نتایج جستجو برای: hack

تعداد نتایج: 658  

Journal: :British Journal of Psychiatry 1995

Journal: :CoRR 2017
Daniela Huppenkothen Anthony Arendt David W. Hogg Karthik Ram Jacob VanderPlas Ariel Rokem

Across almost all scientific disciplines, the instruments that record our experimental data and the methods required for storage and data analysis are rapidly increasing in complexity. This gives rise to the need for scientific communities to adapt on shorter time scales than traditional university curricula allow for, and therefore requires new modes of knowledge transfer. The universal applic...

Journal: :Journal of Mental Science 1896

2012
Alex Tsang Xiong Zhang Wei Thoo Yue Michael Chau

It is a consensus that there exists learning barriers to become a skilled hacker. Hack forums are believed to be indispensable venues where to overcome these barriers. However, this belief has not been formally justified in academia. By studying post content, we find evidence of different posting behaviors in hack forums. One interesting result is that there are indeed some learning behaviors e...

2012
Mathias Morbitzer

The MIFARE Classic is the most popular RFID chip, used in public transport as well as cafeterias and other applications. This paper gives an overview of which methods were used to re-engineer the chips, from polishing to analyzing the communication. Within this process, various security weaknesses were discovered. Those allow various attacks, which will be shown in the last part of the paper.

Journal: :به زراعی کشاورزی 0
محمود قربانزاده نقاب استادیار، گروه تکنولو‍ژی تولیدات گیاهی، دانشکده کشاورزی شیروان، دانشگاه فردوسی مشهد، ایران حمیدرضا بابایی استادیار بخش تحقیقات دانه های روغنی، مؤسسه تحقیقات اصلاح و تهیه نهال و بذر، کرج ـ ایران قربانعلی رسام استادیار، گروه تکنولو‍ژی تولیدات گیاهی، دانشکده کشاورزی شیروان، دانشگاه فردوسی مشهد علیرضا دادخواه دانشیار، گروه تکنولو‍ژی تولیدات گیاهی، دانشکده کشاورزی شیروان، دانشگاه فردوسی مشهد اصغر خوشنود یزدی استادیار، گروه تکنولو‍ژی تولیدات گیاهی، دانشکدة کشاورزی شیروان، دانشگاه فردوسی مشهد

to study the response of yield,yield components,protein and oil content of soybean cultivars to delay in planting in shirvan region, an experiment was conducted at research farm of the faculty of agriculture, shirvan in 2010. in this study, nine soybean cultivars (habit, hack, black hack, cencutry, cloumbos, clark, sahar, zane and willams) were evaluated at different sowing dates (20 may, 4 jun...

2009
PÉTER BARABÁS P. BARABÁS

Bayesian classifiers provide relatively good performance compared with other more complex algorithms. Misclassification ratio is very low for trained samples, but in the case of outliers the misclassification error may increase significantly. The usage of ‘summation hack’ method in Bayesian classification algorithm can reduce the misclassifications rate for untrained samples. The goal of this p...

2001
Rajesh Krishna Balan Boon Peng Lee K. R. Renjish Kumar Lillykutty Jacob Winston Khoon Guan Seah Akkihebbal L. Ananda

In recent years, wireless networks have become increasingly common and an increasing number of devices are communicating with each other over lossy links. Unfortunately, TCP performs poorly over lossy links as it is unable to differentiate the loss due to packet corruption from that due to congestion. In this paper, we present an extension to TCP which enables TCP to distinguish packet corrupti...

Journal: :First Monday 2022

The concept ‘contentious expertise’ is proposed to account for technological expertise applied in controversies. Activists from the Chaos Computer Club, a German hacker group, adapted contentious when they built so-called clone of mobile phone SIM card 1998, and used publicly make call — free charge. activists blamed secret design cards, subsequently, was changed made fully public. activists’ t...

Journal: :Mechanical Engineering 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید