-
18281
Automated Windows domain penetration method based on reinforcement learning
Published 2023-08-01“…Windows domain provides a unified system service for resource sharing and information interaction among users.However, this also introduces significant security risks while facilitating intranet management.In recent years, intranet attacks targeting domain controllers have become increasingly prevalent, necessitating automated penetration testing to detect vulnerabilities and ensure the ongoing maintenance of office network operations.Then efficient identification of attack paths within the domain environment is crucial.The penetration process was first modeled using reinforcement learning, and attack paths were then discovered and verified through the interaction of the model with the domain environment.Furthermore, unnecessary states in the reinforcement learning model were trimmed based on the contribution differences of hosts to the penetration process, aiming to optimize the path selection strategy and improve the actual attack efficiency.The Q-learning algorithms with solution space refinement and exploration policy optimization were utilized to filter the optimal attack path.By employing this method, all security threats in the domain can be automatically verified, providing a valuable protection basis for domain administrators.Experiments were conducted on typical Windows domain scenarios, and the results show that the optimal path is selected from the thirteen efficient paths generated by the proposed method, while also providing better performance optimization in terms of domain controller intrusion, domain host intrusion, attack steps, convergence, and time cost compared to other approaches.…”
Get full text
Article -
18282
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
Published 2024-12-01“…This scheme employs multi-agent systems and attribute-based signcryption algorithms to process data, thereby enhancing privacy protection and verifying data holdership. …”
Get full text
Article -
18283
The Unbiased Characteristic of Doppler Frequency in GNSS Antenna Array Processing
Published 2019-01-01“…Since the integration of frequency is carrier phase, the unbiased Doppler frequency leads to an accurate estimation of carrier phase which can be used to calibrate the antenna array without extra apparatus or complicating algorithms. Therefore, a simple Doppler-aid strategy may be developed in the future to solve the difficulty of STAP bias mitigation.…”
Get full text
Article -
18284
Leveraging Digital Twin Technology for Battery Management: A Case Study Review
Published 2025-01-01“…DTs create virtual representations of physical battery systems, enabling enhanced monitoring, predictive maintenance, and optimized performance through advanced AI algorithms. This study presents a comprehensive exploration of DT technology for BMS. …”
Get full text
Article -
18285
Using electrical resistivity techniques (ERT and SP) for nondestructive detection of seepage channels at the Leitai heritage site, China
Published 2025-01-01“…Subsequently, SP data were extracted along typical survey lines using interpolation algorithms, and these were inverted to supplement and verify the resistivity structure. …”
Get full text
Article -
18286
Takagi–Sugeno State Delayed Feedback and Integral Control for PV Systems: Modeling, Simulation, and Control
Published 2021-01-01“…However, current maximum power point tracking (MPPT) algorithms are generally complex and require electronic components to support variable control gains for different irradiance conditions, preventing simple MPPT implementations suitable for small-scale photovoltaic systems. …”
Get full text
Article -
18287
Integrating Handcrafted Features with Machine Learning for Hate Speech Detection in Albanian Social Media
Published 2024-12-01“…We utilized several machine-learning algorithms, including Support Vector Machine (SVM), Naive Bayes (NB), Random Forest (RF), and Logistic Regression (LR), and extracted a considerable number of handcrafted features. …”
Get full text
Article -
18288
A Lightweight Model for Shine Muscat Grape Detection in Complex Environments Based on the YOLOv8 Architecture
Published 2025-01-01“…These results highlight the potential of our model for accurate and efficient deployment on resource-constrained edge devices, providing an algorithmic foundation for the automated harvesting of “Sunshine Rose” grapes.…”
Get full text
Article -
18289
Potential impact of coronaviruses upon cardiovascular system under COVID-19 pandemic
Published 2020-06-01“…There are no clear algorithms and recommendations for the treatment of such patients in a pandemic and differ in different countries. …”
Get full text
Article -
18290
Cubital Tunnel Syndrome - Modern Treatment Options
Published 2025-01-01“…Conservative treatment for CuTS is typically pursued before surgical intervention, but there are no universally agreed-upon diagnostic and treatment algorithms for the condition. State of knowledge: Symptoms of Cubital Tunnel Syndrome manifest in approximately 5% of the general population. …”
Get full text
Article -
18291
Coordinated Beamforming with Altruistic Precoding and User Selection for MU-MIMO System
Published 2014-01-01“…Simulation results demonstrate that the proposed method outperforms the existing algorithms at any OCI level. Furthermore, we also analyze the best choice of degrees of freedom used to mitigate OCI through simulation.…”
Get full text
Article -
18292
COWVR/TEMPEST Multisensor Satellite-Based Surface State Parameter Retrievals
Published 2025-01-01“…To aid in addressing this scientific community need, the data processing component of the Naval Research Laboratory (NRL) Ocean Surface Flux System (NFLUX) uses multiple polynomial regression algorithms to produce single-sensor satellite-based swath-level estimates of surface state parameters and heat fluxes over the global ocean. …”
Get full text
Article -
18293
Trust-Centric and Economically Optimized Resource Management for 6G-Enabled Internet of Things Environment
Published 2024-12-01“…TEO-IoT presents an end-to-end solution for security management and network traffic optimization, utilizing advanced algorithms for trust score estimation and anomaly detection. …”
Get full text
Article -
18294
New Bridge Weigh-in-Motion System Using Piezo-Bearing
Published 2018-01-01“…The traditional BWIM (bridge weigh-in-motion) system measures the deformation of the bridge by means of sensors and uses these measurements to estimate the characteristics of passing traffic by means of dedicated algorithms. However, the application of the BWIM system is subordinated to the type of superstructure, composition, geometry, materials, and shape of the bridge, the location of the strain sensors used in the system, and the need to calibrate the measured strain curve and of a precise model of the structure at hand. …”
Get full text
Article -
18295
A deep learning‐based attack on text CAPTCHAs by using object detection techniques
Published 2022-03-01“…However, most previous cracks were based on classification algorithms that typically rely on a series of preprocessing operations or on many training samples, thus making such attacks complicated and costly. …”
Get full text
Article -
18296
Baseline-Free Damage Imaging for Structural Health Monitoring of Composite Lap Joint Using Ultrasonic-Guided Waves
Published 2024-01-01“…Damage imaging algorithms are crucial for evaluating the condition of critical structures such as adhesively bonded joints. …”
Get full text
Article -
18297
A novel prediction method for low wind output processes under very few samples based on improved W‐DCGAN
Published 2024-10-01“…Finally, three prediction algorithms are used to construct LWOP prediction models based on both generated and actual samples, respectively. …”
Get full text
Article -
18298
A Specific Time Lag Regulation of Soil Moisture Across Layers on Soil Salinization in the Northeast Tibetan Plateau Agroecosystem
Published 2025-01-01“…Based on Landsat 8 satellite imagery and ERA5-Land reanalysis datasets, this study explored the variation characteristics of soil water and salt in the northeast Tibetan Plateau from 2013 to 2023, inferred by geostatistical methods like ridge regression, windowed cross correlation, and machine learning algorithms. The results show that the negative correlation effect between deep soil moisture (100–289 cm) and soil salinization is stronger. …”
Get full text
Article -
18299
An image dataset for surveillance of personal protective equipment adherence in healthcare
Published 2025-01-01“…The R2PPE dataset provides a resource for developing computer vision algorithms for monitoring PPE use in healthcare.…”
Get full text
Article -
18300
Low probability of intercept‐based cooperative node selection and transmit resource allocation for multi‐target tracking in multiple radars architecture
Published 2022-07-01“…Simulation results demonstrate that the CNS‐TRA strategy has superiority over other existing algorithms and can achieve better LPI performance for MRA.…”
Get full text
Article