-
221
Spectrphotometric Determination of Buclizine as Hydrochloride Using Various Chromogenic Reagents
Published 2010-01-01“…Regression analysis using the method of least squares was made to evaluate the slope(b), intercept(a) and correlation coefficient (r) and standard error of estimation (Se) for each system Determination of BUCZ in bulk form and in pharmaceutical formulations were also incorporated.…”
Get full text
Article -
222
Comparing prediction accuracy for 30-day readmission following primary total knee arthroplasty: the ACS-NSQIP risk calculator versus a novel artificial neural network model
Published 2025-01-01“…While the ANN demonstrated good discrimination and calibration (area under the curve (AUC)ANN = 0.72, slope = 1.32, intercept = −0.09) in the validation cohort, the SRC demonstrated poor discrimination (AUCSRC = 0.55) and underestimated readmission risk (slope = −0.21, intercept = 0.04). …”
Get full text
Article -
223
Impact of cascade reservoir on the sources of organic matter in sediments of Lancang river
Published 2025-01-01“…Summary: The construction of dams to intercept natural rivers constitutes the most severe human activity influencing the underlying surface. …”
Get full text
Article -
224
Artificial noise aided secure beamforming for multi-antenna relay systems
Published 2014-11-01“…In the amplify-and-forward (AF) relay systems,the confidential information forwarded by the relay can be intercepted by the eavesdroppers.For guaranteeing the secure communications,an artificial noise aided secure beamforming method is proposed.The goal is to maximize the secrecy rate of the system by jointly designing the beamforming matrix and the artificial noise (AN) covariance matrix at the relay subject to the total power and the per-antenna power constraints.This non-convex secrecy rate maximization (SRM) problem can be recast as a two-level optimization problem.The outer part can be solved by performing a one-dimensional search,and the inner part can be handled by the semidefinite relaxation (SDR) technique and interior-point methods.It is shown that there always exists a rank-one optimal solution for the SDR problem,i.e.…”
Get full text
Article -
225
UV Spectrophotometric Method for the Estimation of Valacyclovir HCl in Tablet Dosage Form
Published 2009-01-01“…Beer’s law was obeyed in the concentration range of 5-25 mcg mL-1 with 1.0910x104 mol-1 cm-1, the slope, intercept, correlation coefficient, detection and quantitation limits were also calculated. …”
Get full text
Article -
226
Fast Trajectory Generation Method for Midcourse Guidance Based on Convex Optimization
Published 2022-01-01“…To generate the midcourse guidance trajectory for intercepting the high-speed and high maneuvering target, which is a strongly nonlinear and strongly constrained problem, a two-stage convex optimization method is proposed to solve the optimal trajectory quickly. …”
Get full text
Article -
227
Spectrophotometric Determination of Ceftibuten in Bulk and in Pharmaceutical Formulations
Published 2010-01-01“…The apparent molar absorptivity and sandell’s sensitivity were 0.4583x104 and 0.3x104 respectively. The slope and intercept of the equation of the regression line are 4.5x10-3 and 1.3x10-5 respectively. …”
Get full text
Article -
228
Ultra-Low-Voltage CMOS-Based Current Bleeding Mixer with High LO-RF Isolation
Published 2014-01-01“…The mixer exhibits a conversion gain of 7.5 dB at the radio frequency (RF) of 2.4 GHz, an input third-order intercept point (IIP3) of 1 dBm, and a LO-RF isolation measured to 60 dB. …”
Get full text
Article -
229
Three-Dimensional Prescribed-Time Pinning Group Cooperative Guidance Law
Published 2021-01-01“…In order to overcome the drawbacks of the convergence time boundary dependent on tuning parameters in existing finite/fixed-time cooperative guidance law, this paper presents a three-dimensional prescribed-time pinning group cooperative guidance scheme that ensures multiple unpowered missiles to intercept multiple stationary targets. Firstly, combining a prescribed-time scaling function with pinning group consensus theory, the prescribed-time consensus-based cooperative guidance law is proposed. …”
Get full text
Article -
230
Silence et langue.
Published 2009-12-01“…Lors de l’échange verbal, cette spécificité inhérente à la langue provoque la perception d’un reste d’inexprimable qui pourrait intercepter la parole. Ainsi, le silence serait cette absence tendue au sein de l’activité langagière, promettant un nouvel équilibre entre le signe linguistique et l’objet. …”
Get full text
Article -
231
WSN key recovery attack based on symmetric matrix decomposition
Published 2018-10-01“…The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.…”
Get full text
Article -
232
Pilot spoofing detection algorithm for edge nodes based on heterogeneous pilot energy estimation
Published 2023-11-01“…For the federated learning scenarios with edge-end cooperation, edge servers and device terminals update their models and exchange gradient parameters frequently, and hence eavesdroppers can manipulate channel estimation through pilot spoofing to intercept the transmitted information and reduce the update efficiency of federated learning model.Therefore, a pilot attack detection algorithm with heterogeneous pilot energy estimation was proposed.Firstly, a federated learning pilot attack system model was constructed after the security of pilot attacks on data transmission had been analyzed.Then, a pilot attack detection method based on random segmentation and encryption methods was proposed to detect the pilot spoofing accurately and the contaminated channel could be recovered as well.Experimental results show that the proposed algorithm is more suitable for detecting pilot attacks with low transmit power and strong concealment compared to other existing algorithms.Furthermore, the data transmission rate of edge servers is improved significantly through the precoding based on the recovered channel state information.…”
Get full text
Article -
233
Japanese Orange Fly, Bactrocera tsuneonis (Miyake) (Insecta: Diptera: Tephritidae)
Published 2004-11-01“…There have been no interceptions of the Japanese orange fly in the United States, probably due in a large part to the protection provided by a US embargo of long standing against citrus from the orient.This document is EENY-263 (originally published as DPI Entomology Circular 56), one of a series of Featured Creatures from the Entomology and Nematology Department, Florida Cooperative Extension Service, Institute of Food and Agricultural Sciences, University of Florida. …”
Get full text
Article -
234
Threat analysis and defense methods of deep-learning-based data theft in data sandbox mode
Published 2021-11-01“…The threat model of deep-learning-based data theft in data sandbox model was analyzed in detail, and the degree of damage and distinguishing characteristics of this attack were quantitatively evaluated both in the data processing stage and the model training stage.Aiming at the attack in the data processing stage, a data leakage prevention method based on model pruning was proposed to reduce the amount of data leakage while ensuring the availability of the original model.Aiming at the attack in model training stage, an attack detection method based on model parameter analysis was proposed to intercept malicious models and prevent data leakage.These two methods do not need to modify or encrypt data, and do not need to manually analyze the training code of deep learning model, so they can be better applied to data theft defense in data sandbox mode.Experimental evaluation shows that the defense method based on model pruning can reduce 73% of data leakage, and the detection method based on model parameter analysis can effectively identify more than 95% of attacks.…”
Get full text
Article -
235
Analysis of coral reef health based on the abundance of herbivorous reef fish in the waters of Krueng Raya, Aceh Besar
Published 2025-01-01“…Data collection was carried out using the Point Intercept Transect (PIT) method for coral monitoring, while the herbivorous fish were assessed using the Underwater Visual Census (UVC) Belt Transect method. …”
Get full text
Article -
236
Extracting the dependence of directed flow differences on conserved charges
Published 2025-01-01“…Previously, we have shown with quark coalescence that Av1 and the slope difference △v′1 depend linearly on both △q and ∆S with zero intercept. Here we emphasize that a two-dimensional function or fit is necessary for extracting the △q- and △S-dependences of △v1. …”
Get full text
Article -
237
Terminal Guidance Law for UAV Based on Receding Horizon Control Strategy
Published 2017-01-01“…Finally, guidance law performs repeated iteration until intercepting the target. The guidance law is of subprime optimal type, requiring less guidance information, and does not need to estimate the acceleration of target and time to go. …”
Get full text
Article -
238
Secure hidden keyword searchable encryption schemewith fine-grained and flexible access control
Published 2013-08-01“…It deters a third-party storage provider from intercepting users' sensitive information when a search function is provided. …”
Get full text
Article -
239
An Empirical Analysis of Non-Interest Income's Effect on Commercial Bank Performance
Published 2024-12-01“…Using panel data for sixteen Chinese listed commercial banks from 2007 to 2013, variable intercept and variable coefficient models were constructed, accounting for variables including macroeconomic growth rate. …”
Get full text
Article -
240
Comprehensive analysis of In0.53Ga0.47As SOI-FinFET for enhanced RF/wireless performance
Published 2025-02-01“…The linearity performance of InGaAs-SOI-FinFET focuses on parameters such as third-order intercept point (IP3) and linearity metrics in analog circuits. …”
Get full text
Article