نتایج جستجو برای: fatigue countermeasure

تعداد نتایج: 74370  

Journal: :Industrial health 2009
Hans P A Van Dongen Gregory Belenky

There are considerable individual differences in cognitive performance deficits resulting from extended work hours and shift work schedules. Recent progress in sleep and performance research has yielded new insights into the causes and consequences of these individual differences. Neurobiological processes of sleep/wake regulation underlie trait individual variability in vulnerability to perfor...

Journal: :Journal of Agricultural Meteorology 1967

Journal: :Nippon Ronen Igakkai Zasshi. Japanese Journal of Geriatrics 2010

Journal: :The Journal of the Kyushu Dental Society 1990

Journal: : 2022

In 2016, a countermeasure against the Nankai trough long-period and long-duration ground motions (LPGMs) was announced. However, response spectrum method (RSM), indicated by Ministry of Construction notification Vol. 2009 (MCN), is out countermeasure. An RSM that considers characteristic changes due to repeated deformation has also been proposed, but since damping correction formula MCN used, i...

Journal: :Accident; analysis and prevention 1988
S Danielsson

In an earlier paper [Danielsson, 1986], we studied the problem of estimating the safety effect of a countermeasure on the expected number of accidents at road junctions when high-accident sites are selected for the study. Often, however, the countermeasure leads to varying effectiveness on different types of accidents. This paper is a generalization in that we estimate effects of countermeasure...

Journal: :IACR Cryptology ePrint Archive 2015
Christophe Clavier Julien Francq Antoine Wurcker

In this paper we study a parity check based countermeasure proposed by Chen et al. that thwarts their attack by detecting byte fault injection during the AES key schedule process. We provide a generalization of their approach that allows to derive parity equations for every AES sizes not given by the authors. We analyze why Chen et al. countermeasure does not properly works. Doing so we are abl...

2014
Moritz August

Virtualization has become of increasing importance for the security of embedded systems during the last years. One of the major threats to this security is posed by side channel attacks. In this work, Bernstein’s time-driven cache-based timing attack against AES is revisited in a virtualization security scenario and the PikeOS micro kernel system is presented. A novel countermeasure against tim...

Journal: :IACR Cryptology ePrint Archive 2009
Jean-Sébastien Coron Ilya Kizhvatov

Random delays are a countermeasure against a range of side channel and fault attacks that is often implemented in embedded software. We propose a new method for generation of random delays and a criterion for measuring the efficiency of a random delay countermeasure. We implement this new method along with the existing ones on an 8-bit platform and mount practical side-channel attacks against t...

2005
Nikita Borisov Robert Johnson

Dean and Hu proposed a probabilistic countermeasure to the classic access(2)/open(2) TOCTTOU race condition in privileged Unix programs [4]. In this paper, we describe an attack that succeeds with very high probability against their countermeasure. We then consider a stronger randomized variant of their defense and show that it, too, is broken. We conclude that access(2) must never be used in p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید