Showing 1,701 - 1,720 results of 2,093 for search '"Attacker"', query time: 0.07s Refine Results
  1. 1701

    Effect of Nb0.5 and Mo0.75 addition on in-vitro corrosion and wear resistance of high-speed laser metal deposited Al0.3CrFeCoNi high-entropy alloy coatings by Burak Dikici, Thomas Lindner, Thomas Lampke, Thomas Grund, Asli Gunay Bulutsuz

    Published 2025-03-01
    “…This was due to the slower progression of deeper corrosion attacks in unmelted particles, which minimized the micro-galvanic effects associated with the eutectic structures within these particles. …”
    Get full text
    Article
  2. 1702

    A Quantitative Risk Evaluation Model for Network Security Based on Body Temperature by Y. P. Jiang, C. C. Cao, X. Mei, H. Guo

    Published 2016-01-01
    “…And the mechanism of increased antibody concentration, which is made up of activating mature detector and cloning memory detector, is mainly used to assess network risk caused by various species of attacks. Based on these reasons, this paper not only established the equation of antibody concentration increase factor but also put forward the antibody concentration quantitative calculation model. …”
    Get full text
    Article
  3. 1703

    Integrated Pest Management of Wireworms in Potatoes: Use of Tolerant Varieties to Implement Damage Prevention by Furlan Lorenzo, Bona Stefano, Benvegnù Isadora, Cacitti Valentina, Govoni Fausto, Parisi Bruno

    Published 2024-12-01
    “…Both sets of trials showed that some 4x-breeding clones were tolerant to wireworm attacks. The percentages of tubers damaged (any symptom) or with at least one ordinary/large hole was up to five times lower than in the commercial varieties. …”
    Get full text
    Article
  4. 1704

    STUDI POLA INTERAKSI PERILAKU JANGKRIK (Gryllus bimaculatus ) JANTAN DAN BETINA by Anwari Adi Nugroho, Namira Hanin Sal Sabilla, Dwi Setyaningrum, Fikih Putri Prastin, Talila Rima Dani

    Published 2020-05-01
    “…The results showed that the behavior that is often performed by crickets is sounding, eating, climbing, mating and attacking other crickets. Crickets perform sounding behavior to attract the attention of female crickets, show their existence and to defend their territory and food sources. crickets also often climb, to escape from the container because crickets want to live freely. …”
    Get full text
    Article
  5. 1705

    Decision Support Model for Design of High-Performance Concrete Mixtures Using Two-Phase AHP-TOPSIS Approach by Mohd. Ahmed, M. N. Qureshi, Javed Mallick, Mohd. Abul Hasan, Mahmoud Hussain

    Published 2019-01-01
    “…The present research is attempted to provide MCDM framework to rank the concrete mix guidelines for any given environment such as concrete under sulphate and chloride attack and for evolving the performance-based concrete mix design techniques. …”
    Get full text
    Article
  6. 1706

    The Collaborative Search by Tag-Based User Profile in Social Media by Haoran Xie, Xiaodong Li, Jiantao Wang, Qing Li, Yi Cai

    Published 2014-01-01
    “…Facing such a tremendous volume of data, it is a big challenge to assist the users to find their desired data. To attack this critical problem, we propose the collaborative search approach in this paper. …”
    Get full text
    Article
  7. 1707

    Vali@mPEG‐TK‐COS: A Dual‐Function Nano‐Pesticide for Fungicidal Action and Plant Immune Modulation by Ruixin Li, Xiaochen Jia, Hongguo Xie, Xueran Wang, Jinxuan Wen, Guanglu Yu, Chunlai Zhang, Yeqing Sun, Heng Yin

    Published 2024-12-01
    “…Vali@mPEG‐TK‐COS exhibits ROS‐responsive behaviour, releasing Vali and COS in response to plant ROS bursts, exhibiting dual capabilities in pathogen control and plant immunity induction during pathogenic attacks. Plant disease experiments confirmed the superior efficacy of Vali@mPEG‐TK‐COS against Rhizoctonia solani, surpassing the control effects of Vali or COS alone. …”
    Get full text
    Article
  8. 1708

    A Three-Dimensional Anisotropic Diffusion Equation-Based Video Recognition Model for Classroom Concentration Evaluation in English Language Teaching by Yanghong Liu, Jintao Liu

    Published 2021-01-01
    “…Experiments show that the method has excellent performance and can effectively discriminate the live nature of faces in images and resist forged face attacks. Based on the above face detection and expression recognition algorithms, the classroom concentration analysis system based on expression recognition is designed to achieve real-time acquisition and processing of classroom images, complete student classroom attendance records using face detection and face recognition methods, and analyze students’ concentration from the face integrity and facial expression of students facing the blackboard by combining face detection and expression recognition to visualize and display students’ classroom data for teachers, students, and parents with more data support and help.…”
    Get full text
    Article
  9. 1709

