Showing 41 - 60 results of 408 for search '"interception"', query time: 0.06s Refine Results
  1. 41
  2. 42
  3. 43

    Using random subcarrier weighting for multi-carrier systems physical layer security by Zhou ZHONG, Liang JIN, Kai-zhi HUANG

    Published 2012-10-01
    Subjects: “…low probability of interception…”
    Get full text
    Article
  4. 44
  5. 45
  6. 46
  7. 47
  8. 48
  9. 49
  10. 50
  11. 51

    Efficiency of capture of inertia aerosol particles in a periodic cell with a porous cylinder by A.R. Khaziev, Sh.Kh. Zaripov, R.F. Mardanov, A.G. Pilyugin

    Published 2022-09-01
    “…A formula is derived for estimating the efficiency of particle trapping under the effect of particle interception on a porous cylinder.…”
    Get full text
    Article
  12. 52

    Solar radiation model and optimization of asymmetric large-span externally insulated plastic greenhouses. by Chuanqing Wang, Kai Liu, Hongyu Ma, Tianhua Li, Shaojie Wang, Dalong Zhang, Min Wei

    Published 2025-01-01
    “…The optimization objectives for solar radiation were set to maximize solar radiation interception and minimize the coefficient of variation. …”
    Get full text
    Article
  13. 53

    Mobile platform continuous authentication scheme based on gait characteristics by Li YANG, Zhuoru MA, Chenghui ZHANG, Qingqi PEI

    Published 2019-07-01
    “…The popularity of smart phones renders people extremely high requirements for safety.But the traditional one-time authentication method can’t continuously guarantee the security of equipment.To solve the problem,a continuous authentication scheme based on gait characteristics was proposed to realize the identification of current visitors.Moving average filtering,threshold-based useful information interception method and other operations were adopted to reduce noise interference.Template interception was used to maximize the utilization of information,and an optimal combination of time domain features and frequency domain features were proposed to reduce the storage space requirement of users’ information.Finally,the support vector machine realized the identity authentication function.Experiments show that the proposed scheme can effectively authenticate the identities of visitors.…”
    Get full text
    Article
  14. 54

    Prescribed Performance Guidance Law with Multiple Constraints by Xu Li, Jikun Ye, Chijun Zhou, Xiao Tang

    Published 2022-01-01
    “…Firstly, a two-dimensional plane interception model considering the dynamic characteristics of autopilot and input constraints is established. …”
    Get full text
    Article
  15. 55

    Application of MIKE11 Model in River Network Area of Pearl River Delta for Water Quality Improvement by LI Qingfeng, GUO Shan, ZHANG Ruyu, YAN Xiaoman, ZHANG Xuelin

    Published 2023-01-01
    “…The water quality improvement in the river network area of the Pearl River Delta is an important part of the comprehensive management of the river basin,and it is necessary to study the compliance of water quality improvement measures.Taking the Beicun river system of Nanhai district,Foshan city in the Pearl River Delta as an example,this paper chooses COD,NH<sub>3</sub>-N and TP as the characteristic indexes based on the MIKE11 one-dimensional hydrodynamic water quality model to study the hydrodynamic force of rivers and water quality improvement effect under different engineering schemes.The results show that measures such as pollution interception,silt removal,and water diversion can improve the overall water quality of the studied river reach in varying degrees,and thus the water quality improvement is achieved.As the projects of pollution interception and fresh water are implemented,the water quality in typical cross sections of main rivers in the Beicun river system can meet the requirement of class Ⅴ.After the implementation of water diversion and transfer,as well as CSO storage pool,the pollutant concentration in the observed cross section of seriously polluted rivers decreases by more than 70%.As a result,this paper can provide a basis for improving water quality in the river network area of the Pearl River Delta.…”
    Get full text
    Article
  16. 56

    Technical Performance of Ethiopian Male Soccer National Team by Esayas Zenbaba

    Published 2018-08-01
    “…Technical performance variables analysis included: Tackle, clearance Interception passes, pass accuracy, crosses, cross accuracy, corner, shot, shot accuracy and goal and players were categorized into three as defence, midfield, and striker based on their position. …”
    Get full text
    Article
  17. 57

    Pernicious Effects of Toe Sucking Habit in Children by Deepika Pai, Saurabh Kumar, Abhay T. Kamath, Vipin Bhaskar

    Published 2016-01-01
    “…Hence the treatment plan was formulated for immediate cessation of habit. Appropriate interception of habit and timely orthodontic intervention led to not only early interception of cross-bite but also decrease in pyrexial episodes. …”
    Get full text
    Article
  18. 58

    A Midcourse Guidance Method Combined with Trajectory Prediction for Antinear-Space-Gliding Vehicles by JiaQing Wan, Qian Zhang, Hao Zhang, JiaNing Liu

    Published 2022-01-01
    “…Near-space-gliding vehicles have variable maneuver modes and dramatic changes in their ballistic parameters, which lead to a need to accurately predict an intercept point based on predictions of their trajectories. …”
    Get full text
    Article
  19. 59

    «The black room» the Russian foreign Ministry against Napoleon by D. E. Larin

    Published 2012-10-01
    “…Also some organizational work aspects of interception of French army cipher messages are considered.…”
    Get full text
    Article
  20. 60

    Multi-type low-rate DDoS attack detection method based on hybrid deep learning by Lijuan LI, Man LI, Hongjun BI, Huachun ZHOU

    Published 2022-02-01
    “…Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack rate, and periodicity.Existing detection methods have the problems of single detection type and low identification accuracy.In order to solve them, a multi-type low-rate DDoS attack detection method based on hybrid deep learning was proposed.Different types of low-rate DDoS attacks and normal traffic in different scenarios under 5G environment were simulated.Traffic was collected at the network entrance and its traffic characteristic information was extracted to obtain multiple types of low-rate DDoS attack data sets.From the perspective of statistical threshold and feature engineering, the characteristics of different types of low-rate DDoS attacks were analyzed respectively, and the effective feature set of 40-dimension low-rate DDoS attacks was obtained.CNN-RF hybrid deep learning algorithm was used for offline training based on the effective feature set, and the performance of this algorithm was compared with LSTM-Light GBM and LSTM-RF algorithms.The CNN-RF detection model was deployed on the gateway to realize the online detection of multiple types of low-rate DDoS attacks, and the performance was evaluated by using the newly defined error interception rate and malicious traffic detection rate indexes.The results show that the proposed method can detect four types of low-rate DDoS attacks online, including Slow Headers attack, Slow Body attack, Slow Read attack and Shrew attack, and the error interception rate reaches 11.03% in 120 s time window.The detection rate of malicious traffic reaches 96.22%.It can be judged by the results that the proposed method can significantly reduce the intensity of low-rate DDoS attack traffic at the network entrance, and can be deployed and applied in the actual environment.…”
    Get full text
    Article