Showing 61 - 80 results of 408 for search '"The Intercept"', query time: 0.04s Refine Results
  1. 61

    Entangled state testing in the quantum Byzantine agreement by Xia WU, Heng-yue JIA, Jian-ming ZHU

    Published 2016-11-01
    “…In distributed computing,Byzantine agreement is a practical method to solve its fault-tolerance problem.There is a variation of the Byzantine agreement which is called detectable Byzantine agreement.This kind of protocol is unsolvable by classical means,but can be solved using quantum resources——quantum entangled states.A typical quantum detectable Byzantine agreement is the GBKCW protocol.The part with the generation and distribution of the lists in the GBKCW protocol was dealed with.In order to keep the GBKCW protocol from the intercept-and-resend strategy,the property of the determination of entangled states were employed to test the sharing state between the parties.…”
    Get full text
    Article
  2. 62

    Design of network traffic monitoring and control system in SDN by Chuan LIU, Zheng LOU, Hui HUANG, Hui DENG

    Published 2015-12-01
    “…The core idea of SDN(software defined networking)is that the control plane and data plane are separated,which makes the network traffic can be flexible controlled.Since SDN has these characteristics,the traffic monitoring and control in SDN have significant differences with traditional IP networks.A network traffic monitoring and control system based on sFlow technology was presented.With the application of sFlow,the process of data collection was separated from the control plane of SDN.The experimental environment was constructed based on OpenDaylight controller and Mininet,and the abnormal traffic was simulated by DoS(denial of service)attacks.The experiments show that the proposed network traffic monitoring and control system can effectively intercept the abnormal traffic.…”
    Get full text
    Article
  3. 63

    Causal relationship between ulcerative colitis and male infertility: A two-sample Mendelian randomization study. by Xia Wang, Tongyi Li, Qiu Chen

    Published 2024-01-01
    “…The results of MR analysis combined with BWMR analysis also showed positive genetic causal relationship between UC and male infertility.MR-Egger regression showed an intercept of -2.21×10-3 with a standard error of 0.006 and P = 0.751, there was no horizontal pleiotropy for the IVs of exposure factors. …”
    Get full text
    Article
  4. 64

    Selfish mining detection scheme based on the characters of transactions by Heli WANG, Qiao YAN

    Published 2023-04-01
    “…Selfish mining is an attack strategy in Proof-of-Work based blockchains, where attackers withhold their mined blocks to intercept the awards of other honest miners, resulting in higher profitability.This attack undermines the incentive compatibility of Proof-of-Work.Although there are various studies from researchers in recent years, there is no effective detection scheme as the vulnerability of blockchain in propagation delay makes it challenging to distinguish the attackers from honest miners.A scheme for selfish mining detection was introduced.In this scheme, a state value was assigned to the new block based on transaction amount and the transaction fee of the block.By analyzing the relationship between state value and transaction characteristics, we can determine if the block was mined by a selfish miner.The scheme is verified by an experiment with an accuracy of 86.02%.…”
    Get full text
    Article
  5. 65

    Spectrophotometric Determination of Various Drugs Using Chloranilic Acid as Chromogenic Reagent - II by V. Annapurna, G. Jyothi, T. Rohini Kumari, B. B. V. Sailaja

    Published 2010-01-01
    “…Regression analysis using the method of least squares was made to evaluate the slope (b), intercept (a) and correlation coefficient (r) and standard error of estimation (Se) for each drug.…”
    Get full text
    Article
  6. 66

    Analisi dell’anisotropia microstrutturale in materiali compositi rinforzati con fibre corte by A. Bernasconi, F. Cosmi, D. Dreossi

    Published 2013-04-01
    “…Differences in orientation distribution within a sample could be measured using the Mean Intercept Length (MIL) and the fabric tensor. The results presented herein refer to a sample of a 30% by weight glass fibre reinforced polyamide 6, extracted form a thin plate.…”
    Get full text
    Article
  7. 67

    Security test of 101 protocol of FTU by Yong WANG, Xiang WANG, Wenting HE, Yuhao ZHOU, Yufan CAI

