Suggested Topics within your search.
Suggested Topics within your search.
-
1261
A weighted pattern matching approach for classification of imbalanced data with a fireworks-based algorithm for feature selection
Published 2019-04-01“…This paper proposes a novel instance-based classification algorithm called Weighted Pattern Matching based Classification (PMC+) for classifying imbalanced data. …”
Get full text
Article -
1262
-
1263
-
1264
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
1265
-
1266
Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors
Published 2025-04-01“…This research proposes a hybrid deep learning framework that combines techniques from computer vision and sequence modeling, namely, ViT-inspired patch extraction, multi-head attention, and BiLSTM networks, to authenticate users continuously from smartphone sensor data. …”
Get full text
Article -
1267
A Review of Oscillators in Hydrokinetic Energy Harnessing Through Vortex-Induced Vibrations
Published 2025-03-01Get full text
Article -
1268
-
1269
On the principles of building a model of a specialist – a graduate of a pedagogical university
Published 2023-03-01“…The analysis of the data obtained by using methods of multivariate statistics allowed the authors to obtain a variety of relationships between the factors taken into account. In particular, a pattern between the values of psychological scales, the level of competency formation and orientation of students in their choice of future profession was found.Scientific novelty. …”
Get full text
Article -
1270
APLIKASI CROPWAT 8.0 UNTUK MERENCANAKAN POLA TANAM OPTIMAL DAN MEMAKSIMALKAN HASIL PERTANIAN DI KECAMATAN GUNUNGPATI
Published 2022-11-01“…The Cropwat 8.0 application is part of a computer-based information system (including knowledge-based/knowledge management systems) that is used to support decision making to arrange optimal cropping patterns and maximizing agricultural yields. …”
Get full text
Article -
1271
Health Culture of a Teacher as a Condition and Opportunity for the Implementation of Health-Preserving Behavior in the Educational Environment
Published 2021-01-01“…The article presents the results of a study aimed at studying patterns of behavior in the field of health of participants in educational relations. …”
Get full text
Article -
1272
-
1273
Investigation on the Coordination Bonding Nature of Actinide-Doped Endohedral Borospherenes An@B<sub>40</sub><sup>0/+/−</sup> (An = U, Np, Pu, Am, Cm)
Published 2024-12-01“…The IR, Raman, and photoelectron spectra of the most concerned species are computationally simulated to facilitate their characterizations in future experiments.…”
Get full text
Article -
1274
-
1275
A new human-computer interaction paradigm: Agent interaction model based on large models and its prospects
Published 2025-06-01“…This study examines the advent of agent interaction (AIx) as a transformative paradigm in human-computer interaction (HCI), signifying a notable evolution beyond traditional graphical interfaces and touchscreen interactions. …”
Get full text
Article -
1276
-
1277
-
1278
-
1279
Boosting Cognitive Focus via Attention Types Detection using Brain-Computer Interfaces: A Pilot Study
Published 2025-05-01“… This study leverages Brain-Computer Interfaces (BCIs) and electroencephalography (EEG) to enhance cognitive focus in adolescents (12–17 years) by classifying effective (task-oriented) and ineffective (distracted) attention states. …”
Get full text
Article -
1280
Anatomical characteristics and variations of the abdominal aorta and its visceral branches on 128-slice computed to-mography in Vietnamese adults
Published 2025-01-01“…Classical branching patterns were present in 68.0% for the celiac trunk, 96.3% for the SMA, and 97.4% for the IMA. …”
Get full text
Article