-
13501
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01“…With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.…”
Get full text
Article -
13502
Optimization Model and Method of Variable Speed Limit for Urban Expressway
Published 2021-01-01“…The SPSA-based solution algorithm was proposed by taking into account the needs of real-time online applications. …”
Get full text
Article -
13503
PPCM: Combing Multiple Classifiers to Improve Protein-Protein Interaction Prediction
Published 2015-01-01“…This study established a robust pipeline for PPI prediction by integrating multiple classifiers using Random Forests algorithm. This pipeline will be useful for predicting PPI in nonmodel species.…”
Get full text
Article -
13504
A Large-Scale Network Data Analysis via Sparse and Low Rank Reconstruction
Published 2014-01-01“…In addition, we present the iterative scheme of the algorithm for network anomaly detection problem, which is termed as NAD-APG. …”
Get full text
Article -
13505
Modern Methods of Urban Energy System Planning
Published 2019-08-01“…The article presents a possible algorithm of formation of the space-time profile of energy resources consumption. …”
Get full text
Article -
13506
Design of a water heating system for automatic coffee maker using OMRON CP1E-NA20DR-A PLC and PID control
Published 2024-01-01“…The results of this study show that controlling water temperature using the PID algorithm with the Omron CP1E-NA20DR-A PLC can work well. …”
Get full text
Article -
13507
Impact of moving target on underwater positioning by using state measurement
Published 2024-01-01“…A moving target state estimation (MTSE) algorithm is proposed to eliminate the false measurements from the moving targets and to measure the localization of moving targets with the help of the propagation speed of targets. …”
Get full text
Article -
13508
Prediction of Conductive Anomalies Ahead of the Tunnel by the 3D-Resitivity Forward Modeling in the Whole Space
Published 2021-01-01“…The algorithm is proven to be feasible using a slab analytic model. …”
Get full text
Article -
13509
Telefacturing Based Distributed Manufacturing Environment for Optimal Manufacturing Service by Enhancing the Interoperability in the Hubs
Published 2017-01-01“…With an evolutionary algorithm and developed heuristic algorithm, the performance of the proposed manufacturing system has been improved. …”
Get full text
Article -
13510
Leveraging the Turnpike Effect for Mean Field Games Numerics
Published 2024-01-01“…Recently, a deep-learning algorithm referred to as Deep Galerkin Method (DGM), has gained a lot of attention among those trying to solve numerically Mean Field Games with finite horizon, even if the performance seems to be decreasing significantly with increasing horizon. …”
Get full text
Article -
13511
Novel Heronian mean based $ m $-polar fuzzy power geometric aggregation operators and their application to urban transportation management
Published 2024-12-01“…Next, to validate the efficiency of the established algorithm, it was implemented in a daily-life MCDM problem involving urban transportation management. …”
Get full text
Article -
13512
Research on database watermarking based on Independent Component Analysis and multiple rolling
Published 2019-04-01“…The matrix is separated by the ratio Independent Component Analysis algorithm, and the watermark is used to separate the matrix. …”
Get full text
Article -
13513
Designing Landscape of Urban Gardening Based on Optimized Artificial Intelligence Model
Published 2022-01-01“…The results show that the PSO-based landscape pattern spatial optimization model and algorithm can use particle position to simulate landscape distribution for spatial pattern optimization. …”
Get full text
Article -
13514
Empirical Data-Driven Linear Model of a Swimming Robot Using the Complex Delay-Embedding DMD Technique
Published 2025-01-01“…While the experimental results exhibited exotic curves in phase plane and time series, the analysis results showed that the proposed algorithm extracts linear and chaotic modes contributing to the data. …”
Get full text
Article -
13515
Meta's Challenge with Olives and Watermelon: The Case of Blocking Posts About Gaza
Published 2024-12-01“…As a result, we will present examples of the efforts of social media users who are algorithmically censored, which we call symbolic subversion, to overcome this situation with symbols.…”
Get full text
Article -
13516
Anomaly detection in virtual machine logs against irrelevant attribute interference.
Published 2025-01-01“…Firstly, the log parsing algorithm is used to parse the logs. Then, the feature extraction algorithm, which combines Long Short-Term Memory and Autoencoder-Decoder, is applied to extract features. …”
Get full text
Article -
13517
Augmenting Energy Sustainability of Static Nodes Using Hybrid KGNN-AHP Driven Approach for IoT-Based Heterogeneous WSN
Published 2025-01-01“…The simulation results exhibit the enhancement of network lifetime and data transmission by following the proposed algorithm for static network.…”
Get full text
Article -
13518
External barycentric coordinates for arbitrary polygons and an approximate method for calculating them
Published 2024-12-01“…The author of the article hopes that the detailed results of the algorithmic implementation of the calculation of external barycentric coordinates will arouse interest and make the publication material more accessible to a wide range of readers, which will lead to the development of the barycentric method in solving boundary and initial boundary value problems of mathematical physics.…”
Get full text
Article -
13519
Deep Learning-Enabled Variational Optimization Method for Image Dehazing in Maritime Intelligent Transportation Systems
Published 2021-01-01“…The resulting constrained minimization model is solved using a two-step optimization algorithm. To further enhance dehazing performance, the solutions of subproblems obtained in this optimization algorithm are equivalent to deep learning-based image denoising. …”
Get full text
Article -
13520
Rough-Set-Based Real-Time Interest Label Extraction over Large-Scale Social Networks
Published 2022-01-01“…Specifically, we first propose the subgraph division algorithm to construct a subgraph stream by incorporating a rough set. …”
Get full text
Article