نتایج جستجو برای: stealth properties
تعداد نتایج: 870525 فیلتر نتایج به سال:
This paper focuses on the anticipatory enhancement of methods of detecting stealth software. Cyber security detection tools are insufficiently powerful to reveal the most recent cyber-attacks which use malware. In this paper, we will present first an idea of the highest stealth malware, as this is the most complicated scenario for detection because it combines both existing anti-forensic techni...
This papers introduces the stealth tracking problem, in which a robot, equipped with visual sensors, tries to track a moving target among obstacles and, at the same time, remain hidden from the target. Obstacles impede both the tracker’s motion and visibility, but on the other hand, provide hiding places for the tracker. Our proposed tracking algorithm uses only local information from the track...
Documents containing executable files are often used in targeted email attacks in Japan. We examine various document formats (Rich Text Format, Compound File Binary and Portable Document Format) for files used in targeted attacks from 2009 to 2012 in Japan. Almost all the examined document files contain executable files that ignore the document file format specifications. Therefore, we focus on...
An underwater robot is one of the important ocean equipment, and especially its stealth performance has influenced on the vitality in naval warfare. Structure radiation noise as the main source of underwater robot noise, so analysis on vibration and noise radiation is a topic of great concern. The way is used widely that based on fluid-solid coupling modal analysis combined with simulation on v...
To cope with the combat task allocation problems of aerial swarm, firstly, the assumption of battlefield environment was made. And the two multi-attribute principal parts of battlefield, swarm aerocraft (SA) and attacked target (AT) were analysed respectively. Secondly, based on comprehensive consideration of stealth and anti-stealth, attack and counter attack, multi-vehicle cooperation, etc., ...
For increasing radio frequency (RF) signal stealth effect, this paper presents a novel method to generate high-resolution range picture (HRRP) with compressed sensing (CS) technique, and using support vector machine (SVM) technique to separate different aircraft. Firstly, this paper constructs a suitable DFT frame depending on sparse representation of HRRP, and designs the sensing matrix with r...
Accurate Analysis of Target Characteristic in Bistatic SAR Images: A Dihedral Corner Reflectors Case
The dihedral corner reflectors are the basic geometric structure of many targets and are the main contributions of radar cross section (RCS) in the synthetic aperture radar (SAR) images. In stealth technologies, the elaborate design of the dihedral corners with different opening angles is a useful approach to reduce the high RCS generated by multiple reflections. As bistatic synthetic aperture ...
One recent promising development in the modification of drug formulations to improve chemotherapy is the use of a liposome-mediated drug delivery system. The efficacies of isoniazid and rifampin encapsulated in lung-specific stealth liposomes were evaluated by injecting liposomal drugs and free drugs into tuberculous mice twice a week for 6 weeks. Liposome-encapsulated drugs at and below therap...
Literacy assessment is essential for effective literacy instruction and training. However, traditional paper-based assessments are typically decontextualized may cause stress anxiety test takers. In contrast, serious games game environments allow the of in more authentic engaging ways, which has some potential to increase assessment’s validity reliability. The primary objective this study exami...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید