Showing 521 - 540 results of 675 for search '"open source"', query time: 0.05s Refine Results
  1. 521

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article
  2. 522

    Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation by Baolin QIU, Ping YI

    Published 2022-04-01
    “…The neural network approach has been commonly used in computer vision tasks.However, adversarial examples are able to make a neural network generate a false prediction.Adversarial training has been shown to be an effective approach to defend against the impact of adversarial examples.Nevertheless, it requires high computing power and long training time thus limiting its application scenarios.An adversarial examples defense method based on knowledge distillation was proposed, reusing the defense experience from the large datasets to new classification tasks.During distillation, teacher model has the same structure as student model and the feature map vector was used to transfer experience, and clean samples were used for training.Multi-dimensional feature maps were utilized to enhance the semantic information.Furthermore, an attention mechanism based on feature map was proposed, which boosted the effect of distillation by assigning weights to features according to their importance.Experiments were conducted over cifar100 and cifar10 open-source dataset.And various white-box attack algorithms such as FGSM (fast gradient sign method), PGD (project gradient descent) and C&W (Carlini-Wagner attack) were applied to test the experimental results.The accuracy of the proposed method on Cifar10 clean samples exceeds that of adversarial training and is close to the accuracy of the model trained on clean samples.Under the PGD attack of L2 distance, the efficiency of the proposed method is close to that of adversarial training, which is significantly higher than that of normal training.Moreover, the proposed method is a light-weight adversarial defense method with low learning cost.The computing power requirement is far less than that of adversarial training even if optimization schemes such as attention mechanism and multi-dimensional feature map are added.Knowledge distillation can learn the decision-making experience of normal samples and extract robust features as a neural network learning scheme.It uses a small amount of data to generate accurate and robust models, improves generalization, and reduces the cost of adversarial training.…”
    Get full text
    Article
  3. 523

    Implementation of Minimum Antenatal Care Service Standards in North Lampung Regency by Lisa Suarni, Kodri Kodri, Warjidin Aliyanto, Hasti Primadila, Fajar Desma Wahyudi

    Published 2024-04-01
    “…The sample size was determined using the open-source calculator SSPropor (OpenEpi, version 3), resulting in 595 collected samples for this study. …”
    Get full text
    Article
  4. 524

    Identifying Incident Causal Factors to Improve Aviation Transportation Safety: Proposing a Deep Learning Approach by Tianxi Dong, Qiwei Yang, Nima Ebadi, Xin Robert Luo, Paul Rad

    Published 2021-01-01
    “…First, we prepare the data sets used for training, validation, and testing with approximately 200,000 qualified incident reports from the Aviation Safety Reporting System (ASRS). Then, we take an open-source natural language model, which is well trained with a large corpus of Wikipedia texts, as the baseline and fine-tune it with the texts in incident reports to make it more suited to our specific research task. …”
    Get full text
    Article
  5. 525

    A portable electrochemical immunosensor for detection of S. aureus based on polyelectrolyte-modified screen-printed carbon electrode by Aleksei A. Evdokimov, Anna A. Baldina, Anna A. Nikitina, Timur A. Aliev, Artemii M. Zenkin, Mikhail V. Zhukov, Igor S. Pantyukhin, Ekaterina V. Skorb, Anton A. Muravev

    Published 2025-02-01
    “…Voltammetric detection of the formation of the sandwich immunocomplex with secondary antibody in the outermost layer (AB–AG–AB-HRP) not only decreases the detection limit to 230 CFU/mL and expands the linear range of detection to 103–108 CFU/mL, but also could detect S. aureus bacteria with a portable open-source custom potentiostat in voltammetric mode, which is promising for non-invasive point-of-care monitoring of pathogens and addresses issues of antibody-based sensors, such as high cost and difficult chemical modification.…”
    Get full text
    Article
  6. 526

    OCF Bridging Techniques for UWB/LoRa IoT Ecosystems by Hyun Seob Oh, Wha Sook Jeon, Dong Geun Jeong

    Published 2022-01-01
    “…The OCF has developed not only its own standard but also an open source software framework called IoTivity for efficient implementation of IoT systems. …”
    Get full text
    Article
  7. 527

    DataLab as a Service: Distributed Computing Framework for Multi-Interactive Analysis Environments by Aida Palacio Hoz, Andres Heredia Canales, Ezequiel Cimadevilla Alvarez, Marta Obregon Ruiz, Alvaro Lopez Garcia

