Suggested Topics within your search.
Suggested Topics within your search.
- methods 17
- Law reports, digests, etc 13
- History 10
- Study and teaching 10
- Methodology 9
- Research 9
- Cases 8
- Politics and government 8
- Social service 8
- Case studies 7
- Management 7
- Anesthesia 6
- Biochemistry 6
- Evaluation 6
- Women 6
- English language 5
- Information technology 5
- Law 5
- Mass media 5
- Moral and ethical aspects 5
- Nursing 5
- Design 4
- Evaluation research (Social action programs) 4
- Health and hygiene 4
- Law and legislation 4
- Protection 4
- Psychology 4
- Social aspects 4
- Social case work 4
- diagnosis 4
-
4361
Survey on anomaly detection technology based on logs
Published 2020-12-01“…Log information has become an important information resource in the rapid development of information systems.Through the analysis of logs,abnormal detection,fault diagnosis and performance diagnosis can be performed.The log-based anomaly detection technology was focused on.Firstly,the currently used log-based anomaly detection framework was introduced,and then the key link technologies such as log analysis and log anomaly detection were focused on.Finally,the current technology was summarized and suggestions for future research directions were given.…”
Get full text
Article -
4362
Research progress of phosphogypsum-based backfill technology
Published 2025-02-01Subjects: “…phosphogypsum-based backfill…”
Get full text
Article -
4363
The neural basis of self-ambivalence: an ERP study
Published 2024-12-01“…Abstract The primary objective of this study was to investigate the neural basis of self-ambivalence, a phenomenon firmly established by behavioral research but whose underlying brain mechanisms have been less explored. …”
Get full text
Article -
4364
Classifying Cervical Spondylosis Based on Fuzzy Calculation
Published 2014-01-01“…Fuzzy calculation model based on the table can be carried out to classify CS and improve the diagnosis accuracy. …”
Get full text
Article -
4365
-
4366
Traffic Risk Assessment Based on Warning Data
Published 2022-01-01“…To address the issues of insufficient danger excavation and long data collection period in traditional traffic risk assessment methods, this paper proposes a risk assessment method based on driver’s improper driving behavior and abnormal vehicle state warning data. …”
Get full text
Article -
4367
Key technologies and solutions of VR based on IPTV
Published 2018-11-01“…As a new technology,virtual reality technology’s innovation on video brings users a completely new interactive experience.The developments in VR/AR industry at home and abroad were introduced.The IPTV-based demand of the VR was analyzed.Furthermore,the key technologies including video codec,projections,integrated service platform techniques,set top box,network transmission were also researched.At last,a solution and a process were presented from two different scenes.It’s also a solution for reference to the development of IPTV VR.…”
Get full text
Article -
4368
Alternatives to Petroleum-Based Containers for the Nursery Industry
Published 2011-12-01“…This 5-page fact sheet looks at the past, present, and future of containers used in container nursery production. …”
Get full text
Article -
4369
Pesticide Toxicity Profile: Copper-based Pesticides
Published 2005-09-01“…Original publication date September 2005. …”
Get full text
Article -
4370
Pesticide Toxicity Profile: Copper-based Pesticides
Published 2005-09-01“…Original publication date September 2005. …”
Get full text
Article -
4371
-
4372
Outsourced attribute-based encryption with policy update
Published 2016-05-01Subjects: “…attribute-based encryption…”
Get full text
Article -
4373
Content-based effective event matching algorithm
Published 2011-01-01Subjects: Get full text
Article -
4374
Novel defense based on softmax activation transformation
Published 2022-04-01“…Deep learning is widely used in various fields such as image processing, natural language processing, network mining and so on.However, it is vulnerable to malicious adversarial attacks and many defensive methods have been proposed accordingly.Most defense methods are attack-dependent and require defenders to generate massive adversarial examples in advance.The defense cost is high and it is difficult to resist black-box attacks.Some of these defenses even affect the recognition of normal examples.In addition, the current defense methods are mostly empirical, without certifiable theoretical support.Softmax activation transformation (SAT) was proposed in this paper, which was a light-weight and fast defense scheme against black-box attacks.SAT reactivates the output probability of the target model in the testing phase, and then it guarantees privacy of the probability information.As an attack-free defense, SAT not only avoids the burden of generating massive adversarial examples, but also realizes the advance defense of attacks.The activation of SAT is monotonic, so it will not affect the recognition of normal examples.During the activation process, a variable privacy protection transformation coefficient was designed to achieve dynamic defense.Above all, SAT is a certifiable defense that can derive the effectiveness and reliability of its defense based on softmax activation transformation.To evaluate the effectiveness of SAT, defense experiments against 9 attacks on MNIST, CIFAR10 and ImageNet datasets were conducted, and the average attack success rate was reduced from 87.06% to 5.94%.…”
Get full text
Article -
4375
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
4376
Ideas of enterprise informationization based on user experience
Published 2016-03-01Subjects: Get full text
Article -
4377
-
4378
ID-based wireless authentication scheme with anonymity
Published 2009-01-01“…Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be ap-plied to the authentication in the wireless network.…”
Get full text
Article -
4379
DDoS attacks detection based on link character
Published 2007-01-01“…A new method based on link character was proposed for DDoS attacks detection.Maximum likelihood estima-tion was used to estimate the distribution of link character.SOM neural network is used for link activity profile learning and anomaly link detection.Experiment results indicate that the technique is effective and of a definite practicability.It has a further develop potential for DDoS attacks detection.…”
Get full text
Article -
4380
Bioinspired origami-based soft prosthetic knees
Published 2024-12-01“…The efficacy of the proposed design has been corroborated through bench-top and ambulation experiments. …”
Get full text
Article