-
1501
Separasi Aliran pada Permukaan Atas Airfoil Kumbang Kelapa dengan Metoda China Clay
Published 2020-10-01“…Tests are carried out to measure the length of flow separation on the upper surface of the airfoil at Reynolds and the different angles of attack of the airfoil. The China Clay method was used to determine the separation point on the airfoil surface, and the test results obtained various separation points for different angles of attack and Reynolds number.…”
Get full text
Article -
1502
Simulation Research of Space-Time Evolution of Emergency Logistics Network Reliability Based on Complex Network Theory
Published 2013-01-01“…Moreover, the network topological model and the simulation methods of reliability measurement when the network is under attack are present. Finally, we take three classical emergency logistics networks as examples, and through emulation analysis we obtain the connecting reliability changing situation of these three networks under random attack, the changing curve of the ratio of effective demand nodes and emergence supply mileage of emergency logistics network with same network density but different forms, and then evaluate the emergency logistics network connecting reliability. …”
Get full text
Article -
1503
Height Control of Supersonic Sea-Skimming Missiles Based on Online Parameter Identification
Published 2024-01-01“…The method facilitates the online identification of aerodynamic and thrust coefficients while simultaneously estimating state variables such as height and angle of attack. Secondly, a backstepping control method was designed to regulate the height of sea-skimming missiles. …”
Get full text
Article -
1504
Anomaly Detection in IoMT Environment Based on Machine Learning: An Overview
Published 2024-12-01“…The purpose of anomaly detection is to develop methods that can detect attackers' attacks and prevent them from happening again. …”
Get full text
Article -
1505
A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks
Published 2015-09-01“…The simulation results show that the localization error of our proposed algorithm is lower than those of the existing ones in attacked environment.…”
Get full text
Article -
1506
Public safety in the conditions of martial law and mental warfare
Published 2022-09-01“…The phenomenon of mental war during martial law and methods of influencing and countering informational attacks on the nation’s mentality have been studied. …”
Get full text
Article -
1507
Exercise as an abortive treatment for cluster headaches: Insights from a large patient registry
Published 2025-01-01“…Case reports of patients exercising during CH attacks were also reviewed. Results Among 167 registered CH patients, 136 patients provided responses about exercise during CH attacks; 39.7% (54/136) attempted exercise as treatment. …”
Get full text
Article -
1508
Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation
Published 2022-04-01“…The neural network approach has been commonly used in computer vision tasks.However, adversarial examples are able to make a neural network generate a false prediction.Adversarial training has been shown to be an effective approach to defend against the impact of adversarial examples.Nevertheless, it requires high computing power and long training time thus limiting its application scenarios.An adversarial examples defense method based on knowledge distillation was proposed, reusing the defense experience from the large datasets to new classification tasks.During distillation, teacher model has the same structure as student model and the feature map vector was used to transfer experience, and clean samples were used for training.Multi-dimensional feature maps were utilized to enhance the semantic information.Furthermore, an attention mechanism based on feature map was proposed, which boosted the effect of distillation by assigning weights to features according to their importance.Experiments were conducted over cifar100 and cifar10 open-source dataset.And various white-box attack algorithms such as FGSM (fast gradient sign method), PGD (project gradient descent) and C&W (Carlini-Wagner attack) were applied to test the experimental results.The accuracy of the proposed method on Cifar10 clean samples exceeds that of adversarial training and is close to the accuracy of the model trained on clean samples.Under the PGD attack of L2 distance, the efficiency of the proposed method is close to that of adversarial training, which is significantly higher than that of normal training.Moreover, the proposed method is a light-weight adversarial defense method with low learning cost.The computing power requirement is far less than that of adversarial training even if optimization schemes such as attention mechanism and multi-dimensional feature map are added.Knowledge distillation can learn the decision-making experience of normal samples and extract robust features as a neural network learning scheme.It uses a small amount of data to generate accurate and robust models, improves generalization, and reduces the cost of adversarial training.…”
Get full text
Article -
1509
Unexplained Illnesses Associated With a Subscription Meal Service, 2022
Published 2025-01-01“…Minimal attack rates were highest for the Lentil and Leek Crumbles (1.4%) followed by the Walnut and Thyme Crumbles (0.45%). …”
Get full text
Article -
1510
RETRACTED ARTICLE: An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks
Published 2024-09-01“…Autonomous vehicles rely on a complex network of sensors, cameras, and software to operate. A cyber-attack could interfere with these systems, leading to accidents, injuries, or fatalities. …”
Get full text
Article -
1511
Perceptual Mapping-Based Image Tamper Detection and Recovery Algorithm
Published 2022-01-01“…Results show a high ability to blindly recover images after different attacks such as removing and blocking attacks. At the same time, the structure similarity index of resultant images was higher than 0.99 for all tested images.…”
Get full text
Article -
1512
Anders Breivik et le « marxisme culturel » : Etats-Unis/Europe
Published 2013-06-01“…At the origin, and at the core of its e-book released a few hours before the attacks, we first discover an abounding literature that is born in the United States right after the collapse of communist regimes. …”
Get full text
Article -
1513
Sampling method for IDS in high bandwidth network
Published 2009-01-01“…A novel sampling method,IDSampling,was developed to solve the performance unbalance problem that IDS could not scale well in G+bit/s link,which was adaptive with the consumption of the memory bottleneck.With the help of the heuristic messages,such as the entropy of the single-packet flow and the flow length,IDSampling applied the simple sampling strategy based on the entropy of the single-packet flow when the large-scale anomaly occurred,or another complicated one instructed by the feedback of the rear detection results by default.In both cases IDSampling tried to guaran-tee the equal security with detection cost as low as it could.The results of experiment show that ①IDSampling keeps IDS effective by cutting off its load significantly when it is overloaded,at the same time it can guarantee the detection accuracy of the large-scale attack;②Comparing with the other two overwhelming sampling methods,the random packet sampling and the random flow sampling,the number of attack packets sampled by IDSampling is higher than that of the former two,the number outweighs the former two one order of magnitude especially in the large-scale anomaly case.…”
Get full text
Article -
1514
Performance of Tomicus yunnanensis and Tomicus minor (Col., Scolytinae) on Pinus yunnanensis and Pinus armandii in Yunnan, Southwestern China
Published 2012-01-01“…., Scolytinae), have been causing substantial mortality to Yunnan pine (Pinus yunnanensis Franch) in Yunnan, southwestern China, whereas only a few Armand pine (Pinus armandii Franch) were attacked by the beetles. In order to evaluate the suitability of P. armandii as host material for the two Tomicus, adults of both Tomicus were caged on living branches and felled logs of the two pines during shoot feeding and trunk attack phase, respectively. …”
Get full text
Article -
1515
Network moving target defense technique based on optimal forwarding path migration
Published 2017-03-01“…Moving target defense is a revolutionary technology which changes the situation of attack and defense.How to effectively achieve forwarding path mutation is one of the hotspot in this field.Since existing mechanisms are blindness and lack of constraints in the process of mutation,it is hard to maximize mutation defense benefit under the condition of good network quality of services.A novel of network moving target defense technique based on optimal forwarding path migration was proposed.Satisfiability modulo theory was adopted to formally describe the mutation constraints,so as to prevent transient problem.Optimization combination between routing path and mutation period was chosen by using optimal routing path generation method based on security capacity matrix so as to maximum defense benefit.Theoretical and experimental analysis show the defense cost and benefit in resisting passive sniffing attacks.The capability of achieving maximum defense benefit under the condition of ensuring network quality of service is proved.…”
Get full text
Article -
1516
A robust audio steganography algorithm based on differential evolution
Published 2021-11-01“…Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is often difficult for them to extract secret information correctly after some common signal processing attacks.Therefore, based on the spread spectrum technology, firstly, the relationship between steganography parameters (i.e., segmented scaling parameters and steganography capacity) and imperceptibility as well as robustness was analyzed.Next, a multi-objective optimization model of audio steganography was presented, in which segmented scaling parameters and steganography capacity were decision variables, imperceptibility and steganography capacity were optimization objectives, and the signal-to-noise ratio was a constraint.Then, a robust audio steganography algorithm based on differential evolution was proposed, including the corresponding encoding, fitness function, crossover and mutation operators.Finally, comparative experimental results show that the proposed steganography algorithm can achieve better robustness against common signal processing attacks on the premise of ensuring imperceptibility and anti-detection.…”
Get full text
Article -
1517
A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
Published 2022-01-01“…However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks has become the focus of attention to current computer fields. …”
Get full text
Article -
1518
Evaluation and protection of multi-level location privacy based on an information theoretic approach
Published 2019-12-01“…A privacy metric based on mutual information was proposed to measure the privacy leakage occurred when location data owner trust data users at different levels and need to publish the distorted location data to each user according to her trust level,based on which an location privacy protection mechanism (LPPM)was generated to protect user’s location privacy.In addition,based on mutual information,a metric was proposed to measure the privacy leakage caused by attackers obtaining different levels of distorted location data and then performing inference attack on the original location data more accurately.Another privacy metric was also proposed to quantify the information leakage occurred in the scenario based on mutual information.In particular,the proposed privacy mechanism was designed by modifying Blahut-Arimoto algorithm in rate-distortion theory.Experimental results show the superiority of the proposed LPPM over an existing LPPM in terms of location privacyutility tradeoff in both scenarios,which is more conspicuous when there are highly popular locations.…”
Get full text
Article -
1519
Forbuddet mod Loyal to Familia
Published 2022-10-01“…Incarrcerated members of the gang violently attacked prison guards. In two instances, these attacks occurred outside of prisons on the behest of the gang. …”
Get full text
Article -
1520
Attribute-based bilateral access control scheme for cloud storage
Published 2024-04-01“…Finally, the security analysis showed that the proposed scheme was indistinguishable and existential unforgeable under adaptive security models against chosen plaintext attacks and chosen message attacks, respectively. …”
Get full text
Article