-
1581
Blockchain-Based Anonymous Reputation System for Performance Appraisal
Published 2025-01-01“…Our protocol addresses the risks of Sybil attacks, ensures review limitation and unforgeability. …”
Get full text
Article -
1582
Analysis of anomalous behaviour in network systems using deep reinforcement learning with convolutional neural network architecture
Published 2024-12-01“…AbstractTo gain access to networks, various intrusion attack types have been developed and enhanced. The increasing importance of computer networks in daily life is a result of our growing dependence on them. …”
Get full text
Article -
1583
Investigating the Effect of Olfactory Stimulation in Preterm Infants: A Review Study
Published 2024-10-01“…There are controversial results about the aromatherapy effect of pleasant odor vanillin on apnea attacks in preterm infants. Rosa damascenes odor had a therapeutic effect on apnea attacks, but not breast milk odor. …”
Get full text
Article -
1584
‘I should like to see a woman smoking while she was nursing her baby’: The New Woman, Crossdressing, and Humour in Horace William Bleackley’s Une Culotte (1894)
Published 2022-10-01“…While the New Woman was often mocked and caricatured as a mannish and destructive figure in the late Victorian press, New Woman writers also used humour to attack the status quo and parry ridicule with ridicule. …”
Get full text
Article -
1585
Modelling of Electromagnetic Scattering by a Hypersonic Cone-Like Body in Near Space
Published 2017-01-01“…Typically, the BRCS is influenced by 5~10 dBm for a change of attack angle within 0~15 degrees, or for a change of elevation within 30~70 km above the ground.…”
Get full text
Article -
1586
Smart contract-based secure cooperative spectrum sensing algorithm
Published 2021-12-01“…With simulations, we prove that the algorithm proposed in this article increases the accuracy and security of spectrum sensing and can effectively resist SSDF attack.…”
Get full text
Article -
1587
Ectoparasite Infestation on Beef Cattle (Bos Indicus) in Kendit Sub-District, Situbondo District
Published 2021-09-01“…The purpose of this study was to determine the type and percentage of ectoparasites attacking the cattle cow in the Kendit Sub-District, Situbondo District. …”
Get full text
Article -
1588
Ligustrum Weevil (suggested common name), Ochyromera ligustri Warner (Insecta: Coleoptera: Curculionidae: Tychiinae: Tychiini: Endaeina)
Published 2005-06-01“… A seed-attacking weevil was recently found attacking Chinese privet in Tallahassee, Leon County, Florida (Cuda and Zeller 1998). …”
Get full text
Article -
1589
Antigenic Complementarity in the Origins of Autoimmunity: A General Theory Illustrated With a Case Study of Idiopathic Thrombocytopenia Purpura
Published 2006-01-01“…Pairs of stereochemically complementary antigens induce complementary immune responses (antibody or T-cell) that create loss of regulation and civil war within the immune system itself. Antibodies attack antibodies creating circulating immune complexes; T-cells attack T-cells creating perivascular cuffing. …”
Get full text
Article -
1590
Structure Characteristics of the International Stock Market Complex Network in the Perspective of Whole and Part
Published 2017-01-01“…Robustness is applied to analyze the stability of the network and the result shows that ISMN has robustness against random attack but intentional attack breaks the connection integrity of ISMN rapidly. …”
Get full text
Article -
1591
Modelling the strategies for age specific vaccination scheduling during influenza pandemic outbreaks
Published 2010-12-01“…For the best scheme, the attack rateswere up to 10% lower than for other strategies. …”
Get full text
Article -
1592
Insect Pest occurrence on Cultivated Amaranthus Spp in Benin City, Edo State, Nigeria
Published 2015-07-01“…Unfortunately, one of the major factors limiting the productivity of Amaranthus is the incidence of insect pests attack. The aim of this study was to determine the insect pest occurrence on cultivated Amaranths in Benin City, Nigeria. …”
Get full text
Article -
1593
Overview on industrial Internet honeynet technology
Published 2024-10-01“…Honeynets emerged as a powerful cybersecurity measure, employing virtual or simulated systems, services, or resources to lure attackers. Upon interaction with the honeynet, monitoring and recording of attack activities were conducted, which aided in the early detection of novel cybersecurity threats, enhanced network security defenses, and contributed valuable data for security research. …”
Get full text
Article -
1594
Producing secure multimodal biometric descriptors using artificial neural networks
Published 2021-03-01“…The inclusion of the timestamp enables the system to detect and deny replay attacks, while the unique system identifier maintains the privacy of the users. …”
Get full text
Article -
1595
Types of Accidents and Causes of Their Occurrence in Outdoor Sports: A Conceptual Review
Published 2024-08-01“…These risks include drowning, dehydration, poisoning, burn injuries, fires, hypothermia and frostbite, natural disasters, sunstroke, wild animal attacks, and high-altitude sickness. Consequently, it can be said that participants in outdoor sports activities are exposed to a range of risks. …”
Article -
1596
« C’est eux contre nous » ou « Qui a peur de qui ? » : la rhétorique post-11 septembre de l’administration américaine vue par la caricature de presse
Published 2011-09-01“…In the months following the September 11 attacks on New York and Washington when the anti-terrorist phobia was at its peak, very few Americans dared voice criticism of the Bush administration’s assault on civil liberties. …”
Get full text
Article -
1597
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01“…., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
Get full text
Article -
1598
Sql injection detection using Naïve Bayes classifier: A probabilistic approach for web application security
Published 2025-01-01“…A pervasive security issue in web applications is database injection, enabling attackers to alter SQL queries in order to get unauthorized access to confidential information. …”
Get full text
Article -
1599
A New Scalar Quantization Method for Digital Image Watermarking
Published 2016-01-01“…Efficiency of the technique is measured in terms of distortions of the original image and robustness under different kinds of attacks, with particular focus on Additive White Gaussian Noise (AWGN) and Gain Attack (GA). …”
Get full text
Article -
1600
Research on key technologies of safety monitoring data sharing for railway engineering construction based on blockchain
Published 2021-08-01“…In order to solve the problems that the monitoring data was easy to be tampered with in the process of railway engineering construction safety monitoring, and the authenticity of the data might be questioned during the accountability of accidents, a blockchain-based railway engineering construction safety monitoring data sharing model was proposed.The characteristics of automatic execution of smart contracts ensured the transparency of the process of monitoring data on the chain.In the PBFT algorithm, there was a problem that the Byzantine nodes and the normal nodes were selected as the master node with the same probability, a reputation-based practical Byzantine fault tolerance algorithm was proposed.Streaming data on the chain might cause network congestion, which simplified the consensus protocol and reduced the time complexity from O(n<sup>2</sup>) to O(n).A comparative experiment was conducted using Hyperledger Caliper to prove that the delay of the improved algorithm is lower than PBFT algorithm, and the throughput is higher than PBFT algorithm.A quantitative analysis of the possibility of attack and the probability of successful attack was carried out, and it was determined that the smart contract provides tamper-proof modification for the monitoring data on the chain.Comparative analysis proves that the proposed blockchain-based railway engineering construction safety monitoring data sharing model is good than other models in terms of consensus efficiency, TPS and block generation speed.…”
Get full text
Article