Showing 8,541 - 8,560 results of 10,771 for search 'Big3~', query time: 1.39s Refine Results
  1. 8541

    A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls by Jun-Hyung Park, Sung-Chae Park, Heung-Youl Youm

    Published 2025-01-01
    “…The rapid advancement of technology and increasing data utilisation have underscored the need for new models to manage and secure big data effectively. However, the constraints of isolated network environments and the limitations of existing security frameworks hinder the adoption of cutting-edge technologies such as AI and cloud computing, as well as the safe utilisation of data. …”
    Get full text
    Article
  2. 8542

    Approach of detecting low-rate DoS attack based on combined features by Zhi-jun WU, Jing-an ZHANG, Meng YUE, Cai-feng ZHANG

    Published 2017-05-01
    “…LDoS (low-rate denial of service) attack is a kind of RoQ (reduction of quality) attack which has the characteristics of low average rate and strong concealment.These characteristics pose great threats to the security of cloud computing platform and big data center.Based on network traffic analysis,three intrinsic characteristics of LDoS attack flow were extracted to be a set of input to BP neural network,which is a classifier for LDoS attack detection.Hence,an approach of detecting LDoS attacks was proposed based on novel combined feature value.The proposed approach can speedily and accurately model the LDoS attack flows by the efficient self-organizing learning process of BP neural network,in which a proper decision-making indicator is set to detect LDoS attack in accuracy at the end of output.The proposed detection approach was tested in NS2 platform and verified in test-bed network environment by using the Linux TCP-kernel source code,which is a widely accepted LDoS attack generation tool.The detection probability derived from hypothesis testing is 96.68%.Compared with available researches,analysis results show that the performance of combined features detection is better than that of single feature,and has high computational efficiency.…”
    Get full text
    Article
  3. 8543

    Studies at the level of light and electron microscopy the connection of perlslnusoldal cells with vitamin a, lipid metabolisms and fatty liver syndrome in hens by Reşat Nuri AŞTI

    “…<p> In the third group animals fed with high energy rations, histopathological features of fatty liver syndrome were observed.Epithelial cells of the liver tissue filled with big and smal lipid droplets.lt was determined that the number of perisinusoidal cells and of lipid droplets of these cells had not changed. …”
    Get full text
    Article
  4. 8544

    CONSUMER BEHAVIOUR ON THE WINE MARKET IN NITRA REGION by Katarína Kleinová, Ľudmila Nagyová, Petra Waldnerová

    Published 2013-12-01
    “…Last years entrepreneurs have started to feel the need of promotion their products and activities. Competition is high not just from abroad, but also in our country. …”
    Get full text
    Article
  5. 8545

    Time Delay Effect on Regenerative Chatter in Tandem Rolling Mills by Xiaochan Liu, Yong Zang, Zhiying Gao, Lingqiang Zeng

    Published 2016-01-01
    “…The results show that the time delay effect reduces the critical velocity of multistand mills slightly in the big picture. But it alters the relationship between two adjacent stands by worsening the downstream stand stability. …”
    Get full text
    Article
  6. 8546

    ESTABLISHMENT OF THE FIRST RUSSIAN CONSULATES IN CHINA IN 1851–1852 by E. P. Koudryavtseva

    Published 2018-07-01
    “…Numerous reports of the Russian consuls to the Asian Department of the Russian Ministry of Foreign Affairs contain highly interesting material concerning the first diplomatic contacts between Russia and China. …”
    Get full text
    Article
  7. 8547

    Sustainable Development in the Digital Age: Harnessing Emerging Digital Technologies to Catalyze Global SDG Achievement by Claudiu George Bocean

    Published 2025-01-01
    “…This research explores the transformative potential of cutting-edge digital technologies—including artificial intelligence, big data analytics, cloud computing, and the Internet of Things—in fostering sustainable development across economic, social, and environmental dimensions. …”
    Get full text
    Article
  8. 8548

    Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments by Hanan Abbas Mohammad

    Published 2024-12-01
    “…There are numerous deep learning competencies, but LSTM is one of the ones used to interpret big data or time series data. But, it is not easy to find what is the best weights for LSTMs in order to directly achieve performance. …”
    Get full text
    Article
  9. 8549

    Virosome, a hybrid vehicle for efficient and safe drug delivery and its emerging application in cancer treatment by Liu Hanqing, Tu Zhigang, Feng Fan, Shi Haifeng, Chen Keping, Xu Ximing

