-
381
An Advanced Generative AI-Based Anomaly Detection in IEC61850-Based Communication Messages in Smart Grids
Published 2025-01-01“…The ToD model adapts effectively to new attack scenarios without extensive retraining, unlike traditional machine learning (ML) models or HITL, which require frequent updates. …”
Get full text
Article -
382
Symbolic Regression-Based Modeling for Aerodynamic Ground-to-Flight Deviation Laws of Aerospace Vehicles
Published 2025-05-01“…For UAV flight test data, the average root mean square error (RMSE) of the mathematical model demonstrates a maximum improvement of 37% in accuracy compared to three data-driven methods. …”
Get full text
Article -
383
Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers
Published 2025-06-01“…The regular structure not only enables these performance advantages but also facilitates future integration of error-detection and masking techniques for comprehensive side-channel protection. …”
Get full text
Article -
384
Overview of migraine care, impact of the disease, and patient experience in France through patient voices: a cross-sectional and participatory survey study
Published 2025-04-01“…Results Out of the 683 participants (average age: 41.8 years; female: 92.4%; average age at first migraine attack: 16.2 years), 95.9% had received a formal migraine diagnosis from a physician. …”
Get full text
Article -
385
Analysis and prediction of infectious diseases based on spatial visualization and machine learning
Published 2024-11-01“…Since the 1970s, constantly mutated new infectious viruses have been quietly attacking humanity, and at least one new type of infectious disease is discovered every year. …”
Get full text
Article -
386
A big data analysis algorithm for massive sensor medical images
Published 2024-11-01“…We infer the extraction, feature selection, attack detection, and data collection and processing procedures to anticipate anomaly inpatient data. …”
Get full text
Article -
387
Rancang Bangun Case Based Reasoning untuk Diagnosis Hama dan Penyakit Tanaman Nilam menggunakan Nearest Neighbor Kombinasi Certainty Factor
Published 2020-05-01“…The development of patchouli plants attacked by pests and diseases is often hampered because there are still many farmers who do not know the types of pests and diseases that attack farmers' crops. …”
Get full text
Article -
388
Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach
Published 2024-05-01“…This creates further diffusion (level 3 diffusion) to make it difficult for an attacker to recover the plaintext image from an encrypted image. …”
Get full text
Article -
389
(<italic>r, k, ε</italic>)-Anonymization: Privacy-Preserving Data Publishing Algorithm Based on Multi-Dimensional Outlier Detection, <italic>k</italic>-Anonymity, and <itali...
Published 2025-01-01“…However, protecting individuals’ privacy against diverse attack attempts presents significant challenges for anonymization models that rely solely on a single technique, highlighting the need for more adaptable and hybrid approaches. …”
Get full text
Article -
390
Significance of the ARIMA epidemiological modeling to predict the rate of HIV and AIDS in the Kumba Health District of Cameroon
Published 2025-02-01“…BackgroundAIDS is a severe medical condition caused by the human immunodeficiency virus (HIV) that primarily attacks the immune system, specifically CD4+ T lymphocytes (a type of white blood cell crucial for immune response), monocyte macrophages, and dendritic cells. …”
Get full text
Article -
391
Eradication of Helicobacter pylori for prevention of aspirin-associated peptic ulcer bleeding in adults over 65 years: the HEAT RCT
Published 2025-08-01“…Omitting mention of death due to peptic ulcer bleeding from the protocol was an error, but it did not affect the analysis, as there were no pre-hospitalisation deaths. …”
Get full text
Article -
392
The use of modern military technologies in the light of the law of weapons and the law of targeting
Published 2025-03-01“…For example, the bombardment of "USS Cole" by a small industrial ship equipped with classic weapons succeeded in attacking one of the most advanced warships in the world. …”
Get full text
Article -
393
Benefits of aldosterone receptor antagonism in chronic kidney disease: the BARACK-D RCT
Published 2025-03-01“…Due to the higher than anticipated measurement error/fluctuations, the eligible range was extended to 30–50 ml/minute/1.73 m2 following the initial recruitment period. …”
Get full text
Article -
394
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01“…Aiming at the problem that the lattice-based single-sever password-authenticated key exchange (PAKE) protocols are not resistant to server compromise attack, while the existing lattice-based multi-server PAKE protocols are inefficient and incompatible with two-server scenarios.The first lattice-based two-party smooth projective hash function (SPHF) was proposed by utilizing the learning with errors (LWE), which was indistinguishability under adaptive chosen-ciphertext attack(IND-CCA2) secure.The parameters of the based public key encryption (PKE) scheme were also identified.On this basis, pertinent two-server PAKE protocols from lattices were designed countering both passive and active attackers.The two quantum resistance protocols were able to achieve password-only settings and the expensive cryptographic primitives were not used, including signature/verification, fully homomorphic encryption and secret sharing.The utilization of zero knowledge proofs were avoided by the protocol under the passive attackers.In the standard model, rigorous security proofs were provided for the two proposed protocols.Experimental results show that the proposed SPHF and PAKE protocols exhibit higher execution efficiency.…”
Get full text
Article -
395
A compressive sensing–based adaptable secure data collection scheme for distributed wireless sensor networks
Published 2019-06-01“…Under hardness of decisional learning with errors problem on lattice, it can ensure indistinguishability against chosen ciphertext attack (IND-CCA1) security scheme for collected data on the extranet and indistinguishability against chosen plaintext attack security for data during the process of distributed collection on the intranet. …”
Get full text
Article -
396
Secure e-Health System on Passive RFID: Outpatient Clinic and Emergency Care
Published 2013-12-01“…In recent years, many researches have demonstrated several RFID-based solutions to enhance patient medication safety and avoid human errors. Although RFID-based procedure is more efficient than traditional process, patient's information may be attacked (or stolen) during the data transmission period. …”
Get full text
Article -
397
Onboard Trajectory Generation of Hypersonic Morphing Aircraft
Published 2021-01-01“…The simulation results indicate high accuracy of AMPI method and the final errors corresponding to different initial errors were acceptable. …”
Get full text
Article -
398
Linear Disturbance Observer-Enhanced Continuous-Time Predictive Control for Straight-Line Path-Following Control of Small Unmanned Aerial Vehicles
Published 2024-11-01“…Firstly, based on the natural frame’s location on the prescribed reference paths, the command yaw angle (which is the basis for yaw angle control system design) is solved analytically by combining it with the errors of path following, attack angle, sideslip angle, attitude angles, and geometric parameters of the prescribed reference paths. …”
Get full text
Article -
399
Semi-supervised method for anomaly detection in HTTP traffic
Published 2025-08-01“…We also introduce a simple interpretability mechanism by attributing anomalies to token-level reconstruction errors, providing insights into detected threats. …”
Get full text
Article -
400
Detecting deception in movement: the case of the side-step in rugby.
Published 2012-01-01“…By waiting longer and picking up more information that would inform about future running direction these experts made significantly fewer errors (p<.05). In this paper we not only present a mathematical model that describes how deception in body-based movement is detected, but we also show how perceptual expertise is manifested in action expertise. …”
Get full text
Article