Showing 15,281 - 15,300 results of 19,511 for search '"algorithm"', query time: 0.14s Refine Results
  1. 15281

    Research on network risk assessment based on attack graph of expected benefits-rate by Wenfu LIU, Jianmin PANG, Xin ZHOU, Nan LI, Feng YUE

    Published 2022-08-01
    “…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
    Get full text
    Article
  2. 15282

    High-resolution X-ray phase-contrast tomography of human placenta with different wavefront markers by Sara Savatović, Davis Laundon, Fabio De Marco, Mirko Riedel, Jörg U. Hammel, Madleen Busse, Murielle Salomé, Lorella Pascolo, Irene Zanette, Rohan M. Lewis, Julia Herzen, Pierre Thibault

    Published 2025-01-01
    “…Both MBI datasets are processed with the Unified Modulated Pattern Analysis (UMPA) model, a pattern-matching algorithm. In order to evaluate the benefits and suitability of MBI for virtual histology, we discuss how the complexities of the technique influence image quality and correlate the obtained volumes to 2D techniques, such as conventional histology and X-ray fluorescence (XRF) elemental maps.…”
    Get full text
    Article
  3. 15283

    Predicting patients’ sentiments about medications using artificial intelligence techniques by Amir Sorayaie Azar, Samin Babaei Rikan, Amin Naemi, Jamshid Bagherzadeh Mohasefi, Uffe Kock Wiil

    Published 2024-12-01
    “…Three scenarios were considered for classification, including two, three, and ten classes. The Word2Vec algorithm and pre-trained word embeddings, including the general and clinical domains, were utilized in model development. …”
    Get full text
    Article
  4. 15284

    Asynchronous Distributed Coordinated Hybrid Precoding in Multi-Cell mmWave Wireless Networks by Meesam Jafri, Suraj Srivastava, Sunil Kumar, Aditya K. Jagannatham, Lajos Hanzo

    Published 2024-01-01
    “…Furthermore, the above ADBF framework is also extended to the robust ADBF (R-ADBF) algorithm that incorporates the CSI uncertainty into the design procedure for minimizing the the worst-case transmit power. …”
    Get full text
    Article
  5. 15285

    Evaluation of laboratory findings indicating pancreatitis in healthy lean, obese, and diabetic cats by Freja K. Jørgensen, Charlotte R. Bjornvad, Birgit Krabbe, Stinna Nybroe, Ida N. Kieler

    Published 2025-01-01
    “…Fisher's exact test assessed the proportions of cats with fPLI and fTLI indicative of pancreatitis, and hypocobalaminemia. A random forest algorithm identified explanatory variables for cats having fPLI levels indicative of pancreatitis. …”
    Get full text
    Article
  6. 15286

    Design and Verification of Simulation Data Generator for Rail Transit Switch Machine Oriented to Intelligent Operation and Maintenance by ZOU Jinbai, WEI Shiyan, LIU Jiang, SHA Quan, WU Jie, JI Guoyi

    Published 2025-01-01
    “…[Objective] Difficulty in easily obtaining fault data of various rail transit equipment leads to insufficient data to support the research on machine intelligence algorithms such as fault diagnosis and prediction. In order to meet the urgent need of intelligent rail transit operation and maintenance for a large amount of training data, it is necessary to design and verify the simulation data generator (hereinafter abbreviated as SD generator) of rail transit switch machine. …”
    Get full text
    Article
  7. 15287

    Model Predictive Control for an Aerial Tree-Pruning Robot Based on Alternating Direction Method of Multipliers by Changliang Xu, Zhong Yang, Hao Xu, Qiuyan Zhang, Dongsheng Zhou, Kaiwen Lu, Jiaming Han, Luwei Liao

    Published 2021-01-01
    “…One of the main contributions is that an ADMM (alternating direction method of multipliers) algorithm that solves the constrained QP (quadratic programming) is adopted to implement the model predictive control on embedded computers with limited computational power. …”
    Get full text
    Article
  8. 15288

    The prediction model of academic achievement based on cardiorespiratory fitness and BMI status for ninth-grade students by Viktor Bielik, Vladimír Nosáľ, Libuša Nechalová, Milan Špánik, Katarína Žilková, Marian Grendar

    Published 2025-01-01
    “…The results from the Random Forest Regression (RFR) machine learning algorithm suggest that adolescents who meet the international CRF and BMI criterion-referenced standards have a higher probability of getting a higher academic achievement score than unfit students with overweight or obesity. …”
    Get full text
    Article
  9. 15289

    Optimized radiofrequency shimming using low-heating B1+-mapping in the presence of deep brain stimulation implants: Proof of concept. by Maryam Arianpouya, Benson Yang, Fred Tam, Clare E McElcheran, Simon J Graham

    Published 2024-01-01
    “…A two-step optimization algorithm is proposed and examined for a cylindrical phantom with an implanted wire to enable 1) robust B1+ mapping with low localized heating; and 2) robust RF shimming PTX with low localized heating and good B1+ homogeneity over a large imaging volume. …”
    Get full text
    Article
  10. 15290

    Multi-objective Optimization Model of Track Utilization for Depot-returning Urban Rail Transit Trains with Shunting Operation Constraints by ZHANG Zengchao, XU Peng, XIN Liping, FAN Rui, LI Chen, WU Zelin

    Published 2025-01-01
    “…With the minimum number of shunting operations and the shortest running distance for maintenance as the objective function, and taking the constraints of shunting operations into account, a multi-objective optimization model for train track utilization is developed based on an improved grey wolf algorithm, featuring first for individual independent depot-returning plan (early and late depot-returning) and then for all depot-returning plans as a whole. …”
    Get full text
    Article
  11. 15291

    Evaluating 28-Days Performance of Rice Husk Ash Green Concrete under Compression Gleaned from Neural Networks by Sharanjit Singh, Harish Chandra Arora, Aman Kumar, Nishant Raj Kapoor, Kennedy C. Onyelowe, Krishna Kumar, Hardeep Singh Rai

    Published 2023-01-01
    “…In this study, a total of 407 datasets are used to develop an ML-based model by using the ANN algorithm to predict the CS of concrete containing RHA. …”
    Get full text
    Article
  12. 15292

    PhyIndBC: Development of a machine learning tool for screening of potential breast cancer inhibitors from phytochemicalsGitHub by Agneesh Pratim Das, Subhash M. Agarwal

    Published 2025-06-01
    “…Among these models, the RF algorithm coupled with the MACCS fingerprint emerged as the best performing model. …”
    Get full text
    Article
  13. 15293

    Probabilistic prediction of fatigue damage based on linear fracture mechanics by M. Krejsa, L. Koubova, J. Flodr, J. Protivinsky, Q. T. Nguyen

    Published 2017-01-01
    “…For probabilistic calculation of fatigue crack progression was used the original and new probabilistic methods - the Direct Optimized Probabilistic Calculation (“DOProC”), which is based on optimized numerical integration. The algorithm of the probabilistic calculation was applied in the FCProbCalc code (“Fatigue Crack Probabilistic Calculation”), using which is possible to carry out the probabilistic modelling of propagation of fatigue cracks in a user friendly environment very effectively.…”
    Get full text
    Article
  14. 15294

    Sensitivity and identifiability analysis of COVID-19 pandemic models by O. I. Krivorotko, S. I. Kabanikhin, M. I. Sosnovskaya, D. V. Andornaya

    Published 2021-03-01
    “…The paper presents the results of sensitivity-based identif iability analysis of the COVID-19 pandemic spread models in the Novosibirsk region using the systems of differential equations and mass balance law. The algorithm is built on the sensitivity matrix analysis using the methods of differential and linear algebra. …”
    Get full text
    Article
  15. 15295

    Nonlinear vibration analysis of a 3DOF double pendulum system near resonance by Asmaa Amer, W. Zhang, T.S. Amer, H. Li

    Published 2025-02-01
    “…These solutions are ascertained by contrasting them with numerical solutions (NS) that are derived utilizing the fourth-order Runge-Kutta algorithm (RKA-4). The modulation equations are constructed, and the principal external resonance cases are scrutinized concurrently based on the solvability constraints. …”
    Get full text
    Article
  16. 15296

    Harris Harks Optimization Based Clustering With Fuzzy Routing for Lifetime Enhancing in Wireless Sensor Networks by Di Jing

    Published 2024-01-01
    “…In HHOCFR, an improved Harris harks optimization (HHO) algorithm is utilized to select the best cluster heads (CHs) and form optimal clusters simultaneously by a novel encoding mechanism. …”
    Get full text
    Article
  17. 15297

    Resnet-1DCNN-REA bearing fault diagnosis method based on multi-source and multi-modal information fusion by Xu Chen, Wenbing Chang, Yongxiang Li, Zhao He, Xiang Ma, Shenghan Zhou

    Published 2024-11-01
    “…Finally, the tree-structured parzen estimator (TPE) algorithm was utilized to realize the integration of two models in order to improve the diagnostic effect of a single model and obtain the final bearing fault diagnosis results. …”
    Get full text
    Article
  18. 15298

    ORGANISING EFFECTIVE INTERACTION OF MANAGERS OF ARCHITECTURAL AND CONSTRUCTION COMPANIES WITH CLIENTS BASED ON THE THEORY OF NON-VIOLENT COMMUNICATION by Руслан Кубанов, Дмитро Макатьора, Ярослав Кушик-Стрельніков

    Published 2024-12-01
    “…Specific recommendations, including conducting training, creating internal communication standards, implementing a customer feedback system, and developing active listening and empathy skills, are provided to improve managers’ communication practices. An algorithm for effective problem solving is presented, with special attention to the specifics of using non-violent communication when working with clients in conflict. …”
    Get full text
    Article
  19. 15299

    A Point Cloud-Based Feature Recognition and Path Planning Method by Changhong Chen, Shaofeng Wang, Shunzhou Huang

    Published 2022-01-01
    “…For this, a point cloud-based multifeature contour recognition and location algorithm were proposed to simultaneously extract and locate the hole feature and cylindrical feature from an irregular porous castings. …”
    Get full text
    Article
  20. 15300

    Bayesian calibration and uncertainty quantification for a large nutrient load impact modelZenodoZenodoZenodo by Karel Kaurila, Risto Lignell, Frede Thingstad, Harri Kuosa, Jarno Vanhatalo

    Published 2025-03-01
    “…We then integrated over this (approximate) parameter posterior to produce probabilistic predictions for algal biomass and chlorophyll a concentration under alternative nutrient load reduction scenarios. Our computational algorithm allowed for fast posterior inference and the Gaussian process emulator had good predictive accuracy within the highest posterior probability mass region. …”
    Get full text
    Article