-
1661
Florida's Invaders: Exotic Pests
Published 2003-02-01“… Florida's natural ecosystems are increasingly coming under attack by invading exotic species which displace native species, thereby degrading the diversity of floral and faunal resources. …”
Get full text
Article -
1662
Acupuncture Dosage and Its Correlation with Effectiveness in Patients with Chronic Stable Angina: A Systematic Review and Meta-Analysis of Randomized Controlled Trial
Published 2025-01-01“…MDG showed a notable difference in reducing angina attacks (SMD, − 0.60, 95% CI [− 0.91, − 0.29], P = 0.001, I2=60%) while LDG and HDG did not. …”
Get full text
Article -
1663
Où étiez-vous le 11 septembre 2001 ?
Published 2011-09-01“…A handful of dates have imprinted themselves more deeply in the American psyche: the attack on Pearl Harbor, the first step of Neil Armstrong on the moon or the assassination of John F. …”
Get full text
Article -
1664
Epilepsy Treatment Outcome and Its Predictors among Ambulatory Patients with Epilepsy at Mizan-Tepi University Teaching Hospital, Southwest Ethiopia
Published 2020-01-01“…Nonadherence to antiepileptic drugs, high frequency of seizure attack before AEDs initiation, and history of a head injury before the occurrence of seizure were predictors of uncontrolled seizure. …”
Get full text
Article -
1665
Indirect treatment comparison of lanadelumab and a C1-esterase inhibitor in pediatric patients with hereditary angioedema
Published 2025-01-01“…To avoid convergence issues and an underpowered analysis due to the small sample size (n = 29), the base case was defined as Poisson regression analyses on monthly attack rate adjusting for one covariate (baseline attack rate). …”
Article -
1666
LKM: A LDA-Based -Means Clustering Algorithm for Data Analysis of Intrusion Detection in Mobile Sensor Networks
Published 2015-10-01“…Mobile sensor networks (MSNs), consisting of mobile nodes, are sensitive to network attacks. Intrusion detection system (IDS) is a kind of active network security technology to protect network from attacks. …”
Get full text
Article -
1667
Detection and diagnosis of unknown threats in power equipment using machine learning and Spark technology
Published 2025-01-01“…With the continuous advancement of network technology, attack behaviors have become increasingly diversified, giving rise to new challenges in threat detection. …”
Get full text
Article -
1668
Simulation Analysis of the Aerodynamic Performance of a Bionic Aircraft with Foldable Beetle Wings in Gliding Flight
Published 2020-01-01“…The effects of elastic model, rigid and flexible wing, angle of attack, and velocity on the aerodynamic characteristics of the aircraft in gliding flight are analyzed. …”
Get full text
Article -
1669
Effect of Ag Addition on the Electrochemical Performance of Cu10Al in Artificial Saliva
Published 2016-01-01“…SEM analysis showed that Cu10Al alloy was preferably corroded by grain boundaries, and the Ag addition modified the form of attack of the binary alloy. Cu-rich phases reacted with SCN− anions forming a film of CuSCN, and the Ag-rich phase is prone to react with SCN− anions forming AgSCN. …”
Get full text
Article -
1670
An Intrusion Detection System Based on Deep Learning and Metaheuristic Algorithm for IOT
Published 2024-04-01“…The results showed that the proposed method can detect attacks with a high accuracy of 99%..…”
Get full text
Article -
1671
“Theatre’s Other: Event and Testimony in British Verbatim Plays”
Published 2014-06-01“…Whereas Adamson and Schama seem to employ verbatim in an attempt to narrow the gap between theatre and its other – the reality of the 9/11 attacks –, Wood and Kelly appear to insist upon the impossibility of such an endeavour. …”
Get full text
Article -
1672
Research on the robustness of neural machine translation systems in word order perturbation
Published 2023-10-01“…., BERT) into neural machine translation (NMT) models can improve translation performance.However, it is still unclear whether these improvements stem from enhanced semantic or syntactic modeling capabilities, as well as how pre-trained knowledge impacts the robustness of the models.To address these questions, a systematic study was conducted to examine the syntactic ability of BERT-enhanced NMT models using probing tasks.The study revealed that the enhanced models showed proficiency in modeling word order, highlighting their syntactic modeling capabilities.In addition, an attacking method was proposed to evaluate the robustness of NMT models in handling word order.BERT-enhanced NMT models yielded better translation performance in most of the tasks, indicating that BERT can improve the robustness of NMT models.It was observed that BERT-enhanced NMT model generated poorer translations than vanilla NMT model after attacking in the English-German translation task, which meant that English BERT worsened model robustness in such a scenario.Further analyses revealed that English BERT failed to bridge the semantic gap between the original and perturbed sources, leading to more copying errors and errors in translating low-frequency words.These findings suggest that the benefits of pre-training may not always be consistent in downstream tasks, and careful consideration should be given to its usage.…”
