نتایج جستجو برای: nano fe3o4py apts
تعداد نتایج: 50804 فیلتر نتایج به سال:
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Overview of APTs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
The present paper proposes some hints to set up a number of prototypical vowels as acoustic-perceptual targets (APT). APTs are defined using theoretical considerations and the extensive use of an articulatory model for exploring the acoustic and perceptual space. This paper is a revisit of the notion of Cardinal Vowels, which were mainly described in articulatory terms. Our approach avoids the ...
The present paper proposes some hints to set up a number of prototypical vowels as acoustic-‐perceptual targets (APT). APTs are defined using theoretical considerations and the extensive use of an articulatory model for exploring the acoustic and perceptual space. This paper...
The new cyber attack pattern of advanced persistent threats (APTs) poses a serious threat to cyberspace. This paper addresses the issue of defending against APTs in a cost-effective way. First, the APT-based cyber attack-defense processes are modeled as a type of differential dynamical systems. Then, the cyber defense problem is modeled as an optimal control problem. The optimal control problem...
Bu çalışmada Manyetik Fe3O4 nanopartikülün yüzeyinin biyolojik olarak aktif ikincil bir katman ile modifiye edilmesi ve termal, antimikrobiyal dielektrik özellikerinin incelenmesi amaçlanmıştır. Birlikte çöktürme yöntemiyle manyetik nanopartikülleri hazırlanmış 3-aminopropiltrimetoksisilan (APTS) edilmiştir. Daha sonra sitein alanin amino asitlerinden yeni asit konjugatı Fe3O4@APTS nanopartikül...
Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems. Against APTs, active defense technologies aim to create and exploit information asymmetry for defenders. In this paper, we study a scenario in which a powerful defender uses honeynets for active defense in order to observe an attacke...
Advanced persistent threats (APTs) have become a big problem for computer systems. Databases are vulnerable to these threats and can give attackers access to an organizations sensitive data. Oracle databases are at greater risk due to their heavy use as back-ends to corporate applications such as enterprise resource planning software. This paper will describe a methodology for finding APTs that...
Free-electron lasers (FELs) can produce radiation in the short wavelength range extending from extreme ultraviolet (XUV) to X-rays with a few tens of femtoseconds pulse duration. These facilities have enabled significant breakthroughs field atomic, molecular, and optical physics, implementing different schemes based on two-color photoionization mechanisms. In this article, we present generation...
In this study, a TiO2/polyurethane composite (PU-TiO2) for photodegradation of formaldehyde was prepared based on TiO2 amino-functionalized with 3-aminopropyltriethoxysilane (APTS). FTIR, XPS, TG and TEM measurements demonstrated the successful amino-functionalization by APTS. Then NH2-TiO2 were incorporated into polyurethane (PU) through urea linkages, thermal stability, mechanical properties ...
Abstract Advanced persistent threats (APTs) have rocketed over the last years. Unfortunately, their technical characterization is incomplete—it still unclear if they are advanced usages of regular malware or a different form malware. This key to develop an effective cyberdefense. To address this issue, in paper we analyze techniques and tactics at stake for both APT-linked enable reproducibilit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید