Showing 221 - 240 results of 408 for search '"interception"', query time: 0.06s Refine Results
  1. 221

    Spectrphotometric Determination of Buclizine as Hydrochloride Using Various Chromogenic Reagents by V. Annapurna, G. Jyothi, A. V. Subbayamma, B. B. V. Sailaja

    Published 2010-01-01
    “…Regression analysis using the method of least squares was made to evaluate the slope(b), intercept(a) and correlation coefficient (r) and standard error of estimation (Se) for each system Determination of BUCZ in bulk form and in pharmaceutical formulations were also incorporated.…”
    Get full text
    Article
  2. 222

    Comparing prediction accuracy for 30-day readmission following primary total knee arthroplasty: the ACS-NSQIP risk calculator versus a novel artificial neural network model by Anirudh Buddhiraju, Michelle Riyo Shimizu, Tony Lin-Wei Chen, Henry Hojoon Seo, Blake M. Bacevich, Pengwei Xiao, Young-Min Kwon

    Published 2025-01-01
    “…While the ANN demonstrated good discrimination and calibration (area under the curve (AUC)ANN = 0.72, slope = 1.32, intercept = −0.09) in the validation cohort, the SRC demonstrated poor discrimination (AUCSRC = 0.55) and underestimated readmission risk (slope = −0.21, intercept = 0.04). …”
    Get full text
    Article
  3. 223

    Impact of cascade reservoir on the sources of organic matter in sediments of Lancang river by Yufei Bao, Meng Sun, Yuchun Wang, Ji Lu, Yajie Wu, Hao Chen, Shanze Li, Yong Qin, Zhuowei Wang, Jie Wen, Xinghua Wu, Zhongjun Wang

    Published 2025-01-01
    “…Summary: The construction of dams to intercept natural rivers constitutes the most severe human activity influencing the underlying surface. …”
    Get full text
    Article
  4. 224

    Artificial noise aided secure beamforming for multi-antenna relay systems by Li-jian ZHANG, Liang JIN, Lu LIU, Wen-yu LUO

    Published 2014-11-01
    “…In the amplify-and-forward (AF) relay systems,the confidential information forwarded by the relay can be intercepted by the eavesdroppers.For guaranteeing the secure communications,an artificial noise aided secure beamforming method is proposed.The goal is to maximize the secrecy rate of the system by jointly designing the beamforming matrix and the artificial noise (AN) covariance matrix at the relay subject to the total power and the per-antenna power constraints.This non-convex secrecy rate maximization (SRM) problem can be recast as a two-level optimization problem.The outer part can be solved by performing a one-dimensional search,and the inner part can be handled by the semidefinite relaxation (SDR) technique and interior-point methods.It is shown that there always exists a rank-one optimal solution for the SDR problem,i.e.…”
    Get full text
    Article
  5. 225

    UV Spectrophotometric Method for the Estimation of Valacyclovir HCl in Tablet Dosage Form by M. Ganesh, C. V. Narasimharao, A. Saravana Kumar, K. Kamalakannan, M. Vinoba, H. S. Mahajan, T. Sivakumar

    Published 2009-01-01
    “…Beer’s law was obeyed in the concentration range of 5-25 mcg mL-1 with 1.0910x104 mol-1 cm-1, the slope, intercept, correlation coefficient, detection and quantitation limits were also calculated. …”
    Get full text
    Article
  6. 226

    Fast Trajectory Generation Method for Midcourse Guidance Based on Convex Optimization by Jinlin Zhang, Jiong Li, Chijun Zhou, Humin Lei, Wanli Li

    Published 2022-01-01
    “…To generate the midcourse guidance trajectory for intercepting the high-speed and high maneuvering target, which is a strongly nonlinear and strongly constrained problem, a two-stage convex optimization method is proposed to solve the optimal trajectory quickly. …”
    Get full text
    Article
  7. 227

    Spectrophotometric Determination of Ceftibuten in Bulk and in Pharmaceutical Formulations by R. Vijayalakshmi, P. Bhargavi, P. Srujana Kumari, P. Sruthi, M. D. Dhanaraju

    Published 2010-01-01
    “…The apparent molar absorptivity and sandell’s sensitivity were 0.4583x104 and 0.3x104 respectively. The slope and intercept of the equation of the regression line are 4.5x10-3 and 1.3x10-5 respectively. …”
    Get full text
    Article
  8. 228

    Ultra-Low-Voltage CMOS-Based Current Bleeding Mixer with High LO-RF Isolation by Gim Heng Tan, Roslina Mohd Sidek, Harikrishnan Ramiah, Wei Keat Chong, De Xing Lioe

    Published 2014-01-01
    “…The mixer exhibits a conversion gain of 7.5 dB at the radio frequency (RF) of 2.4 GHz, an input third-order intercept point (IIP3) of 1 dBm, and a LO-RF isolation measured to 60 dB. …”
    Get full text
    Article
  9. 229

    Three-Dimensional Prescribed-Time Pinning Group Cooperative Guidance Law by Wenhui Ma, Xiaogeng Liang, Yangwang Fang, Tianbo Deng, Wenxing Fu

    Published 2021-01-01
    “…In order to overcome the drawbacks of the convergence time boundary dependent on tuning parameters in existing finite/fixed-time cooperative guidance law, this paper presents a three-dimensional prescribed-time pinning group cooperative guidance scheme that ensures multiple unpowered missiles to intercept multiple stationary targets. Firstly, combining a prescribed-time scaling function with pinning group consensus theory, the prescribed-time consensus-based cooperative guidance law is proposed. …”
    Get full text
    Article
  10. 230

