Academic literature on the topic 'SILENT ATTACK'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SILENT ATTACK.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SILENT ATTACK"

1

Sushma, Vasamsetti Ramya Sri, K. Nikhil, K. Ashish Reddy, and L. Sunitha. "Diagnosis of Cardiovascular Disease using Deep Learning." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (April 30, 2023): 371–78. http://dx.doi.org/10.22214/ijraset.2023.49209.

Full text
Abstract:
Abstract: Cardiovascular disease is one of the most horrendous illnesses, particularly the silent heart attack that strikes a person so abruptly that there is no time for treatment. It's difficult to diagnose a disease of this nature. One of the scariest diseases that c an kill a person at any time without warning is heart disease, and most doctors are unable to predict silent heart attacks. The lac k of specialists and an increase in cases of wrong diagnoses have fueled the demand for the creation of an efficient cardiovascul ar disease prediction system. This resulted in the exploration and development of original machine learning and medical data mi ning methodologies. The principal goal of this research is to identify the most crucial qualities for silent heart attack identificatio n by using classification algorithms to extract significant patterns and features from medical data. Although it is not innovative t o build such a system, the current ones have flaws and are not designed to detect the likelihood of silent heart attacks. Another is sue with the present heart attack prediction method is the use of characteristics. Choosing the typical features for the heart attac k prediction algorithm frequently yields unreliable results. To increase prediction accuracy, the suggested method aims to extract suitable attributes from the datasets. We developed a framework in this exploration that can understand the principles of predicti ng the risk profile of patients with the clinical data parameters. This research suggests an effective neural network with convolut ional layers to classify clinical data that is noticeably class-imbalanced. In order to forecast the development of Coronary Heart Disease, data from the National Health and Nutritional Examination Survey (NHANES) is collected (CHD). This research aime d to design a robust deep-learning algorithm to predict heart disease. Heart disease prediction is performed using SMOTE and MLP Classifier algorithms and Deep Neural Network Algorithms. The effectiveness of the model that accurately predicts the pre sence or absence of heart disease was examined using DNN and ANN. In this research article, we'll look at a machine-learnin g model that can clearly assess cardiac issues and be utilized by analysts and medical professionals
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Bhuvan, and Spinder Kaur. "Analysis and Solutions of Silent Heart Attack Using Python." International Journal of Computer Sciences and Engineering 10, no. 1 (January 31, 2022): 37–40. http://dx.doi.org/10.26438/ijcse/v10i1.3740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anastasilakis, Dimitrios A., Polyzois Makras, Stergios A. Polyzos, and Athanasios D. Anastasilakis. "Asymptomatic and normocalcemic hyperparathyroidism, the silent attack: a combo-endocrinology overview." Hormones 18, no. 1 (September 25, 2018): 65–70. http://dx.doi.org/10.1007/s42000-018-0069-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Teitelbaum, Michael, Rafail A. Kotronias, Luciano A. Sposato, and Rodrigo Bagur. "Cerebral Embolic Protection in TAVI: Friend or Foe." Interventional Cardiology Review 14, no. 1 (February 25, 2019): 22–25. http://dx.doi.org/10.15420/icr.2018.32.2.

Full text
Abstract:
Cerebrovascular accidents including stroke or transient ischaemic attack are one of the most feared complications after transcatheter aortic valve implantation. Transcatheter aortic valve implantation procedures have been consistently associated with silent ischaemic cerebral embolism as assessed by diffusion-weighted MRI. To reduce the risk of cerebrovascular accidents and silent emboli, cerebral embolic protection devices were developed with the aim of preventing procedural debris reaching the cerebral vasculature. The authors summarise the available data regarding cerebral embolic protection devices and its clinical significance.
APA, Harvard, Vancouver, ISO, and other styles
5

Mykland, Martin Syvertsen, Martin Uglem, Lars Jacob Stovner, Eiliv Brenner, Mari Storli Snoen, Gøril Bruvik Gravdahl, Trond Sand, and Petter Moe Omland. "Insufficient sleep may alter cortical excitability near the migraine attack: A blinded TMS crossover study." Cephalalgia 43, no. 3 (February 14, 2023): 033310242211483. http://dx.doi.org/10.1177/03331024221148391.

Full text
Abstract:
Background Migraine is a brain disorder with a multifaceted and unexplained association to sleep. Brain excitability likely changes periodically throughout the migraine cycle. In this study we examine the effect of insufficient sleep on neuronal excitability during the course of the migraine cycle. Methods We examined 54 migraine patients after two nights of eight-hour habitual sleep and two nights of four-hour restricted sleep in a randomised, blinded crossover study. We performed transcranial magnetic stimulation and measured cortical silent period, short- and long-interval intracortical inhibition, intracortical facilitation and short-latency afferent inhibition. We analysed how responses changed before and after attacks with linear mixed models. Results Short- interval intracortical inhibition was more reduced after sleep restriction compared to habitual sleep the shorter the time that had elapsed since the attack ( p = 0.041), and specifically in the postictal phase ( p = 0.013). Long-interval intracortical inhibition was more increased after sleep restriction with time closer before the attack ( p = 0.006), and specifically in the preictal phase ( p = 0.034). Short-latency afferent inhibition was more decreased after sleep restriction with time closer to the start of the attack ( p = 0.026). Conclusion Insufficient sleep in the period leading up to a migraine attack may cause dysfunction in cortical GABAergic inhibition. The results also suggest that migraine patients may have increased need for sufficient sleep during a migraine attack to maintain normal neurological function after the attack.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Ying, Nan Liu, Yonghua Huang, Wei Wei, Fei Chen, and Weiwei Zhang. "Risk Factors for Silent Lacunar Infarction in Patients with Transient Ischemic Attack." Medical Science Monitor 22 (February 11, 2016): 447–53. http://dx.doi.org/10.12659/msm.895759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Tiancheng, Ankit Mittal, Yunsi Fei, and Aatmesh Shrivastava. "Large Delay Analog Trojans: A Silent Fabrication-Time Attack Exploiting Analog Modalities." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 29, no. 1 (January 2021): 124–35. http://dx.doi.org/10.1109/tvlsi.2020.3034878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Demirel, Esra Aciman, Ufuk Emre, Aysun Ünal, Banu Özen, H. Tuğrul Atasoy, and Fürüzan Öztürk. "Evaluation of silent cerebral lesions in patients with first ischemic stroke attack." Neurology, Psychiatry and Brain Research 18, no. 1 (January 2012): 22–26. http://dx.doi.org/10.1016/j.npbr.2011.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Howard, George, Gregory W. Evans, and James F. Toole. "Silent cerebral infarctions in transient ischemic attack populations: Implications of advancing technology." Journal of Stroke and Cerebrovascular Diseases 4 (January 1994): S47—S50. http://dx.doi.org/10.1016/s1052-3057(10)80257-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jati, Wasisto. "From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries." Simulacra 4, no. 2 (November 18, 2021): 201–13. http://dx.doi.org/10.21107/sml.v4i2.11688.

Full text
Abstract:
This article aims for revisiting the terrorism studies from different perspective. The terror attacks itself cannot be hundred percent zero but it just fluctuated trend. More specifically, terrorism always adaptive in following trends. While terror attacks still to target innocent civilians, the perpetrators could be closest relatives and neighbors. The way terror attack to reach out that group of people basically shows the silent role of returning foreign fighters (RFF)/returnees nurturing dan breeding terror ideologies. By using critical literature review especially historical narrative analysis, this study wants to examine the current terror trend that utilizes social media. It can spread terror narration and also affecting people to join. The way to analyze data is making clear connection from each literature. The findings of this study are: the RFF is adept at social media in nurturing terror ideologies and then making their home country and new terrorist cells to be breeding grounds.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "SILENT ATTACK"

1

Paris, Antoine. "Synthèses de dérivés silylés en séries pyridinique et diazinique. Application de la réaction d'ipso-désilylation à l'élaboration de polyhétérocycles." Rouen, 1997. http://www.theses.fr/1997ROUES053.

