Showing 5,101 - 5,120 results of 67,915 for search 'DASB~', query time: 2.57s Refine Results
  1. 5101
  2. 5102

    Research on mimic decision method based on deep learning by Xiaohan YANG, Guozhen CHENG, Wenyan LIU, Shuai ZHANG, Bing HAO

    Published 2024-02-01
    “…Due to software and hardware differentiation, the problem of false positives mistakenly identified as network attack behavior caused by inconsistent mimic decision results frequently occurs.Therefore, a mimic decision method based on deep learning was proposed.By constructing an unsupervised autoencoder-decoder deep learning model, the deep semantic features of diverse normal response data were explored from different executions and its statistical rules were analyzed and summarized.Additionally, the offline learning-online decision-making mechanism and the feedback optimization mechanism were designed to solve false positive problem, thereby accurately detecting network attacks and improving target system security resilience.Since statistical rules of normal response data was understood and mastered by deep learning model, the mimic decision results among different executions could remain consistent, indicating that the target system was in a secure state.However, once the target system was subjected to a network attacks, the response data outputted by the different executions was deviated from statistical distribution of deep learning model.Therefore, inconsistent mimic decision results were presented, indicating that the affected execution was under attack and the target system was exposed to potential security threats.The experiments show that the performance of the proposed method is significantly superior to the popular mimic decision methods, and the average prediction accuracy is improved by 14.89%, which is conducive to integrating the method into the mimic transformation of real application to enhance the system’s defensive capability.…”
    Get full text
    Article
  3. 5103

    Evidence-Based Comparison of Robotic and Open Radical Prostatectomy by William T. Lowrance, Tatum V. Tarin, Shahrokh F. Shariat

    Published 2010-01-01
    “…The rapid adoption of robotic-assisted laparoscopic radical prostatectomy (RALP) has occurred despite a lack of high-quality evidence demonstrating its oncologic advantages, safety, or cost effectiveness compared with open radical retropubic prostatectomy (ORP). …”
    Get full text
    Article
  4. 5104

    Automatic Irrigation Based on Soil Moisture for Vegetable Crops by Rafael Muñoz-Carpena, Michael D. Dukes

    Published 2005-08-01
    “…This document is AE354, one of a series of the Department of Agricultural and Biological Engineering, UF/IFAS Extension. Original publication date June 2005.  AE354/AE354: Automatic Irrigation Based on Soil Moisture for Vegetable Crops (ufl.edu) …”
    Get full text
    Article
  5. 5105

    Least square-based vehicle position estimation algorithm by PENG Xin, LI Ren-fa, YANG Liu, LIU Liang-jiao

    Published 2010-01-01
    “…A vehicle position estimation algorithm base on least square optimization was prposed.Firstly,the algorithm deduced the convex constraint condition which the distance matrix had to conform within a short time interval.Then,the least square method was employed to estimate the vehicles’ relative position.Finally,the local maps were merged into the global map.Simulation results demonstrate that the algorithm can achieve preferable estimation accuracy,and meet the real time constraint in vehicular networks.…”
    Get full text
    Article
  6. 5106
  7. 5107

    Traditional guidance mechanism based deep robust watermarking by Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG

    Published 2023-04-01
    “…With the development of network and multimedia technology, multimedia data has gradually become a key source of information for people, making digital media the primary battlefield for copyright protection and anti-counterfeit traceability.Digital watermarking techniques have been widely studied and recognized as important tools for copyright protection.However, the robustness of conventional digital watermarking methods is limited as sensitive digital media can easily be affected by noise and external interference during transmission.Then the existing powerful digital watermarking technology’s comprehensive resistance to all forms of attacks must be enhanced.Moreover, the conventional robust digital watermarking algorithm’s generalizability across a variety of image types is limited due to its embedding method.Deep learning has been widely used in the development of robust digital watermarking systems due to its self-learning abilities.However, current initialization techniques based on deep neural networks rely on random parameters and features, resulting in low-quality model generation, lengthy training times, and potential convergence issues.To address these challenges, a deep robust digital watermarking algorithm based on a traditional bootstrapping mechanism was proposed.It combined the benefits of both traditional digital watermarking techniques and deep neural networks, taking into account their learning abilities and robust characteristics.The algorithm used the classic robust digital watermarking algorithm to make watermarked photos, and the constructed feature guaranteed the resilience of traditional watermarked images.The final dense image was produced by fusing the conventionally watermarked image with the deep network using the U-Net structure.The testing results demonstrate that the technique can increase the stego image’s resistance to various attacks and provide superior visual quality compared to the conventional algorithm.…”
    Get full text
    Article
  8. 5108
  9. 5109
  10. 5110

    Processing Technology Based on Radar Signal Design and Classification by Jianping Ou, Jun Zhang, Ronghui Zhan

    Published 2020-01-01
    “…Adaptive radar signal process, pulse compression management, and digital filtering Doppler method are very effective technical means, which has its own unique advantages. At last, the future research trends and challenges of technologies of the radar signals are proposed. …”
    Get full text
    Article
  11. 5111

    Authentication scheme of smart home based on eUICC by Yan LI, Yanqing LU, Rong ZHANG, Maowen GUO

    Published 2018-04-01
    “…The main existing security risks in smart home services was analyzed.For the reason of these risks,the key points of smart home security and also the authentication scheme based on eUICC were put forward,including the overall architecture,main module interactions,key processes,etc.Finally,the application of eUICC in the field of smart home was prospected.…”
    Get full text
    Article
  12. 5112

    Staff turnover management based on HR analytics data by M.V. Chudinovskikh, A.N. Tkach, D.Y. Korolkov

    Published 2024-10-01
    “…The article is devoted to the development of recommendations for improving staff turnover management based on HR analytics data. Based on the analysis of publications devoted to the problem of turnover, the main metrics that are used to analyze staff turnover are systematized. …”
    Get full text
    Article
  13. 5113

    Comparison of modularity-based approaches for nodes clustering in hypergraphs by Poda, Veronica, Matias, Catherine

    Published 2024-03-01
    “…In this work, we conducted a comparative analysis of the performance of modularity-based methods for clustering nodes in binary hypergraphs. …”
    Get full text
    Article
  14. 5114

    Hyperchaotic Circuit Based on Memristor Feedback with Multistability and Symmetries by Xiaoyuan Wang, Xiaotao Min, Pengfei Zhou, Dongsheng Yu

    Published 2020-01-01
    “…Dynamic analysis shows that it has infinite equilibrium points and multistability. …”
    Get full text
    Article
  15. 5115

    Halévy, fugue d’école und basse donnée by Birger Petersen

    Published 2021-06-01
    “…Dabei kommt sowohl der Schüler Halévy, der seine Wettbewerbsfuge 1819 unter dem Auge Cherubinis verfasste, zu Wort als auch der Lehrer Halévy, dessen Schülerarbeiten einen vergleichbaren Anspruch voraussetzten; stellvertretend wird eine Fuge des Halévy-Schülers François Bazin untersucht. Der abschließende Blick auf eine von Halévy entworfene Aufgabe – einer basse donnée von 1842 – erweist auch für dieses Repertoire die enge Verknüpfung von Kontrapunkt einerseits und modellorientiertem Satz andererseits, die einander niemals ausschließen. …”
    Get full text
    Article
  16. 5116

    Research on Satellite Power System Based on MPPT Technology by Wenshuang ZHANG, Wentao YU, Qiang WEI

    Published 2020-09-01
    “…According to the need of power system for GEO satellite,the plan design and simulation based on Maximum Power Point Tracking (MPPT) technology were designed and simulated.It could reduce the power loss in power transport line and made full use of the output power of solar array.Based on the research and simulation for solar array,the simulation of all the power system was fi nished.The result of simulation provides that it can complete the MPPT function and stabilize the bus voltage.Last,the new plan and the traditional one were compared,which shows the advantage of the new plan and lays a foundation for next power system.…”
    Get full text
    Article
  17. 5117

    Violation of human rights as the basis for the threats to international security by Botirjon Ruzmetov

    Published 2021-12-01
    “…Such human rights violations as mass killing, genocide, slavering, mass raping and others, together with other similar ones around the world, constitute a global threat to security. …”
    Get full text
    Article
  18. 5118
  19. 5119
  20. 5120

    Energy optimization strategy on the IoT equipment based on the scheduler by Wanfang ZHAO, Yong HAN

    Published 2019-03-01
    “…A scheduling strategy to optimize energy consumption was proposed to reduce the energy consumption of the edge system in view of the fast growth of energy consumption demand in the internet of things.Based on the analysis of the power management architecture and the energy consumption composition in the typical multi-core terminal system,in view of the shortcomings of the existing system power management module,the scheduler load balancing mechanism was improved to control system energy consumption and the implementation process and implementation points of the strategy were given.The strategy was tested in the multi-core simulation system.The result shows that in low load scenarios,that is,in scenarios that CPU does not need to do data-intensive computing,the energy-saving effect of this strategy is obvious,such as data acquisition,equipment monitoring and other typical internet of things applications.…”
    Get full text
    Article