نتایج جستجو برای: attack

تعداد نتایج: 80818  

Journal: :international journal of advanced design and manufacturing technology 0
saeed daneshmand

nowadays, we live in a world which quality, speed, accuracy and cost are the most important parameters in parts' design and manufacturing. due to the complexity of part manufacturing, traditional and nontraditional manufacturing techniques are used. aerodynamic tests usually requires one or several models for testing in wind tunnels and these models typically have particular complexities in whi...

Journal: :Nature 1972

Journal: :the journal of tehran university heart center 0
afsoon fazlinezhad ghaem hospital, mashhad university of medical sciences, mashhad, iran. sara azimi ghaem hospital, mashhad university of medical sciences, mashhad, iran. mahmoodreza azarpazhooh ghaem hospital, mashhad university of medical sciences, mashhad, iran. mohammad khajedaluee ghaem hospital, mashhad university of medical sciences, mashhad, iran. mohsen mahdinezhad kashani islamic azad university, mashhad branch, mashhad, iran.

background: stroke, one of the most important causes of morbidity and mortality in the world, is of great importance in young adults (15-45 years), amongst whom the causes of stroke and transient ischemic attack (tia) are different from those in older ages and a significant portion of them have no known etiology. patent foramen ovale (pfo) is considered a probable cause in this group. methods: ...

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...

Journal: :ACM Transactions on Intelligent Systems and Technology 2023

Deep neural networks are vulnerable to adversarial examples, even in the black-box setting where attacker is only accessible model output. Recent studies have devised effective attacks with high query efficiency. However, such performance often accompanied by compromises attack imperceptibility, hindering practical use of these approaches. In this article, we propose restrict perturbations a sm...

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

Journal: :iranian journal of allergy, asthma and immunology 0
m.ii. boskabady m. ilosaini

for better management of asthma it is essential that patients adjust their treatment according to the medical plan developed by the health care professionals. to achieve this goal, patients should assess the severity of their disease regularly. the purpose of this study was to determine the effect of regular measurement of peak expiratory flow and patient education on self management of asthma....

پایان نامه :دانشگاه امام رضا علیه اسلام - دانشکده مهندسی 1394

روش های موجود برای احرازهویت با توجه به ذخیره تصاویر عنبیه برای مرحله تطبیق، باعث نقض حریم خصوصی افراد و لورفتن ویژگی بیومتریک آنان می شود. الگوریتم پیشنهادی راهکاری برای استفاده از تصاویر بدست آمده از عنبیه برای تولید یک کلید موقت برای عنبیه کاربر و استفاده از ویژگی های عنبیه چشم او و ترکیب آنها برای تولید یک کپسول بیومتریک جهت احرازهویت می باشد. این کار با استفاده از عنبیه‏ های دو چشم کاربر و...

Mohammad Hasan Kargar Maher Nemat Bilan, Parinaz Habibi

IntroductionChildren with severe asthma attack are a challenging group of patients who could be difficult to treat and leading to significant morbidity and mortality. Asthma attack severity is qualitatively estimated as mild, moderate and severe attacks and respiratory failure based on conditions such as respiration status, feeling of dyspnea, and the degree of unconsciousness. part of which ar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید