Suggested Topics within your search.
Suggested Topics within your search.
-
9181
Intrusion detection model based on fuzzy theory and association rules
Published 2019-05-01“…An intrusion detection model based on fuzzy theory and improved Apriori algorithm was proposed.The BV-Apriori algorithm was used to generate the matching rule base,and the problem of excessive boundary in the continuous data partitioning process was solved by fuzzy set technology.The real-time analysis of the relationship between features and the update of the rule base were completed,and the intrusion detection model BVA-IDS (Boolean vector Apriori-intrusion detection system) was built.The results show that the mining efficiency of the BV-Apriori algorithm is significantly improved when compared with the existing Apriori-BR algorithm,in addition,the BVA-IDS model also performs well on intrusion detection indicators with high detection accuracy,and low false positive rate and false negative rate.…”
Get full text
Article -
9182
Recommendation algorithm based on GMM clustering and FOA-GRNN model
Published 2018-12-01“…Aiming at the problem of low recommendation accuracy caused by sparse data in traditional item-based recommendation algorithm,a recommendation algorithm based on GMM clustering and FOA-GRNN model is proposed.The algorithm firstly uses Gaussian mixture model (GMM) to cluster the item features,then constructs the score matrix according to the clustering results,and fills the score matrix with slope one algorithm.Finally,the user's score based on similarity prediction is taken as input,and the final score is output through FOA-GRNN model.Experimental results based on movielens-2k dataset show that the proposed algorithm can deal with highly sparse data better and has better recommendation accuracy than the other three algorithms.…”
Get full text
Article -
9183
Mimic cloud service architecture for cloud applications
Published 2021-02-01“…In order to solve the problem of the lack of heterogeneity and dynamics of cloud application services with a single executor, and the difficulty of dealing with the security threats of unknown vulnerabilities and backdoors, a mimic cloud service architecture was proposed.In this architecture, the application services provided by the cloud platform were constructed into a service package based on mimic defense technology, so that the application services had the endogenous security features and robustness brought by mimic structure.At the same time, two key mimic cloud services operating mechanism,policy scheduling and adjudication mechanism were discussed.The experimental results and analysis show that the mimic cloud service obtains better security and its response time delay can be reduced by reducing the performance difference of the executor.…”
Get full text
Article -
9184
Intelligent detection method on network malicious traffic based on sample enhancement
Published 2020-06-01“…To address the problem that the existing methods of network traffic anomaly detection not only need a large number of training sets,but also have poor generalization ability,an intelligent detection method on network malicious traffic based on sample enhancement was proposed.The key words were extracted from the training set and the sample of the training set was enhanced based on the strategy of key word avoidance,and the ability for the method to extract the text features from the training set was improved.The experimental results show that,the accuracy of network traffic anomaly detection model and cross dataset can be significantly improved by small training set.Compared with other methods,the proposed method can reduce the computational complexity and achieve better detection ability.…”
Get full text
Article -
9185
IMPROVING PERSONNEL EFFICIENCY BASED ON A PERSONALIZED APPROACH
Published 2022-02-01“…The article presents a study of the relevance of the problem of developing the theory and methodology of personalized management to improve the efficiency and competitiveness of personnel in modern conditions of high conurence. …”
Get full text
Article -
9186
Neurological Impairment and Literary Empowerment in Nicole Krauss’s Man Walks into a Room
Published 2021-12-01“…While she draws on neuroscience, she also writes against it, as she emphasizes the explanatory gap and the problem of qualia. To resist the growing authority of neuroscience and its often reductionist discourse, Krauss features a neurosurgeon as a mad scientist coming straight out of a science-fiction novel, who uses discursive strategies borrowed from the humanities. …”
Get full text
Article -
9187
Hybrid presence: Integrating interprofessional interactions with digital consultations
Published 2021-09-01“…Moreover, via a video-recorded case study, this article shows how two practitioners organise social actions by exploiting features of a digital communication system in a situation where they manage a practical problem. …”
Get full text
Article -
9188
INSTITUTIONAL TRAPS» OF DIGITAL ECONOMY: CONCEPT AND METHODOLOGY OF RESEARCH
Published 2022-02-01“…The aim of the study is to solve the urgent fundamental scientiic problem of developing a methodological ground regarding the identiication and overcoming institutional traps, based on determining the degree of positive and negative effects of information on socio-economic development; to examine and justify the features and patterns of socio-economic changes associated with the growing digital economy in Russia and worldwide.…”
Get full text
Article -
9189
FORECASTING OF WINTER HIGHWAY SLIPPERINESS
Published 2007-02-01“…Winter slipperiness forecasting is rather complicated problem due to a lot of influencing factors and their non- deterministic character. …”
Get full text
Article -
9190
Enhanced "Green Nudging": Tapping the channels of cultural transmission.
Published 2025-01-01“…Evidence indicates that the behavioral impact of "green nudges" is subject to decay. To address this problem, we propose "enhanced green nudges", which incorporate learning biases as features of humans' capacity for culture. …”
Get full text
Article -
9191
QUANTITATIVE AND QUALITATIVE SCREENING OF THE TRADITIONAL PLUM JAM FROM ROMANIA
Published 2019-01-01“…The production of plum jam, the process of obtaining jams traditional products, the quality of the final products and their main features have been analyzed in this research article. …”
Get full text
Article -
9192
Organization of accounting for factoring companies: risk-oriented approach
Published 2017-08-01“…To solve the problem of rational organization of accounting factoring activity the current research identifies the types of factoring operations typical for the accounting system of factoring company, and their place in this system. …”
Get full text
Article -
9193
The principles of showing man in A. Fadeyev's novel "The Rout"
Published 1974-03-01“…Fadeyev always connected the problem of showing man with that of the formation of the new method, that's why he always tried to find a new principle in solving it. …”
Get full text
Article -
9194
PARAMETRIC SELF-EXCITATION OF CUTTING DYNAMIC SYSTEM
Published 2013-09-01“…The problem on stabilizing the toolpath generation relative to the workpiece taking into account the parametric self-excitation is considered. …”
Get full text
Article -
9195
Enhanced predictive capability for chaotic dynamics by modified quantum reservoir computing
Published 2024-11-01“…In recent years, there has been a growing interest in approaching the problem using both classical and quantum machine learning methods. …”
Get full text
Article -
9196
«Green» employment: the essence and genesis of the concept
Published 2023-06-01“…Two key aspects of the relevant problem are touched upon: the definition of the term under consideration and the main stages of the environmental employment periodization. …”
Get full text
Article -
9197
A Deep Learning Method for Pneumoconiosis Staging on Chest X-Ray Under Label Noise
Published 2025-01-01“…During the fine learning procedure, we apply two different strategies to fit the sample features in the above two subsets. For the samples in ‘confident’ subset, we specifically design a novel soft label relaxation learning strategy (SLRL) to mine the explicit features and overcome the overfitting problem caused by traditional one-hot labels. …”
Get full text
Article -
9198
Calculation and Experimental Study of the Dynamics of the Track Mover Bypass of a Cross-Country Transport Vehicle
Published 2024-12-01“…The model allows for further development for the purpose of in-depth study and consideration of various factors acting in the design elements of the track mover, such as the features of the interaction of the support rollers with the links in the support branch of the track, the formation features of the moment of resistance to rotation and the turning moment depending on the type of the turning mechanism — stepped, differential hydrostatic. …”
Get full text
Article -
9199
STRUCTURED RADIOLOGY REPORTS
Published 2016-02-01“…The paper reviews the problem of using structured radiology reports. Their salient features are as follows: to work out a protocol in accordance with some pattern, to divide it into subheadings arranged consecutively and logically and broken down by main anatomical structures, types of disease, and study, and to use standardized terminology. …”
Get full text
Article -
9200
Personalized medicine: Predictors for the efficiency of biological agent therapy for rheumatoid arthritis
Published 2017-04-01“…Publications dealing with this problem are very heterogeneous: the data obtained in different populations, as well as different studies and criteria for evaluating the efficiency of therapy are used. …”
Get full text
Article