-
361
Inter-player Variability Within the Same Positional Status in High-level Men's Volleyball
Published 2022-09-01“…Results: (a) in side-out under non-ideal setting conditions, OHNs preferred the strong attack while OHAs alternated between the strong attack and the tip; (b) after a prior action, OHNs attacked via exploration of the block while OHAs preferred the tip; (c) after consecutive errors, OHNs play more in the opponent’s error; (d) after a previous defense action, OHNs preferred the strong attack and exploration of the block while OHAs preferred the strong attack; (e) in transition, OHNs were solicited under non-ideal setting conditions while OHAs were solicited in ideal and non-ideal conditions. …”
Get full text
Article -
362
Static detection method for multi-level network source code vulnerabilities based on knowledge graph technology
Published 2025-06-01“…The identified named entities are taken as the basic nodes in the knowledge graph to build the multi-level network source code vulnerability knowledge graph, calculate the vulnerability attack error and attack loss, and quantitatively evaluate the accuracy of detection and the potential harm of vulnerabilities. …”
Get full text
Article -
363
Toward Authentication of Videos: Integer Transform Based Motion Vector Watermarking
Published 2022-01-01“…The proposed technique can concisely determine the attacked regions. The results validate the performance of the proposed approach in terms of quality metrics like peak signal-to-noise ratio (PSNR), structural similarity index (SSIM), normalized coefficients (NC) and bit error rate (BER).…”
Get full text
Article -
364
Machine Learning Models for the Prediction of Wind Loads on Containerships
Published 2025-02-01“…Numerical simulations were conducted for two containerships with various container configurations at angles of attack ranging from 0° to 180°. The models showed satisfactory performance on an evaluation set, with high coefficients of determination. …”
Get full text
Article -
365
Automated Event Log Analysis With Causal Dependency Graphs for Impact Assessment of Business Processes
Published 2024-01-01“…Traditional BIAs are manual, relying on consultants to interview employees, which can be inefficient and error-prone. Process mining, an established field in business management, offers automated techniques to map business processes via log analysis. …”
Get full text
Article -
366
Design and Analysis of Physical Layer Security Based on Ill-Posed Theory for Optical OFDM-Based VLC System Over Real-Valued Visible Light Channel
Published 2016-01-01“…Meanwhile, we combine the CDSS scheme with the preequalization module to further improve the bit error rate (BER) performance for legitimate users. …”
Get full text
Article -
367
Wake development behind paired wings with tip and root trailing vortices: consequences for animal flight force estimates.
Published 2014-01-01“…Wake deformation was most severe behind wings with lower aspect ratios and when the distance between the wings was small, suggesting that animals that match this description constitute high-risk groups in terms of measurement error. Our results, therefore, have significant implications for experimental design where wake measurements are used to estimate forces generated in animal flight. …”
Get full text
Article -
368
Theoretical insights on potential-dependent oxidation behaviors and antioxidant strategies of MXenes
Published 2024-11-01“…This work contributes to a fundamental understanding MXene stability at the atomic level, and promotes the transition in materials discovery from trial-and-error synthesis to rational design.…”
Get full text
Article -
369
An Emergency Monitoring System for Power Cable Tunnels Based on Mobile Wireless Sensor Network
Published 2020-01-01“…To meet the environmental monitoring requirements of power cable tunnels for emergency cases such as communication network being missed, broken-down, or attacked, a low-cost mobile wireless senor network monitoring system was developed based on WiFi and ultra-wide band (UWB) communication. …”
Get full text
Article -
370
Exploiting Optical Chaos With Time-Delay Signature Suppression for Long-Distance Secure Communication
Published 2017-01-01“…The time-delay (TD) signature of the chaotic signal is an essential factor for eavedroppers and attackers to reconstruct the secure communication system. …”
Get full text
Article -
371
Performance assessment in elite table tennis matches using the enhanced first offensive shot model
Published 2025-06-01“…Thirdly, male players outperform female players in both initial and subsequent attack. These findings offer practical insights for players and coaches, suggesting that training should emphasise the initial-offensive phase and focus on reducing errors during transitions, particularly for low-ranked players. …”
Get full text
Article -
372
Model-based hierarchal control framework for frequency and voltage stability in islanded microgrids with low inertia
Published 2025-06-01“…Future research will focus on hardware-in-the-loop verification and cyber-attack-resilience integration.…”
Get full text
Article -
373
Adaptive Fast Smooth Second-Order Sliding Mode Fault-Tolerant Control for Hypersonic Vehicles
Published 2024-11-01“…The root mean square errors for the angle of attack, sideslip angle, and roll angle are reduced by 65.11%, 86.71%, and 45.51%, respectively, while the standard deviation is reduced by 81.78%, 86.80%, and 45.51%, demonstrating that the proposed controller has faster convergence, higher control accuracy, and smoother output than the terminal sliding mode controller.…”
Get full text
Article -
374
Automatic plant disease detection using computationally efficient convolutional neural network
Published 2024-12-01“…Abstract Agricultural plants are the fundamental source of nutrients worldwide. The attack of diseases on these plants leads to food scarcity and results in a catastrophic situation. …”
Get full text
Article -
375
Informed Consent for the Use of AI in the Process of Providing Medical Services
Published 2024-06-01“…The use of medical devices equipped with AI creates new types of risk, including the risk of algorithmic error, the risk of cyber-attack, and the risk of algorithmic mismatch (false-positive or false-negative results). …”
Get full text
Article -
376
The Effectiveness of Emotion-Focused Therapy on Pain Anxiety and Resilience in Patients with Migraine
Published 2024-08-01“…On the other hand, resilience, as the ability to adapt positively to stressful conditions, can reduce the severity of migraine attacks and improve patients' quality of life (Vos et al., 2015).Emotion-focused therapy (EFT), as a psychotherapeutic approach based on deep emotional processing and restructuring attachment patterns, has demonstrated efficacy in reducing psychological issues such as anxiety, depression, and trauma (Elliott et al., 2013). …”
Get full text
Article -
377
Predicting the Robustness of Large Real-World Social Networks Using a Machine Learning Model
Published 2022-01-01“…We found that the RF model can predict network robustness with a mean squared error (RMSE) of 0.03 and is 30% better than the MLR model. …”
Get full text
Article -
378
Federated learning with LSTM for intrusion detection in IoT-based wireless sensor networks: a multi-dataset analysis
Published 2025-03-01“…The evaluation metrics for its performance included accuracy, F1 score, FPR, and root mean square error (RMSE). We evaluated the performance of the FL-based LSTM model against traditional centralized models, finding significant improvements in intrusion detection. …”
Get full text
Article -
379
Numerical investigation of wind turbine blade materials and airfoil profiles to extract maximum wind energy
Published 2024-01-01“…After analyzing with the help of Ansys Fluent, this paper determines NACA 4412 as the optimal airfoil profile among three primarily considered airfoils: NACA 2412, NACA 4412, and NACA 0012 due to the maximum coefficient of lift, Cl = 1.654, at 15° angle of attack (α). The obtained result is validated with the result obtained by Abbott and Doenhoff from NASA, and the percentage of error estimated is 1.47%. …”
Get full text
Article -
380
Network intrusion detection based on relative mutual K-nearest neighbor density peak clustering
Published 2025-07-01“…Secondly, in the remaining point allocation stage, the fuzzy allocation strategy of the mutual K-nearest neighbor effectively avoids the error propagation problem caused by chain allocation in traditional density peaks clustering algorithm (DPC). …”
Get full text
Article