    Published 2025-01-01
    “…In this work, we introduce a novel framework called Datalab as a Service which integrates cutting-edge and open-source technologies to offer an online platform designed for both resource providers and researchers. …”
    Get full text
    Article
  8. 528

    A computational tool to infer enzyme activity using post-translational modification profiling data by Dehui Kong, Aijun Zhang, Ling Li, Zuo-Fei Yuan, Yingxue Fu, Long Wu, Ashutosh Mishra, Anthony A. High, Junmin Peng, Xusheng Wang

    Published 2025-01-01
    “…The JUMPsem program is scalable and publicly available as an open-source R package and user-friendly web-based R/Shiny app. …”
    Get full text
    Article
  9. 529

    Analyzing Transit Systems Using General Transit Feed Specification (GTFS) by Generating Spatiotemporal Transit Networks by Diyi Liu, Jing Guo, Yangsong Gu, Meredith King, Lee D. Han, Candace Brakewood

    Published 2025-01-01
    “…<i>GTFS2STN</i> is a new tool that converts General Transit Feed Specification (GTFS) data into spatiotemporal networks, addressing the lack of open-source solutions for transit analysis. The tool includes a web application that generates isochrone maps and calculates travel time variability between locations. …”
    Get full text
    Article
  10. 530

    Determining Dust Sources of Middle East and Assessing Their Impact on Agricultural Lands in Euphrates-Tigris River Basin (Syria-Iraq) by Ayhan Ateşoğlu, Metin Tunay, Talha Berk Arıkan, Saffet Yıldız

    Published 2018-04-01
    “…This study was carried out in order to determine the dust sources in the Middle status of Middle East region between 2000-2015years have been analyzed using Collect earth methodology initiated by United Nations Food AND Agriculture Organized (FAO) in Antalya/Turkey on July 2015 and the results were reported by FAO.As being free of charge and an open source tool, the Collect Earth software uses very high resolution multi-temporal images from Google Earth and Bing Maps. …”
    Get full text
    Article
  11. 531

    Tracing the 2018 Sulawesi Earthquake and Tsunami’s Impact on Palu, Indonesia: A Remote Sensing Analysis by Youshuang Hu, Aggeliki Barberopoulou, Magaly Koch

    Published 2025-01-01
    “…Unlike many studies that rely on advanced or proprietary tools, we demonstrate that comparable results can be achieved with cost-effective open-source data and straightforward methodologies. …”
    Get full text
    Article
  12. 532

    An Interactive Computational Pipeline to Investigate Ventricular Hemodynamics with Real‐Time Three‐Dimensional Echocardiography and Computational Fluid Dynamics by Jan‐Niklas Thiel, Daniel Verhülsdonk, Ulrich Steinseifer, Katharina Linden, Ulrike Herberg, Ingeborg Friehs, Daniel Diaz‐Gil, Michael Neidlin

    Published 2025-01-01
    “…In this work, we introduce IP‐HEART—an interactive and open‐source computational pipeline to perform geometry processing for CFD models of ventricular blood flow. …”
    Get full text
    Article
  13. 533

    Cross-project software defect prediction based on the reduction and hybridization of software metrics by Ahmed Abdu, Zhengjun Zhai, Hakim A. Abdo, Sungon Lee, Mohammed A. Al-masni, Yeong Hyeon Gu, Redhwan Algabri

    Published 2025-01-01
    “…The experimental analysis conducted using nine open-source projects from the PROMISE dataset demonstrates that RH-CPDP surpasses current CPDP methods (TCSBoost, TPTL, DA-KTSVMO, DBN, and 3SW-MSTL) regarding area under the curve (AUC) and F1-measure. …”
    Get full text
    Article
  14. 534

    A Machine Learning Approach for the Autonomous Identification of Hardness in Extraterrestrial Rocks from Digital Images by Shuyun Liu, Haifeng Zhao, Zihao Yuan, Liping Xiao, Chengcheng Shen, Xue Wan, Xuhai Tang, Lu Zhang

    Published 2024-12-01
    “…The model is used to predict the hardness distribution of extraterrestrial rocks using images from the Tianwen-1 Mars Rover Navigation and Terrain Camera (NaTeCam) and a simulated lunar rock dataset from an open-source website. The results demonstrate the method’s potential for enhancing extraterrestrial exploration.…”
    Get full text
    Article
  15. 535

