Showing 37,881 - 37,900 results of 46,768 for search '"Design"', query time: 0.23s Refine Results
  1. 37881

    Business process mining based insider threat detection system by Tai-ming ZHU, Yuan-bo GUO, An-kang JU, Jun MA

    Published 2016-10-01
    “…Current intrusion detection systems are mostly for detecting external attacks,but sometimes the internal staff may bring greater harm to organizations in information security.Traditional insider threat detection methods of-ten do not combine the behavior of people with business activities,making the threat detection rate to be improved.An insider threat detection system based on business process mining from two aspects was proposed,the implementation of insider threats and the impact of threats on system services.Firstly,the normal control flow model of business ac-tivities and the normal behavior profile of each operator were established by mining the training log.Then,the actual behavior of the operators was compared with the pre-established normal behavior contours during the operation of the system,which was supplemented by control flow anomaly detection and performance anomaly detection of business processes,in order to discover insider threats.A variety of anomalies were defined and the corresponding detection algorithms were given.Experiments were performed on the ProM platform.The results show the designed system is effective.…”
    Get full text
    Article
  2. 37882

    Fault Feature Extraction of Rolling Bearing based on Improved EMD and Spectrum Kurtosis by Jing Shuangxi, Yang Xin, Leng Junfa, Wang Zhiyang

    Published 2016-01-01
    “…According to the modulation characteristic of fault signals of rolling bearings and the disadvantages of depending on the experience to select resonance high frequency band,an improved empirical mode decomposition(EMD) and spectrum kurtosis method of rolling bearing fault diagnosis is put forward.First of all,the bearing fault signal are decomposed into a number of intrinsic mode functions(IMF) through the EMD method.Then,the false IMF components is eliminated through mutual information,kurtosis and cross- correlation,the fault signal is reconstructed.Finally,the optimal band pass filter is designed by using the spectral kurtosis,then analysis of envelope demodulation spectrum of the filtered signal is carried out,the fault feature of rolling bearing is extracted.The analysis results of rolling bearing experimental signal show that,the improved EMD and spectral kurtosis method can effectively extract the fault features of rolling bearing,and has more advantages than the traditional envelope analysis method.…”
    Get full text
    Article
  3. 37883

    EDWF-MTTF-based heuristic scheduling algorithm in time-sensitive networks by Chuanhuang LI, Junhu LIAO, Jiadong XUAN, Qi XU, Huifeng ZHANG, Jun ZHU, Tao ZOU, Ruyun ZHANG

    Published 2024-02-01
    “…With the rapid integration and development of industrial control and information networks, time-sensitive networks based on ethernet have received widespread attention.In these networks, time-triggered communication scheduling is adopted to ensure the determinacy of data transmission.However, existing scheduling algorithms have struggled to rapidly calculate the scheduling tables for large-scale periodic traffic.Therefore, a heuristic scheduling algorithm based on the earliest deadline with weight first-maximum transfer time first was designed.This algorithm, by flexibly adapting traffic sorting weights and enhancing backtracking methods, could resolve the scheduling issues of large-scale traffic in industrial automation scenarios in a relatively short time.Experimental results show that compared to the classic integer linear programming method, the earliest deadline with weight first-maximum transfer time first heuristic scheduling algorithm is able to calculate a more optimal solution for the scheduling table of large-scale periodic traffic more swiftly.…”
    Get full text
    Article
  4. 37884

    Robotics for Natural Orifice Transluminal Endoscopic Surgery: A Review by Xiaona Wang, Max Q.-H. Meng

    Published 2012-01-01
    “…Potential solutions are proposed to improve the existing designs and develop robust and stable robotic platforms for NOTES.…”
    Get full text
    Article
  5. 37885

    Research on intrusion detection method for edge networks based on federated reinforcement learning by DING Kai, HUANG Yidu, TAO Ming, XIE Renping

    Published 2024-12-01
    “…Imbalanced traffic sample distributions were designed for each edge agent to simulate a real-world environment, allowing for the evaluation of the detection accuracy and robustness of the global model. …”
    Get full text
    Article
  6. 37886

    Privacy self-correlation privacy-preserving scheme in LBS by Weihao LI, Jin CAO, Hui LI

    Published 2019-05-01
    “…The prevalence of mobile intelligent terminals gives the location-based service (LBS) more opportunities to enrich mobile users’ lives.However,mobile users enjoy the convenience with the cost of personal privacy.The side information and mobile user’s recent requirement records were considered,which were obtained or stored by the service provider.Based on the existence of recent requirement records,adversary can employ the inference attack to analysis mobile user’s personal information.Therefore,two schemes were proposed,including of basic privacy self-correlation privacy-preserving scheme (Ba-2PS) and enhanced privacy self-correlation privacy-preserving scheme(En-2PS).In En-2PS,the privacy-preserving scheme was designed from two dimensions of aspects of time factor and query region,which increased the uncertainty inferring out the real information.Finally,the privacy analysis was illustrated to proof En-2PS’s privacy degree,then the performance and privacy evaluation results indicate that En-2PS is effective and efficient.…”
    Get full text
    Article
  7. 37887

