultimately, devices that are not sufficiently secured can be vulnerable to cyber attacks, which can lead to the leakage of financial and other important data stored by businesses. …”
    Get full text
    Article