نتایج جستجو برای: fatigue countermeasure

تعداد نتایج: 74370  

Journal: :IACR Cryptology ePrint Archive 2015
Sikhar Patranabis Abhishek Chakraborty Debdeep Mukhopadhyay P. P. Chakrabarti

Biased fault attacks such as the Differential Fault Intensity Analysis (DFIA) have been a major threat to cryptosystems in recent times. DFIA combines principles of side channel analysis and fault attacks to try and extract the key using faulty ciphertexts only. Biased fault attacks have also been shown to weaken traditional redundancy based countermeasures, such as Concurrent Error Detection (...

Journal: :نشریه مراقبت پرستاری مددجو محور 0
tahereh najafi ghezeljeh department of intensive care unit, school of nursing and midwifery, iran university of medical sciences, tehran, iran. hojatollah sedghian department of intensive care unit, school of nursing and midwifery, iran university of medical sciences, tehran, iran. fatemeh mohaddes ardabili department of medical surgical nursing, school of nursing and midwifery, iran university of medical sciences, tehran, iran. habibollah rezaei loieh shahid rajaei cardiovascular, medical and research center, tehran, iran.

background: fatigue is one of the important factors in nursing performance because it affects the quality of care provided to the patients. in this regard, some complementary interventions such as benson relaxation techniques may relieve fatigue. this study aimed to evaluate the effect of benson relaxation on fatigue of nurses working in intensive care units. methods: this is an experimental st...

2005
Gabriel Becerra Jordan Kidney Jason Heard Rob Kremer Jörg Denzinger

Multi-agent systems are one of the fastest growing areas in computer science thanks to their synergistic properties and the applicability of their characteristics in both technological and non-technological areas. Virus and other malicious software writers have not ignored this fact and are now either taking advantage of multi-agent systems. In some cases, multi-agent methodologies are used to ...

Journal: :PLoS neglected tropical diseases 2016
Robert W Malone Jane Homan Michael V Callahan Jill Glasspool-Malone Lambodhar Damodaran Adriano De Bernardi Schneider Rebecca Zimler James Talton Ronald R Cobb Ivan Ruzic Julie Smith-Gagen Daniel Janies James Wilson

INTRODUCTION Reports of high rates of primary microcephaly and Guillain-Barré syndrome associated with Zika virus infection in French Polynesia and Brazil have raised concerns that the virus circulating in these regions is a rapidly developing neuropathic, teratogenic, emerging infectious public health threat. There are no licensed medical countermeasures (vaccines, therapies or preventive drug...

Journal: :iranian journal of neurology 0
mohammad hossein harirchian professor, iranian center of neurological research, department of neurology, school of medicine, tehran university of medical sciences, tehran, iran. somayeh nasergivechi professor, iranian center of neurological research, department of neurology, school of medicine, tehran university of medical sciences, tehran, iran marzieh maddah immunology, allergy and asthma research institute, tehran university of medical sciences, tehran, iran alipasha meysamie associate professor, department of community and preventive medicine, school of medicine, tehran university of medical sciences, tehran, iran homayoun amini associate professor, psychiatry and psychology research center, tehran university of medical sciences, tehran, iran ehsan esmaelii shandiz iranian center of neurological research, department of neurology, school of medicine, tehran university of medical sciences, tehran, iran

background: fatigue, a major cause of disability in individuals with multiple sclerosis (ms), is associated with reduced quality of life. the aim of this study was to evaluate the reliability and reproducibility of the persian version of modified fatigue impact scale (mfis) in iranian patients with ms. methods: this study included 15 subjects with clinically definite ms, 15 hospitalized patient...

2009
CAROL A. FLANNAGAN MICHAEL J. FLANNAGAN Carol A. Flannagan Michael J. Flannagan

The Unified Tool for Mapping Opportunities for Safety Technology (UTMOST) is a model of crash data that incorporates the complex relationships among different vehicle and driver variables. It is designed to visualize the effect of multiple safety countermeasures on elements of the driver, vehicle, or crash population. We have recently updated UTMOST to model the effects of the time-course of fl...

Journal: :IACR Cryptology ePrint Archive 2015
Sikhar Patranabis Abhishek Chakraborty Debdeep Mukhopadhyay

Infective countermeasures have been a promising class of fault attack countermeasures. However, they have been subjected to several attacks owing to lack of formal proofs of security and improper implementations. In this paper, we first provide a formal information theoretic proof of security for one of the most recently proposed infective countermeasures against DFA, under the assumption that ...

Journal: :Human factors 2011
Frédéric Dehais Mickaël Causse Sébastien Tremblay

OBJECTIVE The aim of this study was to empirically assess the efficacy of cognitive countermeasures based on the technique of information removal to enhance human operator attentional disengagement abilities when facing attentional tunneling. BACKGROUND Lessons learned from human factors studies suggest that conflict with automation leads to the degradation of operators' performance by promot...

2001
Dong Xuan Shengquan Wang Ye Zhu Riccardo Bettati Wei Zhao

We describe a defense system to contain Distributed Denial-of-Service (DDoS) flooding attacks in highspeed networks. We aim at protecting TCP friendly traffic, which forms a large portion of Internet traffic. DDoS flooding attacks tend to establish large numbers of malicious traffic flows to congest network. These flows are marked as TCP flows, and use spoofed source identifiers to hide their i...

2015
Liwei Zhang A. Adam Ding Yunsi Fei Pei Luo

To design effective countermeasures for cryptosystems against side-channel power analysis attacks, the evaluation of the system leakage has to be lightweight and often times at the early stage like on cryptographic algorithm or source code. When real implementations and power leakage measurements are not available, security evaluation has to be through metrics for the information leakage of alg...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید