Suggested Topics within your search.
Suggested Topics within your search.
- Mass media 3
- Research 3
- Methodology 2
- Objectivity 2
- Psychological aspects 2
- Psychology 2
- methods 2
- physiology 2
- Arthritis 1
- Arthritis, Rheumatoid 1
- Automobiles 1
- Collectors and collecting 1
- Comparative method 1
- Construction industry 1
- Consumer satisfaction 1
- Cross-cultural studies 1
- Customer relations 1
- Customer services 1
- Diagnostic Imaging 1
- Education 1
- Educational evaluation 1
- Electricity 1
- Embryology 1
- Embryonic Development 1
- English 1
- English language 1
- Ethnology 1
- Evaluation 1
- Evidence-Based Medicine 1
- Fault location (Engineering) 1
-
1781
Being Reformed today?
Published 2022-12-01“…It engages with important historical figures and documents (Calvin, Barth, Barmen) as well as more contemporary works and statements (Wolterstorff, Niebuhr, Leith, Gerrish, Plasger, Welker, Nimmo and Fergusson, Boesak, Botman, Belhar, Kitwe, Debrecen, Accra) on being Reformed. …”
Get full text
Article -
1782
Oor die inhoud en boodskap van die Heidelbergse Kategismus
Published 2014-12-01“…A third section serves as reminder of Barth’s claim that Jesus Christ is the content of this comfort and therefore of the Heidelberg Catechism. …”
Get full text
Article -
1783
KAJIAN STRUKTUR EKONOMI KABUPATEN BEKASI
Published 2021-10-01“…Kabupaten Bekasi merupakan salah satu daerah dengan Pendapatan asli Daerah terbesar di Jawa Barat,maka kajian struktur ekonomi sangat penting untuk menunjang kinerja pembangunan. …”
Get full text
Article -
1784
MalHAPGNN: An Enhanced Call Graph-Based Malware Detection Framework Using Hierarchical Attention Pooling Graph Neural Network
Published 2025-01-01“…Firstly, to ensure semantic richness, a Bidirectional Encoder Representations from Transformers-based (BERT) attribute-enhanced function embedding method is proposed for the extraction of node attributes in the function call graph. …”
Get full text
Article -
1785
Cross-Community Question Relevance Prediction for Stack Overflow and GitHub
Published 2025-01-01“…Compared to the latest models (MQDD, CodeBERT, ASIM), CCQRP demonstrates an improvement in F1-score ranging from 0.60% to 10.86% and exhibits robust generalization capabilities.…”
Get full text
Article -
1786
Sentiment works in small-cap stocks: Japanese stock’s sentiment with language models
Published 2025-06-01“…Comparisons between the models showed higher returns at high sentiment for the model trained with the existing sentiment dataset and lower returns at low sentiment for ChatGPT. The DeBERTaV2 model trained on Economy Watchers Survey data performed best in terms of returns at the highest sentiment quantile.…”
Get full text
Article -
1787
Exploring Food Safety Emergency Incidents on Sina Weibo: Using Text Mining and Sentiment Evolution
Published 2025-01-01“…Subsequently, the study employed an innovative approach by combining BERT-TextCNN and BERTopic models for a thorough analysis of sentiment and thematic aspects of the textual data. …”
Get full text
Article -
1788
-
1789
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
1790
TIBW: Task-Independent Backdoor Watermarking with Fine-Tuning Resilience for Pre-Trained Language Models
Published 2025-01-01“…Pre-trained language models such as BERT, GPT-3, and T5 have made significant advancements in natural language processing (NLP). …”
Get full text
Article -
1791
Insider threat detection based on operational attention and data augmentation
Published 2023-06-01“…In recent years, there has been an increased focus on the issue of insider threats.Insider threats are a major cause security breaches in organizations and pose an ongoing challenge.By analyzing the existing insider threat data, it was identified that the biggest challenge in insider threat detection lies in data imbalance and the limited number of labeled threat samples.In the Cert R4.2 dataset, which is a classic dataset for insider threat detection, there are over 3.22 million log data, but only 7,423 are marked as malicious operation logs.Furthermore, most of the operation types in the logs are not related to malicious behavior, and only two types of operations are highly correlated with malicious behavior, such as leaking company data, creating interference in the detection process.To address this challenge, a data processing framework was designed based on operational attention and data augmentation.Anomaly evaluation was first performed on operations by the framework, and operations with low anomaly scores were then masked.This makes the model better focus on operations related to malicious behavior, which can be considered as a hard attention mechanism for operations.Next, the characteristics of the insider threat dataset were analyzed, and three rules were designed for data augmentation on malicious samples to increase the diversity of samples and alleviate the substantial imbalance between positive and negative samples.Supervised insider threat detection was regarded as a time-series classification problem.Residual connections were added to the LSTM-FCN model to achieve multi-granularity detection, and indicators such as precision rate and recall rate were used to evaluate the model.The results indicate superior performance over existing baseline models.Moreover, the data processing framework was implemented on various classic models, such as ITD-Bert and TextCNN, and the results show that the methods effectively improve the performance of insider threat detection models.…”
Get full text
Article -
1792
Hate Speech Detection Using Large Language Models: A Comprehensive Review
Published 2025-01-01“…This paper provides a comprehensive review of the application of large language models (LLMs) like GPT-3, BERT, and their successors in hate speech detection. …”
Get full text
Article -
1793
Profil Kasus Tuberkulosis Paru di Instalasi Rawat Inap Paru RSUP Dr. M. Djamil Padang Periode 1 Januari 2010 - 31 Desember 2011
Published 2015-09-01“…Laki - laki (72%), usia 20- 29 tahun (27%), pendidikan tamat sekolah lanjut tingkat atas (SLTA)(47%), pekerjaan rumah tangga (33%) merupakan karakteristik terbanyak diikuti merokok pada laki- laki (64%) dan status gizi kurus dengan kekurangan berat badan tingkat berat (53%). Hasil data analisis berdasarkan Chi Square, didapatkan X 2<br />= 2,5 dengan α= 0,05, sehingga tidak ada hubungan bermakna antara jenis kelamin dengan hasil pemeriksaan BTA sputum. …”
Get full text
Article -
1794
Penerapan Model Enterprise Architecture Cube Pada Perencanaan Strategi Sistem Dan Teknologi Informasi
Published 2024-07-01Get full text
Article -
1795
-
1796
-
1797
-
1798
JOHN WANSBROUGH: STUDI ATAS TRADISI DAN INSTRUMEN TAFSIR ALQUR’AN KLASIK
Published 2018-12-01Get full text
Article -
1799
Assessment of Selected Proximate and Heavy Metals in Enset Products Collected from Tepi Market, Southwestern Ethiopia
Published 2022-01-01“…This study focused on determining selected proximate compositions, such as moisture content, ash content, crude fibre content, and crude fat content, of kocho and bulla enset products collected from Bechi, Fide, Yeki, Zinki, Addis Alem, and Korcha kebeles of Yeki woreda. …”
Get full text
Article -
1800
Réflexions critiques autour des frontières de la péninsule Ibérique au premier âge du Fer
Published 2020-06-01“…The traditional approach has been to map some remains in order to recognize cultural areas that may coincide with the ethnic territories described by greco-latin literature. F. Barth denounced the approach of ethnic categories based on their cultural content to favour study of their boundaries. …”
Get full text
Article