Showing 1,781 - 1,800 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1781

    Wind Tunnel Testing on Start/Unstart Characteristics of Finite Supersonic Biplane Wing by Hiroshi Yamashita, Naoshi Kuratani, Masahito Yonezawa, Toshihiro Ogawa, Hiroki Nagai, Keisuke Asai, Shigeru Obayashi

    Published 2013-01-01
    “…The tests were carried out using supersonic and transonic wind tunnels over a Mach number range of 0.3≤M∞≤2.3 with angles of attack of 0°, 2°, and 4°. The Schlieren system was used to observe the flow characteristics around the models. …”
    Get full text
    Article
  2. 1782

    Highly selective deethylation of rhodamine B: Adsorption and photooxidation pathways of the dye on the TiO2/SiO2 composite photocatalyst by Feng Chen, Jincai Zhao, Hisao Hidaka

    Published 2003-01-01
    “…It is confirmed that visible light-induced photocatalytic degradation of dye proceeds on the surface of catalysts rather than in the bulk solution and active oxygen species preferentially attack the molecular portion that connects directly to the surface of catalysts. …”
    Get full text
    Article
  3. 1783

    A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity by Abdullah Al Siam, Moutaz Alazab, Albara Awajan, Nuruzzaman Faruqui

    Published 2025-01-01
    “…This report synthesizes previous research while identifying gaps and future prospects, including the integration of emerging AI approaches, the enhancement of real-time threat detection capabilities, and the addressing of changing attack vectors. By providing a holistic view of the current state and future potential of AI in cybersecurity, this paper aims to serve as a foundational reference for researchers and practitioners seeking to leverage AI for robust and adaptive security solutions.…”
    Get full text
    Article
  4. 1784

    A phylogenetic epidemiology approach to predicting the establishment of multi-host plant pests by Shannon Colleen Lynch, Edeli Reyes-Gonzalez, Emily L. Bossard, Karen S. Alarcon, Natalie L. R. Love, Allan D. Hollander, Beatriz E. Nobua-Behrmann, Gregory S. Gilbert

    Published 2025-01-01
    “…For host-specialized pests, epidemiological models of spread through a single host population are well developed. However, most pests attack multiple host species; the challenge is predicting which communities are most vulnerable to infestation. …”
    Get full text
    Article
  5. 1785

    The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field by Ijaz Khalid, Tariq Shah, Khalid Ali Almarhabi, Dawood Shah, Muhammad Asif, M. Usman Ashraf

    Published 2022-01-01
    “…The scheme has been thoroughly securitized against various attacks. The result shows the efficiency of the proposed algorithm over the existing schemes. …”
    Get full text
    Article
  6. 1786

    Effect of the epidemiological heterogeneity on the outbreak outcomes by Alina Macacu, Dominique J. Bicout

    Published 2017-05-01
    “…Three types of responses are observed: dilution, amplification or no effect, corresponding to lower, higher or equal attack rates, respectively, for a host population in an interacting multi-host system compared to the zero-mixing situation. …”
    Get full text
    Article
  7. 1787

    Design of an Evolutionary Approach for Intrusion Detection by Gulshan Kumar, Krishan Kumar

    Published 2013-01-01
    “…For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. …”
    Get full text
    Article
  8. 1788

    Video Analysis of 26 Cases of Second ACL Injury Events in Collegiate and Professional Athletes by Manuela Vargas, Grace K Chaney, María C. Mejía Jaramillo, Paige Cummings, April McPherson, Nathaniel A. Bates

    Published 2023-02-01
    “…Injuries were distributed between attacking play (n=14) and defending (n=8). Player attention was most commonly focused on the ball (n=12) or an opponent (n=7). …”
    Get full text
    Article
  9. 1789

    Comparison of two bolus doses of dexmedetomidine for prophylaxis against postoperative nausea and vomiting in highly susceptible patients: A randomized controlled trial by Maha Mohamed Ismail Youssef, Amr Raafat Mahmoud Seif, Kareem Nagy Abbass Ahmed, Ghada Abo Bakr, Gihan Mohamed Obayah, Mohamed Ramadan Ahmed Mohamed

    Published 2024-04-01
    “…The time to give the first rescue antiemetic was significantly higher in group D75 compared to group D50 and in group D50 and group D75 compared to group C. The number of attacks and postoperative consumption of Ondansetron was significantly lower in group D50 and group D75 compared to group C. …”
    Get full text
    Article
  10. 1790

    Implementasi Mekanisme End-To-End Security pada IoT Middleware by Eko Sakti Pramukantoro, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji, Deny Hari Prasetya Dewa

    Published 2019-05-01
    “…However, a vulnerability that can lead to the eavesdropping attack exist. there is no security mechanism in the communication system among middleware with other parties like node sensors and subscribers. …”
    Get full text
    Article
  11. 1791

