-
81
Radar Selection Method Based on an Improved Information Filter in the LPI Radar Network
Published 2018-01-01“…In order to save the radar resources and obtain the better low probability intercept ability in the network, a novel radar selection method for target tracking based on improved interacting multiple model information filtering (IMM-IF) is presented. …”
Get full text
Article -
82
Simple, Rapid and Sensitive UV-Visible Spectrophotometric Method for Determination of Antidepressant Amitriptyline in Pharmaceutical Dosage Forms
Published 2013-01-01“…The detection limit of the method was 0.3 μg·mL−1. The slope, intercept, and correlation coefficients for the present method were found to be 0.008, 0.002, and +0.998, respectively. …”
Get full text
Article -
83
Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode
Published 2021-11-01“…The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data processing stage, a data leakage prevention method based on model pruning was proposed to reduce the amount of data leakage while ensuring the availability of the original model.Aiming at the attack in model training stage, an attack detection method based on model parameter analysis was proposed to intercept malicious models and prevent data leakage.These two methods do not need to modify or encrypt data, and do not need to manually analyze the training code of deep learning model, so they can be better applied to data theft defense in data sandbox mode.Experimental evaluation shows that the defense method based on model pruning can reduce 73% of data leakage, and the detection method based on model parameter analysis can effectively identify more than 95% of attacks.…”
Get full text
Article -
84
Privacy protection system based on Hook for Android
Published 2018-04-01“…A privacy protection system based on Hook technology was designed and implemented to address the problem of user privacy leakage caused by malicious applications in Android.The system consists of three modules:application classification module,privacy information management module and collusion attack management module.The application classification module constructs classification model by using permission feature vectors and then classifies mobile applications into malicious applications and normal applications.The privacy information management module hooks all privacy-related application programming interfaces (API) based on Hook technology and then intercepts malicious applications by returning false data or empty data.The collusion attack management module hooks all inter-application communication channels and then intercepts corresponding communication contents by using the permission rules of collusion attack.Finally,the proposed privacy protection scheme on Android virtual machine was implemented to prove and its feasibility and effectiveness were proved.In addition,the system can intercept application behaviors of breaching privacy in real time with less memory,which does not need to modify Android system and applications.…”
Get full text
Article -
85
Design and development of Cartesian propulsion system of the autonomous docking module for target acquisition
Published 2023-10-01“…The concept of building an orbital complex for operational interception of a target is proposed, including in its composition the method of ballistic construction of operational interception, recommendations to the design appearance of the Cartesian propulsion system of the autonomous docking module, functioning at the stage of close-in guidance during tether delivery from the upper stage to the target, at the stage of capture and transfer of the target to the disposal orbit as part of the rotating tether space system. …”
Get full text
Article -
86
A Class of Pursuit Problems in 3D Space via Noncooperative Stochastic Differential Games
Published 2025-01-01“…To validate its applicability, the method is applied to missile interception games. Simulations confirm that the optimal strategies enable pursuers to consistently intercept evaders under stochastic dynamics, demonstrating the robustness and practical relevance of the approach in pursuit–evasion problems.…”
Get full text
Article -
87
Influence of Particle Size Distribution on the Critical State of Rockfill
Published 2019-01-01“…It was observed that the intercept and gradient of the critical state line in the e−p′ plane decreased as the grading broadened with the increase in particle size while the gradient of the critical state line in the p′−q plane increased as the particle size increased. …”
Get full text
Article -
88
An Empirical Analysis of Non-Interest Income's Effect on Commercial Bank Performance
Published 2024-12-01“…Using panel data for sixteen Chinese listed commercial banks from 2007 to 2013, variable intercept and variable coefficient models were constructed, accounting for variables including macroeconomic growth rate. …”