    Published 2018-10-01
    “…The IEC60870-5-101 protocol is mainly used for transmitting messages between the primary station and the substation of the power SCADA data monitoring and acquisition system.Since the message mainly adopts “frame check and sum” to ensure communication security,there is a common security risk among the intermediate personnel.In order to verify the communication problems of the 101 protocol,the communication system between the FTU and the main station of the feeder terminal was constructed,which collected the telemetry signal of the FTU mobile IoT card on the cloud server,and used the man-in-the-middle attack mode to use the ARP to intercept the communication data packet.To analyze the telemetry information in the data packet,try data tampering and successfully make the monitoring data not updated in time.Finally,an enhancement mechanism against external attacks was proposed.…”
    Get full text
    Article
  8. 68

    A Least Squares Method for Variance Estimation in Heteroscedastic Nonparametric Regression by Yuejin Zhou, Yebin Cheng, Tiejun Tong

    Published 2014-01-01
    “…In this paper, we propose two least squares estimators for the error variance in heteroscedastic nonparametric regression: the intercept estimator and the slope estimator. Both estimators are shown to be consistent and their asymptotic properties are investigated. …”
    Get full text
    Article
  9. 69

    Low-maintenance subtropical green roofs. Spontaneous vegetation and substrate deph by Brenda Chaves Coelho Leite, Lucas Gobatti, Isabela Gamba Huttenlocher

    Published 2022-06-01
    “…The paper aims to systematically identify the effects exerted by substrate depth during the first months of vegetation growth using the Point-Intercept method in low-maintenance extensive green roofs. …”
    Get full text
    Article
  10. 70

    Statistical Characteristics and Security Analysis over Multi-Cascade κ-μ Shadowed Channels by Xiaohong Wang, Ming Ren, Yiwei Fang, Xinji Tian, Yanyang Zeng

    Published 2022-01-01
    “…Moreover, we further utilize the two performance evaluation metrics including outage probability and intercept probability to investigate the impacts of cascade number and channel parameters on reliability and security. …”
    Get full text
    Article
  11. 71

    A Heuristic Algorithm for Resource Allocation/Reallocation Problem by S. Raja Balachandar, K. Kannan

    Published 2011-01-01
    “…This paper presents a 1-opt heuristic approach to solve resource allocation/reallocation problem which is known as 0/1 multichoice multidimensional knapsack problem (MMKP). The intercept matrix of the constraints is employed to find optimal or near-optimal solution of the MMKP. …”
    Get full text
    Article
  12. 72

    Android application privacy protection mechanism based on virtual machine bytecode injection by Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU

    Published 2021-06-01
    “…To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was generated according to the user’s security requirement and usage scenario, and injected into the coding unit of Android application that involves dangerous permission request and sensitive data access, to realize dynamic application behavior control.Tests on applications crawled from four mainstream domestic App stores show that the method can effectively intercept sensitive API calls and dangerous permission requests of legitimate App programs and implement control according to pre-specified security policies.Also, after injecting virtual machine bytecode, most of the App program operation is not affected by the injected code, and the robustness is guaranteed.The proposed method has a good universality.…”
    Get full text
    Article
  13. 73

    Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud by Jianhua LIU, Minglu LI, Dazhi LI, Luqun LI

    Published 2017-06-01
    “…Industrial wireless sensor networks and production equipments are deployed in unattended and distributed intelligent manufacturing system (IMS).Sensor-cloud as a potential technology can effectively integrate distributed equipments as a service and provide it to mobile robots.However,when the mobile robots access the remote devices via sensor-cloud platform,because potential attackers easily intercept keys and eavesdrop equipment operation contents through wireless channels,which makes the key management and the control of equipment operation permission become crucial to the safe and reliable operation of IMS.Therefore,the utility function of game players were formalized,the adaptive trust update process was analyzed,and an adaptive trust management mechanism based on evolutionary game was proposed.Simulation results show that the proposed method can effectively improve the security of sensor-cloud network systems and equipments.…”
    Get full text
    Article
  14. 74

    LANGUAGE LEARNING STRATEGIES OF ESL LEARNERS AT MURRAY STATE UNIVERSITY IN IMPROVING THEIR ENGLISH LANGUAGE SKILLS by Rusnadi Rusnadi