    Silence et langue. by Zlatka Timenova

    Published 2009-12-01
    “…Lors de l’échange verbal, cette spécificité inhérente à la langue provoque la perception d’un reste d’inexprimable qui pourrait intercepter la parole. Ainsi, le silence serait cette absence tendue au sein de l’activité langagière, promettant un nouvel équilibre entre le signe linguistique et l’objet. …”
    Get full text
    Article
  11. 231

    WSN key recovery attack based on symmetric matrix decomposition by Xiangmin JI, Bo ZHAO, Jinhui LIU, Jianwei JIA, Huanguo ZHANG, Shuang XIANG

    Published 2018-10-01
    “…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
    Get full text
    Article
  12. 232

    Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation by Shiguo WANG, Shujuan TIAN, Qingyong DENG

    Published 2023-11-01
    “…For the federated learning scenarios with edge-end cooperation, edge servers and device terminals update their models and exchange gradient parameters frequently, and hence eavesdroppers can manipulate channel estimation through pilot spoofing to intercept the transmitted information and reduce the update efficiency of federated learning model.Therefore, a pilot attack detection algorithm with heterogeneous pilot energy estimation was proposed.Firstly, a federated learning pilot attack system model was constructed after the security of pilot attacks on data transmission had been analyzed.Then, a pilot attack detection method based on random segmentation and encryption methods was proposed to detect the pilot spoofing accurately and the contaminated channel could be recovered as well.Experimental results show that the proposed algorithm is more suitable for detecting pilot attacks with low transmit power and strong concealment compared to other existing algorithms.Furthermore, the data transmission rate of edge servers is improved significantly through the precoding based on the recovered channel state information.…”
    Get full text
    Article
  13. 233

    Japanese Orange Fly, Bactrocera tsuneonis (Miyake) (Insecta: Diptera: Tephritidae) by Howard V. Weems, Jr., Thomas R. Fasulo

    Published 2004-11-01
    “…There have been no interceptions of the Japanese orange fly in the United States, probably due in a large part to the protection provided by a US embargo of long standing against citrus from the orient.This document is EENY-263 (originally published as DPI Entomology Circular 56), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
    Get full text
    Article
  14. 234

    Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode by Hezhong PAN, Peiyi HAN, Xiayu XIANG, Shaoming DUAN, Rongfei ZHUANG, Chuanyi LIU

    Published 2021-11-01
    “…The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data processing stage, a data leakage prevention method based on model pruning was proposed to reduce the amount of data leakage while ensuring the availability of the original model.Aiming at the attack in model training stage, an attack detection method based on model parameter analysis was proposed to intercept malicious models and prevent data leakage.These two methods do not need to modify or encrypt data, and do not need to manually analyze the training code of deep learning model, so they can be better applied to data theft defense in data sandbox mode.Experimental evaluation shows that the defense method based on model pruning can reduce 73% of data leakage, and the detection method based on model parameter analysis can effectively identify more than 95% of attacks.…”
    Get full text
    Article
  15. 235

    Analysis of coral reef health based on the abundance of herbivorous reef fish in the waters of Krueng Raya, Aceh Besar by Ulfah Maria, Cindy Safitri Arsa, Andianto Dika, Zahra Avifah, Miswari Nur

    Published 2025-01-01
    “…Data collection was carried out using the Point Intercept Transect (PIT) method for coral monitoring, while the herbivorous fish were assessed using the Underwater Visual Census (UVC) Belt Transect method. …”
    Get full text
    Article
  16. 236

    Extracting the dependence of directed flow differences on conserved charges by Lin Zi-Wei, Nayak Kishora, Shi Shusu

    Published 2025-01-01
    “…Previously, we have shown with quark coalescence that Av1 and the slope difference △v′1 depend linearly on both △q and ∆S with zero intercept. Here we emphasize that a two-dimensional function or fit is necessary for extracting the △q- and △S-dependences of △v1. …”
    Get full text
    Article
  17. 237

    Terminal Guidance Law for UAV Based on Receding Horizon Control Strategy by Zhenglong Wu, Zhenyu Guan, Chengwei Yang, Jie Li

    Published 2017-01-01
    “…Finally, guidance law performs repeated iteration until intercepting the target. The guidance law is of subprime optimal type, requiring less guidance information, and does not need to estimate the acceleration of target and time to go. …”
    Get full text
    Article
  18. 238

    Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control by Yang YANG, Bo-gang LIN, Mao-de MA

    Published 2013-08-01
    “…It deters a third-party storage provider from intercepting users' sensitive information when a search function is provided. …”
    Get full text
    Article
  19. 239

    An Empirical Analysis of Non-Interest Income's Effect on Commercial Bank Performance by Yimeng Wang, Aisyah Abdul-Rahman, Syajarul Imna Mohd Amin, Ainul Huda Jamil

    Published 2024-12-01
    “…Using panel data for sixteen Chinese listed commercial banks from 2007 to 2013, variable intercept and variable coefficient models were constructed, accounting for variables including macroeconomic growth rate. …”
    Get full text
    Article
  20. 240

    Comprehensive analysis of In0.53Ga0.47As SOI-FinFET for enhanced RF/wireless performance by Priyanka Agrwal, Ajay Kumar

    Published 2025-02-01
    “…The linearity performance of InGaAs-SOI-FinFET focuses on parameters such as third-order intercept point (IP3) and linearity metrics in analog circuits. …”
    Get full text
    Article