Get full text
Article -
89
Spectrophotometric Method for the Determination of Nebivolol Hydrochloride in Bulk and Pharmaceutical Formulations
Published 2010-01-01“…Beer’s law was obeyed in the concentration range of 4-60 μg/mL. The slope, intercept and correlation coefficient were also calculated. …”
Get full text
Article -
90
Spectrphotometric Determination of Buclizine as Hydrochloride Using Various Chromogenic Reagents
Published 2010-01-01“…Regression analysis using the method of least squares was made to evaluate the slope(b), intercept(a) and correlation coefficient (r) and standard error of estimation (Se) for each system Determination of BUCZ in bulk form and in pharmaceutical formulations were also incorporated.…”
Get full text
Article -
91
Three-Dimensional Prescribed-Time Pinning Group Cooperative Guidance Law
Published 2021-01-01“…In order to overcome the drawbacks of the convergence time boundary dependent on tuning parameters in existing finite/fixed-time cooperative guidance law, this paper presents a three-dimensional prescribed-time pinning group cooperative guidance scheme that ensures multiple unpowered missiles to intercept multiple stationary targets. Firstly, combining a prescribed-time scaling function with pinning group consensus theory, the prescribed-time consensus-based cooperative guidance law is proposed. …”
Get full text
Article -
92
Comprehensive analysis of In0.53Ga0.47As SOI-FinFET for enhanced RF/wireless performance
Published 2025-02-01“…The linearity performance of InGaAs-SOI-FinFET focuses on parameters such as third-order intercept point (IP3) and linearity metrics in analog circuits. …”
Get full text
Article -
93
Extracting the dependence of directed flow differences on conserved charges
Published 2025-01-01“…Previously, we have shown with quark coalescence that Av1 and the slope difference △v′1 depend linearly on both △q and ∆S with zero intercept. Here we emphasize that a two-dimensional function or fit is necessary for extracting the △q- and △S-dependences of △v1. …”
Get full text
Article -
94
Laser Communications for Satellite-Terrestrial Integration: Research Status, Key Technologies, and Future Prospects
Published 2024-12-01“…Besides, because of the highly directional and narrow beam characteristics of the laser beam, it is difficult to intercept and eavesdrop the laser links. Satellite laser communication, with its characteristics of high speed, high bandwidth, high security, and abundant spectrum resources, has become an important supporting technology for the development of future 6G satellite-terrestrial integration networks. …”
Get full text
Article -
95
Performance Analysis in DF Energy Harvesting Full-Duplex Relaying Network with MRC and SC at the Receiver under Impact of Eavesdropper
Published 2021-01-01“…In the mathematical analysis, we derived the exact expressions for intercept probability and outage probability (OP) by applying maximal ratio combining (MRC) and selection combining (SC) techniques at the receiver. …”
Get full text
Article -
96
Characterization of microstructure and properties of AlCuMg alloys
Published 2003-01-01“…Using automatic image analysis we were able to measure the linear intercept grain size, the secondary dendrite arm spacing (DAS), the size of eutectic cells (Le), as well as the size distribution and volume fractions of the α-solid solution and the eutectic. …”
Get full text
Article -
97
Simple Spectrophotometric Determination of Torsemide in Bulk Drug and in Formulations
Published 2008-01-01“…The apparent molar absorptivity and sandell sensitivity were 1.896×103 L mol−1 cm−1 and 0.183 μg cm−2, respectively. The slope and intercept of the equation of the regression line are 5.4x10−3 and 1.00×10−4 respectively. …”
Get full text
Article -
98
Chaos Synchronization Based Novel Real-Time Intelligent Fault Diagnosis for Photovoltaic Systems
Published 2014-01-01“…The fault diagnosis method proposed in this study needs only one set of sensing elements to intercept the fault features of the system, which can be real-time-diagnosed by creating the fault data of only one set of sensors. …”
Get full text
Article -
99
Ultra-Low-Voltage CMOS-Based Current Bleeding Mixer with High LO-RF Isolation
Published 2014-01-01“…The mixer exhibits a conversion gain of 7.5 dB at the radio frequency (RF) of 2.4 GHz, an input third-order intercept point (IIP3) of 1 dBm, and a LO-RF isolation measured to 60 dB. …”
Get full text
Article -
100
Dynamic hierarchical quantum secret sharing protocol based on high-dimensional GHZ state
Published 2024-10-01“…In addition, security analysis results showed that the proposed protocol could resist intercept-and-resend attack, measure-and-resend attack, entangle-and-measure attack, Trojan horse attack, as well as collusion attacks from internal participants.…”
Get full text
Article