    Long-Term Consequences: Deep Time in Barry Lopez’s “The Stone Horse” by Norma Tilden

    Published 2016-01-01
    “…As a literary artifact of deep time, Barry Lopez’s essay “The Stone Horse” anticipates the building of the Clock of the Long Now, a project of the Long Now Foundation designed to foster long-term thinking and ecological stewardship. …”
    Get full text
    Article
  8. 37888

    Development of Fatigue Test Bench for Gearbox Assembly of Crawler Combine Harvester by Zhu Ruiheng, Li Yaoming, Tang Zhong, Xu Lizhang, Ma Zheng

    Published 2022-10-01
    “…In order to solve the problem of high fault rate of gearboxes of crawler combine harvesters, the single HST hydro-mechanical differential steering gearbox developed by the team is taken as the test object, this study designs and builds the gearbox assembly fatigue test bench, and then carries out the fatigue test of differential steering gearboxes. …”
    Get full text
    Article
  9. 37889

    Beef, hay, and non-nomadic pastoralism by Sabine Chabrat, Baritaux Virginie, Marie Houdart

    Published 2014-09-01
    “…Local-territory-scale actors consider pastoralism and pastorality as a resource that they mobilize to build wider local-territory-scale resources – typically protected designation of origin indications (‘AOP’). As the bulk of the literature has looked at AOP cheeses, we elected to focus our analysis on beef, specifically AOP Fin Gras du Mézenc. …”
    Get full text
    Article
  10. 37890

    Logistics Information Traceability Mechanism of Fresh E-Commerce Based on Image Recognition Technology by Xin Zhang, Pengfei Shao

    Published 2022-01-01
    “…In this article, an incessant visualized tracking scheme (IVTS) is designed for identifying and tracking E-commerce logistics throughout the migration points. …”
    Get full text
    Article
  11. 37891

    Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application by Ruiqi LI, Chunfu JIA, Yafei WANG

    Published 2021-03-01
    “…To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was proposed based on the idea of ciphertext extension, and the corresponding homomorphic operations and relinearization procedure were designed on the basis of this new ciphertext form, so that a NTRU-based multi-key homomorphic encryption (MKHE) scheme which supported distributed decryption was constructed.Then, resorting to the idea of key switching, the re-encryption key and re-encryption procedure were put forward such that the functionality of proxy re-encryption (PRE) was integrated to this new NTRU-based MKHE scheme.The MKH-PRE scheme preserved the properties of MKHE and PRE, and had a better performance on the client side.The scheme was applied to the privacy-preserving problems in federated learning and an experiment of the application was carried out.The results demonstrate that the accuracy of learning is scarcely affected by the encryption procedure and the computational overhead of this MKH-PRE scheme is acceptable.…”
    Get full text
    Article
  12. 37892

    Practical application of large language models in educational informatics: specification, framework, and applications by XU Gang, LIU Zhipeng, FENG Qi, SHEN Fuke

    Published 2024-11-01
    “…The standards covered API interface designs from three perspectives: general conversation, retrieval enhancement, and intelligent agents. …”
    Get full text
    Article
  13. 37893

    Knowledge triple extraction in cybersecurity with adversarial active learning by Tao LI, Yuanbo GUO, Ankang JU

    Published 2020-10-01
    “…Aiming at the problem that using pipeline methods for extracting cybersecurity knowledge triples may cause the errors propagation of entity recognition and did not consider the correlation between entity recognition and relation extraction,and training triple extraction model lacked labeled corpora,an end-to-end cybersecurity knowledge triple extraction method with adversarial active learning was proposed.For knowledge triple extraction,the conventional entity recognition and relation extraction were modelled as sequence labeling task through joint labeling strategy firstly.And then,a BiLSTM-LSTM-based model with dynamic attention mechanism was designed to jointly extract entities and relations,forming triples.Finally,with adversarial learning framework,a discriminator was trained to incrementally select high-quality samples for labeling,and the performance of the joint extraction model was continuously enhanced by iterative retraining.Experiments show that the proposed joint extraction model outperforms the existing cybersecurity knowledge triple extraction methods,and demonstrate the effectiveness of proposed adversarial active learning scheme.…”
    Get full text
    Article
  14. 37894

    Satellite Fast Maneuver Control Technology Based on Parallel System by Youtao Gao, Jinghe Guo, Zhicheng You, Zezheng Dong, Yi Cheng

    Published 2023-01-01
    “…Then, a maneuver strategy is designed and fed back to the actual system. The method based on a parallel system with jet time as the optimal parameter has higher control accuracy than the previous maneuvering control, which only considers the speed increment. …”
    Get full text
    Article
  15. 37895

    Ad Reinhardt: Oko Odpowiedzialne. Percepcja i Zaangażowanie Widza w Kolażach z 1946 Roku by Margaux VERDET

    Published 2024-12-01
    “…From January 27, 1946 to January 5, 1947, Ad Reinhardt published in the magazine PM a series of "art pages"- a term designating full pages presenting drawings and collages. …”
    Get full text
    Article
  16. 37896

    Public key searchable encryption scheme in blockchain-enabled multi-user environment by Dong ZHENG, Tianze ZHU, Rui GUO

    Published 2021-10-01
    “…In order to meet the needs of data security sharing in multi-user environment, a public key searchable encryption scheme supporting one-to-many mode was proposed.Specifically, the data owner could specify multiple users to retrieve the ciphertext by executing the encryption algorithm once, so as to achieve more flexible sharing of ciphertext data.In addition, the specific file encryption key transfer algorithm was designed to ensure that the user could decrypt and obtain the plaintext correctly after retrieving the ciphertext.Combined with the blockchain technology, the smart contract execution detection algorithm was used to ensure the correctness of the retrieval results.In terms of security, based on the decisional bilinear Diffie-Hellman hypothesis and the modified bilinear Diffie-Hellman hypothesis, it was proved that the proposed scheme satisfies the security requirements of keyword indistinguishability and trapdoor information indistinguishability under the random oracle model, and could resist the internal keyword guessing attack.Finally, the proposed scheme and the existing related schemes were simulated by using jPBC cryptolibrary, and the test results show that the proposed scheme has high computational efficiency.…”
    Get full text
    Article
  17. 37897

    Index modulation aided frequency hopping anti-jamming and encryption method based on rotation scrambling by Xinjin LU, Jing LEI, Yuxin SHI

    Published 2021-12-01
    “…In order to improve the anti-jamming ability and security of the wireless communication system, an index frequency-hopping anti-interference encryption method based on rotation scrambling was designed, which could be simply called encrypted index modulation frequency hopping spread spectrum (EIM-FHSS).Firstly, the wireless secret key was used to control multiple orthogonal frequency hopping patterns to determine the available frequencies at the current moment.The index of the active frequency (the frequency point with the modulation symbol) was used to transmit the bit information.Secondly, the secret key was used to employ scrambling encryption on the mapping table between information bits and the indexes, to ensure the security of the index bits.Finally, constellation rotation encryption was used on the symbols transmitted on the active frequency in the scheme, which ensured the security of symbol bits.Theoretical analysis and simulation results show that the proposed EIM-FHSS method has stronger security and anti-jamming abilities than the traditional IM-FHSS methods.…”
    Get full text
    Article
  18. 37898

    Research on the NB-IoT Random Access in LEO Satellite IoT by Haodong LIU, Zhong ZHENG, Wenjin WANG, Li YOU, Xiqi GAO

    Published 2021-12-01
    “…Narrowband internet of things (NB-IoT) technology is widely used in data communications for a large number of low-speed and low-power devices, but it is diff cult to provide services for remote areas that cannot be covered by terrestrial networks.With its global coverage and low cost, the LEO satellite constellation can supplement and expand the terrestrial NB-IoT infrastructure, providing an eff ective solution for the space-based internet of things.Facing the application requirements of space-based internet of things, on the basis of reviewing the NB-IoT system architecture, the challenges of channel environment high dynamic delay and frequency off set faced by the application of NB-IoT technology in the LEO satellite constellation scenario were analyzed.For the uplink random access process, an eff ective user detection and timing synchronization method was designed, which had the advantages of high performance and low complexity, and provided an eff cient receiving method for the LEO satellite NB-IoT uplink random access synchronization.…”
    Get full text
    Article
  19. 37899

    Is a convivial synthetic biology possible? by Matthew J. Tarnowski, Mario Pansera

    Published 2024-12-01
    “…The outcome is a re-evaluation of synthetic biology through the lens of ‘conviviality’, a concept introduced by Ivan Illich to designate a modern society of responsibly limited tools, where individual freedom is realised through personal interdependence. …”
    Get full text
    Article
  20. 37900

    État, Politique et absence : le « statut » des Marocains Résidant à l’Étranger (MRE) by Malika Gouirir

    Published 2018-11-01
    “…Migrants are subject to the public policies of both emigration and immigration countries. By the designation “Moroccans residing abroad”, or “MRE” (Marocains Résidant à l’Etranger), Morocco signals to all of its citizens the existence of a relation of filiation that could never be broken or forgotten. …”
    Get full text
    Article