-
301
Precision distribution of fire command system based on an air-to-surface laser-guided weapons
Published 2025-06-01“…The experimental results show that the model models the tactical indicators of low-speed targets with a CEP of 2 m, a long-range attack distance of 10 km, and a ground attack of less than 10 m/s.…”
Get full text
Article -
302
The effectiveness of paliperidone palmitate at the stage of stabilizing treatment of schizophrenia in the outpatient department. Clinical observation
Published 2020-01-01“…The article presents a clinical observation when, as a result of errors in receiving supportive therapy, the patient ended up in a hospital with developed attacks of schizophrenia and after long-term treatment was discharged with residual psychotic symptoms, indicating resistance and an increase in the defect. …”
Get full text
Article -
303
A differentially-private mechanism for multi-level data publishing
Published 2015-12-01“…Privacy preserving technology had addressed the problem of privacy leakage during data publishing proc-ess,however,current data publishing technologies mostly focused on publishing privacy preserving data with single level,without considering some scenarios of multi-level users.Therefore,a differentially-private mechanism for multi-level data publishing was proposed.The proposed mechanism employed the Laplace mechanism with different privacy budgets to output results with different privacy protection levels.After the user’s level was determined ac-cording to the charge or privilege of that specific user,the goal that a user with high(low) level can only use the out-put result with low(high) privacy protection level which had low(high) error rate could be achieved.Finally,the evaluation results and security analysis show that our proposed framework can not only prevent from background knowledge attack,but also achieve multi-level data publishing with different error rates effectively .…”
Get full text
Article -
304
A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
Published 2013-01-01“…Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. …”
Get full text
Article -
305
Theistical deontology suggested by Mohammad Baqir al-Sadr
Published 2020-02-01“…Nevertheless, he accepted a destination called the divine paradise to be equal to the deontological criterion and regard defects and errors of practical reason to be compensable through this way. …”
Get full text
Article -
306
A Comprehensive Analysis of the Security of ML Integrated CPS as Autonomous Vehicles
Published 2025-04-01“…The complexity of these systems often results in connected devices undergoing errors, and there is an occurrence of risk at various cyber-attacks. …”
Get full text
Article -
307
Documentation of management processes in information institutions: New challenges and prospects
Published 2024-01-01“…Implementation of modern document management systems enables fast data exchange, reduces the risk of errors and improves customer service, which is the ultimate goal of any management process.…”
Get full text
Article -
308
BISGA: Recalculating the Entire Boolean-Valued Information System from Aggregates Using a Genetic Algorithm
Published 2023-01-01“…BIS may be lost for several reasons including virus attacks, improper entry, and machine errors. A concept was presented that the entire lost BIS can be regenerated from four aggregate sets through supposition. …”
Get full text
Article -
309
Multi-Domain Multi-Level Optical Encryption Transmission Scheme Based on Memristor Rulkov Neuron Chaos
Published 2024-01-01“…The results show that the encryption scheme can effectively resist illegal attacks and improve the security performance of the system.…”
Get full text
Article -
310
Legal Challenges of Marine Insurance Laws in the Use of Unmanned Ships
Published 2025-03-01“…These include remote control centers and the existence of new risks such as cyber-attacks, hazards from design and programming errors, as well as novel hardware and software components. …”
Get full text
Article -
311
A Cluster-Based Secure Synchronization Protocol for Underwater Wireless Sensor Networks
Published 2014-04-01“…This paper presents a CLUster-based Secure Synchronization (CLUSS) protocol that ensures the security of synchronization under harsh underwater environments against various attacks, including Sybil attack, replay attack, message manipulation attack, and delay attack. …”
Get full text
Article -
312
Forecasting of Tropical Storm Wind Speeds Based on Multi-Step Differencing and Artificial Neural Network
Published 2025-02-01“…The tropical storm is a severe wind disaster that frequently attacks coastal structures and infrastructure facilities. …”
Get full text
Article -
313
An AI-Driven Cybersecurity Framework for IoT: Integrating LSTM-Based Anomaly Detection, Reinforcement Learning, and Post-Quantum Encryption
Published 2025-01-01“…The framework integrates four core components: Long Short-Term Memory (LSTM) networks for temporal anomaly detection, homomorphic hashing using SHA-256 with hidden salts for real-time data integrity verification, Q-learning-based reinforcement learning for automated threat response, and lattice-based encryption grounded in the Learning With Errors (LWE) problem to safeguard against quantum-era attacks. …”
Get full text
Article -
314
Experimentally Certified Transmission of a Quantum Message through an Untrusted and Lossy Quantum Channel via Bell’s Theorem
Published 2025-07-01“…In adversarial scenarios, a certification method can be vulnerable to attacks if too much trust is placed on the underlying system. …”
Get full text
Article -
315
From Accuracy to Vulnerability: Quantifying the Impact of Adversarial Perturbations on Healthcare AI Models
Published 2025-04-01“…As AI becomes indispensable in healthcare, its vulnerability to adversarial attacks demands serious attention. Even minimal changes to the input data can mislead Deep Learning (DL) models, leading to critical errors in diagnosis and endangering patient safety. …”
Get full text
Article -
316
INVARIAN AUTOMATIC CONTROL SYSTEM, USING THE INTERMEDIATE-FREQUENCY SIGNALS OF HEAT POWER PARAMETERS
Published 2015-03-01“…This method allow to increase essential system speed in processing of task jump and to reduce operation time of outside external disturbance up to two values of regulated influence, and the usage of invariance principle is based on an additional measuring of the most dangerous perturbation influence and in connection with it the improvement of regulation quality is achieved.In this article the principle of invariance is applied in order to improve greatly external disturbance attack by consumption of over-heated steam. Compensation of disturbance influence on regulated value is achieving by introduction of additional signal on input of correction regulator from output of compensation device, measuring the external disturbance by consumption of over-heated steam.Modeling results of transient processes of cascade system of automatic control (CSAC), on the base of which were realized the unity of these methods, demonstrated the fact that, in processing of external disturbance by consumption of steam, the reduction of maximal dynamic regulation error is six times and cutting of regulation time by 30 % in comparison with CSAC without compensation device of external disturbance. …”
Get full text
Article -
317
Direct Force Control Technology for Longitudinal Trajectory of Receiver Aircraft Based on Incremental Nonlinear Dynamic Inversion and Active Disturbance Rejection Controller
Published 2025-06-01“…Under disturbance conditions, the estimation errors of true airspeed, angle of attack, pitch angle, and pitch angular velocity are less than 0.3 m/s, 0.12°, 0.1°, and 0.2°/s, respectively, demonstrating the high-precision estimation capability of the observer. …”
Get full text
Article -
318
Evaluation of Factors Influencing Assistant Referee Decisions in Determining "Offside" in Football
Published 2025-03-01“…The human factor and referee errors are an inherent part of football. The number of mistakes can be significantly reduced, but it cannot be completely eliminated. …”
Get full text
Article -
319
A Post-Quantum Public-Key Signcryption Scheme over Scalar Integers Based on a Modified LWE Structure
Published 2025-07-01“…The design is inspired by modified learning-with-errors (LWE) assumptions, adapted to scalar settings, making it suitable for post-quantum applications. …”
Get full text
Article -
320
Advantages and disadvantages of using the Internet of Things in accounting
Published 2024-04-01“…Ultimately, devices that are not sufficiently secured can be vulnerable to cyber attacks, which can lead to the leakage of financial and other important data stored by businesses. …”
Get full text
Article