defense model
Recently Published Documents


TOTAL DOCUMENTS

122
(FIVE YEARS 46)

H-INDEX

9
(FIVE YEARS 4)

2021 ◽  
Vol 12 (05) ◽  
pp. 339-351
Author(s):  
Lesmana Lesmanaumar ◽  
Iman Sulaiman ◽  
Hernawan

The purpose of this research is to produce a futsal defense system model for 14-16 years olds and to test the effectiveness of the futsal defense model for 14-16 years olds. The method used in this research is research and development. Data collection techniques used, interviews, tests, and field observations. The results of the product effectiveness test by comparing the two groups. the treatment group using the product development, and the control group using the pretest and posttest designs. The mean score of each group based on the test is that the effectiveness of the experimental group is higher than that of the control group. The improvement of the futsal defense system for ages 14-16 years at the time of the pre-test showed t-count = 22, 219,> t-table = 1.70329, df = 27 and p-value = 0.00 <0.005. Based on the comparison of the test results. the increase in test results for the experimental group increased significantly than that of the control group. The subjects in this study were MC Utama athletes aged 14-16 years. It is hoped that this research can provide benefits for sports practitioners, especially in the sport of futsal. Key words : Futsal, a futsal defense system model  


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Yanhong Shang ◽  
Jing Zhang

In response to the continuous development of computer science and multimedia technology, many problems related to computer multimedia security are gradually exposed in the development. Through the existence of hidden dangers of computer multimedia security, a computer is constructed based on the network security active defense model. For a multimedia security protection system, select four modules in the system for design and description. Finally, the experimental results show that the system designed in this study can realize the security protection of computer multimedia, and the system is simple to operate and has strong practicability and meets the expected design effect.


2021 ◽  
Author(s):  
Shah Md Istiaque ◽  
Md Toki Tahmid ◽  
Asif Iqbal Khan ◽  
Zaber Al Hassan ◽  
Sajjad Waheed

2021 ◽  
pp. 324-331
Author(s):  
Dafei Wu

Firewall and intrusion detection system are widely used network security protection equipment, which plays a vital role in preventing network attack and intrusion. However, they have inevitable defects, which reduces the protection function provided in actual use. Therefore, in order to further improve network security, this paper designs a new network security protection technology which can integrate the advantages of multiple security technologies and make up for their shortcomings. This paper proposes a network security defense model based on the combination strategy of firewall and IPS. The purpose of policy based intrusion prevention system (pb-ips) is to realize the real combination of security management and network management system. This can take the network management system as the intermediary, integrate the firewall technology and intrusion detection technology, and realize a new network security protection measures.


2021 ◽  
Vol 13 (2) ◽  
pp. 80-117
Author(s):  
Владислав Вячеславович Шумов ◽  
Vyacheslav Shumov ◽  
Всеволод Олегович Корепанов ◽  
Vsevolod Korepanov

The main types of combined arms combat operations are offensive and defense. Using the function of victory in battle, which is an extension of the function of conflict by G. Tullock, the following game-theoretic problems have been solved. First, the extended Gross-Germeier ''attack-defense'' model, which is a special case of a more general ''offensive-defense'' model, and describing the solution by the parties of the nearest tactical tasks, is investigated. Secondly, it has been proved that in the problem of breaking through points of defense (the closest tactical task), the criteria ``breaking through the weakest point'' and ``breaking through at least one point'' are equivalent. Thirdly, in the model of resource distribution of attackers and defenders between tactical tasks (echelons), the use of two criteria: 1) the product of the probabilities of solving the nearest and subsequent tactical tasks, 2) the minimum value of the named probabilities, - gives two fundamentally different solutions. Fourthly, the results of decisions were checked for compliance with the principles of military art and the practice of battles, battles and operations.


Author(s):  
Александр Геннадьевич Перевозчиков ◽  
Валерий Юрьевич Решетов ◽  
Александра Ильинична Лесик

Статья обобщает игру «нападение-оборона», имеющую сетевую структуру, в части учета начальных остатков ресурсов сторон и основана на работе R. Hohzaki, V. Tanaka. В отличие от последней, оборона на каждом из возможных направлений движения между вершинами сети, заданных ориентированными ребрами, может иметь ненулевые начальные остатки ресурсов сторон, что приводит в общем случае к выпуклым минимаксным задачам, которые могут быть решены методом субградиентного спуска. В частности, изучаемая модель обобщает игру «нападение-оборона» с начальными остатками, предложенную В.Ф.Огарышевым, на сетевой случай. The article generalizes the "attack-defense" game with the network structure, in terms of accounting for the initial residuals of the parties' resources and is based on the work by Hohzaki and Tanaka. In contrast to the latter, the defense on each of the possible movement directions between the network’s vertices, given by the oriented edges, can have nonzero initial residuals of the parties' resources, which generally leads to convex minimax problems that can be solved by the subgradient descent method. In particular, the model under study generalizes the "attack-defense" game with initial residuals, proposed by Ogaryshev, to the network case.


2021 ◽  
Vol 1855 (1) ◽  
pp. 012039
Author(s):  
Yishu Li ◽  
Hequan Cao ◽  
Likun Yang ◽  
Chao Qin
Keyword(s):  
Long Rod ◽  

Sign in / Sign up

Export Citation Format

Share Document