Showing 18,281 - 18,300 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 18281

    Automated Windows domain penetration method based on reinforcement learning by Lige ZHAN, Letian SHA, Fu XIAO, Jiankuo DONG, Pinchang ZHANG

    Published 2023-08-01
    “…Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.…”
    Get full text
    Article
  2. 18282

    A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology by Chaoyue Song, Lifeng Chen, Xuguang Wu, Yu Li

    Published 2024-12-01
    “…This scheme employs multi-agent systems and attribute-based signcryption algorithms to process data, thereby enhancing privacy protection and verifying data holdership. …”
    Get full text
    Article
  3. 18283

    The Unbiased Characteristic of Doppler Frequency in GNSS Antenna Array Processing by Yuchen Xie, Zhengrong Li, Feiqiang Chen, Huaming Chen, Feixue Wang

    Published 2019-01-01
    “…Since the integration of frequency is carrier phase, the unbiased Doppler frequency leads to an accurate estimation of carrier phase which can be used to calibrate the antenna array without extra apparatus or complicating algorithms. Therefore, a simple Doppler-aid strategy may be developed in the future to solve the difficulty of STAP bias mitigation.…”
    Get full text
    Article
  4. 18284

    Leveraging Digital Twin Technology for Battery Management: A Case Study Review by Judith Nkechinyere Njoku, Ebuka Chinaechetam Nkoro, Robin Matthew Medina, Cosmas Ifeanyi Nwakanma, Jae-Min Lee, Dong-Seong Kim

    Published 2025-01-01
    “…DTs create virtual representations of physical battery systems, enabling enhanced monitoring, predictive maintenance, and optimized performance through advanced AI algorithms. This study presents a comprehensive exploration of DT technology for BMS. …”
    Get full text
    Article
  5. 18285

    Using electrical resistivity techniques (ERT and SP) for nondestructive detection of seepage channels at the Leitai heritage site, China by Kai Lu, Kaitian Li, Fan Li, Zhenyu Li, Peng Wang

    Published 2025-01-01
    “…Subsequently, SP data were extracted along typical survey lines using interpolation algorithms, and these were inverted to supplement and verify the resistivity structure. …”
    Get full text
    Article
  6. 18286

    Takagi–Sugeno State Delayed Feedback and Integral Control for PV Systems: Modeling, Simulation, and Control by Hicham El Aiss, Karina A. Barbosa, Hector Chavez, Carlos Rodriguez

    Published 2021-01-01
    “…However, current maximum power point tracking (MPPT) algorithms are generally complex and require electronic components to support variable control gains for different irradiance conditions, preventing simple MPPT implementations suitable for small-scale photovoltaic systems. …”
    Get full text
    Article
  7. 18287

    Integrating Handcrafted Features with Machine Learning for Hate Speech Detection in Albanian Social Media by Fetahi Endrit, Hamiti Mentor, Susuri Arsim, Zenuni Xhemal, Ajdari Jaumin

    Published 2024-12-01
    “…We utilized several machine-learning algorithms, including Support Vector Machine (SVM), Naive Bayes (NB), Random Forest (RF), and Logistic Regression (LR), and extracted a considerable number of handcrafted features. …”
    Get full text
    Article
  8. 18288

    A Lightweight Model for Shine Muscat Grape Detection in Complex Environments Based on the YOLOv8 Architecture by Changlei Tian, Zhanchong Liu, Haosen Chen, Fanglong Dong, Xiaoxiang Liu, Cong Lin

    Published 2025-01-01
    “…These results highlight the potential of our model for accurate and efficient deployment on resource-constrained edge devices, providing an algorithmic foundation for the automated harvesting of “Sunshine Rose” grapes.…”
    Get full text
    Article
  9. 18289

    Potential impact of coronaviruses upon cardiovascular system under COVID-19 pandemic by L.O. Tkachenko, O.A. Yepanchintseva, B.M. Todurov

    Published 2020-06-01
    “…There are no clear algorithms and recommendations for the treatment of such patients in a pandemic and differ in different countries. …”
    Get full text
    Article
  10. 18290

    Cubital Tunnel Syndrome - Modern Treatment Options by Aleksandra Sieradzka, Krzysztof Szerej, Alicja Kot, Marta Wojtczak, Natalia Myśliwiec, Adrian Różycki, Michał Pniak, Paweł Miklis, Maciej Mawlichanów, Aleksandra Ciesielska

    Published 2025-01-01
    “…Conservative treatment for CuTS is typically pursued before surgical intervention, but there are no universally agreed-upon diagnostic and treatment algorithms for the condition. State of knowledge: Symptoms of Cubital Tunnel Syndrome manifest in approximately 5% of the general population. …”
    Get full text
    Article
  11. 18291

    Coordinated Beamforming with Altruistic Precoding and User Selection for MU-MIMO System by Gaofeng Cui, Yanjie Dong, Weidong Wang, Yinghai Zhang

    Published 2014-01-01
    “…Simulation results demonstrate that the proposed method outperforms the existing algorithms at any OCI level. Furthermore, we also analyze the best choice of degrees of freedom used to mitigate OCI through simulation.…”
    Get full text
    Article
  12. 18292

    COWVR/TEMPEST Multisensor Satellite-Based Surface State Parameter Retrievals by Jackie C. May, Clark Rowley

    Published 2025-01-01
    “…To aid in addressing this scientific community need, the data processing component of the Naval Research Laboratory (NRL) Ocean Surface Flux System (NFLUX) uses multiple polynomial regression algorithms to produce single-sensor satellite-based swath-level estimates of surface state parameters and heat fluxes over the global ocean. …”
    Get full text
    Article
  13. 18293

    Trust-Centric and Economically Optimized Resource Management for 6G-Enabled Internet of Things Environment by Osama Z. Aletri, Kamran Ahmad Awan, Abdullah M. Alqahtani

    Published 2024-12-01
    “…TEO-IoT presents an end-to-end solution for security management and network traffic optimization, utilizing advanced algorithms for trust score estimation and anomaly detection. …”
    Get full text
    Article
  14. 18294

    New Bridge Weigh-in-Motion System Using Piezo-Bearing by Jinkyo F. Choo, Dong-Ho Ha, Seok-Gi Chang, Dong-Ho Lee, Chang-Beck Cho

    Published 2018-01-01
    “…The traditional BWIM (bridge weigh-in-motion) system measures the deformation of the bridge by means of sensors and uses these measurements to estimate the characteristics of passing traffic by means of dedicated algorithms. However, the application of the BWIM system is subordinated to the type of superstructure, composition, geometry, materials, and shape of the bridge, the location of the strain sensors used in the system, and the need to calibrate the measured strain curve and of a precise model of the structure at hand. …”
    Get full text
    Article
  15. 18295

    A deep learning‐based attack on text CAPTCHAs by using object detection techniques by Jiawei Nian, Ping Wang, Haichang Gao, Xiaoyan Guo

    Published 2022-03-01
    “…However, most previous cracks were based on classification algorithms that typically rely on a series of preprocessing operations or on many training samples, thus making such attacks complicated and costly. …”
    Get full text
    Article
  16. 18296

    Baseline-Free Damage Imaging for Structural Health Monitoring of Composite Lap Joint Using Ultrasonic-Guided Waves by Mohsen Barzegar, Dario J. Pasadas, Artur L. Ribeiro, Helena G. Ramos

    Published 2024-01-01
    “…Damage imaging algorithms are crucial for evaluating the condition of critical structures such as adhesively bonded joints. …”
    Get full text
    Article
  17. 18297

    A novel prediction method for low wind output processes under very few samples based on improved W‐DCGAN by Shihua Liu, Han Wang, Weiye Song, Shuang Han, Jie Yan, Yongqian Liu

    Published 2024-10-01
    “…Finally, three prediction algorithms are used to construct LWOP prediction models based on both generated and actual samples, respectively. …”
    Get full text
    Article
  18. 18298

    A Specific Time Lag Regulation of Soil Moisture Across Layers on Soil Salinization in the Northeast Tibetan Plateau Agroecosystem by Di Wei, Ziqi Zhang, Lin Yan, Jia Yu, Yun Zhang, Bo Wang

    Published 2025-01-01
    “…Based on Landsat 8 satellite imagery and ERA5-Land reanalysis datasets, this study explored the variation characteristics of soil water and salt in the northeast Tibetan Plateau from 2013 to 2023, inferred by geostatistical methods like ridge regression, windowed cross correlation, and machine learning algorithms. The results show that the negative correlation effect between deep soil moisture (100–289 cm) and soil salinization is stronger. …”
    Get full text
    Article
  19. 18299

    An image dataset for surveillance of personal protective equipment adherence in healthcare by Wanzhao Yang, Mary S. Kim, Genevieve J. Sippel, Aaron H. Mun, Kathleen H. McCarthy, Beomseok Park, Aleksandra Sarcevic, Marius George Linguraru, Ivan Marsic, Randall S. Burd

    Published 2025-01-01
    “…The R2PPE dataset provides a resource for developing computer vision algorithms for monitoring PPE use in healthcare.…”
    Get full text
    Article
  20. 18300

    Low probability of intercept‐based cooperative node selection and transmit resource allocation for multi‐target tracking in multiple radars architecture by Lintao Ding, Chenguang Shi, Fei Wang, Jianjiang Zhou

    Published 2022-07-01
    “…Simulation results demonstrate that the CNS‐TRA strategy has superiority over other existing algorithms and can achieve better LPI performance for MRA.…”
    Get full text
    Article