نتایج جستجو برای: level attack
تعداد نتایج: 1152212 فیلتر نتایج به سال:
A sensor network key distribution scheme for hierarchical sensor networks was recently proposed by Cheng and Agrawal. A feature of their scheme is that pairwise keys exist between any pair of high-level nodes (which are called cluster heads) and between any (low-level) sensor node and the nearest cluster head. We present two attacks on their scheme. The first attack can be applied for certain p...
BACKGROUND The aim of this study was to observe the change in plasma PPARs (peroxisome proliferator-activated receptors) level during various periods and in different subtypes in migraine patients. MATERIAL AND METHODS We divided 227 patients with migraine into 2 main groups: the attack period group (n=98) and the attack-free period group (n=129). Patients were further divided into 4 subgroup...
OBJECTIVE To assess patient perspectives on secondary lifestyle modification and knowledge of 'heart attack' after percutaneous coronary intervention (PCI) for coronary artery disease (CAD). DESIGN Observational cross-sectional study. SETTING A single university-based hospital centre in Japan. PARTICIPANTS In total, 236 consecutive patients with CAD who underwent PCI completed a questionn...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyzes the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen plain-images is only one or two. In addition, the security of RCES against the brute-force attack was overestimated. Both theoretical and experimen...
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper analyzes the security of RCES, and points out that it is insecure against the known/chosen-plaintext attacks: the number of required known/chosen plain-images is only one or two. In addition, the security of RCES against the brute-force attack was overestimated. Both theoretical and experimen...
Demand fluctuations in the supply chain lead to uncertainty in inventory policy and thereupon the inventory costs increase. This paper considers the impact of forecasting on the demand variation in a serial three-stage supply chain including a retailer, a manufacturer and a supplier. Four forecasting methods are considered and demand variations evaluated as bullwhip effect measure. We use analy...
The Internet has become a fertile ground for hostile activity. One of the simplest yet most effective attacks that can be launched over the network is a denial of service (DoS) attack. The most trivial form of a DoS attack floods the target with packets, causing congestion and consuming all available network resources. In order to employ massive attack power, the attacker usually launches a dis...
-Security-sensitive environments defend their resources against unauthorized access by implementing access management mechanisms. Text based passwords are not secure enough for such applications. Increasing security has regularly been a problem since net and net Development came into existence, text primarily based passwords is not enough to counter such problems, that's to boot Associate in Nu...
The purpose of this study was to examine the power-strength curve in a half squat exercise in trained basketball players of the EBA league. For that, a cross sectional, descriptive study was carried out to 8 high-level male basketball players. After controlling the participants 1RM, a progressive test, consisted on moving loads of 30, 45, 60, 70 and 80% of 1RM as fast as possible in the concent...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید