Search alternatives:
compositional » composition (Expand Search)
Showing 661 - 680 results of 52,129 for search '(compositional OR computational) data', query time: 0.35s Refine Results
  1. 661

    Composite Tor traffic features extraction method of webpage in actual network flow based on SDN by Hongping YAN, Qiang ZHOU, Shihao WANG, Wang YAO, Liukun HE, Liangmin WANG

    Published 2022-03-01
    “…Website fingerprinting (WF) methods for Tor webpage traffic are often based on the separated Tor traffic or even the separated Tor webpage traffic.However, distinguishing Tor traffic from the original traffic of the actual network and Tor webpage traffic from the Tor traffic costs amount of computation, which is more difficult than the WF attack itself.According to the current architecture of the Internet and the characteristics of network traffic converging to regional central nodes, the bi-directional statistical feature (BSF) was proposed for distinguishing Tor traffic through the intra-domain global perspective provided by the SDN structure of the central node and the node information disclosed by the Tor network.Furthermore, a hidden feature extraction method for Web traffic based on lifted structure fingerprinting (LSF) was proposed, and a composited Tor-webpage-identification traffic feature (CTTF) was proposed based on BSF and LSF deep features.For solving the problem of traffic training data scarcity, a traffic data augmentation method based on translation was proposed, which made the augmented traffic data as consistent as the Tor traffic data captured in the real working environment.The experimental results show that the identification rate based on CTTF can be improved by about 4% compared with using only the original data features.When there is less training data, the classification accuracy is improved more obvious after using the traffic data augmentation method, and the false positive rate can be effectively reduced.…”
    Get full text
    Article
  2. 662

    Usable observations over Europe: evaluation of compositing windows for Landsat and Sentinel-2 time series by Katarzyna Ewa Lewińska, David Frantz, Ulf Leser, Patrick Hostert

    Published 2024-12-01
    “…We considered separate and joint use of both data archives and analyzed the spatio-temporal availability of composites during each calendar year and pixel-specific growing season across a variety of time windows and hypothesizing data interpolation. …”
    Get full text
    Article
  3. 663
  4. 664

    Robust biochar yield and composition prediction via uncertainty-aware ResNet-based autoencoder by Yali Zhang, Bowen Lei, Amirhossein Mahdaviarab, Xiao Wang, Zong Liu

    Published 2025-03-01
    “…This paper presents a ResNet-based autoencoder model that utilizes biomass properties and pyrolysis conditions to more accurately and robustly predict biochar yield and composition. The developed model has the advantage of addressing the common data uncertainty concerns in training data. …”
    Get full text
    Article
  5. 665
  6. 666
  7. 667
  8. 668
  9. 669
  10. 670
  11. 671
  12. 672
  13. 673

    Survey of data possession provability proving on cloud storage by Wei FU, Qing YE, Ze-mao CHEN, Xiao-ping WU

    Published 2012-11-01
    Subjects: “…cloud computing;cloud storage;cloud security;data possession provability…”
    Get full text
    Article
  14. 674

    Associations between 24-hour movement compositions and cardiometabolic health in children and adolescents: a five-part compositional analysis using data from the International Children’s Accelerometery Database (ICAD) by Russell R Pate, John J Reilly, Kate Northstone, EMF van Sluijs, Russ Jago, Niels Wedderkopp, R Davey, Luis B Sardinha, Jardena Puder, J Reilly, K Northstone, LB Andersen, S Kriemler, R Jago, J Salmon, G Cardon, Pedro Curi Hallal, Adam Runacres, Zoe A Marshall, Soyang Kwon, Ester Van Slujis, S Anderssen, P Hallal, S Kwon, N Møller, R Pate, JJ Puder, LB Sardinha

    Published 2025-06-01
    “…The aim of this study was to determine the joint influence of SED, light-, moderate- and vigorous-intensity PA (LPA, MPA and VPA), and sleep on CMR factors using five-part compositional analyses.Methods Data were pooled from 16 cohort studies comprising 22 474 children and adolescents from the International Children’s Accelerometery Database. …”
    Get full text
    Article
  15. 675
  16. 676

    Big data security features and operation practices by Zhiyong LIU, Zhongjiang HE, Yilong RUAN, Junfeng SHAN, Chao ZHANG

    Published 2021-05-01
    Subjects: “…big data;data security;blockchain;federated learning;artificial intelligence;cloud computing…”
    Get full text
    Article
  17. 677
  18. 678
  19. 679
  20. 680