نتایج جستجو برای: armed attack
تعداد نتایج: 92853 فیلتر نتایج به سال:
Attacks on the routing system, with the goal of diverting traffic past an enemy-controlled point for purposes of eavesdropping or connection-hijacking, have long been known. In principle, at least, these attacks can be countered by use of appropriate authentication techniques. We demonstrate a new attack, based on link-cutting, that cannot be countered in this fashion. Armed with a topology map...
A logic programming approach to the intelligent monitoring of anomalous human activity is considered. The main idea of this approach is in using of a first order logic for describing abstract concepts of anomalous human activity, i.e. brawls, sudden attack, armed attack, leaving object, loitering, pickpocketing, personal theft, immobile person, etc. We use the Actor Prolog concurrent object-ori...
To follow the dynamicity of the user’s content, researchers have recently started to model interactions between users and the ContextAware Recommender Systems (CARS) as a bandit problem where the system needs to deal with exploration and exploitation dilemma. In this sense, we propose to study the freshness of the user’s content in CARS through the bandit problem. We introduce in this paper an ...
Models of Plio-Pleistocene hominid behavioral ecology often emphasize competition with large carnivores. This paper describes competition between modern humans and large carnivores in rural Uganda, including active, confrontational scavenging of carnivore kills by humans and carnivore attacks on humans. Information gathered from Ugandan Game Department archives (1923-1994) reveals that twentiet...
Background and Aim: During the Covid-19 epidemic, the armed forces and medical personnel, took direct action against the disease and served the people. It is possible that these forces and their mental health were affected by the outbreak of this disease. This study aimed to investigate the prevalence of COVID-19 among the armed forces and its impact on their mental health. Methods: This study ...
Background and Aim: Due to the increasing number of Armed Forces Retirement and an increase in the number of cases of sleep disorder by age, sleep disorder is a common problem in the Armed Forces Retirement. For Armed Forces Retirement, the disease and its treatment can have long-term negative effects on their Relaxation Deepening and sleep Quality. The purpose of this study was to evaluate the...
Armed with super computational ability, the most efficient attack on symmetric-key systems is an exhaustive key search. A novel encryption method with infinite key space is presented by modifying traditional book cipher. Infinite key space means the unbounded entropy of the key space, which can frustrate any exhaustive key search. Moreover, this book cipher is immune from frequency analysis. Ex...
This paper describes a method to pick up a folded cloth product by a single-armed robot. We focus on a problem on picking up a folded cloth, and organize tasks to attack it. Then, we propose methods of grasp position estimation composed of two stages: detection of the thickest folded hem and pose estimation of the cloth product. In addition, we attempt to search for appropriate grasping posture...
Precisely how predators solve the problem of sampling unfamiliar prey types is central to our understanding of the evolution of a variety of antipredator defenses, ranging from Müllerian mimicry to polymorphism. When predators encounter a novel prey item then they must decide whether to take a risk and attack it, thereby gaining a potential meal and valuable information, or avoid such prey alto...
As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید