Showing 4,921 - 4,940 results of 5,905 for search 'Enfusion~', query time: 2.43s Refine Results
  1. 4921
  2. 4922
  3. 4923
  4. 4924
  5. 4925
  6. 4926
  7. 4927
  8. 4928
  9. 4929
  10. 4930
  11. 4931
  12. 4932
  13. 4933
  14. 4934

    Data recommendation algorithm of network security event based on knowledge graph by Xianwei ZHU, Wei LIU, Zihao LIU, Zeyu GU

    Published 2023-12-01
    “…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
    Get full text
    Article
  15. 4935

    PRMT1-methylated MSX1 phase separates to control palate development by Li Meng, Yucheng Jiang, Jiawen You, Yatao Chen, Shuyu Guo, Liming Chen, Junqing Ma

    Published 2025-01-01
    “…Here, we show that MSX1 phase separation is a vertebrate-conserved mechanism underlying embryonic palatal fusion. Notably, MSX1 phase separation is triggered by its intrinsically disordered protein region (IDR) and regulated by PRMT1-catalyzed methylation, specifically asymmetric dimethylation of arginine in the MSX1 IDR including R150 and R157. …”
    Get full text
    Article
  16. 4936

    SCoralDet: Efficient real-time underwater soft coral detection with YOLO by Zhaoxuan Lu, Lyuchao Liao, Xingang Xie, Hui Yuan

    Published 2025-03-01
    “…First, we introduce a Multi-Path Fusion Block (MPFB) to capture coral features across multiple scales, enhancing the model’s robustness to uneven lighting and image blurring. …”
    Get full text
    Article
  17. 4937

    Potato Plant Variety Identification Study Based on Improved Swin Transformer by Xue Xing, Chengzhong Liu, Junying Han, Quan Feng, Enfang Qi, Yaying Qu, Baixiong Ma

    Published 2025-01-01
    “…The model employs a multi-scale feature fusion module in place of patch partitioning and linear embedding. …”
    Get full text
    Article
  18. 4938

    Automated deobfuscation and family classification system for Excel 4.0 macros by LI Chenguang, YANG Xiuzhang, PENG Guojun

    Published 2024-06-01
    “…Based on that, Word and Token features tailored to XLM code peculiarities were extracted, capturing multi-level, fine-grained features through feature fusion. XLMRevealer incorporated a CNNBiLSTM model to discern familial correlations across dimensions, facilitating family classification. …”
    Get full text
    Article
  19. 4939

    Study on the vibration characteristics and influence range of buried dam pipeline by Lihui Gao, Jing Xu, Shuai Xing

    Published 2025-01-01
    “…To accurately identify the vibration and transmission characteristics of the buried pipeline dikes, determine its primary vibration sources, and clarify the propagation laws of pipeline vibrations within the levee, this study, based on prototype observation data and utilizing signal fusion processing technology, investigates the inherent vibration characteristics of the buried pipeline dikes from the perspectives of excitation, transmission, and response. …”
    Get full text
    Article
  20. 4940

    Serial visual reversal learning in captive black-handed spider monkeys, Ateles geoffroyi by Jules Dorschner, Laura Teresa Hernandez Salazar, Matthias Laska

    Published 2024-08-01
    “…Therefore, we assessed the ability of 12 black-handed spider monkeys (Ateles geoffroyi), a highly frugivorous platyrrhine primate with strong fission-fusion dynamics, to succeed in a serial visual reversal learning task. …”
    Get full text
    Article