    Published 2015-06-01
    “…Cancer treatment is a big battlefield for virosome-based drug delivery systems. …”
    Get full text
    Article
  10. 8550
  11. 8551

    Competencias del ingeniero industrial en la Industria 4.0 by Isidro Jesús González-Hernández, Rafael Granillo-Macías

    Published 2020-12-01
    “…Los resultados muestran que se deben desarrollar competencias específicas basadas en las Tecnologías de la Información y la Comunicación, como big data, Internet de las cosas y Simulación, con el propósito de interactuar en los ambientes inteligentes que propone la Industria 4.0. …”
    Get full text
    Article
  12. 8552

    THE EFFECT OF LITERACY HABITS AND THE USE OF AL-QURAN LEARNING METHODS ON STUDENTS' AL-QURAN READING ABILITY by Arinda Rosalina, Avip Nurdarmawan, Kharisma Eka Firmanda

    Published 2024-12-01
    “…This research is based on a phenomenon seen in educational institutions at elementary, middle school, high school and even college levels, namely not being able to read the Al-Qur’an properly and correctly. …”
    Get full text
    Article
  13. 8553
  14. 8554
  15. 8555
  16. 8556

    RAPID AND SPESIFIC DETECTION OF MYCOBACTERIUM TUBERCULOSIS USING POLYMERASE CHAIN REACTION by Anita Kurniati, Desak Nyoman Surya Suameitra Dewi, Ni Nyoman Purwani

    Published 2019-12-01
    “…This infectious disease still give big health problem in all over the world by being second in causing high mortality rates after HIV/AIDS.  …”
    Get full text
    Article
  17. 8557

    Access control scheme for medical data based on PBAC and IBE by Yi-ting ZHANG, Yu-chuan FU, Ming YANG, Jun-zhou LUO

    Published 2015-12-01
    “…Due to the large amount of personal privacy information contained,the medical big data formed in the health care industry was faced with potential threats of both external attacks and internal data leakages.However,traditional access control technology didn’t take into account the important role of user access purpose in the access control schemes that emphasized data privacy,and existing symmetric and asymmetric encryption technologies both face problems such as the complexity of key and certificate management.To address these problems,a novel access control scheme based on PBAC model and IBE encryption technology was proposed,which could provide flexible access control of encrypted medical data.By introducing the concept of conditioned purpose,the PBAC model was extended to achieve full coverage of purpose trees.Furthermore,the scheme used patient ID,conditioned bit and intended purpose as the IBE public key,with which patients’ data were encrypted.Only users who pass the authentication and whose access purposes conform to the intended purposes can obtain the corresponding private keys and the encrypted data,thereby achieving access to patients’ information.Experimental results prove that the scheme can achieve the goals of fine-grained access control and privacy protection with high performance.…”
    Get full text
    Article
  18. 8558

    OPTIMIZATION OF SLOTTED JACK SEPARATION FORCE BASED ON FINITE ELEMENT SIMULATION AND TAGUCHI METHOD by LIANG YunZhong, LI Hong, XU WeiPeng

    Published 2018-01-01
    “…In order to solve the present situation of big dispersion degree of the slotted jack contact separation force,Finite element simulation and Taguchi method is proposed to optimize the range and the dispersion degree of the separation force. …”
    Get full text
    Article
  19. 8559

    PERFORMANCE DEGRADATION ASSESSMENT OF ROLLING BEARING BASED ON SINGLE RING THEOREM IN RANDOM MATRIX THEORY by SHAN Qiang, NI GuangXian, WANG Heng

    Published 2022-01-01
    “…Firstly, through segmentation, randomization, amplification and dimensional reconstruction of the bearing sampling data, a high-dimensional random matrix of the bearing at the current moment is established; Secondly, given the good high-dimensional data processing ability of random matrix theory, the distribution of eigenvalues of bearing random matrix is investigated by using the single ring theorem. …”
    Get full text
    Article
  20. 8560

    Software Design Challenges in Time Series Prediction Systems Using Parallel Implementation of Artificial Neural Networks by Narayanan Manikandan, Srinivasan Subha

    Published 2016-01-01
    “…Particularly software developed with prediction based results is always a big challenge for designers. Time series data forecasting like currency exchange, stock prices, and weather report are some of the areas where an extensive research is going on for the last three decades. …”
    Get full text
    Article