-
2961
Intrinsic assurance: a systematic approach towards extensible cybersecurity
Published 2023-02-01“…At present, the mainstream cyber security systems are laid out in an alienated style, where security functions are separated from business processes, and security products are isolated from each other.It is difficult to effectively cope with increasingly complicated cyber threats in this architecture.Therefore, it is imperative to move security inward for more resilient and secure network infrastructures.Business scenarios of the cybersecurity sector can be categorized into four perspectives: organization, vendor, regulatory and threat, each of which has different business objectives.Starting from the commonness and individuality of the four perspectives, the needs of this sector was systematically summarized and then the goal of building an extensible cybersecurity capability ecosystem was recognized.As the key to this goal, the intrinsic assurance methodology was proposed.Intrinsic assurance capabilities referred to the abilities of ICT components to natively support security functions such as monitoring, protection and traceability.But intrinsic assurance is not the ultimate security implementation itself, which is a key difference from the existing “endogenous security” or “designed-in security” methodologies.Intrinsic assurance emphasizes the inherent security enabling endowment of network components, whether by activating an innate gift or by encapsulating a given one, both of which logically exhibit autoimmunity from an external viewpoint.One advantage of such a component is the cohesion of business and security, which leads to transparent security posture awareness, customized security policies, and close-fitting security protection.It also simplifies the overall engineering architecture and reduces management complexity through encapsulation of multiple functions into a singleton.Additionally, the Intrinsic Assurance Support Capability Framework was put forward, which summarized and enumerated the security capabilities that conformed to the intrinsic assurance concept.This framework classified the security capabilities into five categories, namely collection, cognition, execution, syndication and resilience respectively, together with their sub-types and underlying ICT technologies.Based on this framework, the enhanced implementations of typical security business scenarios was further introduced in light of intrinsic assurance.…”
Get full text
Article -
2962
ID071 Early stimulation strategies for children aged 0 to 3 years old with cerebral palsy: overview of systematic reviews
Published 2024-11-01“…The interventions resulted in significant improvements in child development, body functions and structures, and functional abilities of activities and participation, such as locomotor movements, gait pattern, postural control, balance, muscle tone, joint mobility, visual and auditory functions, fine and gross motor skills, execution of activities of daily living, self-initiated movements, self-care, visual perception, interaction, face-to-face contact, vocalization and communication. …”
Get full text
Article -
2963
Interrater Reliability of the Occupational Therapy Anticipatory Awareness Test: A Performance-Based Cognitive Assessment
Published 2025-05-01“…Impaired self-awareness can pose obstacles to task execution and participation. Traditional assessment methods for self-awareness lack a functional approach, highlighting the need for performance-based assessments such as the Occupational Therapy Anticipatory Awareness Test (OTAAT). …”
Get full text
Article -
2964
Ergonomic implementation of movement interventions in healthcare from the point of view of the physiotherapist
Published 2024-10-01“…When helping patients to stand up, it is most optimal for the healthcare worker to stand next to the patient, ideally on the side where the patient has preserved better functionality. All the proposed methods have proven to be more ergonomically effective and safe, and allow the patient to gain more independence and functionality. …”
Get full text
Article -
2965
Variational Quantum Algorithms for Differential Equations on a Noisy Quantum Computer
Published 2025-01-01“…We further show that it is possible to determine derivatives of the learned functions using the parameter shift rule on the IBM hardware. …”
Get full text
Article -
2966
Towards Automatic Deductive Verification of C Programs with Sisal Loops Using the C-lightVer System
Published 2021-12-01“…Symbolic replacement of definite iterations by recursive functions is the base of this method. Obtained verification conditions with applications of recursive functions correspond to logical base of ACL2 prover. …”
Get full text
Article -
2967
Hierarchical Reinforcement Learning with Automatic Curriculum Generation for Unmanned Combat Aerial Vehicle Tactical Decision-Making in Autonomous Air Combat
Published 2025-05-01“…At the low level, three tactical policies (angle, snapshot, and energy tactics) are designed with reward functions informed by expert knowledge, while the high-level policy dynamically terminates current tactics and selects new ones through sparse reward learning, thus overcoming the limitations of fixed-duration tactical execution. …”
Get full text
Article -
2968
An Adaptive PSO Approach with Modified Position Equation for Optimizing Critical Node Detection in Large-Scale Networks: Application to Wireless Sensor Networks
Published 2025-06-01“…The critical node detection problem (CNDP) focuses on determining the set of nodes whose removal most significantly affects the network’s connectivity, stability, functionality, robustness, and resilience. CNDP is a significant challenge in network analysis that involves identifying the nodes that have a significant influence on connectivity or centrality measures within a network. …”
Get full text
Article -
2969
Temporal characteristics of the human mirror neuron system. Research using transcranial magnetic stimulation
Published 2024-12-01“…Mirror neurons (MN) are integral to linking the perception of actions with their execution, activating during both action observation and execution. …”
Get full text
Article -
2970
Effect of alkali metal cations on dehydrogenative coupling of formate anions to oxalate
Published 2025-04-01“…Density functional theory (DFT) calculations suggest that this kinetic advantage arises not only from increased basicity but also from intermediate destabilization in the Na/Cs mixed-cation system. …”
Get full text
Article -
2971
Are Requirements Really All You Need? Using LLMs to Generate Configuration Code: A Case Study in Automotive Simulations
Published 2025-01-01“…In this work, we investigate the practical capabilities of a state-of-the-art LLM in the context of autonomous driving functionalities. Specifically, we assess the model’s ability to interpret abstract textual requirements extracted from real automotive regulations and transform them into executable configuration code for CARLA, a widely used autonomous driving simulation environment. …”
Get full text
Article -
2972
Simulation Modelling of Multiservice Switched Networks Carrying Unicast and Multicast Traffic with Priorities
Published 2025-02-01“…A specially developed and executed simulation programme was used to carry out the research. …”
Get full text
Article -
2973
MLKL as an emerging machinery for modulating organelle dynamics: regulatory mechanisms, pathophysiological significance, and targeted therapeutics
Published 2025-02-01“…Thus, this review mainly focuses on the regulatory functions, mechanisms, and targets of MLKL in organelles rather than necroptosis and summarize the medical significance in multiple diseases. …”
Get full text
Article -
2974
Biomimetic security model based on immune system control mechanism
Published 2025-04-01“…A system with autonomous defense functions was thus built. Task-oriented, the system was divided into three components: task component, forwarding component, and distributed control component, with all parts being highly interconnected and integrated. …”
Get full text
Article -
2975
MODEL FOR THE EVALUATION OF THE AIRPORT SECURITY SYSTEM
Published 2014-06-01“…The task consists in selection of infrastructure, technical equipment, allocation of personnel and financial means that are necessary to perform all functions of the APS. The paper discusses the elements that make up the APS that are both decision variables for the airport operator during the execution of the APS configuration tasks. …”
Get full text
Article -
2976
Corona-Virus Pandemic: Time of Collaboration in Business
Published 2022-06-01“…Corona-virus pandemic motivated executives to develop creative potential of their employees, to extend horizons of functioning and to start new projects. …”
Get full text
Article -
2977
Can large language models generate geospatial code?
Published 2025-08-01“…As large language models increasingly exhibit hallucinations such as refusal to respond, generation of non-executable code, and poor readability in geospatial code generation tasks, establishing a systematic and quantifiable evaluation framework has become essential for advancing their application in GIS. …”
Get full text
Article -
2978
HIL Automatic Test System Design for the Host Software of LKJ-15C System
Published 2021-01-01“…The system software is mainly composed of test script development module, test script execution module and simulation model library. It performs complete automated regression testing of all the functions of the LKJ-15C host software, and only takes more than 2 days to complete a round of automated testing. …”
Get full text
Article -
2979
The Effects of Motion on Distributed Detection in Mobile Ad Hoc Sensor Networks
Published 2012-03-01“…These results allow rapid characterization of the time-dependence of distributed detection algorithms that are executed in mobile sensor networks.…”
Get full text
Article -
2980
Efficient hybrid-encryption-based optimistic Mix-net protocol
Published 2014-11-01“…An efficient hybrid-encryption-based Mix-net is presented that is much faster than all previous Mix-nets with public verifiability when all mix-servers execute the mixing protocol honestly (the usual case).The improvement by taking an “optimistic” and hash-based approach to verify the correctness of mixing is achieved without requiring complex and costly zero-knowledge proofs.Only two element-wise testing processes with low-cost computations of hash functions are involved to make certain messages are not manipulated by a cheating server.An efficient integration of public-key and symmetric-key operations also speeds up the mixing.As a result,the computational task of each mix-server is almost independent of the number of mix-servers except for some negligible tasks.Anyone can verify the correctness of a result rapidly by computing a few exponentiations.The scheme is robust,too.Those characteristics make it very suitable for large scale electronic voting.…”
Get full text
Article