-
2361
Extreme Event Statistics in Dst, SYM‐H, and SMR Geomagnetic Indices
Published 2023-03-01Get full text
Article -
2362
Research on IoT security situation awareness method based on evidence theory
Published 2022-04-01“…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
Get full text
Article -
2363
Using microscopic imaging and ensemble deep learning to classify the provenance of archaeological ceramics
Published 2024-12-01“…Under 5-fold cross-validation and independent testing, the proposed fusion-based model performed excellently after comparing above three typical deep learning model. …”
Get full text
Article -
2364
VERTEBRAL PEDICULAR TETHERING - GROWTH MODULATION TECHNIQUE FOR IDIOPATHIC SCOLIOSIS
Published 2025-02-01“…ABSTRACT Objectives: This study aimed to evaluate Vertebral Pedicular Tethering (VPT) as a less invasive alternative to traditional spinal fusion in Adolescent Idiopathic Scoliosis (AIS), focusing on thoracolumbar and lumbar curves (Lenke 5C and 6C) in growing patients. …”
Get full text
Article -
2365
High-Risk Microgranular Acute Promyelocytic Leukemia with a Five-Way Complex Translocation Involving PML-RARA
Published 2015-01-01“…Acute promyelocytic leukemia (APL) is classically characterized by chromosomal translocation (15;17), resulting in the PML-RARA fusion protein leading to disease. Here, we present a case of a 50-year-old man who presented with signs and symptoms of acute leukemia with concern for APL. …”
Get full text
Article -
2366
Statistical Characteristics of Total Electron Content Intensifications on Global Ionospheric Maps
Published 2024-01-01Get full text
Article -
2367
A novel pansharpening method based on cross stage partial network and transformer
Published 2024-06-01“…Abstract In remote sensing image fusion, the conventional Convolutional Neural Networks (CNNs) extract local features of the image through layered convolution, which is limited by the receptive field and struggles to capture global features. …”
Get full text
Article -
2368
Effect of Exercise Preconditioning on Myocardia Ischemia-Reperfusion Injury in Aged Rats
Published 2021-04-01Get full text
Article -
2369
-
2370
-
2371
Clinical Features Associated with Frozen Shoulder Syndrome in Parkinson’s Disease
Published 2015-01-01Get full text
Article -
2372
-
2373
Endogenous endophthalmitis associated with autoimmune hepatitis: case report
Published 2023-08-01Get full text
Article -
2374
-
2375
The Propensity for Inducing Atrial Fibrillation: A Comparative Study on Old versus Young Rabbits
Published 2014-01-01Get full text
Article -
2376
Lenalidomide and Dexamethasone for a Patient of POEMS Syndrome Presenting with Massive Ascites
Published 2014-01-01Get full text
Article -
2377
-
2378
-
2379
-
2380