Showing 4,321 - 4,340 results of 67,915 for search 'DASB~', query time: 2.38s Refine Results
  1. 4321

    An Information-Based Classification of Elementary Cellular Automata by Enrico Borriello, Sara Imari Walker

    Published 2017-01-01
    “…We propose a novel, information-based classification of elementary cellular automata. …”
    Get full text
    Article
  2. 4322

    Haplotypes-based genetic analysis: benefits and challenges by D. Sehgal, S. Dreisigacker

    Published 2019-11-01
    “…Concomitantly, researchers will face the challenge of handling large data sets at the whole-genome level. By grouping thousands of SNPs into a few hundred haplotype blocks, complexity of the data can be reduced with fewer statistical tests and a lower probability of spurious associations. …”
    Get full text
    Article
  3. 4323

    Exploration of SDN-Based Mobility Management Mecbanism by Mingyu Zhao, Xueqiang Yan

    Published 2015-04-01
    “…Mobility management is a key technology in the mobile communication network.On the basis of analyzing the current mobility management technologies and researching SDN,an SDN-based mobility management mechanism without tunnel was presented,which was applicable to solve the existing issues such as GTP overheads,increasing signa1,non-seamless handover,and low routing efficient,and was in line with the future network trend as well.The architecture of this proposal was depicted,and the signal procedure was minutely dissected.…”
    Get full text
    Article
  4. 4324
  5. 4325
  6. 4326

    Consensus-Based Resilience Assurance for System of Systems by Huanjun Zhang, Yutaka Matsubara

    Published 2025-01-01
    “…Within the framework, the resilient team can discuss the specific implementation details of failure response, accountability, and change accommodation based on stakeholder consensus. Finally, two SoS case studies, Microgrid and Mobility as a Service, are used to demonstrate the application of the proposed approach.…”
    Get full text
    Article
  7. 4327
  8. 4328

    Urban regeneration. Benefits of nature-based solutions by Katia Perini, Francesca Mosca, Andrea Giachetta

    Published 2021-06-01
    Subjects: “…nature-based solutions…”
    Get full text
    Article
  9. 4329

    Hardware Trojans detection based on projection pursuit by Peng ZHANG, Xin-cheng WANG, Qing ZHOU

    Published 2013-04-01
    “…A novel hardware Trojans detection technique using the side channel signals of chips was proposed.Based on the projection pursuit with absolute information divergence index,this technique could find out the data structure enables reflect high dimension special rules without obvious i tion loss,so as to attain the goal of feature abstraction and identification on side channel signals of IC chips.The detection experiment against an exemplary AES-128 hardware Trojan circuit showed that the technique could distinguish the difference of side channel signal's feature between the genuine chip and tested chip,and consequently could detect the existence of the hardware Trojan.…”
    Get full text
    Article
  10. 4330

    Health-based network node importance assessment by Jianwei LIU, Bin JIANG, Pu YANG

    Published 2021-09-01
    “…For the identification of key nodes in network systems, a node importance assessment method based on the system health state was proposed.Firstly, the definition of the system health degree was analyzed.Then, according to the connection relationship between network nodes, the adjacency matrix was established to calculate the network capacity change under normal conditions and fault degradation conditons.And the relationship model between the system health degree and the node importance degree was established.Finally, simulations of network systems showed that this method could effectively identify the key nodes in the system and improve the reliability of the network.…”
    Get full text
    Article
  11. 4331

    Alternatives to Petroleum-Based Containers for the Nursery Industry by Gary W. Knox, Matthew Chappell

    Published 2011-12-01
    “…This 5-page fact sheet looks at the past, present, and future of containers used in container nursery production. …”
    Get full text
    Article
  12. 4332

    Survey of software anomaly detection based on deception by Jianming FU, Chang LIU, Mengfei XIE, Chenke LUO

    Published 2022-02-01
    “…Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address space randomization technologies have effectively prevented the pace of APT.However, the complexity of the software and the evolution of attacks make the software still being vulnerable.For this reason, deception defense with resources as bait is an indispensable supplement for network security.The trapping mechanism consists of bait design and attack detection, which infer possible unauthorized access or malicious attacks by sensing the interaction behavior with the bait.According to the three types of bait, which are file, data and code, the automatic construction scheme of bait is designed and deployed, and the effectiveness of bait is measured from the aspects of believability, detectability and enticement, etc.Ransom ware detection based on deception defense focuses on the deployment location of bait files, and in the area of vulnerability detection, code reuse attacks are detected by injecting bait code.Research work related to the implementation of deception defense in each phase of APT attacks was introduced, and the mechanism of deception defense from bait type, bait generation, bait deployment, and bait measurement was described.Simultaneously, deception defense applications in ransom ware detection, vulnerability detection, and Web security were analyzed.In response to the shortcomings of existing ransom ware detection research in terms of bait file design and deployment, a dynamic update method of bait for ransom ware detection was proposed.The deception defense challenges were discussed and hoped that deception defense can provide theoretical and technical support for discovering unknown attacks and attack attribution.…”
    Get full text
    Article
  13. 4333

    Constitutional basis of Austria’s accession to the European Union by E. A. Vodyanitskaya

    Published 2009-12-01
    “…On this occasion the Austrian legislature passed an amendment to the Federal Constitution which provides for the participation of Austrian organs in the decision-making process of the European Union. …”
    Get full text
    Article
  14. 4334

    Device integration technology based on Web services by Lu JIN, Su-bin SHEN

    Published 2012-11-01
    “…Through studied on integration technologies based on the web services,DPWS (devices profile for Web service) was applied to solve the integration issues of different kinds of devices.Relying on the requirements of integrating networked cameras,the difficulties in the integration process of embedded devices were summarized.Application interfaces based on web services was implemented by using DPWS and the features like dynamic discovery,eventing were integrated.The test results show that the system has high performance,scalability,robustness and universality.…”
    Get full text
    Article
  15. 4335

    Software diversification method based on binary rewriting by Benwei HE, Yunfei GUO, Yawen WANG, Qingfeng WANG, Hongchao HU

    Published 2023-04-01
    “…Software diversity is an effective defense against code-reuse attacks, but most existing software diversification technologies are based on source code.Obtaining program source code may be difficult, while binary files are challenging to disassemble accurately and distinguish between code pointers and data constants.This makes binary file diversification difficult to generate high levels of randomization entropy, and easily compromised by attackers.To overcome these challenges, a binary file oriented software diversification method was proposed based on static binary rewriting technology, namely instruction offset randomization.This method inserted NOP instructions of varying byte lengths before program instructions with a certain probability, reducing the number of unintended gadgets in the program and randomly offsetting the original instruction address.This disrupts the program’s original memory layout and increases the cost of code-reuse attacks.At the same time, an optimization strategy based on hot code was designed for this method.The execution times of basic blocks in binary files were obtained by dynamic pile insertion, so as to adjust the NOP instruction insertion probability in each basic block.The higher the execution frequency, the fewer NOP instructions were inserted into the basic block, which can ensure lower performance overhead and produce higher randomization entropy.In the experimental part, the SPEC benchmark program was used to test the optimized method from the aspects of performance overhead, gadget survival rate and file size.The results show that a 15% insertion probability achieves the best effect, with an average gadget survival rate of less than 1.49%, increasing attackers’ difficulty in reusing the same gadget attack chain.Furthermore, only a 4.1% operation overhead and 7.7% space overhead are added, maintaining high levels of security.…”
    Get full text
    Article
  16. 4336

    Hydrogen-Based Energy Systems for Sustainable Transportation by Matteo Genovese, Francesco Piraino, Petronilla Fragiacomo

    Published 2025-01-01
    “…Rising concerns about climate change, the need to innovate and connect diverse energy sectors, and the challenge of energy dependency are boosting global interest in hydrogen-based technologies [...]…”
    Get full text
    Article
  17. 4337

    Shamir-based virtual machine placement policy by Junfeng TIAN, Zilong WANG, Xinfeng HE, Zhen LI

    Published 2019-10-01
    “…In order to alleviate the harm of co-location attack in cloud environment,a virtual machine placement strategy based on Shamir was proposed,and a virtual machine placement framework was designed.The security of key data was ensured by the blockchain in the proposed placement strategy.The virtual machine placement policy could effectively improve the security of the virtual machine and the load balancing capability of the cloud environment,and reduce resource waste.Finally,the effectiveness of the scheme is proved by simulation experiments.…”
    Get full text
    Article
  18. 4338

    Trajectory Planning of Robot based on the Jerk Optimal by Wang Wenjie, Qin Xiansheng, Wang Hongbo, Niu Junlong, Tan Xiaoqun, Zhang Xuefeng

    Published 2017-01-01
    “…According to the need of the stability and complexity of the robot trajectory path,a method of Cartesian space trajectory planning based on the Jerk optimal is presented,a smooth and stable robot motion trajectory is obtained. …”
    Get full text
    Article
  19. 4339

    Accounting and management systems as the basis of enterprise development by E. V. Gavrichenko, A. A. Ilina

    Published 2023-09-01
    “…The impact of the Covid-19 pandemic has been studied on the economic activity of the enterprise and on the reporting formation. …”
    Get full text
    Article
  20. 4340