A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Junior High School Home Economics Practice through Clothing Materials as a Countermeasure to COVID-19:
中学校家庭科におけるCOVID-19に対応する布を用いた製作実習
2021
Journal of Home Economics of Japan
中学校家庭科におけるCOVID-19に対応する布を用いた製作実習
In April ₂₀₂₀, when the COVID-₁₉ infection spread, ₂₈₃ people made ₅₀₀ cloth masks in a home economics class at a junior high school. ...
In order to develop the ability to take a countermeasure to the crisis, the educational effect of the mask-making class by taking advantage of already learned knowledge was examined. ...
doi:10.11428/jhej.72.543
fatcat:a36bbgd5srhrlpfsmqfl2yn734
Limited containment options of COVID-19 outbreak revealed by regional agent-based simulations for South Africa
2021
F1000Research
Bay Municipality in South Africa under a range of countermeasure scenarios. ...
Only immediate and the most severe countermeasures, up to a complete lock-down that essentially inhibits all joint human activities, can contain the epidemic effectively. ...
In our framework, we thus set θ NMBM = 0.000003 in order to meet this condition. ...
doi:10.12688/f1000research.28250.1
fatcat:ukwplrl5qzfu5nxg2q5h6fpua4
Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures
2009
Journal of Engineering Science and Technology Review
The main application of the proposed model is a countermeasures planning in advance and computer network design optimization ...
Existing malware propagation models mainly concentrate on malware epidemic consequences modeling, i.e. forecasting the number of infected computers, simulating malware behavior or economic propagation ...
Model extensions In order to evaluate countermeasures efficiency on worm propagation it is necessary to classify them. ...
doi:10.25103/jestr.021.08
fatcat:fk74fnwae5b6foeajogh62rth4
Limited containment options of COVID-19 outbreak revealed by regional agent-based simulations for South Africa
[article]
2020
arXiv
pre-print
in South Africa under a range of countermeasure scenarios. ...
Only immediate and the most severe countermeasures, up to a complete lock-down that essentially inhibits all joint human activities, can contain the epidemic effectively. ...
In our framework, we thus set θ N M BM = 0.000003 in order to meet this condition. ...
arXiv:2004.05513v1
fatcat:watj4ep2s5ftrib5b4esxqgofa
Countermeasures against COVID-19: how to navigate medical practice through a nascent, evolving evidence base - a European multicentre mixed methods study
2021
BMJ Open
in 12 European countries with case loads of 4-680 infected patients per million. ...
In a previously published Delphi exercise the European Pediatric Dialysis Working Group (EPDWG) reported widely variable counteractive responses to COVID-19 during the first week of statutory public curfews ...
(EPDWG) centres as a function of infected patient case load (log2 of infected cases per million people), a measure of pandemic phase on 20 March 2020 (T1). ...
doi:10.1136/bmjopen-2020-043015
pmid:33597140
pmcid:PMC7893209
fatcat:li5e7ls6ubfydcyzi4ivk6er5m
Timely pandemic countermeasures reduce both health damage and economic loss: Generality of the exact solution
[article]
2022
arXiv
pre-print
A general inequality provides the guiding principles on how such measures should be implemented. ...
The methodology leading to the exact solution is a novel theoretical contribution to the econophysics literature. ...
The author then formulated a theoretical framework and found a preliminary analytic result, analogous to the thermodynamic theory, that the early adoption of a countermeasure, keeping the infected population ...
arXiv:2209.12805v2
fatcat:vpii6qftzzb4tmknckbprksdse
Intelligent response system to mitigate the success likelihood of ongoing attacks
2010
2010 Sixth International Conference on Information Assurance and Security
Second, candidate countermeasures are identified, and their effectiveness in reducing the pre-calculated success likelihood are assessed. Finally, the candidate countermeasures are prioritized. ...
In this paper, we present a novel attack response system, based on the assessment of the likelihood of success of attack objectives. ...
Consequently, a high mean sojourn time is assigned to the attack steps blocked by countermeasure CM V . ...
doi:10.1109/isias.2010.5604054
dblp:conf/IEEEias/KanounCCDM10
fatcat:76rzghfpkvf4xlvyduz33wcj5m
Modeling of Post-Incident Root Cause Analysis
2003
International Journal of Digital Evidence
The approach is best suited to large, complex investigations, and we use a case study of a SQLSlammer worm infection on a reasonably large multinational enterprise as a working example. ...
Clearly, therefore, an important objective of the investigation is a high level of confidence that the outcome of the investigation accurately describes the actual events being investigated. ...
While the Framework gives a roadmap for addressing those issues comprising a structured investigation, the EEDI process provides a set of steps the investigator must perform in order to preserve, collect ...
dblp:journals/ijde/Stephenson03
fatcat:pvjhrnenqncwri2qfotgaumwai
Agent based Simulations of Epidemics on a Large Scale - Toward the Right Choice of Parameters
english
2013
Proceedings of the 3rd International Conference on Simulation and Modeling Methodologies, Technologies and Applications
english
In a world where epidemic outbreaks may take many lives, forecasting and analysis tools are of high importance -for an urban area such as New York City, a continent like Africa, as well as for the world ...
In a second step we empirically analyze the effects of certain non-pharmaceutical countermeasures as applied in the USA against the Influenza Pandemic in 1918 -1919 (Markel et al., 2007 . ...
Countermeasures. In our model, the countermeasures are governed by the parameters α and κ. That is, high values of these two parameters imply a high level of countermeasures and vice-versa. ...
doi:10.5220/0004429402630274
dblp:conf/simultech/ElsasserOM13
fatcat:uramzxtmcjhbpn3mdudpfrkfjm
Fault Tolerant Infective Countermeasure for AES
2017
Journal of Hardware and Systems Security
Infective countermeasures have been a promising class of fault attack countermeasures. ...
In this paper, we first provide a formal information theoretic proof of security for one of the most recently proposed state of the art infective countermeasures against DFA, under the assumption that ...
Fault Tolerant Implementation of the Infective Countermeasure for AES Our next step is to write the infective countermeasure scheme presented in Algorithm 1 in the aforementioned fault redundant framework ...
doi:10.1007/s41635-017-0006-1
dblp:journals/jhss/Patranabis0M17
fatcat:sjge3ohhf5emdlv5fdkpahs3gu
Public Transport COVID-19-Safe: New Barriers and Policies to Implement Effective Countermeasures under User's Safety Perspective
2022
Sustainability
We used data from an online survey with users of public transportation in a metropolitan area in southern Brazil. ...
Countermeasures that reduce the contact with other passengers—directly (limit the number of passengers in vehicles) or indirectly (operate with large vehicles)—and increase offers are possible solutions ...
In order to identify countermeasures to increase safety for users regarding COVID-19 infections in PT systems, the questionnaire included the following items.
1. ...
doi:10.3390/su14052945
fatcat:2v7fqis3zfgh3cgroqcyqp6xvq
MAlSim - Mobile Agent Malware Simulator
2008
Proceedings of the First International ICST Conference on Simulation Tools and Techniques for Communications Networks and Systems
Then analyse results in order to evaluate impact of the attack, test robustness and identify countermeasures. ...
Vulnerabilities and Countermeasures Repository was implemented in the framework of Industrial Security Risks Assessment Workbench (InSAW) [16, 21] which is our proprietary system based on a two tier ...
The report introduces MAlSim -Mobile Agent Malware Simulator, a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against critical infrastructures ...
doi:10.4108/icst.simutools2008.2942
dblp:conf/simutools/LeszczynaFM08
fatcat:tn7mjdn2irb2pcstnphfiivgru
Fault Tolerant Infective Countermeasure for AES
[chapter]
2015
Lecture Notes in Computer Science
Infective countermeasures have been a promising class of fault attack countermeasures. ...
In this paper, we first provide a formal information theoretic proof of security for one of the most recently proposed infective countermeasures against DFA, under the assumption that the adversary does ...
We then evaluate the infective countermeasure depicted in algorithm 1 using this framework and verify that the countermeasure indeed thwarts DFA successfully. ...
doi:10.1007/978-3-319-24126-5_12
fatcat:6zbjkwrnpjfsbifiz4hang5fb4
The Impact of Countermeasure Propagation on the Prevalence of Computer Viruses
2004
IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics)
which a countermeasure acts as a competing species against the computer virus. ...
Countermeasures such as software patches or warnings can be effective in helping organizations avert virus infection problems. ...
TARGET proposes a similar strategy but immunizes nodes that have high connectivity. ...
doi:10.1109/tsmcb.2003.817098
pmid:15376832
fatcat:46ej2mkhdvclzcfsxjtkgsanai
A Framework of Computational Model for Predicting the Spread of COVID-19 Pandemic in Saudi Arabia
2020
International Journal of Intelligent Engineering and Systems
Through rigorous study of different models of COVID-19, the proposed framework provides the best model to use according to the social factors prevalent in a country. ...
Once identified, these factors can be prioritized so as to device accurate and efficient countermeasures. ...
The study concludes by predicting wide scale spread of Coronavirus in China due to low prevention mechanisms and high infection spread ratio. ...
doi:10.22266/ijies2020.1031.41
fatcat:3buvrskmmjdqbdvoeipqlrgkha
« Previous
Showing results 1 — 15 out of 6,849 results