Get full text
Article -
1673
Design of a Multi-Layer Symmetric Encryption System Using Reversible Cellular Automata
Published 2025-01-01“…The encryption process concludes with an additional layer of security by encrypting the final RCA configurations, further protecting against potential attacks on the encrypted data. Additionally, the 224-bit key length provides robust resistance against brute force attacks. …”
Get full text
Article -
1674
Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
Published 2025-01-01“… The increasing prevalence of Android devices has made them prime targets for malware attacks. These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and contact information. …”
Get full text
Article -
1675
Multiple redundant flow fingerprint model based on time slots
Published 2023-02-01“…With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future Internet architecture should take security as a basic attribute to provide the native security support which is also called as endogenous safety and security.In order to support the data trustworthiness of endogenous security, a time-slot based multiple redundant flow fingerprint model was designed and implemented based on the research of the watermark (or fingerprint) mechanism.The proposed model used only three time slot intervals and operated the packets within the specified time slots, so that the fingerprint can be embedded without conflicting with the adjacent bit operations.Redundant coding was introduced to improve the fingerprint robustness, and the behaviors such as jitter or malicious disruptions by attackers in the network were considered.Furthermore, the impacts of delayed interference, spam packet interference and packet loss interference were analyzed.The analytical results show that the robustness of the fingerprint model improves with increasing redundant bits when the packet distribution in the network stream is given.Besides, in order to reduce the consumption of time and space and improve the efficiency and accuracy of packet operations, a flow fingerprinting prototype system was designed and implemented based on the kernel, and its efficiency and robustness were evaluated.The experimental result show that the model has high robustness.Additionally, the application scenario of the model was elaborated, which can effectively detect man-in-the-middle attacks and prevent network identity spoofing with the help of the flow fingerprinting model.…”
Get full text
Article -
1676
A New Sensors-Based Covert Channel on Android
Published 2014-01-01“…Aside from all sorts of malware, one threat proved intractable by current protection solutions, that is, collusion attacks involving two applications communicating over covert channels. …”
Get full text
Article -
1677
Effect of fly ash on the corrosion performance and structural integrity of stainless steel concrete rebars in acid rain and saline environments
Published 2019-10-01“…The corrosion behavior of 304L stainless steel rebars in an alkaline solution simulating new concrete subjected to acid rain attack and a mildly to slightly acidic solution simulating corroded cover concrete that ex¬posed the reinforcement to direct acid rain attack, was investigated by reverse polarization. …”
Get full text
Article -
1678
DNNobfus: a study on obfuscation-based edge-side model protection framework
Published 2024-04-01“…Such actions can compromise the intellectual property rights of the model and increase the risk of white-box attacks. To mitigate the capability of model decompilers to locate and identify model operators, acquire parameters, and parse network topologies, an obfuscation framework was proposed. …”
Get full text
Article -
1679
Time Pattern Locking Scheme for Secure Multimedia Contents in Human-Centric Device
Published 2014-01-01“…In particular, the smudge attack technique is a convenient way to unlock multimedia smartphones after they have been stolen. …”
Get full text
Article -
1680
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
Published 2023-07-01“…The authors reveal its vulnerability to various attacks, such as tag impersonation, reader impersonation and de−synchronisation attacks. …”
Get full text
Article