    Analysis of Water Surface Ratio Evolution in Guangdong-Hong Kong-Macao Greater Bay Area Based on Landsat by JIANG Xintong, LIAO Xiaolong, QUAN Xujian, XUE Jiao, ZHONG Yixuan, YU Baishun

    Published 2022-01-01
    “…An appropriate urban water surface ratio plays a vital role in improving the ecological quality of urban areas and the quality of urban living space.By RS and GIS technology,the research takes the free and open source optical remote sensing data,Landsat images,as the data source and uses the normalized difference water index (NDWI) and the normalized difference vegetation index (NDVI) to construct an automatic water body discrimination model.In this way,we can analyze the evolution of the water surface ratio in the core cities of the Guangdong-Hong Kong-Macao Greater Bay Area (Greater Bay Area) in the past two decades.The result analysis reveals that in the past 20 years,the water area of the Greater Bay Area has been decreased by 136 km<sup>2</sup>,and the water surface ratio is reduced from 4.48% to 4.22%.Among the cities in the Greater Bay Area,the city with the largest reduction in the water area is Jiangmen,with a decline of 44.20 km<sup>2</sup>,and its water surface ratio falls from 6.10% to 5.62%.Foshan follows Jiangmen,with a water area decrease of 32.34 km<sup>2</sup>,and its water surface ratio drops from 13.17% to 12.32%.The water area in Macao,Hong Kong,Huizhou,and Zhaoqing demonstrates a fall of not more than 10 km<sup>2</sup>,and that in Guangzhou and Shenzhen is reduced by not more than 20 km<sup>2</sup>.By the transition matrix analysis of land use types in the Greater Bay Area,we can uncover the main reason for the decline in water area—that is,the increase in construction land invading the original water area.The result of this paper can provide theoretical and methodological support for the rational use of water resources and the construction of water ecology in the cities of the Greater Bay Area.Meanwhile,it can offer an important reference for promoting the construction of ecological civilization and strengthening environmental protection in the Greater Bay Area.…”
    Get full text
    Article
  16. 536
  17. 537

    Validation Psychometrical analysis of Sexual Machism Scale (EMS-Sexism-12) among university students from Arequipa, Peru by Julio Cesar Huamani-Cahua, Estefany Cecilia Ojeda-Flores, Walter L Arias-Gallegos, Ferdinand Eddington Ceballos Bejarano, José Manuel Calizaya López

    Published 2023-09-01
    “…Results: The data were analysed using CFA and the WLSMV estimator along with polychoric correlation matrices in the open-source software Rstudio. The analysis revealed a unidimensional model with good fit indices for both men (CFI = .924, TLI = .907, SMRM = 0.069) and women (CFI = .936, TLI = .922, SMRM = 0.051). …”
    Get full text
    Article
  18. 538

    Refactoring BZIP2 on the new‐generation sunway supercomputer by Xiaohui Liu, Zekun Yin, Haodong Tian, Wubing Wan, Mengyuan Hua, Wenlai Zhao, Zhenchun Huang, Ping Gao, Fangjin Zhu, Hua Wang, Xiaohui Duan

    Published 2025-01-01
    “…In particular, the BZIP2 lossless compression algorithm has been widely used due to its exceptional compression ratio, moderate compression speed, high reliability, and open‐source nature. This paper focuses on the design and realization of a parallelized BZIP2 algorithm tailored for deployment on the New‐Generation Sunway supercomputing platform. …”
    Get full text
    Article
  19. 539

    MBI-KG: A knowledge graph of structured and linked economic research data extracted from the 1937 book “Die Maschinen-Industrie im Deutschen Reich”MADATA by Renat Shigapov, Thomas Schmidt, Jan Kamlah, Irene Schumm, Jochen Streb, Sibylle Lehmann-Hasemeyer

    Published 2025-02-01
    “…The semantically enriched data was uploaded into an open-source knowledge-graph software. The resulting knowledge graph includes detailed information about companies, individuals, and administrative entities relevant to the German mechanical engineering industry. …”
    Get full text
    Article
  20. 540

    Medyalararası Gündem Belirleme Çalışmalarında R Stüdyo Kullanımı: Rozelle-Campbell Taban Hizası ile Çapraz Gecikmeli Korelasyonun Bilişimleştirilmesi by Özlem Alikılıç, İnanç Alikılıç

    Published 2020-06-01
    “…It is licensed for a free and an open-source software. There are many researchers have released applications for general use in “R” after they have been introduced into the literature. …”
    Get full text
    Article