-
341
El género como variable de estudio en las características del juego en voleibol en categoría infantil (Gender as study variable in the game characteristics in volleyball Under-14 c...
Published 2014-07-01“…Specifically, correlated significantly and positively: the serve zone from zone 1, the jump serve, the float serve and serve permits attacking with the male gender; and the serve zone from zone 6, the standing serve, the power serve, serve error, the serve that does not permit attacking and the point serve in the female gender. …”
Get full text
Article -
342
Proposal of a New Isogeny-Based Cryptographic Protocol: Formal Analysis and Comparison
Published 2025-03-01“…The proposed protocol, Isogeny-Based Key Exchange with Error-Correcting Codes (IKEC), offers enhanced security, computational efficiency, and practical applicability, making it a viable alternative to existing schemes like SIDH. …”
Get full text
Article -
343
Lattice-Based CP-ABE Access Control for SDS Constraint with Lazy Assignment of Attributes and Attribute Revocation
Published 2024-01-01“…This paper proposes a revocable CP-ABE scheme on the lattice, based on ring learning with error (R-LWE) problem, to enforce access control constraints on user access to such data objects. …”
Get full text
Article -
344
Pulse Wave Generation Method for PPG by Using Display
Published 2023-01-01“…The results showed that the error between the target heart rate and the heart rate acquired by the smartwatch was within 3 beats per minute (bpm) in many cases when the target heart rate was set to 60–100 bpm. …”
Get full text
Article -
345
Sparse Planar Array Synthesis Using Matrix Enhancement and Matrix Pencil
Published 2013-01-01“…In this paper, MEMP is applied to attack the problem of two-dimensional sparse array synthesis. …”
Get full text
Article -
346
Prevention and Detection Methods for Enhancing Security in an RFID System
Published 2012-08-01“…False acceptance rate (FAR), false rejection rate (FRR), receiver operating characteristic (ROC) curve, and equal error rate (EER) were implemented to justify the robustness of t -test in detecting counterfeit tags. …”
Get full text
Article -
347
Trajectory tracking control of a flexible air-breathing hypersonic vehicle using Lyapunov-based model predictive control
Published 2024-12-01“…Considering the constraints of inputs and angle of attack (AOA), the trajectory tracking control of a flexible air-breathing hypersonic vehicle (FAHV) is investigated. …”
Get full text
Article -
348
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network
Published 2014-01-01“…Internet of Things composed of wireless sensor network faces security threats mainly from Dos attack, replay attack, integrity attack, false routing information attack, and flooding attack. …”
Get full text
Article -
349
GWO-LPWSN: Grey Wolf Optimization Algorithm for Node Localization Problem in Wireless Sensor Networks
Published 2017-01-01“…This algorithm mimics the social behavior of grey wolves whereas it follows the leadership hierarchy and attacking strategy. The rising issue in wireless sensor network (WSN) is localization problem. …”
Get full text
Article -
350
Adaptive Steganography Using Improve Bit-plane Complexity Segmentation
Published 2024-06-01“…One of the primary challenges in Internet data transmission lies in safeguarding data from unauthorized access by potential attackers. The goal of content-adaptive steganography is to conceal data inside the image's intricate texture. …”
Get full text
Article -
351
Improving Wireless Sensor Network Security Using Quantum Key Distribution
Published 2023-10-01“…In the coming days, as attack technologies become more improved, security will have an important role in WSN. …”
Get full text
Article -
352
An Initial Investigation of Adjoint-Based Unstructured Grid Adaptation for Vortical Flow Simulations
Published 2011-01-01“…The basic idea is to construct a new adaptive sensor in a grid adaptation process with the intent to tell where the elements should be smaller or larger by introducing an adjoint formulation to relate the estimated functional error to local residual errors of both the primal and adjoint solutions.…”
Get full text
Article -
353
An engineering method of aerodynamic heating prediction for hypersonic blunt body vehicles
Published 2025-06-01“…The engineering method is validated against experimental data from a spherically blunted cone and an Orbiter Vehicle model, showing good agreement in wall heat flux predictions for small angles of attack, with a relative error of less than 15% in the stagnation and non-expanded downstream regions. …”
Get full text
Article -
354
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
Published 2025-01-01“…The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in dealing with flaws in quality control process of SCM. …”
Get full text
Article -
355
Migraine and stroke: correlation, coexistence, dependence - a modern perspective
Published 2025-02-01“…While microemboli associated with PFO may provoke ischemic events and migraine attacks, the effectiveness of PFO closure in alleviating migraine symptoms has produced varying results. …”
Get full text
Article -
356
Tensor-Based Cybersecurity Analysis of Smart Grids Using IT/OT Convergence
Published 2024-01-01“…The effectiveness of the low-rank modeling using both decompositions is confirmed by demonstrating relatively low reconstruction error. A residual extraction method is also considered to distinguish the normal subspace of tensor dataset from the anomalous dataset resulting from the attacker actions. …”
Get full text
Article -
357
Development of Accurate Long-lead COVID-19 Forecast.
Published 2023-07-01“…Here, we propose strategies to address three major forecast challenges, i.e., error growth, the emergence of new variants, and infection seasonality. …”
Get full text
Article -
358
Estimating pilots’ cognitive load from ocular parameters through simulation and in-flight studies
Published 2019-09-01“…In a second study, we undertook three test flights with a BAES Hawk Trainer aircraft doing air to ground attack training missions and constant G level turn maneuvers up to +5G. …”
Get full text
Article -
359
Machine Learning Prediction of Airfoil Aerodynamic Performance Using Neural Network Ensembles
Published 2025-07-01“…The model is trained on an extensive database of NACA four-digit airfoils, covering angles of attack ranging from −5° to 14° and ten Reynolds numbers increasing in steps of 500,000 from 500,000 up to 5,000,000. …”
Get full text
Article -
360
Hierarchical Event-Triggered Online Charging Management of Time-Varying Network of Electric Vehicles Based on Cooperative Game Theory
Published 2024-04-01“…Although several distributed event-triggered methods have been introduced recently, these methods generally require state estimators to calculate the event-triggered error, the latest states and the threshold which increases the computation cost. …”
Get full text
Article