-
41
Security versus reliability analysis for multi-eavesdropper cooperation wireless networks with best relay
Published 2017-10-01Subjects: Get full text
Article -
42
INCORPORATING PUBLIC INPUT WITH GEOGRAPHIC INFORMATION SYSTEM (GIS) FOR BICYCLE STRATEGIC PLANNING
Published 2021-10-01Subjects: Get full text
Article -
43
Using random subcarrier weighting for multi-carrier systems physical layer security
Published 2012-10-01Subjects: “…low probability of interception…”
Get full text
Article -
44
Using a digital health intervention “INTERCEPT” to improve secondary prevention in coronary heart disease (CHD) patients: protocol for a mixed methods non-randomised feasibility study [version 2; peer review: 2 approved]
Published 2025-01-01“…Commencing with pre-implementation (1 month duration), participants will not immediately receive INTERCEPT, however, they will be invited to receive INTERCEPT at 3 months follow-up. …”
Get full text
Article -
45
ANALYSIS ON THE INFLUENCE OF THE LOAD THE END PLATE OF THE DRUM SHEAER
Published 2017-01-01Subjects: Get full text
Article -
46
Effects of clear aligners treatment in growing patients: a systematic review
Published 2025-01-01Subjects: Get full text
Article -
47
BANKRUPTCY LAW AS AN INSTRUMENT OF REDISTRIBUTION OF CORPORATE CONTROL: A RETROSPECTIVE ANALYSIS
Published 2017-01-01Subjects: Get full text
Article -
48
Rate splitting based robust secure transmission scheme in RIS-assisted satellite-terrestrial integrated network
Published 2023-12-01Subjects: Get full text
Article -
49
-
50
-
51
Efficiency of capture of inertia aerosol particles in a periodic cell with a porous cylinder
Published 2022-09-01“…A formula is derived for estimating the efficiency of particle trapping under the effect of particle interception on a porous cylinder.…”
Get full text
Article -
52
Solar radiation model and optimization of asymmetric large-span externally insulated plastic greenhouses.
Published 2025-01-01“…The optimization objectives for solar radiation were set to maximize solar radiation interception and minimize the coefficient of variation. …”
Get full text
Article -
53
Mobile platform continuous authentication scheme based on gait characteristics
Published 2019-07-01“…The popularity of smart phones renders people extremely high requirements for safety.But the traditional one-time authentication method can’t continuously guarantee the security of equipment.To solve the problem,a continuous authentication scheme based on gait characteristics was proposed to realize the identification of current visitors.Moving average filtering,threshold-based useful information interception method and other operations were adopted to reduce noise interference.Template interception was used to maximize the utilization of information,and an optimal combination of time domain features and frequency domain features were proposed to reduce the storage space requirement of users’ information.Finally,the support vector machine realized the identity authentication function.Experiments show that the proposed scheme can effectively authenticate the identities of visitors.…”
Get full text
Article -
54
Prescribed Performance Guidance Law with Multiple Constraints
Published 2022-01-01“…Firstly, a two-dimensional plane interception model considering the dynamic characteristics of autopilot and input constraints is established. …”
Get full text
Article -
55
Application of MIKE11 Model in River Network Area of Pearl River Delta for Water Quality Improvement
Published 2023-01-01“…The water quality improvement in the river network area of the Pearl River Delta is an important part of the comprehensive management of the river basin,and it is necessary to study the compliance of water quality improvement measures.Taking the Beicun river system of Nanhai district,Foshan city in the Pearl River Delta as an example,this paper chooses COD,NH<sub>3</sub>-N and TP as the characteristic indexes based on the MIKE11 one-dimensional hydrodynamic water quality model to study the hydrodynamic force of rivers and water quality improvement effect under different engineering schemes.The results show that measures such as pollution interception,silt removal,and water diversion can improve the overall water quality of the studied river reach in varying degrees,and thus the water quality improvement is achieved.As the projects of pollution interception and fresh water are implemented,the water quality in typical cross sections of main rivers in the Beicun river system can meet the requirement of class Ⅴ.After the implementation of water diversion and transfer,as well as CSO storage pool,the pollutant concentration in the observed cross section of seriously polluted rivers decreases by more than 70%.As a result,this paper can provide a basis for improving water quality in the river network area of the Pearl River Delta.…”
Get full text
Article -
56
Technical Performance of Ethiopian Male Soccer National Team
Published 2018-08-01“…Technical performance variables analysis included: Tackle, clearance Interception passes, pass accuracy, crosses, cross accuracy, corner, shot, shot accuracy and goal and players were categorized into three as defence, midfield, and striker based on their position. …”
Get full text
Article -
57
Pernicious Effects of Toe Sucking Habit in Children
Published 2016-01-01“…Hence the treatment plan was formulated for immediate cessation of habit. Appropriate interception of habit and timely orthodontic intervention led to not only early interception of cross-bite but also decrease in pyrexial episodes. …”
Get full text
Article -
58
A Midcourse Guidance Method Combined with Trajectory Prediction for Antinear-Space-Gliding Vehicles
Published 2022-01-01“…Near-space-gliding vehicles have variable maneuver modes and dramatic changes in their ballistic parameters, which lead to a need to accurately predict an intercept point based on predictions of their trajectories. …”
Get full text
Article -
59
«The black room» the Russian foreign Ministry against Napoleon
Published 2012-10-01“…Also some organizational work aspects of interception of French army cipher messages are considered.…”
Get full text
Article -
60
Multi-type low-rate DDoS attack detection method based on hybrid deep learning
Published 2022-02-01“…Low-Rate distributed denial of service (DDoS) attack attacks the vulnerabilities in the adaptive mechanism of network protocols, posing a huge threat to the quality of network services.Low-Rate DDoS attack was characterized by high secrecy, low attack rate, and periodicity.Existing detection methods have the problems of single detection type and low identification accuracy.In order to solve them, a multi-type low-rate DDoS attack detection method based on hybrid deep learning was proposed.Different types of low-rate DDoS attacks and normal traffic in different scenarios under 5G environment were simulated.Traffic was collected at the network entrance and its traffic characteristic information was extracted to obtain multiple types of low-rate DDoS attack data sets.From the perspective of statistical threshold and feature engineering, the characteristics of different types of low-rate DDoS attacks were analyzed respectively, and the effective feature set of 40-dimension low-rate DDoS attacks was obtained.CNN-RF hybrid deep learning algorithm was used for offline training based on the effective feature set, and the performance of this algorithm was compared with LSTM-Light GBM and LSTM-RF algorithms.The CNN-RF detection model was deployed on the gateway to realize the online detection of multiple types of low-rate DDoS attacks, and the performance was evaluated by using the newly defined error interception rate and malicious traffic detection rate indexes.The results show that the proposed method can detect four types of low-rate DDoS attacks online, including Slow Headers attack, Slow Body attack, Slow Read attack and Shrew attack, and the error interception rate reaches 11.03% in 120 s time window.The detection rate of malicious traffic reaches 96.22%.It can be judged by the results that the proposed method can significantly reduce the intensity of low-rate DDoS attack traffic at the network entrance, and can be deployed and applied in the actual environment.…”
Get full text
Article