Showing 14,281 - 14,300 results of 16,498 for search 'addition implementation', query time: 0.20s Refine Results
  1. 14281

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  2. 14282

    Energy Balance and Cost-benefit analysis of Biogas Production from Sewage Sludge by Thermal Pretreatment by Jungsu Park, Sang-Hyoun Kim

    Published 2025-05-01
    “…In particular, public wastewater treatment plants in Seoul face challenges in implementing co-digestion due to issues such as odor complaints, which limits biogas production in AD processes. …”
    Get full text
    Article
  3. 14283

    Fault Detection System of Photovoltaic Based on Artificial Neural Network by Ali Salman Zamzeer, Mansour S. Farhan, Haider TH. ALRikabi

    Published 2023-04-01
    “…Using implementations with three different numbers of hidden layers and an identical fault dataset, the performance of the proposed network is tested. …”
    Get full text
    Article
  4. 14284

    Health indicators and human development: developing a new health governance index with the case of Türkiye by Bircan Kara

    Published 2025-07-01
    “…The study also considers the Health Economic Performance Capacity (HEPC) as an additional indicator to assess the broader health governance impact. …”
    Get full text
    Article
  5. 14285

    AI-based approaches for improving autonomous mobile robot localization in indoor environments: A comprehensive review by Shoude Wang, Nur Syazreen Ahmad

    Published 2025-03-01
    “…We systematically categorize and critically analyze existing research on Simultaneous Localization and Mapping (SLAM)-based methods, odometry-based approaches, and multi-sensor fusion techniques, elucidating the principles and implementations of various AI methodologies. Additionally, we discuss real-time performance challenges associated with AI-based approaches and delineate the distinctions between AI-enhanced localization methods and traditional localization techniques, highlighting the necessity and advantages of adopting AI-based solutions. …”
    Get full text
    Article
  6. 14286

    Estimating and visualising multivariable Mendelian randomization analyses within a radial framework. by Wes Spiller, Jack Bowden, Eleanor Sanderson

    Published 2024-12-01
    “…A RMVMR R package is presented as accompanying software for implementing the methods described.<h4>Results</h4>We demonstrate the effectiveness of the radial MVMR approach through simulations and applied analyses. …”
    Get full text
    Article
  7. 14287

    The “Mother Load” and Return to Sport: A Case Report of Returning to Professional Netball Following Cesarean Section by Alexandra Diggles

    Published 2023-02-01
    “…A functionally staged dynamic and sport specific pelvic floor muscle training program was implemented and adapted to the patient for her early post-partum timeline…”
    Get full text
    Article
  8. 14288

    Health and Economic Impact Estimation of Ambient Air Particulate Matter (PM) Pollution in Addis Ababa Using BenMAP-CE Model by Mulugeta Getachew, Andualem Mekonnen, Desta Fitsum

    Published 2025-01-01
    “…This study underscores the importance of implementing interventions to mitigate PM 2.5 pollution for improved public health and economic well-being in Addis Ababa and similar urban settings.…”
    Get full text
    Article
  9. 14289

    Assessing biomedical research capacities in selected countries of Latin America: challenges, opportunities, and recommendations by Jorge A. Huete-Perez, Narayana Salvatierra

    Published 2025-07-01
    “…Using a mixed-methods approach—including surveys, expert interviews, and data analysis—this study examines infrastructure, institutional support, funding mechanisms, researcher training, and international partnerships. Additionally, it evaluates the impact of global programs, such as the Pew Latin American Fellows Program, in advancing research capacity. …”
    Get full text
    Article
  10. 14290

    Media ecological approach in the context of state and municipal policy in vocational education by Alexandra A. Amelina, Anna Yu. Ilina, Yi Zhang

    Published 2025-07-01
    “…These results demonstrate the efficacy of collaborative efforts in aligning educational policies with the principles of media ecology. Additionally, the study emphasizes the importance of providing teachers with the necessary professional competencies to implement media ecological practices. …”
    Get full text
    Article
  11. 14291

    Design of e-commerce product price prediction model based on generative adversarial network with adaptive weight adjustment by Abuduaini Abudureheman, Yan Zhao, Aishanjiang Nilupaer

    Published 2025-07-01
    “…This algorithm employs a neighborhood learning strategy to update the optimal individuals within subpopulations, thereby reinforcing the influence of elite individuals during population evolution. Additionally, dynamic weight adjustment based on sparsity is implemented to increase genetic diversity within the population. …”
    Get full text
    Article
  12. 14292

    Adoption Internet of Things on Islamic Boarding School: A Systematic Literature Review by Konita Lutfiyah, Mohamad Syamsul Maarif, Yudha Heryawan Asnawi, Laily Dwi Arsyianti

    Published 2024-09-01
    “…Conclusion: Some of the problems and importance of IoT disruption for Islamic boarding schools include limited human resources where Islamic boarding schools may have limited resources, both in terms of finances and technological infrastructure. Implementing IoT technology requires initial investment and maintenance which can be an additional burden. …”
    Get full text
    Article
  13. 14293

    A Prototype Unit of a Distributed Sensor System for Ecological Monitoring by E. A. Sevryukova, E. A. Volkova, V. A. Doroshenko, A. V. Solodkov

    Published 2021-06-01
    “…The receiver and transmitter of the NB-IoT standard were implemented on the Xilinx Zedboard evaluation board. …”
    Get full text
    Article
  14. 14294

    Genome-wide SNP-genotyping array to study the evolution of the human pathogen Vibrio vulnificus biotype 3. by Nili Raz, Yael Danin-Poleg, Ryan B Hayman, Yudi Bar-On, Alex Linetsky, Michael Shmoish, Eva Sanjuán, Carmen Amaro, David R Walt, Yechezkel Kashi

    Published 2014-01-01
    “…A custom single-nucleotide polymorphism (SNP) array implemented on the Illumina GoldenGate platform was developed based on 570 SNPs randomly distributed throughout the genome. …”
    Get full text
    Article
  15. 14295

    Application of Wireless Power Transfer to Railway Parking Functionality: Preliminary Design Considerations with Series-Series and LCC Topologies by Luca Pugi, Alberto Reatti, Fabio Corti

    Published 2018-01-01
    “…In this work, proposed application is innovative with respect to existing literature: static current collection on conventional railway lines is proposed in order to replace the functionalities implemented by conventional battery chargers and the so-called railway “parking” system. …”
    Get full text
    Article
  16. 14296

    A Study on Using Transfer Learning to Utilize Information From Similar Systems for Data-Driven Condition Diagnosis and Prognosis by Marcel Braig, Peter Zeiler

    Published 2025-01-01
    “…Two transfer learning approaches are analyzed: parameter transfer with fine-tuning and retraining, and feature alignment. Both concepts are implemented with the neural network types multilayer perceptron, 1D convolutional neural network, and temporal convolutional network. …”
    Get full text
    Article
  17. 14297

    Assessment of COVID-19 pandemic-related detrimental impact on the population of nuclear city: two-year results by Mikhail V. Osipov, Evgeny P. Fomin

    Published 2023-03-01
    “…Conclusion — The analyses revealed significant impact of the COVID-19 pandemic on the overall excess mortality in the nuclear city population in 2020 and 2021 implemented in both direct and indirect way. The population size was a major significant risk factor confounding the overall mortality. …”
    Get full text
    Article
  18. 14298

    Operational risk management during disasters: A case of South African tourism small businesses by Wonder Mahembe, Ashley T. Mutezo

    Published 2025-04-01
    “…Larger and older businesses were able to implement disaster learning and resilience better than younger and less resourced businesses. …”
    Get full text
    Article
  19. 14299

    Peer-to-Peer Transactive Energy Trading of Smart Homes/Buildings Contributed by A Cloud Energy Storage System by Shalau Farhad Hussein, Sajjad Golshannavaz, Zhiyi Li

    Published 2024-11-01
    “…This research assesses how smart homes and buildings can effectively utilize CESS while implementing P2P transactive energy management. Additionally, it explores the potential of a solar rooftop parking lot facility that offers charging and discharging services for plug-in electric vehicles (PEVs) within the MG. …”
    Get full text
    Article
  20. 14300

    The separation of the electromagnetic field at the position of the sources in the magnetotelluric method by P.N. Alexandrov, A.K. Rybin, O.B. Zabinyakova

    Published 2018-06-01
    “…The field from the sources located in the layered space is included additively into this relationship formula. The approach to solving the direct MTS problem for horizontally layered media on the basis of field extension is not stable terms of calculation. …”
    Get full text
    Article