Full text
Abstract:
Ce travail décrit la préparation de dérivés silylés en séries pyridinique et diazinique. L'emploi de la technique de piégeage in situ du lithien avec le chlorure de triméthyl-silyle a permis d'obtenir une fonctionnalisation régioselective sur certaines pyridines et diazines. Une étude de la réaction d'ipso-désilylation a été effectuée sur ces différents composés. L'intérêt de l'utilisation du groupement triméthylsilyle dans la série des hétérocycles pi-déficitaires est illustré par les synthèses de divers polyhétérocycles (γ-Carboline, Benzo[h]- 1,6-naphtyridine, 5,6-Diarylpyridazin-3-one) par association des réactions de métallation, de couplage et d'ipso-désilylation.
APA, Harvard, Vancouver, ISO, and other styles
2

CHEN, TING-WEI, and 陳庭葦. "Silent attack-Discussion on the Behavior of Network Bullying." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/c4yuw8.

Full text
Abstract:
碩士
正修科技大學
資訊管理研究所
105
The Internet is far away, a plain little things, one on the Internet, through the masses of the masses of mutual transmission, and even public trial, often resulting in the event of the second person in the event of injury. However, most of the message will be sent out of the message, holding the curiosity and play the majority of the mentality, do not think this behavior is wrong? I do not know the network to help spread or fun based on fun and free to share Audio and video, most likely have violated the law but no knowledge. Therefore, this study is aimed at the well-known community, relying on the power of the Internet and was even the attention of the event, and with interviews with well-known secondary school tutors and the use of questionnaires to the three information derived from the integration The following points: 1. On the Internet to share and spread indecent or false audio and video, most people are holding a fun and curious, rather than absolute malicious. 2. In the questionnaire survey, that part of the people who share the forwarding does not know this behavior may have violated the law, and know their own behavior is wrong, but often holding a lucky mind. 3. According to the survey in this study, even if most people are aware of the Internet to send and distribute some indecent or false audio and video text is a violation of the law, but still can not help but "we are doing, I will not be so untrue. " 4. Finally, this study argues that, although not in the chaos with the heavy code, but for the behavior of the rules and deeds on the Internet, it is necessary and clear, can not be vague, because often distributed anonymous network of others, are holding a lucky mind And make an act.
APA, Harvard, Vancouver, ISO, and other styles
3

MUKOKO, FUNGAYI DONEWELL. "USING HIDDEN MARKOV MODEL TOWARDS SECURING THE CLOUD: DETECTION OF DDoS SILENT ATTACKS." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15380.

Full text
Abstract:
Cloud Computing has presented itself as a promising solution to new entrepreneurs as well as existing organizations for management of their IT needs at various levels. Many cloud service providers have exposed cloud services at cheap prices, which allow users at all levels of society to materialize their ideas and make them available across the globe. While the response has been overwhelming, the application areas where security of data is of utmost importance have not shown much interest. Hence incorporating dependable security measures in the cloud computing technology would be a good move since the aspect of security has turn out to be one of the main things to consider. In this thesis work we took an initiative as we adopted and/or interpolating Hidden Markov Model into the circles of Cloud Computing, as we exploited it’s capabilities in detecting the silent attack traces that dodge and/or bypass a set of methodical mechanisms intended to sense and prevent them into the cloud system. We modelled our hackers’ attack scenarios where we defined some states and observations. The hackers’ clusters have been taken to be the states, along with the observations which have been taken to a series of Virtual Machines on to which the attacker trades upon from the silent invasion through to the vulnerable and finally the target Virtual Machine. The modelling is given in such a way that, if we have a generated sequence of observed attacks, we must be able to find out the roots of done attackers from the grouped hackers.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "SILENT ATTACK"

1

Verma, Virendra. Fall of Dera Baba Nanak Bridge: A silent night attack. Dehradun, U.P: Youth Education Publications, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Calvert, James F. Silent running: My years on a World War II attack submarine. New York: J. Wiley, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

P, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, N.J: John Wiley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

