Showing 2,361 - 2,380 results of 5,905 for search 'Enfusion~', query time: 2.35s Refine Results
  1. 2361
  2. 2362

    Research on IoT security situation awareness method based on evidence theory by Jian LI, Tinglu DONG, Jie LI

    Published 2022-04-01
    “…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
    Get full text
    Article
  3. 2363

    Using microscopic imaging and ensemble deep learning to classify the provenance of archaeological ceramics by Qian Wang, Xuan Xiao, Zi Liu

    Published 2024-12-01
    “…Under 5-fold cross-validation and independent testing, the proposed fusion-based model performed excellently after comparing above three typical deep learning model. …”
    Get full text
    Article
  4. 2364

    VERTEBRAL PEDICULAR TETHERING - GROWTH MODULATION TECHNIQUE FOR IDIOPATHIC SCOLIOSIS by ANDRÉ SANTOS DE BARROS, PEDRO BIZARRO, PEDRO JORDÃO, JOÃO LAMEIRAS CAMPAGNOLO, JORGE MINEIRO

    Published 2025-02-01
    “…ABSTRACT Objectives: This study aimed to evaluate Vertebral Pedicular Tethering (VPT) as a less invasive alternative to traditional spinal fusion in Adolescent Idiopathic Scoliosis (AIS), focusing on thoracolumbar and lumbar curves (Lenke 5C and 6C) in growing patients. …”
    Get full text
    Article
  5. 2365

    High-Risk Microgranular Acute Promyelocytic Leukemia with a Five-Way Complex Translocation Involving PML-RARA by Benjamin Powers, Diane Persons, Deepthi Rao, Janet Woodroof, Tara L. Lin

    Published 2015-01-01
    “…Acute promyelocytic leukemia (APL) is classically characterized by chromosomal translocation (15;17), resulting in the PML-RARA fusion protein leading to disease. Here, we present a case of a 50-year-old man who presented with signs and symptoms of acute leukemia with concern for APL. …”
    Get full text
    Article
  6. 2366
  7. 2367

    A novel pansharpening method based on cross stage partial network and transformer by Yingxia Chen, Huiqi Liu, Faming Fang

    Published 2024-06-01
    “…Abstract In remote sensing image fusion, the conventional Convolutional Neural Networks (CNNs) extract local features of the image through layered convolution, which is limited by the receptive field and struggles to capture global features. …”
    Get full text
    Article
  8. 2368
  9. 2369
  10. 2370
  11. 2371
  12. 2372
  13. 2373
  14. 2374
  15. 2375
  16. 2376
  17. 2377
  18. 2378
  19. 2379
  20. 2380