نتایج جستجو برای: nano fe3o4py apts

تعداد نتایج: 50804  

2011

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Overview of APTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

2009
Jacqueline Vaissière

The present paper proposes some hints to set up a number of prototypical vowels as acoustic-perceptual targets (APT). APTs are defined using theoretical considerations and the extensive use of an articulatory model for exploring the acoustic and perceptual space. This paper is a revisit of the notion of Cardinal Vowels, which were mainly described in articulatory terms. Our approach avoids the ...

2012
Jacqueline Vaissière Daniel Jones

The present paper proposes some hints to set up a number of prototypical vowels as acoustic-­‐perceptual targets (APT). APTs are defined using theoretical considerations and the extensive use of an articulatory model for exploring the acoustic and perceptual space. This paper...

Journal: :CoRR 2017
Pengdeng Li Luxing Yang Xiaofan Yang Qingyu Xiong Junhao Wen Yuan Yan Tang

The new cyber attack pattern of advanced persistent threats (APTs) poses a serious threat to cyberspace. This paper addresses the issue of defending against APTs in a cost-effective way. First, the APT-based cyber attack-defense processes are modeled as a type of differential dynamical systems. Then, the cyber defense problem is modeled as an optimal control problem. The optimal control problem...

Journal: : 2021

Bu çalışmada Manyetik Fe3O4 nanopartikülün yüzeyinin biyolojik olarak aktif ikincil bir katman ile modifiye edilmesi ve termal, antimikrobiyal dielektrik özellikerinin incelenmesi amaçlanmıştır. Birlikte çöktürme yöntemiyle manyetik nanopartikülleri hazırlanmış 3-aminopropiltrimetoksisilan (APTS) edilmiştir. Daha sonra sitein alanin amino asitlerinden yeni asit konjugatı Fe3O4@APTS nanopartikül...

Journal: :CoRR 2017
Jeffrey Pawlick Thi Thu Hang Nguyen Quanyan Zhu

Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems. Against APTs, active defense technologies aim to create and exploit information asymmetry for defenders. In this paper, we study a scenario in which a powerful defender uses honeynets for active defense in order to observe an attacke...

Journal: :IJSITA 2014
Loye Lynn Ray Henry Felch

Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that...

Journal: :Applied sciences 2021

Free-electron lasers (FELs) can produce radiation in the short wavelength range extending from extreme ultraviolet (XUV) to X-rays with a few tens of femtoseconds pulse duration. These facilities have enabled significant breakthroughs field atomic, molecular, and optical physics, implementing different schemes based on two-color photoionization mechanisms. In this article, we present generation...

Journal: :Applied science and innovative research 2022

In this study, a TiO2/polyurethane composite (PU-TiO2) for photodegradation of formaldehyde was prepared based on TiO2 amino-functionalized with 3-aminopropyltriethoxysilane (APTS). FTIR, XPS, TG and TEM measurements demonstrated the successful amino-functionalization by APTS. Then NH2-TiO2 were incorporated into polyurethane (PU) through urea linkages, thermal stability, mechanical properties ...

Journal: :International Journal of Information Security 2023

Abstract Advanced persistent threats (APTs) have rocketed over the last years. Unfortunately, their technical characterization is incomplete—it still unclear if they are advanced usages of regular malware or a different form malware. This key to develop an effective cyberdefense. To address this issue, in paper we analyze techniques and tactics at stake for both APT-linked enable reproducibilit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید