Showing 6,241 - 6,260 results of 81,006 for search 'at*', query time: 0.17s Refine Results
  1. 6241

    Enhancing Low-Light Images with Kolmogorov–Arnold Networks in Transformer Attention by Alexandru Brateanu, Raul Balmez, Ciprian Orhei, Cosmin Ancuti, Codruta Ancuti

    Published 2025-01-01
    “…This work presents a novel Transformer attention mechanism inspired by the Kolmogorov–Arnold representation theorem, incorporating learnable non-linearity and multivariate function decomposition. …”
    Get full text
    Article
  2. 6242

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  3. 6243
  4. 6244

    ATP-Binding Pocket-Targeted Suppression of Src and Syk by Luteolin Contributes to Its Anti-Inflammatory Action by Jeong-Oog Lee, Deok Jeong, Mi-Yeon Kim, Jae Youl Cho

    Published 2015-01-01
    “…Overexpression of wild type Src and point mutants thereof, and molecular modelling studies, suggest that the ATP-binding pocket may be the luteolin-binding site in Src. …”
    Get full text
    Article
  5. 6245

    Agave attenuata Spineless Century Plant by Edward Gilman

    Published 2007-05-01
    “… This document provides an overview of the Agave attenuata, commonly known as the spineless century plant. …”
    Get full text
    Article
  6. 6246

    Man’s Attitude Towards Nature and Animal Respect Questionnaire (AniRe-Que) by Ján Kaliský, Lada Kaliská

    Published 2020-12-01
    “…The questionnaire is based on the theoretical outcomes of an egalitarian zoocentric, ecoethical position attributing moral statues to all beings, and measures the level of respect expression to nonhuman beings. …”
    Get full text
    Article
  7. 6247
  8. 6248
  9. 6249

    Research on Aircraft Attack Angle Control Considering Servo-Loop Dynamics by Xiaodong Liu, Yan Wang, Wanwei Huang, Zongxia Jiao

    Published 2015-01-01
    “…Computer simulation results present that, compared with the attack angle control scheme which does not consider the servo-loop dynamics in design process, the proposed scheme can guarantee that the whole attack angle control system possesses the better comprehensive performances. …”
    Get full text
    Article
  10. 6250
  11. 6251
  12. 6252
  13. 6253
  14. 6254
  15. 6255

    A severe microsporidian disease in cultured Atlantic Bluefin Tuna (Thunnus thynnus) by Alejandro López-Verdejo, Francisco E. Montero, Fernando de la Gándara, Miguel A. Gallego, Aurelio Ortega, Juan Antonio Raga, José F. Palacios-Abella

    Published 2022-03-01
    “…Abstract One of the most promising aquaculture species is the Atlantic bluefin tuna (Thunnus thynnus) with high market value; disease control is crucial to prevent and reduce mortality and monetary losses. …”
    Get full text
    Article
  16. 6256
  17. 6257

    The university brand as a factor in attracting applicants by I. I. Cherkasova, V. V. Cherkasov, A. V. Cherkasov

    Published 2023-01-01
    “…This, in turn, will make it possible to develop marketing strategy for attracting talented applicants.…”
    Get full text
    Article
  18. 6258
  19. 6259

    Àgbéyẹ ̀wó Ìfẹ ̀tọ ́dunni àti Ìdájọ ́ Nínú Àsàyàn Eré-onítàn Yorùbá by Àrìnpé G. Adéjùmọ ̀, Ọládélé Ṣàngótóyè

    Published 2021-12-01
    “…   Ìfè tọ ́ dunni àti ìdájo ̣ ́ kó ipa pàtàkì nínú iṣe ̣ ́ àwọn òǹko ̣ ̀ wé alátinúdá láti ìgbà ̣ pípé wá àti títí di àkókò yìí. …”
    Get full text
    Article
  20. 6260

    Fuzzy Similar Priority Method for Mixed Attributes by Jinshan Ma, Changsheng Ji, Jing Sun

    Published 2014-01-01
    “…The improved method can not only address mixed attributes but also simplify the calculation and improve the accuracy of result. …”
    Get full text
    Article