    Published 2017-05-01
    “…The collected data were analyzed by using multiple regression analysis which includes Coefficients of Discrimination (r squared), Intercept Coefficients (the constant), and Variable Coefficients (slope), and then concluded inductively. …”
    Get full text
    Article
  15. 75

    Analisi dell’anisotropia microstrutturale in materiali compositi rinforzati con fibre corte by A. Bernasconi, F. Cosmi, D. Dreossi

    Published 2013-04-01
    “…Differences in orientation distribution within a sample could be measured using the Mean Intercept Length (MIL) and the fabric tensor. The results presented herein refer to a sample of a 30% by weight glass fibre reinforced polyamide 6, extracted form a thin plate.…”
    Get full text
    Article
  16. 76

    Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment by Heng HE, Yan HU, Lianghan ZHENG, Zhengyuan XUE

    Published 2018-04-01
    “…For addressing the problem of two typical types of distributed denial of service (DDoS) attacks in cloud environment,a DDoS attack detection and prevention scheme called SDCC based on software defined network (SDN) architecture was proposed.SDCC used a combination of bandwidth detection and data flow detection,utilized confidence-based filtering (CBF) method to calculate the CBF score of packets,judged the packet of CBF score below the threshold as an attacking packet,added its attribute information to the attack flow feature library,and sent the flow table to intercept it through SDN controller.Simulation results show that SDCC can detect and prevent different types of DDoS attacks effectively,and it has high detection efficiency,reduces the controller’s computation overhead,and achieves a low false positive rate.…”
    Get full text
    Article
  17. 77

    Spectrophotometric Methods for the Assay of Fluvoxamine Using Chromogenic Reagents by V. Annapurna, G. Jyothi, V. Nagalakshmi, B. B. V. Sailaja

    Published 2010-01-01
    “…Regression analysis using the method of least squares was made to evaluate the slope(b), intercept(a) and correlation coefficient (r) and standard error of estimation (Se) for each system. …”
    Get full text
    Article
  18. 78

    Comparing prediction accuracy for 30-day readmission following primary total knee arthroplasty: the ACS-NSQIP risk calculator versus a novel artificial neural network model by Anirudh Buddhiraju, Michelle Riyo Shimizu, Tony Lin-Wei Chen, Henry Hojoon Seo, Blake M. Bacevich, Pengwei Xiao, Young-Min Kwon

    Published 2025-01-01
    “…While the ANN demonstrated good discrimination and calibration (area under the curve (AUC)ANN = 0.72, slope = 1.32, intercept = −0.09) in the validation cohort, the SRC demonstrated poor discrimination (AUCSRC = 0.55) and underestimated readmission risk (slope = −0.21, intercept = 0.04). …”
    Get full text
    Article
  19. 79

    Adsorption of Malachite Green Dye by Acid Activated Carbon - Kinetic, Thermodynamic and Equilibrium Studies by P. K. Baskaran, B. R. Venkatraman, S. Arivoli

    Published 2011-01-01
    “…Thermodynamic parameters such as ΔH°,ΔS° and ΔG°, were calculated from the slope and intercept of the linear plots. Analysis of adsorption results obtained at 303, 313, 323 and 333 K showed that the adsorption pattern on zea mays dust carbon seems to follow the Langmuir and Freundlich. …”
    Get full text
    Article
  20. 80

    Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation by Shiguo WANG, Shujuan TIAN, Qingyong DENG

    Published 2023-11-01
    “…For the federated learning scenarios with edge-end cooperation, edge servers and device terminals update their models and exchange gradient parameters frequently, and hence eavesdroppers can manipulate channel estimation through pilot spoofing to intercept the transmitted information and reduce the update efficiency of federated learning model.Therefore, a pilot attack detection algorithm with heterogeneous pilot energy estimation was proposed.Firstly, a federated learning pilot attack system model was constructed after the security of pilot attacks on data transmission had been analyzed.Then, a pilot attack detection method based on random segmentation and encryption methods was proposed to detect the pilot spoofing accurately and the contaminated channel could be recovered as well.Experimental results show that the proposed algorithm is more suitable for detecting pilot attacks with low transmit power and strong concealment compared to other existing algorithms.Furthermore, the data transmission rate of edge servers is improved significantly through the precoding based on the recovered channel state information.…”
    Get full text
    Article