-
15281
Research on network risk assessment based on attack graph of expected benefits-rate
Published 2022-08-01“…As Internet applications and services become more and more extensive, the endless network attacks lead to great risks and challenges to the security of information systems.As a model-based network security risk analysis technology, attack graph is helpful to find the vulnerability between network nodes and the harm of being attacked.It has been proved to be an effective method to find and prevent network security risks.Attack graph is mainly divided into state-based attack graph and attribute-based attack graph.Due to the problem of state explosion in state-based attack graph, most researchers prefer the attribute-based attack graph for network risk assessment.In view of the existing researches on attribute-based attack graph, they excessively rely on the vulnerability of network nodes and the essential attributes of atomic attack.However, they ignore that rational attackers usually choose specific attack paths by maximizing attack benefits.Then, a network risk assessment framework and a quantification method of attack benefits-rate based on expected benefits-rate attack graph were proposed.The network risk assessment framework took the open vulnerability resource database, the new vulnerabilities found by the vulnerability mining system and the big data related to network attack and defense as the basic data source.The network risk assessment framework also took the open source big data platform as the analysis tool to mine and calculate the elements related to attack cost and attack benefit.Using the concepts of cost, benefit and benefit-rate in economics, the calculation model of expected benefit-rate of atomic attack was constructed.By constructing the attribute-based attack graph of the target network, the expected benefit-rate of atomic attack on the attack path was calculated, and the expected benefit-rate list of all possible attack paths was generated.Furthermore, taking the expected goal as the starting point, the search was carried out according to the specific optimization strategy (backtracking method, greedy algorithm, dynamic programming).And the complete attack path with the maximum benefit-rate was obtained, which provided the basis for network risk assessment.The simulation results show the effectiveness and rationality of the proposed expected benefit-rate attack graph network risk assessment method, which can provide support for discovering and preventing network security problems.…”
Get full text
Article -
15282
High-resolution X-ray phase-contrast tomography of human placenta with different wavefront markers
Published 2025-01-01“…Both MBI datasets are processed with the Unified Modulated Pattern Analysis (UMPA) model, a pattern-matching algorithm. In order to evaluate the benefits and suitability of MBI for virtual histology, we discuss how the complexities of the technique influence image quality and correlate the obtained volumes to 2D techniques, such as conventional histology and X-ray fluorescence (XRF) elemental maps.…”
Get full text
Article -
15283
Predicting patients’ sentiments about medications using artificial intelligence techniques
Published 2024-12-01“…Three scenarios were considered for classification, including two, three, and ten classes. The Word2Vec algorithm and pre-trained word embeddings, including the general and clinical domains, were utilized in model development. …”
Get full text
Article -
15284
Asynchronous Distributed Coordinated Hybrid Precoding in Multi-Cell mmWave Wireless Networks
Published 2024-01-01“…Furthermore, the above ADBF framework is also extended to the robust ADBF (R-ADBF) algorithm that incorporates the CSI uncertainty into the design procedure for minimizing the the worst-case transmit power. …”
Get full text
Article -
15285
Evaluation of laboratory findings indicating pancreatitis in healthy lean, obese, and diabetic cats
Published 2025-01-01“…Fisher's exact test assessed the proportions of cats with fPLI and fTLI indicative of pancreatitis, and hypocobalaminemia. A random forest algorithm identified explanatory variables for cats having fPLI levels indicative of pancreatitis. …”
Get full text
Article -
15286
Design and Verification of Simulation Data Generator for Rail Transit Switch Machine Oriented to Intelligent Operation and Maintenance
Published 2025-01-01“…[Objective] Difficulty in easily obtaining fault data of various rail transit equipment leads to insufficient data to support the research on machine intelligence algorithms such as fault diagnosis and prediction. In order to meet the urgent need of intelligent rail transit operation and maintenance for a large amount of training data, it is necessary to design and verify the simulation data generator (hereinafter abbreviated as SD generator) of rail transit switch machine. …”
Get full text
Article -
15287
Model Predictive Control for an Aerial Tree-Pruning Robot Based on Alternating Direction Method of Multipliers
Published 2021-01-01“…One of the main contributions is that an ADMM (alternating direction method of multipliers) algorithm that solves the constrained QP (quadratic programming) is adopted to implement the model predictive control on embedded computers with limited computational power. …”
Get full text
Article -
15288
The prediction model of academic achievement based on cardiorespiratory fitness and BMI status for ninth-grade students
Published 2025-01-01“…The results from the Random Forest Regression (RFR) machine learning algorithm suggest that adolescents who meet the international CRF and BMI criterion-referenced standards have a higher probability of getting a higher academic achievement score than unfit students with overweight or obesity. …”
Get full text
Article -
15289
Optimized radiofrequency shimming using low-heating B1+-mapping in the presence of deep brain stimulation implants: Proof of concept.
Published 2024-01-01“…A two-step optimization algorithm is proposed and examined for a cylindrical phantom with an implanted wire to enable 1) robust B1+ mapping with low localized heating; and 2) robust RF shimming PTX with low localized heating and good B1+ homogeneity over a large imaging volume. …”
Get full text
Article -
15290
Multi-objective Optimization Model of Track Utilization for Depot-returning Urban Rail Transit Trains with Shunting Operation Constraints
Published 2025-01-01“…With the minimum number of shunting operations and the shortest running distance for maintenance as the objective function, and taking the constraints of shunting operations into account, a multi-objective optimization model for train track utilization is developed based on an improved grey wolf algorithm, featuring first for individual independent depot-returning plan (early and late depot-returning) and then for all depot-returning plans as a whole. …”
Get full text
Article -
15291
Evaluating 28-Days Performance of Rice Husk Ash Green Concrete under Compression Gleaned from Neural Networks
Published 2023-01-01“…In this study, a total of 407 datasets are used to develop an ML-based model by using the ANN algorithm to predict the CS of concrete containing RHA. …”
Get full text
Article -
15292
PhyIndBC: Development of a machine learning tool for screening of potential breast cancer inhibitors from phytochemicalsGitHub
Published 2025-06-01“…Among these models, the RF algorithm coupled with the MACCS fingerprint emerged as the best performing model. …”
Get full text
Article -
15293
Probabilistic prediction of fatigue damage based on linear fracture mechanics
Published 2017-01-01“…For probabilistic calculation of fatigue crack progression was used the original and new probabilistic methods - the Direct Optimized Probabilistic Calculation (“DOProC”), which is based on optimized numerical integration. The algorithm of the probabilistic calculation was applied in the FCProbCalc code (“Fatigue Crack Probabilistic Calculation”), using which is possible to carry out the probabilistic modelling of propagation of fatigue cracks in a user friendly environment very effectively.…”
Get full text
Article -
15294
Sensitivity and identifiability analysis of COVID-19 pandemic models
Published 2021-03-01“…The paper presents the results of sensitivity-based identif iability analysis of the COVID-19 pandemic spread models in the Novosibirsk region using the systems of differential equations and mass balance law. The algorithm is built on the sensitivity matrix analysis using the methods of differential and linear algebra. …”
Get full text
Article -
15295
Nonlinear vibration analysis of a 3DOF double pendulum system near resonance
Published 2025-02-01“…These solutions are ascertained by contrasting them with numerical solutions (NS) that are derived utilizing the fourth-order Runge-Kutta algorithm (RKA-4). The modulation equations are constructed, and the principal external resonance cases are scrutinized concurrently based on the solvability constraints. …”
Get full text
Article -
15296
Harris Harks Optimization Based Clustering With Fuzzy Routing for Lifetime Enhancing in Wireless Sensor Networks
Published 2024-01-01“…In HHOCFR, an improved Harris harks optimization (HHO) algorithm is utilized to select the best cluster heads (CHs) and form optimal clusters simultaneously by a novel encoding mechanism. …”
Get full text
Article -
15297
Resnet-1DCNN-REA bearing fault diagnosis method based on multi-source and multi-modal information fusion
Published 2024-11-01“…Finally, the tree-structured parzen estimator (TPE) algorithm was utilized to realize the integration of two models in order to improve the diagnostic effect of a single model and obtain the final bearing fault diagnosis results. …”
Get full text
Article -
15298
ORGANISING EFFECTIVE INTERACTION OF MANAGERS OF ARCHITECTURAL AND CONSTRUCTION COMPANIES WITH CLIENTS BASED ON THE THEORY OF NON-VIOLENT COMMUNICATION
Published 2024-12-01“…Specific recommendations, including conducting training, creating internal communication standards, implementing a customer feedback system, and developing active listening and empathy skills, are provided to improve managers’ communication practices. An algorithm for effective problem solving is presented, with special attention to the specifics of using non-violent communication when working with clients in conflict. …”
Get full text
Article -
15299
A Point Cloud-Based Feature Recognition and Path Planning Method
Published 2022-01-01“…For this, a point cloud-based multifeature contour recognition and location algorithm were proposed to simultaneously extract and locate the hole feature and cylindrical feature from an irregular porous castings. …”
Get full text
Article -
15300
Bayesian calibration and uncertainty quantification for a large nutrient load impact modelZenodoZenodoZenodo
Published 2025-03-01“…We then integrated over this (approximate) parameter posterior to produce probabilistic predictions for algal biomass and chlorophyll a concentration under alternative nutrient load reduction scenarios. Our computational algorithm allowed for fast posterior inference and the Gaussian process emulator had good predictive accuracy within the highest posterior probability mass region. …”
Get full text
Article