Showing 361 - 380 results of 416 for search 'error attacks', query time: 0.09s Refine Results
  1. 361

    Inter-player Variability Within the Same Positional Status in High-level Men's Volleyball by João Bernardo Martins, José Afonso, Ademilson Mendes, Letícia Santos, Isabel Mesquita

    Published 2022-09-01
    “…Results: (a) in side-out under non-ideal setting conditions, OHNs preferred the strong attack while OHAs alternated between the strong attack and the tip; (b) after a prior action, OHNs attacked via exploration of the block while OHAs preferred the tip; (c) after consecutive errors, OHNs play more in the opponent’s error; (d) after a previous defense action, OHNs preferred the strong attack and exploration of the block while OHAs preferred the strong attack; (e) in transition, OHNs were solicited under non-ideal setting conditions while OHAs were solicited in ideal and non-ideal conditions. …”
    Get full text
    Article
  2. 362

    Static detection method for multi-level network source code vulnerabilities based on knowledge graph technology by Peng Xiao, Lina Zhang, Ying Yan, Zhenhong Zhang

    Published 2025-06-01
    “…The identified named entities are taken as the basic nodes in the knowledge graph to build the multi-level network source code vulnerability knowledge graph, calculate the vulnerability attack error and attack loss, and quantitatively evaluate the accuracy of detection and the potential harm of vulnerabilities. …”
    Get full text
    Article
  3. 363

    Toward Authentication of Videos: Integer Transform Based Motion Vector Watermarking by Rafi Ullah, Sultan Daud Khan, Mohib Ullah, Fadi Al-Machot, Habib Ullah

    Published 2022-01-01
    “…The proposed technique can concisely determine the attacked regions. The results validate the performance of the proposed approach in terms of quality metrics like peak signal-to-noise ratio (PSNR), structural similarity index (SSIM), normalized coefficients (NC) and bit error rate (BER).…”
    Get full text
    Article
  4. 364

    Machine Learning Models for the Prediction of Wind Loads on Containerships by Nastia Degiuli, Carlo Giorgio Grlj, Ivana Martić, Sandi Baressi Šegota, Nikola Anđelić, Darin Majnarić

    Published 2025-02-01
    “…Numerical simulations were conducted for two containerships with various container configurations at angles of attack ranging from 0° to 180°. The models showed satisfactory performance on an evaluation set, with high coefficients of determination. …”
    Get full text
    Article
  5. 365

    Automated Event Log Analysis With Causal Dependency Graphs for Impact Assessment of Business Processes by Melina Raptaki, George Stergiopoulos, Dimitris Gritzalis

    Published 2024-01-01
    “…Traditional BIAs are manual, relying on consultants to interview employees, which can be inefficient and error-prone. Process mining, an established field in business management, offers automated techniques to map business processes via log analysis. …”
    Get full text
    Article
  6. 366

    Design and Analysis of Physical Layer Security Based on Ill-Posed Theory for Optical OFDM-Based VLC System Over Real-Valued Visible Light Channel by Huaiyin Lu, Lin Zhang, Wenjun Chen, Zhiqiang Wu

    Published 2016-01-01
    “…Meanwhile, we combine the CDSS scheme with the preequalization module to further improve the bit error rate (BER) performance for legitimate users. …”
    Get full text
    Article
  7. 367

    Wake development behind paired wings with tip and root trailing vortices: consequences for animal flight force estimates. by Jan T Horstmann, Per Henningsson, Adrian L R Thomas, Richard J Bomphrey

    Published 2014-01-01
    “…Wake deformation was most severe behind wings with lower aspect ratios and when the distance between the wings was small, suggesting that animals that match this description constitute high-risk groups in terms of measurement error. Our results, therefore, have significant implications for experimental design where wake measurements are used to estimate forces generated in animal flight. …”
    Get full text
    Article
  8. 368

    Theoretical insights on potential-dependent oxidation behaviors and antioxidant strategies of MXenes by Yumiao Tian, Pengfei Hou, Huiwen Zhang, Yu Xie, Gang Chen, Quan Li, Fei Du, Aleksandra Vojvodic, Jianzhong Wu, Xing Meng

    Published 2024-11-01
    “…This work contributes to a fundamental understanding MXene stability at the atomic level, and promotes the transition in materials discovery from trial-and-error synthesis to rational design.…”
    Get full text
    Article
  9. 369

    An Emergency Monitoring System for Power Cable Tunnels Based on Mobile Wireless Sensor Network by Xinqian XU, Lai XU, Jie CHEN, Yang LIU, Chaopeng ZHANG, Jiahong HE, Bingtuan GAO

    Published 2020-01-01
    “…To meet the environmental monitoring requirements of power cable tunnels for emergency cases such as communication network being missed, broken-down, or attacked, a low-cost mobile wireless senor network monitoring system was developed based on WiFi and ultra-wide band (UWB) communication. …”
    Get full text
    Article
  10. 370

    Exploiting Optical Chaos With Time-Delay Signature Suppression for Long-Distance Secure Communication by Yu-Zhu Liu, Yi-Yuan Xie, Yi-Chen Ye, Jing-Ping Zhang, Shu-Jian Wang, Yong Liu, Gao-Feng Pan, Ji-Liang Zhang