    Enhancing concealed object detection in active THz security images with adaptation-YOLO by Aiguo Cheng, Shiyou Wu, Xiaodong Liu, Hangyu Lu

    Published 2025-01-01
    “…Abstract The terahertz (THz) security scanner offers advantages such as non-contact inspection and the ability to detect various types of dangerous goods, playing an important role in preventing terrorist attacks. We aim to accurately and quickly detect concealed objects in THz security images. …”
    Get full text
    Article
  12. 1792

    The influence of meteorological factors on the technical performance of football teams during matches by Yonghan Zhong, Shaoliang Zhang, Qing Yi, Miguel Ángel Gómez Ruano

    Published 2024-04-01
    “…Notably, “shot from counter attack” was the most significantly affected variable, being exclusively influenced by air temperature (OR = 0.55, 95% CI: 0.30 to 0.98). …”
    Get full text
    Article
  13. 1793

    Knowledge, Attitude, and Practice of Community towards an Onchocerciasis Elimination Program from South West Ethiopia by Haile Worku, Misganaw Mola, Bizuwork Derebew Alemu, Sebwedin Surur Jemal, Aklilu Ayiza, Samuel Getachew, Nitin Mahendra Chauhan, Sunil Tulshiram Hajare, Suresh Chandra Singh, Mohammed Kuddus, Vijay J. Upadhye

    Published 2022-01-01
    “…As a result, the respondent demonstrates that covering the lower body part lessens the black fly’s vulnerability because they may attack below the knee. In general, community awareness and attitude are required to eradicate this disease from the district. …”
    Get full text
    Article
  14. 1794

    The ‘envers du décor’ of Suffragette Imagery: Anti-Suffrage Caricature by Abby Franchitti

    Published 2008-12-01
    “…They launched a counter attack using numerous propaganda techniques. Among those were representations of the Suffragette and her goals, which they satirised by caricatures in their newspaper, The Anti-Suffrage Review, posters designed for their campaign and postcards.The specific aspect of the anti-suffrage campaign that I will examine in this paper is the use of caricature. …”
    Get full text
    Article
  15. 1795

    A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics by Gerardo Iovane, Riccardo Amatore

    Published 2025-01-01
    “…The solution is broken down into four main components, considered four levels of security against attackers: (i) defocusing, (ii) fogging, (iii) puzzling, and (iv) crypto agility. …”
    Get full text
    Article
  16. 1796

    The Durability of High-Strength Concrete Containing Waste Tire Steel Fiber and Coal Fly Ash by Babar Ali, Erol Yilmaz, Ahmad Raza Tahir, Fehmi Gamaoun, Mohamed Hechmi El Ouni, Syed Muhammad Murtaza Rizvi

    Published 2021-01-01
    “…The studied durability parameters included rapid chloride permeability (RCP) and chloride penetration depth (CPD) by immersion method (28 and 120 days) and acid attack resistance (AAR) (28 and 120 days). Various basic mechanical properties of HSC were also analyzed, such as compressive strength (fCM), modulus of elasticity (ECM), splitting-tensile strength (fCTM), and modulus of rupture (fCRM). …”
    Get full text
    Article
  17. 1797

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…The rapid growth of the Internet of Medical Things (IoMT) is changing healthcare data management, but it also brings serious issues like data privacy, malicious attacks, and service quality. In this study, we present EdgeGuard, a novel decentralized architecture that combines blockchain technology, federated learning, and edge computing to address those challenges and coordinate medical resources across IoMT networks. …”
    Get full text
    Article
  18. 1798

    University proceedings. Volga region. Social sciences by A.A. Nerush

    Published 2024-11-01
    “…Possible resolution strategies include: confrontation (attacks, creating conditions for defeat) or avoidance (blocking, exclusion from the group), and the involvement of external arbitration. …”
    Article
  19. 1799

    A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing by Canling Wang, Wei Wu, Fulong Chen, Hong Shu, Ji Zhang, Yuxuan Zhang, Taochun Wang, Dong Xie, Chuanxin Zhao

    Published 2024-01-01
    “…Considering the cost of permissions management and the problem of insider malicious node attacks, users hope to implement authorization constraints within the authorized institutions. …”
    Get full text
    Article
  20. 1800

    The End of Akıncı Corps in The Ottoman Empire by Mustafa Alkan

    Published 2013-12-01
    “…The number of Akıncıs continued to increase until the 16th Century. In 1595, during the attacks carried out against Walachia Voivodina Mihail, who rebelled, the Akıncıs which stayed behind the Ottoman army, which was retreating over the wooden bridge, were nearly destroyed due to the inconsiderate act of Grand Vizier Sinan Pasha. …”
    Get full text
    Article