    Aerodynamic Performance of a Passive Pitching Model on Bionic Flapping Wing Micro Air Vehicles by Jinjing Hao, Jianghao Wu, Yanlai Zhang

    Published 2019-01-01
    “…However, FWMAVs with mechanisms to limit the angle of attack (α) artificially by active force cannot meet specific requirements. …”
    Get full text
    Article
  10. 1710

    EPPTA: Efficient partially observable reinforcement learning agent for penetration testing applications by Zegang Li, Qian Zhang, Guangwen Yang

    Published 2025-01-01
    “…Abstract In recent years, penetration testing (pen‐testing) has emerged as a crucial process for evaluating the security level of network infrastructures by simulating real‐world cyber‐attacks. Automating pen‐testing through reinforcement learning (RL) facilitates more frequent assessments, minimizes human effort, and enhances scalability. …”
    Get full text
    Article
  11. 1711

    Early and long-term performance evaluation of low NaOH concentrated waste HBP-GGBS based alkali activated composites by Mine Kurtay-Yıldız

    Published 2025-03-01
    “…Durability evaluations revealed resistance to sulfate attack and carbonation, emphasizing the long-term stability of the material under aggressive environmental conditions. …”
    Get full text
    Article
  12. 1712

    Face-work in North American Presidential Debates: A Corpus-based Multi-theoretical Approach by Rosa María Martínez Abellán

    Published 2024-07-01
    “…Supported by results from Pearson’s Chi-square test, the combination of these theories was shown to be possible. The recurrence of attack-defense pairings integrating strategies from both theories also pointed to their necessary combination. …”
    Get full text
    Article
  13. 1713

    Cellular Debris in the Anterior Vitreous in Silent Eyes of Behçet Patients as a Clue of Asymptomatic Ocular Involvement by Abdullah Kursat Cingu, Fatih Mehmet Türkcü, Bariş Yeniad, llknur Tugal-Tutkun

    Published 2013-01-01
    “…None of the eyes with disc hyperflourescence on initial examination developed uveitis attacks in their followup. In Kaplan-Meier survival analysis there was a significant difference between the groups (group A 20.6% and group B 4.2%) by means of ocular involvement during their followup (log-rank = 6.85, ). …”
    Get full text
    Article
  14. 1714

    Quantum algorithms for enhanced educational technologies by Basil Hanafi, Mohammad Ali, Devyaani Singh

    Published 2025-01-01
    “…Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
    Get full text
    Article
  15. 1715

    From Palestine to Turtle Island by Sarah Rotz, Charles Levkoe, Martha Stiegman, Mustafa Koc, Indra Singh, Max Ajl, Yafa Al Masri, Justin Podur

    Published 2024-12-01
    “…The destruction of food systems in Palestine is part of a broader attack on land sovereignty, reflecting similar patterns of colonial land theft and environmental devastation in North America. …”
    Get full text
    Article
  16. 1716

    Photoperiod effects on the growth stages of fall armyworm Spodoptera frugiperda (Lepidoptera: Noctuidae) under laboratory conditions by Redwika Clarissa Putri, Dita Megasari, Noni Rahmadhini

    Published 2024-12-01
    “… Spodoptera frugiperda, commonly known as the fall armyworm, is a pest that attacks maize plants in Indonesia. Light is one of the crucial factors in the development of S. frugiperda. …”
    Get full text
    Article
  17. 1717

    FWA-SVM Network Intrusion Identification Technology for Network Security by Yaohui Zhang

    Published 2025-01-01
    “…The effectiveness of traditional network intrusion is limited in the face of complex network attacks and constantly increasing data volume. Support vector machine has attracted much attention for its excellent classification ability, but it faces challenges in feature selection and parameter optimization when dealing with large-scale high-dimensional data. …”
    Get full text
    Article
  18. 1718

    Deep learning-based prediction of autoimmune diseases by Donghong Yang, Xin Peng, Senlin Zheng, Shenglan Peng

    Published 2025-02-01
    “…Abstract Autoimmune Diseases are a complex group of diseases caused by the immune system mistakenly attacking body tissues. Their etiology involves multiple factors such as genetics, environmental factors, and abnormalities in immune cells, making prediction and treatment challenging. …”
    Get full text
    Article
  19. 1719
  20. 1720

    Implementation and optimisation of intelligent police systems based on artificial intelligence by D. O. Zhadan, M. V. Mordvyntsev, D. V. Pashniev, O. V. Khlestkov

    Published 2024-06-01
    “…Modern video surveillance systems can help counter terrorist attacks by tracking and identifying people and suspicious objects. …”
    Get full text
    Article