Showing 341 - 360 results of 416 for search 'error attacks', query time: 0.08s Refine Results
  1. 341

    El género como variable de estudio en las características del juego en voleibol en categoría infantil (Gender as study variable in the game characteristics in volleyball Under-14 c... by Carmen Fernández Echeverría, Fernando Claver Rabaz, Jara González-Silva, Luis García González, M. Perla Moreno Arroyo

    Published 2014-07-01
    “…Specifically, correlated significantly and positively: the serve zone from zone 1, the jump serve, the float serve and serve permits attacking with the male gender; and the serve zone from zone 6, the standing serve, the power serve, serve error, the serve that does not permit attacking and the point serve in the female gender. …”
    Get full text
    Article
  2. 342

    Proposal of a New Isogeny-Based Cryptographic Protocol: Formal Analysis and Comparison by mohammed EL BARAKA, Siham Ezzouak

    Published 2025-03-01
    “…The proposed protocol‎, ‎Isogeny-Based Key Exchange with Error-Correcting Codes (IKEC)‎, ‎offers enhanced security‎, ‎computational efficiency‎, ‎and practical applicability‎, ‎making it a viable alternative to existing schemes like SIDH‎. ‎…”
    Get full text
    Article
  3. 343

    Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation by Ting Guo, Abdugeni Abduxkur, Nurmamat Helil

    Published 2024-01-01
    “…This paper proposes a revocable CP-ABE scheme on the lattice, based on ring learning with error (R-LWE) problem, to enforce access control constraints on user access to such data objects. …”
    Get full text
    Article
  4. 344

    Pulse Wave Generation Method for PPG by Using Display by Atsuhiro Fujii, Kazuya Murao, Naoji Matsuhisa

    Published 2023-01-01
    “…The results showed that the error between the target heart rate and the heart rate acquired by the smartwatch was within 3 beats per minute (bpm) in many cases when the target heart rate was set to 60–100 bpm. …”
    Get full text
    Article
  5. 345

    Sparse Planar Array Synthesis Using Matrix Enhancement and Matrix Pencil by Mei-yan Zheng, Ke-song Chen, Hong-gang Wu, Xian-pan Liu

    Published 2013-01-01
    “…In this paper, MEMP is applied to attack the problem of two-dimensional sparse array synthesis. …”
    Get full text
    Article
  6. 346

    Prevention and Detection Methods for Enhancing Security in an RFID System by Jing Huey Khor, Widad Ismail, Mohammad Ghulam Rahman

    Published 2012-08-01
    “…False acceptance rate (FAR), false rejection rate (FRR), receiver operating characteristic (ROC) curve, and equal error rate (EER) were implemented to justify the robustness of t -test in detecting counterfeit tags. …”
    Get full text
    Article
  7. 347

    Trajectory tracking control of a flexible air-breathing hypersonic vehicle using Lyapunov-based model predictive control by Haiyan Gao, Zhichao Chen, Weiqiang Tang

    Published 2024-12-01
    “…Considering the constraints of inputs and angle of attack (AOA), the trajectory tracking control of a flexible air-breathing hypersonic vehicle (FAHV) is investigated. …”
    Get full text
    Article
  8. 348

    A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network by Wenchao Li, Ping Yi, Yue Wu, Li Pan, Jianhua Li

    Published 2014-01-01
    “…Internet of Things composed of wireless sensor network faces security threats mainly from Dos attack, replay attack, integrity attack, false routing information attack, and flooding attack. …”
    Get full text
    Article
  9. 349

    GWO-LPWSN: Grey Wolf Optimization Algorithm for Node Localization Problem in Wireless Sensor Networks by R. Rajakumar, J. Amudhavel, P. Dhavachelvan, T. Vengattaraman

    Published 2017-01-01
    “…This algorithm mimics the social behavior of grey wolves whereas it follows the leadership hierarchy and attacking strategy. The rising issue in wireless sensor network (WSN) is localization problem. …”
    Get full text
    Article
  10. 350

    Adaptive Steganography Using Improve Bit-plane Complexity Segmentation by Noor Gassan Abdullah, Shahd Abdulrhman Hasso

    Published 2024-06-01
    “…One of the primary challenges in Internet data transmission lies in safeguarding data from unauthorized access by potential attackers. The goal of content-adaptive steganography is to conceal data inside the image's intricate texture. …”
    Get full text
    Article
  11. 351

    Improving Wireless Sensor Network Security Using Quantum Key Distribution by Laith H. Alhasnawy, Ameer K. AL-Mashanji

    Published 2023-10-01
    “…In the coming days, as attack technologies become more improved, security will have an important role in WSN. …”
    Get full text
    Article
  12. 352

    An Initial Investigation of Adjoint-Based Unstructured Grid Adaptation for Vortical Flow Simulations by Li Li

    Published 2011-01-01
    “…The basic idea is to construct a new adaptive sensor in a grid adaptation process with the intent to tell where the elements should be smaller or larger by introducing an adjoint formulation to relate the estimated functional error to local residual errors of both the primal and adjoint solutions.…”
    Get full text
    Article
  13. 353

    An engineering method of aerodynamic heating prediction for hypersonic blunt body vehicles by Jimin Chen, Guoyi He

    Published 2025-06-01
    “…The engineering method is validated against experimental data from a spherically blunted cone and an Orbiter Vehicle model, showing good agreement in wall heat flux predictions for small angles of attack, with a relative error of less than 15% in the stagnation and non-expanded downstream regions. …”
    Get full text
    Article
  14. 354

    SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT by Mohammad Iqbal Saryuddin Assaqty, Ying Gao, Abeer D. Algarni, Siraj Khan, Mohuya Chakraborty, Hafied Nur Siddiqi, Sadique Ahmad

    Published 2025-01-01
    “…The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in dealing with flaws in quality control process of SCM. …”
    Get full text
    Article
  15. 355

    Migraine and stroke: correlation, coexistence, dependence - a modern perspective by Michał Borończyk, Anna Zduńska, Julia Węgrzynek-Gallina, Olga Grodzka, Anetta Lasek-Bal, Izabela Domitrz

    Published 2025-02-01
    “…While microemboli associated with PFO may provoke ischemic events and migraine attacks, the effectiveness of PFO closure in alleviating migraine symptoms has produced varying results. …”
    Get full text
    Article
  16. 356

    Tensor-Based Cybersecurity Analysis of Smart Grids Using IT/OT Convergence by Danial Jafarigiv, Keyhan Sheshyekani, Marthe Kassouf

    Published 2024-01-01
    “…The effectiveness of the low-rank modeling using both decompositions is confirmed by demonstrating relatively low reconstruction error. A residual extraction method is also considered to distinguish the normal subspace of tensor dataset from the anomalous dataset resulting from the attacker actions. …”
    Get full text
    Article
  17. 357

    Development of Accurate Long-lead COVID-19 Forecast. by Wan Yang, Jeffrey Shaman

    Published 2023-07-01
    “…Here, we propose strategies to address three major forecast challenges, i.e., error growth, the emergence of new variants, and infection seasonality. …”
    Get full text
    Article
  18. 358

    Estimating pilots’ cognitive load from ocular parameters through simulation and in-flight studies by Mohan Dilli Babu, D. V. JeevithaShree, Gowdham Prabhakar, Kamal Preet Singh Saluja, Abhay Pashilkar, Pradipta Biswas

    Published 2019-09-01
    “…In a second study, we undertook three test flights with a BAES Hawk Trainer aircraft doing air to ground attack training missions and constant G level turn maneuvers up to +5G. …”
    Get full text
    Article
  19. 359

    Machine Learning Prediction of Airfoil Aerodynamic Performance Using Neural Network Ensembles by Diana-Andreea Sterpu, Daniel Măriuța, Grigore Cican, Ciprian-Marius Larco, Lucian-Teodor Grigorie

    Published 2025-07-01
    “…The model is trained on an extensive database of NACA four-digit airfoils, covering angles of attack ranging from −5° to 14° and ten Reynolds numbers increasing in steps of 500,000 from 500,000 up to 5,000,000. …”
    Get full text
    Article
  20. 360

    Hierarchical Event-Triggered Online Charging Management of Time-Varying Network of Electric Vehicles Based on Cooperative Game Theory by Maryam Amirabad Farahani, Mohammad Haeri

    Published 2024-04-01
    “…Although several distributed event-triggered methods have been introduced recently, these methods generally require state estimators to calculate the event-triggered error, the latest states and the threshold which increases the computation cost. …”
    Get full text
    Article