P, Johnson Stephen. Silent steel: the mysterious death of the nuclear attack sub USS Scorpion. Hoboken, NJ: John Wiley, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kristen, Strom Terry, and Fox Barry, eds. Syndrome X: Overcoming the silent killer that can give you a heart attack. New York: Simon and Schuster, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miller, Vickie Gail. Doris Miller: A silent medal of honor. Austin, Tex: Eakin Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Reader's Digest (Australia) Pty. Ltd., ed. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pty, Reader's Digest Services, ed. Sharks: Silent hunters of the deep. Sydney [Australia]: Reader's Digest, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pty, Reader's Digest Services, ed. Sharks: Silent hunters of the deep. Sydney: Reader's Digest, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Silent siege-II: Japanese attacks on North America in World War II. 2nd ed. Medford, Or: Webb Research Group, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SILENT ATTACK"

1

Mukoko, Fungayi Donewell, Aman Jatain, and Yojna Arora. "Cloud Silent Attack Strategies Analysis Alongside Proposed Generic Modelling." In Advances in Intelligent Systems and Computing, 491–501. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-3590-9_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Majumder, Sharmistha, Mrinal Kanti Deb Barma, Ashim Saha, and A. B. Roy. "Silent Listening to Detect False Data Injection Attack and Recognize the Attacker in Smart Car Platooning." In Studies in Computational Intelligence, 145–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97113-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"The Revolution in Heart Attack Treatment." In Fighting the Silent Killer, 147–57. A K Peters/CRC Press, 1993. http://dx.doi.org/10.1201/9781439864753-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bell, Derrick. "The School Desegregation Era." In Silent Covenants. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195172720.003.0014.

Full text
Abstract:
Yale Law School Professor Alexander Bickel was a major consti­tutional scholar of his time. When, in 1970, he questioned the long-term viability of the Brown decision in a highly praised book, civil rights lawyers and liberal scholars were annoyed. Few of us at that time had any doubts that we would eventually prevail in eradicating segrega­tion “root and branch” from the public schools. Now, more than three decades later, Professor Bickel’s prediction, heavily criticized at the time, has become an unhappy but all too accurate reality. In this chapter I will examine the resistance by whites and the rigidity by civil rights lawyers and leaders that combined to transform Bickel’s prediction into prophesy. Even the optimists among us had continuing reasons to regret the “all deliberate speed” standard for implementing Brown I. The Supreme Court insisted in Brown II that its unique-compliance formula was intended to do no more than allow time for the necessary adminis­trative changes that transformation to a desegregated school system required. After a decade of experience with the standard, Judge Robert L. Carter, former NAACP General Counsel, surmised that the formula actually permitted movement toward compliance on terms that the white South could accept.1 Until Brown II, Carter said, constitutional rights had been defined as personal and present, but under the guise of judicial statesmanship, “the Warren Court sacri­ficed individual and immediate vindication of the newly discovered right of blacks to a desegregated education in favor of a remedy more palatable to whites.” Carter suggests that the Court failed to realize the depth or nature of the problem, and by attempting to regulate the pace of desegrega­tion so as to convey a show of compassion and understanding for the white South, it not only failed to develop a willingness to comply, but instead aroused the hope that resistance to the constitutional imper­ative would succeed. As had happened so frequently before, southern politicians began waving the Confederate flag and equating the Brown decision with a Supreme Court-led attack on states’ rights. Highway billboards called for the impeachment of Chief Justice Earl Warren, and candidates were elected to office on campaigns based on little more than shouting “Never.”
APA, Harvard, Vancouver, ISO, and other styles
5

Joseph, Theyamma, and Jacquline C. Vadasseril. "Diabetes a Silent Killer: A Threat for Cardiorespiratory Fitness." In Cardiorespiratory Fitness - New Topics [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.108164.

Full text
Abstract:
Type 2 Diabetes Mellitus (T2DM) is a noncommunicable, lifestyle-related chronic metabolic disorder of global involvement, characterized by elevated blood sugar levels, manifested by hyperglycaemia, polyuria, polydipsia and polyphagia. DM is associated with acute and chronic complications which lead to reduced quality of life, premature morbidity and mortality. T2DM is linked with overweight, obesity, reduced physical activity and a genetic component. T2DM is named a silent killer because the primary disease is silent at the early stage and usually gets diagnosed when presenting with a vascular event such as stroke or heart attack. Impaired cardiorespiratory fitness plays a crucial role in acceleration of cardiovascular complications resulting in premature organ damage, morbidity and mortality. Regular physical activity, resistance training and reduction in sedentary life style along with diet control and drugs help to control DM and prevent or delay complications. This chapter deals with diabetes as a disease, its prevalence, risk factors, signs and symptoms, pathophysiology, pathogenesis and underlying mechanisms, acute and chronic complications, along with measures to enhance cardiorespiratory fitness and control DM and a word of caution to the younger generation to be aware of the silent killer.
APA, Harvard, Vancouver, ISO, and other styles
6

Adams, Andrea C. "Cerebrovascular Disease." In Mayo Clinic Essential Neurology, 352–92. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190206895.003.0011.

Full text
Abstract:
Transient ischemic attack (TIA) is an episode of focal neurologic dysfunction (brain, spinal cord, or retina) caused by ischemia. The clinical symptoms usually last less than 1 hour, and there is no evidence of acute infarction. Central nervous system infarction is defined as cell death attributable to ischemia with clinical, neuroimaging, and/or neuropathologic evidence of permanent injury. In the absence of imaging and pathologic evidence, clinical stroke is established by the persistence of symptoms for 24 hours. Silent infarction, discovered by imaging, has no known symptoms but remains an important issue in secondary stroke prevention.
APA, Harvard, Vancouver, ISO, and other styles
7

Delgado, James P. "Controversy and Inquiry." In The Curse of the Somers, 115—C6.F2. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197575222.003.0007.

Full text
Abstract:
Abstract News of the “Somers Affair” quickly became national news and highly controversial. Supporters and detractors of Mackenzie commented publicly and privately, and Mackenzie wrote a lengthy defense of his actions that proved more damning than helpful. Spencer’s father, John Canfield Spencer, the secretary of war, wrote a spirited attack on Mackenzie and his officers. The secretary of navy ordered a court of inquiry, which was followed avidly in the press, and followed by a court-martial. The trial was the most-followed legal proceeding of the time, and Mackenzie’s acquittal left his detractors unhappy. The trial and revelations of Mackenzie’s own troubled behavior, near-panic, and excessive discipline damaged Mackenzie’s reputation, and his naval career, once promising, was also damaged beyond repair. Legal proceedings against the boys arrested and confined by Mackenzie but not hanged ended in their favor. An old foe of Mackenzie, James Fenimore Cooper, launched an affective public attack on the captain, as did other polemics. Mackenzie’s inability to remain silent, or at least parse his words, continued to harm him throughout the controversy.
APA, Harvard, Vancouver, ISO, and other styles
8

Inouye, Melissa Wei-Tsing. "The Handwritten Hymnbook (1958–1974)." In China and the True Jesus, 212–34. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190923464.003.0008.

Full text
Abstract:
During the Cultural Revolution, organizations and individuals of all stripes came under attack in a chaotic age characterized by the widespread breakdown of social relationships. As “old” art, music, and literature were criticized and replaced by “new” politically orthodox works, clandestine communities formed to preserve and produce alternative forms of culture. The silent prayer meetings of the True Jesus Church are akin to other covert cultural activities such as groups dedicated to reading banned literature, listening to Western music, and creating art. Charismatic experience played a key role in sustaining the life of the True Jesus Church underground because it could occur within informal, intimate settings. The church experienced an inversion of gendered power, as top male leaders were arrested and elderly women became key figures in sustaining the community’s religious life.
APA, Harvard, Vancouver, ISO, and other styles
9

van Schaik, Carel P., and John Terborgh. "The Silent Crisis: The State of Rain Forest Nature Preserves." In Last Stand. Oxford University Press, 1997. http://dx.doi.org/10.1093/oso/9780195095548.003.0008.

Full text
Abstract:
The principal response of the global community to the threats against biodiversity has been the establishment of strictly protected areas, exemplified by the National Park System of the United States. In such areas, consumptive uses are banned and wild nature is allowed to exist in untrammeled form. Nonconsumptive recreational uses—such as sightseeing, hiking, swimming, boating, and camping—are permitted but are regulated as to place and time and number of participants. In the tropical forest realm, however, protected nature preserves are in a state of crisis. A number of tropical parks have already been degraded almost beyond redemption; others face severe threats of many kinds with little capacity to resist. The final bulwark erected to shield tropical nature from extinction is collapsing. The predictable and unpredictable ecological processes likely to affect the future ability of protected rain forest areas to retain their full biodiversity are examined in chapter 3. While the potential impact of ecological processes could be severe, they are amenable to technical solutions and could be solved given sufficient resources and knowledge. A far more immediate and significant threat is posed by human activities. Indeed, the crisis of parks in the tropics results primarily from increasing human pressure on all unexploited natural resources, aggravated by ineffective protection. Pressure on parks is exerted on local, regional, and national scales, usually taking the form of illegal land appropriation or resource extraction. The attack on tropical parks is being pressed by four main classes of actors: local and displaced populations of agriculturalists and extractors, governments, resource-robbing elites, and (in a few cases) indigenous forest-dwelling populations. In this chapter, we discuss the root causes of the actions of each of these groups and of the institutional failure that results in ineffective enforcement of park legislation. many common themes, regardless of the geographic area to which they pertained, and one theme in particular stood out: despite legal status and the presence of conservation officers, protected areas are not safe from illegal appropriation and exploitation. Our perception is that the threat to tropical parks is not widely appreciated.
APA, Harvard, Vancouver, ISO, and other styles
10

Yanık, Lerna K., and Fulya Hisarlıoğlu. "‘They wrote history with their bodies’: Necrogeopolitics, Necropolitical Spaces and the Everyday Spatial Politics of Death in Turkey." In Turkey's Necropolitical Laboratory, 46–70. Edinburgh University Press, 2019. http://dx.doi.org/10.3366/edinburgh/9781474450263.003.0003.

Full text
Abstract:
In this piece, through an alternative reading of biopolitics and merging the literature on necropolitics with critical geography, we develop the concepts necrogepolitics and necropolitical spaces. We argue that the Turkish sovereign has very little difficulty in making death and self-sacrifice a desired behaviour by spatialising necropolitical power domestically and internationally. Necrogeopolitics emerges as a discursive practice that conditions the subject to die for the geopolitical and security interests of the sovereign, necropolitical spaces, on the other hand, are both material and discursive spaces that aim at the same goal at the domestic level. Both spaces condition the subjects for the idea that death is the appropriate behaviour if/when the state is under attack. This modification of social behaviour is engineered by the Turkish state in a very subtle, silent, and everyday manner. We discuss these instances of intervention through the necrogeopolitisation of Turkey’s territorial self, as well as the specific necrospatial changes that took place in the aftermath of the 15 July 2016 coup attempt.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SILENT ATTACK"

1

Grande, C. E. Lopez, and R. S. Guadron. "Social engineering: The silent attack." In 2015 IEEE Thirty-Fifth Central American and Panama Convention (CONCAPAN XXXV). IEEE, 2015. http://dx.doi.org/10.1109/concapan.2015.7428452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Croft, Neil. "On forensics: A silent SMS attack." In 2012 Information Security for South Africa (ISSA). IEEE, 2012. http://dx.doi.org/10.1109/issa.2012.6320454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Koch, Robert, and Mario Golling. "Silent Battles: Towards Unmasking Hidden Cyber Attack." In 2019 11th International Conference on Cyber Conflict (CyCon). IEEE, 2019. http://dx.doi.org/10.23919/cycon.2019.8757146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chen, Ting, Haiyang Tang, Xiaodong Lin, Kuang Zhou, and Xiaosong Zhang. "Silent Battery Draining Attack against Android Systems by Subverting Doze Mode." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Greitzer, Edward M. "Some Aerodynamic Problems of Aircraft Engines: Fifty Years After." In ASME Turbo Expo 2007: Power for Land, Sea, and Air. ASMEDC, 2007. http://dx.doi.org/10.1115/gt2007-28364.

Full text
Abstract:
Problems of high technological interest, for example the development of gas turbine engines, span disciplinary boundaries. Collaboration is critical in advancing the technology, but it has been less a factor in gas turbine research. In this paper it is proposed that step changes in gas turbine performance can emerge from such collaborative endeavors. In these, success depends on the development of integrated teams with the appropriate range of skills. This is well known in product development, but it is less familiar, and less subscribed to, in the research community. Case histories of two projects are given to illustrate the point: the development of the concept of “smart jet engines” and the Silent Aircraft Initiative. In addition to providing the ability to attack multidisciplinary issues discussion is also given about the way in which collaboration can enhance the research process within a single discipline.
APA, Harvard, Vancouver, ISO, and other styles
6

Cerkovnik, Mark, and Wasy Akhtar. "Inclusion of Crack Face Pressure in Reference Stress for Thick Walled Risers and Flowlines." In ASME 2013 32nd International Conference on Ocean, Offshore and Arctic Engineering. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/omae2013-11021.

Full text
Abstract:
A methodology is developed to account for the effect of crack face pressure on the reference stress in high pressure, thick walled, flowlines and risers. Risers and flowlines in production service may be exposed to corrosive attack resulting in pitting. In such cases, cracks can initiate and fitness for service assessment, including fatigue crack growth and fracture analysis, is required. For such thick walled lines, the effect of high internal pressure on the crack face is significant and must be taken into account. Current industry standards, including API-RP-579 [1] and BS7910 [2], are silent on the effects of crack face pressure on the reference stress. Reference stress, a quantity similar to the net section stress, can be used to predict the local plastic failure of the remaining ligament ahead of the crack tip, or the collapse of the full cross section. The reference stress is also used in the abscissa on the Failure-Assessment-Diagram (FAD) to determine the allowable stress intensity ratio for fracture assessment. The methodology described in the paper follows from systematic detailed finite element analysis (FEA) conducted using linear material properties. The analysis is conducted over a range of pipe thickness ratios (D/t), crack depths (a/t) and crack aspect ratios (c/a). The results presented permit an accurate calculation of the effect of crack face pressure that can be implemented within the framework of existing methods of fitness for service analysis without the use of FEA. This paper presents a detailed analysis of the effect of crack face pressure on the reference stress for axial and circumferential internal flaws. The results from this study provide expressions to estimate the reference stress with crack face pressure loading, thus, allowing an improved fracture prediction for high pressure risers and flowlines.
APA, Harvard, Vancouver, ISO, and other styles
7

Mukoko, Fungayi Donewell, and Vikas Thada. "A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks." In 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2018. http://dx.doi.org/10.1109/ic3i44769.2018.9007279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hajipour, Mohammad, Mohammad Ali Akhaee, and Ramin Toosi. "Listening to Sounds of Silence for Audio replay attack detection." In 2021 7th International Conference on Signal Processing and Intelligent Systems (ICSPIS). IEEE, 2021. http://dx.doi.org/10.1109/icspis54653.2021.9729353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Payre, William, Jaume Perellomarch, Giedre Sabaliauskaite, Hesamaldin Jadidbonab, Siraj Shaikh, Hoang Nguyen, and Stewart Birrell. "Understanding drivers' trust after software malfunctions and cyber intrusions of digital displays in an automated car." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002463.

Full text
Abstract:
The aim of this paper is to examine the effect of explicit (i.e., ransomware) and silent (i.e., no turn signals) automation failures on drivers’ reported levels of trust and perception of risk. In a driving simulator study, 38 participants rode in a conditionally automated vehicle in built-up areas and motorways. They all experienced both failures. Not only levels of trust decreased after experiencing the failures, especially after the explicit one, but also some of the scores were low. This could mean cyber-attacks lead to distrust in automated driving, rather than merely decreasing levels of trust. Participants also seemed to differentiate connected driving from automated driving in terms of perception of risk. These results are discussed in the context of cyber intrusions as well as long- and short-term trust.
APA, Harvard, Vancouver, ISO, and other styles
10

Khalil Bhuiyan, Md Ebrahim, Dustin Smith, Eric J. Voss, Chin-Chuan Wei, and Mohammad Shavezipur. "Surface Functionalization of Silicon MEMS Biochemical Sensors for the Detection of Foodborne Pathogens." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-69708.

Full text
Abstract:
Abstract This work presents the surface modification of silicon chips as a platform for silicon-based biosensors with applications aiming for the detection of foodborne bacteria in aqueous solution. The detection requires high selectivity as the solution may contain a variety of biological species, which affect the outcome of the sensing process. The silicon surface is functionalized by a self-assembled monolayer (SAM) with thiol groups followed by immobilizing a thiol-linked DNA aptamer. The DNA aptamer used in this work has reported to recognize a biological species, E. coli ATCC 25922. The presence of DNA aptamer on the sensor surface allows the capture of the specific E. coli cells on the surface, while other potential biological (and chemical) species would not attach to the sensor surface, thus improving the selectivity of the sensor. The uniform formation of the SAM on the surface is an important step toward uniformly coating the sensor surface with the desired DNA aptamer. The SAM is created on the silicon surface by surface modification with the MPTS (3-mercaptopropyl trimethoxy silane) solution. Then the aptamer DNA solution is applied as droplets on the chip followed by a cure process. The attachment of the SAM and DNA aptamers are verified by atomic force microscopy (AFM). The surface functionalization presented in this work can be used for sensors made of silicon coated with a thin layer of native oxide, and can be adopted for detection of other cells and biological agents using the proper SAM and DNA aptamer.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SILENT ATTACK"

1

Mizrach, Amos, Michal Mazor, Amots Hetzroni, Joseph Grinshpun, Richard Mankin, Dennis Shuman, Nancy Epsky, and Robert Heath. Male Song as a Tool for Trapping Female Medflies. United States Department of Agriculture, December 2002. http://dx.doi.org/10.32747/2002.7586535.bard.

Full text
Abstract:
This interdisciplinaray work combines expertise in engineering and entomology in Israel and the US, to develop an acoustic trap for mate-seeking female medflies. Medflies are among the world's most economically harmful pests, and monitoring and control efforts cost about $800 million each year in Israel and the US. Efficient traps are vitally important tools for medfly quarantine and pest management activities; they are needed for early detection, for predicting dispersal patterns and for estimating medfly abundance within infested regions. Early detection facilitates rapid response to invasions, in order to contain them. Prediction of dispersal patterns facilitates preemptive action, and estimates of the pests' abundance lead to quantification of medfly infestations and control efforts. Although olfactory attractants and traps exist for capturing male and mated female medflies, there are still no satisfactorily efficient means to attract and trap virgin and remating females (a significant and dangerous segment of the population). We proposed to explore the largely ignored mechanism of female attraction to male song that the flies use in courtship. The potential of such an approach is indicated by studies under this project. Our research involved the identification, isolation, and augmentation of the most attractive components of male medfly songs and the use of these components in the design and testing of traps incorporating acoustic lures. The project combined expertise in acoustic engineering and instrumentation, fruit fly behavior, and integrated pest management. The BARD support was provided for 1 year to enable proof-of-concept studies, aimed to determine: 1) whether mate-seeking female medflies are attracted to male songs; and 2) over what distance such attraction works. Male medfly calling song was recorded during courtship. Multiple acoustic components of male song were examined and tested for synergism with substrate vibrations produced by various surfaces, plates and loudspeakers, with natural and artificial sound playbacks. A speaker-funnel system was developed that focused the playback signal to reproduce as closely as possible the near-field spatial characteristics of the sounds produced by individual males. In initial studies, the system was tasted by observing the behavior of females while the speaker system played songs at various intensities. Through morning and early afternoon periods of peak sexual activity, virgin female medflies landed on a sheet of filter paper at the funnel outlet and stayed longer during broadcasting than during the silent part of the cycle. In later studies, females were captured on sticky paper at the funnel outlet. The mean capture rates were 67 and 44%, respectively, during sound emission and silent control periods. The findings confirmed that female trapping was improved if a male calling song was played. The second stage of the research focused on estimating the trapping range. Initial results indicated that the range possibly extended to 70 cm, but additional, verification tests remain to be conducted. Further studies are planned also to consider effects of combining acoustic and pheromonal cues.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography