Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
37881
Business process mining based insider threat detection system
Published 2016-10-01“…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
Get full text
Article -
37882
Fault Feature Extraction of Rolling Bearing based on Improved EMD and Spectrum Kurtosis
Published 2016-01-01“…According to the modulation characteristic of fault signals of rolling bearings and the disadvantages of depending on the experience to select resonance high frequency band,an improved empirical mode decomposition(EMD) and spectrum kurtosis method of rolling bearing fault diagnosis is put forward.First of all,the bearing fault signal are decomposed into a number of intrinsic mode functions(IMF) through the EMD method.Then,the false IMF components is eliminated through mutual information,kurtosis and cross- correlation,the fault signal is reconstructed.Finally,the optimal band pass filter is designed by using the spectral kurtosis,then analysis of envelope demodulation spectrum of the filtered signal is carried out,the fault feature of rolling bearing is extracted.The analysis results of rolling bearing experimental signal show that,the improved EMD and spectral kurtosis method can effectively extract the fault features of rolling bearing,and has more advantages than the traditional envelope analysis method.…”
Get full text
Article -
37883
EDWF-MTTF-based heuristic scheduling algorithm in time-sensitive networks
Published 2024-02-01“…With the rapid integration and development of industrial control and information networks, time-sensitive networks based on ethernet have received widespread attention.In these networks, time-triggered communication scheduling is adopted to ensure the determinacy of data transmission.However, existing scheduling algorithms have struggled to rapidly calculate the scheduling tables for large-scale periodic traffic.Therefore, a heuristic scheduling algorithm based on the earliest deadline with weight first-maximum transfer time first was designed.This algorithm, by flexibly adapting traffic sorting weights and enhancing backtracking methods, could resolve the scheduling issues of large-scale traffic in industrial automation scenarios in a relatively short time.Experimental results show that compared to the classic integer linear programming method, the earliest deadline with weight first-maximum transfer time first heuristic scheduling algorithm is able to calculate a more optimal solution for the scheduling table of large-scale periodic traffic more swiftly.…”
Get full text
Article -
37884
Robotics for Natural Orifice Transluminal Endoscopic Surgery: A Review
Published 2012-01-01“…Potential solutions are proposed to improve the existing designs and develop robust and stable robotic platforms for NOTES.…”
Get full text
Article -
37885
Research on intrusion detection method for edge networks based on federated reinforcement learning
Published 2024-12-01“…Imbalanced traffic sample distributions were designed for each edge agent to simulate a real-world environment, allowing for the evaluation of the detection accuracy and robustness of the global model. …”
Get full text
Article -
37886
Privacy self-correlation privacy-preserving scheme in LBS
Published 2019-05-01“…The prevalence of mobile intelligent terminals gives the location-based service (LBS) more opportunities to enrich mobile users’ lives.However,mobile users enjoy the convenience with the cost of personal privacy.The side information and mobile user’s recent requirement records were considered,which were obtained or stored by the service provider.Based on the existence of recent requirement records,adversary can employ the inference attack to analysis mobile user’s personal information.Therefore,two schemes were proposed,including of basic privacy self-correlation privacy-preserving scheme (Ba-2PS) and enhanced privacy self-correlation privacy-preserving scheme(En-2PS).In En-2PS,the privacy-preserving scheme was designed from two dimensions of aspects of time factor and query region,which increased the uncertainty inferring out the real information.Finally,the privacy analysis was illustrated to proof En-2PS’s privacy degree,then the performance and privacy evaluation results indicate that En-2PS is effective and efficient.…”
Get full text
Article -
37887
Long-Term Consequences: Deep Time in Barry Lopez’s “The Stone Horse”
Published 2016-01-01“…As a literary artifact of deep time, Barry Lopez’s essay “The Stone Horse” anticipates the building of the Clock of the Long Now, a project of the Long Now Foundation designed to foster long-term thinking and ecological stewardship. …”
Get full text
Article -
37888
Development of Fatigue Test Bench for Gearbox Assembly of Crawler Combine Harvester
Published 2022-10-01“…In order to solve the problem of high fault rate of gearboxes of crawler combine harvesters, the single HST hydro-mechanical differential steering gearbox developed by the team is taken as the test object, this study designs and builds the gearbox assembly fatigue test bench, and then carries out the fatigue test of differential steering gearboxes. …”
Get full text
Article -
37889
Beef, hay, and non-nomadic pastoralism
Published 2014-09-01“…Local-territory-scale actors consider pastoralism and pastorality as a resource that they mobilize to build wider local-territory-scale resources – typically protected designation of origin indications (‘AOP’). As the bulk of the literature has looked at AOP cheeses, we elected to focus our analysis on beef, specifically AOP Fin Gras du Mézenc. …”
Get full text
Article -
37890
Logistics Information Traceability Mechanism of Fresh E-Commerce Based on Image Recognition Technology
Published 2022-01-01“…In this article, an incessant visualized tracking scheme (IVTS) is designed for identifying and tracking E-commerce logistics throughout the migration points. …”
Get full text
Article -
37891
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
Published 2021-03-01“…To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was proposed based on the idea of ciphertext extension, and the corresponding homomorphic operations and relinearization procedure were designed on the basis of this new ciphertext form, so that a NTRU-based multi-key homomorphic encryption (MKHE) scheme which supported distributed decryption was constructed.Then, resorting to the idea of key switching, the re-encryption key and re-encryption procedure were put forward such that the functionality of proxy re-encryption (PRE) was integrated to this new NTRU-based MKHE scheme.The MKH-PRE scheme preserved the properties of MKHE and PRE, and had a better performance on the client side.The scheme was applied to the privacy-preserving problems in federated learning and an experiment of the application was carried out.The results demonstrate that the accuracy of learning is scarcely affected by the encryption procedure and the computational overhead of this MKH-PRE scheme is acceptable.…”
Get full text
Article -
37892
Practical application of large language models in educational informatics: specification, framework, and applications
Published 2024-11-01“…The standards covered API interface designs from three perspectives: general conversation, retrieval enhancement, and intelligent agents. …”
Get full text
Article -
37893
Knowledge triple extraction in cybersecurity with adversarial active learning
Published 2020-10-01“…Aiming at the problem that using pipeline methods for extracting cybersecurity knowledge triples may cause the errors propagation of entity recognition and did not consider the correlation between entity recognition and relation extraction,and training triple extraction model lacked labeled corpora,an end-to-end cybersecurity knowledge triple extraction method with adversarial active learning was proposed.For knowledge triple extraction,the conventional entity recognition and relation extraction were modelled as sequence labeling task through joint labeling strategy firstly.And then,a BiLSTM-LSTM-based model with dynamic attention mechanism was designed to jointly extract entities and relations,forming triples.Finally,with adversarial learning framework,a discriminator was trained to incrementally select high-quality samples for labeling,and the performance of the joint extraction model was continuously enhanced by iterative retraining.Experiments show that the proposed joint extraction model outperforms the existing cybersecurity knowledge triple extraction methods,and demonstrate the effectiveness of proposed adversarial active learning scheme.…”
Get full text
Article -
37894
Satellite Fast Maneuver Control Technology Based on Parallel System
Published 2023-01-01“…Then, a maneuver strategy is designed and fed back to the actual system. The method based on a parallel system with jet time as the optimal parameter has higher control accuracy than the previous maneuvering control, which only considers the speed increment. …”
Get full text
Article -
37895
Ad Reinhardt: Oko Odpowiedzialne. Percepcja i Zaangażowanie Widza w Kolażach z 1946 Roku
Published 2024-12-01“…From January 27, 1946 to January 5, 1947, Ad Reinhardt published in the magazine PM a series of "art pages"- a term designating full pages presenting drawings and collages. …”
Get full text
Article -
37896
Public key searchable encryption scheme in blockchain-enabled multi-user environment
Published 2021-10-01“…In order to meet the needs of data security sharing in multi-user environment, a public key searchable encryption scheme supporting one-to-many mode was proposed.Specifically, the data owner could specify multiple users to retrieve the ciphertext by executing the encryption algorithm once, so as to achieve more flexible sharing of ciphertext data.In addition, the specific file encryption key transfer algorithm was designed to ensure that the user could decrypt and obtain the plaintext correctly after retrieving the ciphertext.Combined with the blockchain technology, the smart contract execution detection algorithm was used to ensure the correctness of the retrieval results.In terms of security, based on the decisional bilinear Diffie-Hellman hypothesis and the modified bilinear Diffie-Hellman hypothesis, it was proved that the proposed scheme satisfies the security requirements of keyword indistinguishability and trapdoor information indistinguishability under the random oracle model, and could resist the internal keyword guessing attack.Finally, the proposed scheme and the existing related schemes were simulated by using jPBC cryptolibrary, and the test results show that the proposed scheme has high computational efficiency.…”
Get full text
Article -
37897
Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling
Published 2021-12-01“…In order to improve the anti-jamming ability and security of the wireless communication system, an index frequency-hopping anti-interference encryption method based on rotation scrambling was designed, which could be simply called encrypted index modulation frequency hopping spread spectrum (EIM-FHSS).Firstly, the wireless secret key was used to control multiple orthogonal frequency hopping patterns to determine the available frequencies at the current moment.The index of the active frequency (the frequency point with the modulation symbol) was used to transmit the bit information.Secondly, the secret key was used to employ scrambling encryption on the mapping table between information bits and the indexes, to ensure the security of the index bits.Finally, constellation rotation encryption was used on the symbols transmitted on the active frequency in the scheme, which ensured the security of symbol bits.Theoretical analysis and simulation results show that the proposed EIM-FHSS method has stronger security and anti-jamming abilities than the traditional IM-FHSS methods.…”
Get full text
Article -
37898
Research on the NB-IoT Random Access in LEO Satellite IoT
Published 2021-12-01“…Narrowband internet of things (NB-IoT) technology is widely used in data communications for a large number of low-speed and low-power devices, but it is diff cult to provide services for remote areas that cannot be covered by terrestrial networks.With its global coverage and low cost, the LEO satellite constellation can supplement and expand the terrestrial NB-IoT infrastructure, providing an eff ective solution for the space-based internet of things.Facing the application requirements of space-based internet of things, on the basis of reviewing the NB-IoT system architecture, the challenges of channel environment high dynamic delay and frequency off set faced by the application of NB-IoT technology in the LEO satellite constellation scenario were analyzed.For the uplink random access process, an eff ective user detection and timing synchronization method was designed, which had the advantages of high performance and low complexity, and provided an eff cient receiving method for the LEO satellite NB-IoT uplink random access synchronization.…”
Get full text
Article -
37899
Is a convivial synthetic biology possible?
Published 2024-12-01“…The outcome is a re-evaluation of synthetic biology through the lens of ‘conviviality’, a concept introduced by Ivan Illich to designate a modern society of responsibly limited tools, where individual freedom is realised through personal interdependence. …”
Get full text
Article -
37900
État, Politique et absence : le « statut » des Marocains Résidant à l’Étranger (MRE)
Published 2018-11-01“…Migrants are subject to the public policies of both emigration and immigration countries. By the designation “Moroccans residing abroad”, or “MRE” (Marocains Résidant à l’Etranger), Morocco signals to all of its citizens the existence of a relation of filiation that could never be broken or forgotten. …”
Get full text
Article