Suggested Topics within your search.
Suggested Topics within your search.
- Law reports, digests, etc 5
- methods 3
- Economics 2
- Health and hygiene 2
- History 2
- Law 2
- Medicine 2
- Moral and ethical aspects 2
- Religious life 2
- Women 2
- Academic writing 1
- Administration 1
- Advertising 1
- Anesthesia 1
- Anesthesiology 1
- Application software 1
- Arthritis 1
- Arthritis, Rheumatoid 1
- Attitudes 1
- Big data 1
- Biochemical Phenomena 1
- Biochemistry 1
- Cave ecology 1
- Christian men 1
- Christian sociology 1
- Christian women 1
- Christianity 1
- Climate Change 1
- Clinical biochemistry 1
- Consumers 1
-
8541
A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Published 2025-01-01“…The rapid advancement of technology and increasing data utilisation have underscored the need for new models to manage and secure big data effectively. However, the constraints of isolated network environments and the limitations of existing security frameworks hinder the adoption of cutting-edge technologies such as AI and cloud computing, as well as the safe utilisation of data. …”
Get full text
Article -
8542
Approach of detecting low-rate DoS attack based on combined features
Published 2017-05-01“…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
Get full text
Article -
8543
Studies at the level of light and electron microscopy the connection of perlslnusoldal cells with vitamin a, lipid metabolisms and fatty liver syndrome in hens
Get full text
Article -
8544
CONSUMER BEHAVIOUR ON THE WINE MARKET IN NITRA REGION
Published 2013-12-01“…Last years entrepreneurs have started to feel the need of promotion their products and activities. Competition is high not just from abroad, but also in our country. …”
Get full text
Article -
8545
Time Delay Effect on Regenerative Chatter in Tandem Rolling Mills
Published 2016-01-01“…The results show that the time delay effect reduces the critical velocity of multistand mills slightly in the big picture. But it alters the relationship between two adjacent stands by worsening the downstream stand stability. …”
Get full text
Article -
8546
ESTABLISHMENT OF THE FIRST RUSSIAN CONSULATES IN CHINA IN 1851–1852
Published 2018-07-01“…Numerous reports of the Russian consuls to the Asian Department of the Russian Ministry of Foreign Affairs contain highly interesting material concerning the first diplomatic contacts between Russia and China. …”
Get full text
Article -
8547
Sustainable Development in the Digital Age: Harnessing Emerging Digital Technologies to Catalyze Global SDG Achievement
Published 2025-01-01“…This research explores the transformative potential of cutting-edge digital technologies—including artificial intelligence, big data analytics, cloud computing, and the Internet of Things—in fostering sustainable development across economic, social, and environmental dimensions. …”
Get full text
Article -
8548
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01“…There are numerous deep learning competencies, but LSTM is one of the ones used to interpret big data or time series data. But, it is not easy to find what is the best weights for LSTMs in order to directly achieve performance. …”
Get full text
Article -
8549
Virosome, a hybrid vehicle for efficient and safe drug delivery and its emerging application in cancer treatment
Published 2015-06-01“…Cancer treatment is a big battlefield for virosome-based drug delivery systems. …”
Get full text
Article -
8550
Association Between Deforestation and the Incidence of Snakebites in South Korea
Published 2025-01-01Get full text
Article -
8551
Competencias del ingeniero industrial en la Industria 4.0
Published 2020-12-01“…Los resultados muestran que se deben desarrollar competencias específicas basadas en las Tecnologías de la Información y la Comunicación, como big data, Internet de las cosas y Simulación, con el propósito de interactuar en los ambientes inteligentes que propone la Industria 4.0. …”
Get full text
Article -
8552
THE EFFECT OF LITERACY HABITS AND THE USE OF AL-QURAN LEARNING METHODS ON STUDENTS' AL-QURAN READING ABILITY
Published 2024-12-01“…This research is based on a phenomenon seen in educational institutions at elementary, middle school, high school and even college levels, namely not being able to read the Al-Qur’an properly and correctly. …”
Get full text
Article -
8553
Credit Risk Contagion Based on Asymmetric Information Association
Published 2018-01-01Get full text
Article -
8554
Crocodile optimization algorithm for solving real-world optimization problems
Published 2024-12-01Get full text
Article -
8555
Design and Implementation of BIM-Based Construction Supervision Platform for Hydraulic Engineering
Published 2022-01-01Subjects: Get full text
Article -
8556
RAPID AND SPESIFIC DETECTION OF MYCOBACTERIUM TUBERCULOSIS USING POLYMERASE CHAIN REACTION
Published 2019-12-01“…This infectious disease still give big health problem in all over the world by being second in causing high mortality rates after HIV/AIDS. …”
Get full text
Article -
8557
Access control scheme for medical data based on PBAC and IBE
Published 2015-12-01“…Due to the large amount of personal privacy information contained,the medical big data formed in the health care industry was faced with potential threats of both external attacks and internal data leakages.However,traditional access control technology didn’t take into account the important role of user access purpose in the access control schemes that emphasized data privacy,and existing symmetric and asymmetric encryption technologies both face problems such as the complexity of key and certificate management.To address these problems,a novel access control scheme based on PBAC model and IBE encryption technology was proposed,which could provide flexible access control of encrypted medical data.By introducing the concept of conditioned purpose,the PBAC model was extended to achieve full coverage of purpose trees.Furthermore,the scheme used patient ID,conditioned bit and intended purpose as the IBE public key,with which patients’ data were encrypted.Only users who pass the authentication and whose access purposes conform to the intended purposes can obtain the corresponding private keys and the encrypted data,thereby achieving access to patients’ information.Experimental results prove that the scheme can achieve the goals of fine-grained access control and privacy protection with high performance.…”
Get full text
Article -
8558
OPTIMIZATION OF SLOTTED JACK SEPARATION FORCE BASED ON FINITE ELEMENT SIMULATION AND TAGUCHI METHOD
Published 2018-01-01“…In order to solve the present situation of big dispersion degree of the slotted jack contact separation force,Finite element simulation and Taguchi method is proposed to optimize the range and the dispersion degree of the separation force. …”
Get full text
Article -
8559
PERFORMANCE DEGRADATION ASSESSMENT OF ROLLING BEARING BASED ON SINGLE RING THEOREM IN RANDOM MATRIX THEORY
Published 2022-01-01“…Firstly, through segmentation, randomization, amplification and dimensional reconstruction of the bearing sampling data, a high-dimensional random matrix of the bearing at the current moment is established; Secondly, given the good high-dimensional data processing ability of random matrix theory, the distribution of eigenvalues of bearing random matrix is investigated by using the single ring theorem. …”
Get full text
Article -
8560
Software Design Challenges in Time Series Prediction Systems Using Parallel Implementation of Artificial Neural Networks
Published 2016-01-01“…Particularly software developed with prediction based results is always a big challenge for designers. Time series data forecasting like currency exchange, stock prices, and weather report are some of the areas where an extensive research is going on for the last three decades. …”
Get full text
Article