Showing 2,461 - 2,480 results of 54,221 for search 'Methil~', query time: 4.36s Refine Results
  1. 2461

    Financial phishing detection method based on sensitive characteristics of webpage by Xiang-dong HU, Ke LIU, Feng ZHANG, Jia-fu LIN, Jun FU, Zhi-hui GUO

    Published 2017-02-01
    “…The method matches number of sensitive text using multiple pattern matching algorithm AC_SC (AC suitable for Chinese). …”
    Get full text
    Article
  2. 2462

    A Service Recommendation Method Based on Requirements for the Cloud Environment by Liangmin Guo, Kaixuan Luan, Xiaoyao Zheng, Jing Qian

    Published 2021-01-01
    “…Compared to the traditional collaborative filtering method and the deviation-based method, our method improves the recommendation accuracy without lowering the efficiency.…”
    Get full text
    Article
  3. 2463
  4. 2464
  5. 2465
  6. 2466

    Method of botnet network nodes detection base on communication similarity by Yuquan JIN, Bin XIE, Yi ZHU

    Published 2018-10-01
    “…At present,the botnet detection method mostly relies on the analysis of the network communication activity or the communication content.The former carries on the statistical analysis to the characteristic of the data flow,does not involve the content in the data flow,has the strong superiority in the detection encryption type aspect,but the accuracy is low.The latter relies on the prior knowledge to examine,has the strong accuracy,but the generality of detection is low.The communication similarity was defined according to Jaccard similarity coefficient,and a method of calculating communication similarity based on user request DNS (domain name system) was proposed,which was used for botnet node detection based on network traffic.Finally,based on the spark framework,the experimental results show that the proposed method can be used in the detection of botnet nodes effectively.…”
    Get full text
    Article
  7. 2467

    C-SHAP: A Hybrid Method for Fast and Efficient Interpretability by Golshid Ranjbaran, Diego Reforgiato Recupero, Chanchal K. Roy, Kevin A. Schneider

    Published 2025-01-01
    “…To address this, we introduce C-SHAP (Clustering-Boosted SHAP), a hybrid method that combines SHAP with K-means clustering to reduce execution times significantly while preserving interpretability. …”
    Get full text
    Article
  8. 2468
  9. 2469

    Quantitative method for network security situation based on attack prediction by Hao HU, Run-guo YE, Hong-qi ZHANG, Ying-jie YANG, Yu-ling LIU

    Published 2017-10-01
    “…To predict the attack behaviors accurately and comprehensively as well as to quantify the threat of attack,a quantitative method for network security situation based on attack prediction was proposed.By fusing the situation factors of attacker,defender and network environment,the capability of attacker and the exploitability rate of vulnerability were evaluated utilizing the real-time detected attack events,and the expected time-cost for attack-defense were further calculated.Then an attack prediction algorithm based on the dynamic Bayesian attack graph was designed to infer the follow-up attack actions.At last,the attack threat was quantified as the security risk situation from two levels of the hosts and the overall network.Experimental analysis indicates that the proposed method is suitable for the real adversarial network environment,and is able to predict the occurrence time of attack accurately and quantify the attack threat reasonably.…”
    Get full text
    Article
  10. 2470

    Research on the rapid diagnosis method for hunting of high-speed trains by Wanru Xie, Yixin Zhao, Gang Zhao, Fei Yang, Zilong Wei, Jinzhao Liu

    Published 2025-02-01
    “…On this basis, an effective diagnostic method has been proposed. With a focus on practical engineering applications, a rapid screening index for identifying potential issues has been proposed, significantly enhancing the efficiency of diagnostic processes.…”
    Get full text
    Article
  11. 2471
  12. 2472
  13. 2473

    Successful Management of Immune Thrombocytopenia Presenting with Lethal Alveolar Hemorrhage by Keiki Nagaharu, Masahiro Masuya, Keiki Kawakami, Naoyuki Katayama

    Published 2019-01-01
    “…However, there is little evidence for the utilization of this treatment for acute ITP or acute exacerbation of chronic ITP. We report the case details of three elderly ITP patients presenting with lethal diffuse alveolar hemorrhage. …”
    Get full text
    Article
  14. 2474
  15. 2475

    A New Method for Predicting Non‐Recurrent Geomagnetic Storms by Cong Wang, Qian Ye, Fei He, Bo Chen, Xiaoxin Zhang

    Published 2023-08-01
    “…This study proposes a new method that includes the spectral whitening method and CEEMDAN‐CWT for predicting non‐recurrent geomagnetic storms. …”
    Get full text
    Article
  16. 2476
  17. 2477

    Comparison of different methods for identification of meat species in meat products by Yusuf Özşensoy, Seyda Şahin

    “…<b>Aim:</b> Objective of this study were identification of animal species in meat products marketed in Sivas province using different methods and comparison of these methods.<p> <b>Materials and Methods:</b> Sucuk, salami, sausage, meatball and braised meat samples were collected for the investigation from marketed in Sivas province with random samples methods in 2014. …”
    Get full text
    Article
  18. 2478
  19. 2479

    Application of an Improved TF-IDF Method in Literary Text Classification by Lin Xiang

    Published 2022-01-01
    “…With the purpose of classifying the literary texts in this study, this work proposes an improved IDF method for the problem of feature words appearing several times and having diverse meanings in different fields. …”
    Get full text
    Article
  20. 2480

    The First Integral Method to the Nonlinear Schrodinger Equations in Higher Dimensions by Shoukry Ibrahim Atia El-Ganaini

    Published 2013-01-01
    “…This method provides polynomial first integrals for autonomous planar systems. …”
    Get full text
    Article