Showing 181 - 200 results of 3,648 for search '"Attacker"', query time: 0.05s Refine Results
  1. 181

    Dynamic Characteristics of the Rotating Penetrating Missile for Attacking Warship Vertically by Dong-ze Qin, Pei-hang Li

    Published 2021-01-01
    “…The paper aimed to analyze the dynamic response of a new type penetrating missile in rotary attacking warship. The dynamic response characteristics of the penetrator become more complex when attacking the ship target due to the special materials of the deck such as stiffeners. …”
    Get full text
    Article
  2. 182
  3. 183
  4. 184

    Predictors of infliximab efficacy in patients with severe attack of ulcerative colitis by A. O. Golovenko, I. L. Khalif, O. V. Golovenko, V. V. Veselov

    Published 2013-10-01
    “…The retrospective analysis of biological therapy results in 30 patients with severe steroid-resistant attack of ulcerative colitis, assessed by Truelove and Witts’ criteria was carried out.Results. …”
    Get full text
    Article
  5. 185

    Grievous Temporal and Occipital Injury Caused by a Bear Attack by Sampath Chandra Prasad, Nikhil Dinaker Thada, Pallavi Rao, Smitha Rani Thada, Kishore Chandra Prasad

    Published 2013-01-01
    “…Bear attacks are reported from nearly every part of the world. …”
    Get full text
    Article
  6. 186

    Inference Attacks on Genomic Data Based on Probabilistic Graphical Models by Zaobo He, Junxiu Zhou

    Published 2020-09-01
    “…We propose new inference attacks to predict unknown Single Nucleotide Polymorphisms (SNPs) and human traits of individuals in a familial genomic dataset based on probabilistic graphical models and belief propagation. …”
    Get full text
    Article
  7. 187

    Experimental Analysis of Neural Approaches for Synthetic Angle-of-Attack Estimation by Angelo Lerro, Piero Gili, Mario Luca Fravolini, Marcello Napolitano

    Published 2021-01-01
    “…Within modern digital avionics, synthetic sensors can be implemented and used for several purposes such as analytical redundancy or monitoring functions. The angle of attack, measured at air data system level, can be estimated using synthetic sensors exploiting several solutions, e.g., model-based, data-driven, and model-free state observers. …”
    Get full text
    Article
  8. 188
  9. 189
  10. 190
  11. 191

    Localization of multiple jamming attackers in vehicular ad hoc network by Liang Pang, Xiao Chen, Yong Shi, Zhi Xue, Rida Khatoun

    Published 2017-08-01
    “…In this article, we propose a range-free approach to localize the source of the attacker and determine the number of jamming attackers. …”
    Get full text
    Article
  12. 192
  13. 193

    My Pine Is Under Attack—What Should I Do? by Jiri Hulcr

    Published 2016-05-01
    “… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
    Get full text
    Article
  14. 194
  15. 195

    Analysis of attacks on device manager in software-defined Internet of Things by Tri-Hai Nguyen, Myungsik Yoo

    Published 2017-08-01
    “…Consequently, the device manager accepts all the changes of device information made by other devices, which leads to potential attacks as demonstrated in this article. To address this problem, a comprehensive and lightweight countermeasure is proposed and its effectiveness is verified through experiments.…”
    Get full text
    Article
  16. 196
  17. 197
  18. 198
  19. 199
  20. 200