    Published 2017-01-01
    “…The time-delay (TD) signature of the chaotic signal is an essential factor for eavedroppers and attackers to reconstruct the secure communication system. …”
    Get full text
    Article
  11. 371

    Performance assessment in elite table tennis matches using the enhanced first offensive shot model by Ruizhi Liu, Frederic Rothe, Martin Lames

    Published 2025-06-01
    “…Thirdly, male players outperform female players in both initial and subsequent attack. These findings offer practical insights for players and coaches, suggesting that training should emphasise the initial-offensive phase and focus on reducing errors during transitions, particularly for low-ranked players. …”
    Get full text
    Article
  12. 372

    Model-based hierarchal control framework for frequency and voltage stability in islanded microgrids with low inertia by Girmaw Teshager Bitew, Teketay Mulu Beza, Muhammad Shahzad

    Published 2025-06-01
    “…Future research will focus on hardware-in-the-loop verification and cyber-attack-resilience integration.…”
    Get full text
    Article
  13. 373

    Adaptive Fast Smooth Second-Order Sliding Mode Fault-Tolerant Control for Hypersonic Vehicles by Lijia Cao, Lei Liu, Pengfei Ji, Chuandong Guo

    Published 2024-11-01
    “…The root mean square errors for the angle of attack, sideslip angle, and roll angle are reduced by 65.11%, 86.71%, and 45.51%, respectively, while the standard deviation is reduced by 81.78%, 86.80%, and 45.51%, demonstrating that the proposed controller has faster convergence, higher control accuracy, and smoother output than the terminal sliding mode controller.…”
    Get full text
    Article
  14. 374

    Automatic plant disease detection using computationally efficient convolutional neural network by Muhammad Rizwan, Samina Bibi, Sana Ul Haq, Muhammad Asif, Tariqullah Jan, Mohammad Haseeb Zafar

    Published 2024-12-01
    “…Abstract Agricultural plants are the fundamental source of nutrients worldwide. The attack of diseases on these plants leads to food scarcity and results in a catastrophic situation. …”
    Get full text
    Article
  15. 375

    Informed Consent for the Use of AI in the Process of Providing Medical Services by Katarzyna Wałdoch

    Published 2024-06-01
    “…The use of medical devices equipped with AI creates new types of risk, including the risk of algorithmic error, the risk of cyber-attack, and the risk of algorithmic mismatch (false-positive or false-negative results). …”
    Get full text
    Article
  16. 376

    The Effectiveness of Emotion-Focused Therapy on Pain Anxiety and Resilience in Patients with Migraine by Hamid Reza Arab Bafrani, Hasan Rezayi, Ahmad Sobhani

    Published 2024-08-01
    “…On the other hand, resilience, as the ability to adapt positively to stressful conditions, can reduce the severity of migraine attacks and improve patients' quality of life (Vos et al., 2015).Emotion-focused therapy (EFT), as a psychotherapeutic approach based on deep emotional processing and restructuring attachment patterns, has demonstrated efficacy in reducing psychological issues such as anxiety, depression, and trauma (Elliott et al., 2013). …”
    Get full text
    Article
  17. 377

    Predicting the Robustness of Large Real-World Social Networks Using a Machine Learning Model by Ngoc-Kim-Khanh Nguyen, Quang Nguyen, Hai-Ha Pham, Thi-Trang Le, Tuan-Minh Nguyen, Davide Cassi, Francesco Scotognella, Roberto Alfieri, Michele Bellingeri

    Published 2022-01-01
    “…We found that the RF model can predict network robustness with a mean squared error (RMSE) of 0.03 and is 30% better than the MLR model. …”
    Get full text
    Article
  18. 378

    Federated learning with LSTM for intrusion detection in IoT-based wireless sensor networks: a multi-dataset analysis by Raja Waseem Anwar, Mohammad Abrar, Abdu Salam, Faizan Ullah

    Published 2025-03-01
    “…The evaluation metrics for its performance included accuracy, F1 score, FPR, and root mean square error (RMSE). We evaluated the performance of the FL-based LSTM model against traditional centralized models, finding significant improvements in intrusion detection. …”
    Get full text
    Article
  19. 379

    Numerical investigation of wind turbine blade materials and airfoil profiles to extract maximum wind energy by Babu Tasruzzaman, Kowser Arefin, Mukut A.N.M. Mominul Islam

    Published 2024-01-01
    “…After analyzing with the help of Ansys Fluent, this paper determines NACA 4412 as the optimal airfoil profile among three primarily considered airfoils: NACA 2412, NACA 4412, and NACA 0012 due to the maximum coefficient of lift, Cl = 1.654, at 15° angle of attack (α). The obtained result is validated with the result obtained by Abbott and Doenhoff from NASA, and the percentage of error estimated is 1.47%. …”
    Get full text
    Article
  20. 380

    Network intrusion detection based on relative mutual K-nearest neighbor density peak clustering by Chunhua Ren, Changyuan Wang, Yang Yu, Wanan Yang, Ruiqi Guo

    Published 2025-07-01
    “…Secondly, in the remaining point allocation stage, the fuzzy allocation strategy of the mutual K-nearest neighbor effectively avoids the error propagation problem caused by chain allocation in traditional density peaks clustering algorithm (DPC). …”
    Get full text
    Article