Showing 1 - 20 results of 65 for search 'Don Byas~', query time: 2.43s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Kurganless Cemetery of the Sarmatian Times on the Maloe Storozhevoe Hillfort in the Middle Don Basin by Yuriy D. Razuvaev, Aleksandr N. Merkulov, Sergey A. Nelyubov, Yuliya A. Neretina

    Published 2024-09-01
    “…A silver earring and a bone bead were buried with the two individuals. Traces of trauma and pathology on the bones were either absent or few in number (caries, abrasion and loss of teeth). …”
    Get full text
    Article
  5. 5

    Economic Management within the Cossack Frontier in the Second Half of the 19th Century (Based on the Example of the Don and Azov Cossack Troops) by Petr A. Kolpakov, Ivan Yu. Yurchenko

    Published 2025-02-01
    “…The research aims to analyze the specifics of economic administration in the Cossack troops. It is based on the administrative documentation from the boards of the Don and Azov Cossack troops, which are kept in the collections of the State Archive of the Russian Federation and the Russian State Military Historical Archive. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Development of path reservation for wheelchair users within a High-Activity train Station: A case study of SRT Red Line, Don Mueang Station, Bangkok, Thailand by Pakapon Ueasatchamongkhon, Somsiri Siewwuttanagul

    Published 2025-01-01
    “…This study investigates the impact of spatial-based accessibility on the SRT Red Line, Don Mueang Station, a railway station that frequently poses challenges for wheelchair users and has recently been developed under the megaproject “The High-Speed Railway Connecting Three Airports Project”. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    The Savvy Survey #11: Mail-Based Surveys by Glenn D. Israel, Jessica L. Gouldthorpe

    Published 2014-02-01
    “…AEC401/PD075: The Savvy Survey #11: Mail-Based Surveys (ufl.edu) …”
    Get full text
    Article
  17. 17

    The Savvy Survey #11: Mail-Based Surveys by Glenn D. Israel, Jessica L. Gouldthorpe

    Published 2014-02-01
    “…AEC401/PD075: The Savvy Survey #11: Mail-Based Surveys (ufl.edu) …”
    Get full text
    Article
  18. 18
  19. 19

    SyncPoint based scoring method in IDS evaluation by YANG Wang1, GONG Jian1, WU Xiong1

    Published 2008-01-01
    “…Scoring the true positive rate and the false positive rate is a key component in IDS evaluation.The accuracy of the scoring method affects the effectiveness of the evaluation results.There are two kinds of scoring methods existed,one considering the false positive and the other not.But both of them aren’t accurate enough and don’t scale to the traffic volume increase.The characteristics required by the evaluating window was analyzed,and a SyncPoint based scoring method utilizing the features that the IDS processes the packet in a FIFO queue way was proposed.The theoretical analy-sis and the experiment show that the SyncPoint based scoring method is better than the current methods in accuracy and the scalability.…”
    Get full text
    Article
  20. 20

    Power analysis attack of HMAC based on SM3 by Zhi-bo DU, Zhen WU, Min WANG, Jin-tao RAO

    Published 2016-05-01
    “…The current power analysis attack of HMAC based on SM3 applies only to the object,on which there is the Hamming weight and Hamming distance information leakage at the same time.there is only a single information leakage mode on the attack object,then the attack methods don't work.To solve the limitations of the current attack methods,a novel method of the power analysis attack of HMAC based on SM3 was proposed.The different attack object and their related va-riables were selected in each power analysis attack.The attacks were implemented according to the Hamming distance mod-el or Hamming weight model of the intermediate variables.After several power analysis attacked on the first four rounds of SM3,the equations that consists of the results proposed of all the power analysis attacks were obtained.The ultimate attack object is derived by getting the solution of the equations.The experimental results show that the oposed attack method was effective.The method can be used universally because its being available for both the situation of co-exist of hamming weight with Hamming distance,and that of either the Hamming weight or choosing the Hamming distance model existence.…”
    Get full text
    Article