Suggested Topics within your search.
Suggested Topics within your search.
-
1061
Biologically-informed excitatory and inhibitory ratio for robust spiking neural network training
Published 2025-07-01Get full text
Article -
1062
Cloud-based configurable data stream processing architecture in rural economic development
Published 2024-11-01Get full text
Article -
1063
Consumerisation of IT: Intersection of development streams of business and personal IT
Published 2025-01-01“…As a spinout from business IT, personal IT has had a feedback effect on it: the proliferation of computers and mobile devices on the consumer market, combined with affordable Internet-related resources, not only changed personal IT usage patterns, but also redefined the expectations that users have for enterprise software. …”
Get full text
Article -
1064
-
1065
-
1066
Enhancing Cloud Job Failure Prediction With a Novel Multilayer Voting-Based Framework
Published 2025-01-01Get full text
Article -
1067
-
1068
Local Binary Pattern–Cycle Generative Adversarial Network Transfer: Transforming Image Style from Day to Night
Published 2025-03-01“…However, existing CycleGAN-based approaches struggle with texture loss, structural inconsistencies, and high computational costs. In our attempt to overcome these challenges, we produced LBP-CycleGAN, a new modification of CycleGAN that benefits from the advantages of a Local Binary Pattern (LBP) that extracts details of texture, unlike traditional CycleGAN, which relies heavily on color transformations. …”
Get full text
Article -
1069
-
1070
PaperCAD: A System for Interrogating CAD Drawings Using Small Mobile Computing Devices Combined with Interactive Paper
Published 2014-01-01“…Smartphones have become indispensable computational tools. However, some tasks can be difficult to perform on a smartphone because these devices have small displays. …”
Get full text
Article -
1071
-
1072
Differences in Healing of a Horizontal Root Fracture as Seen on Conventional Periapical Radiography and Cone-Beam Computed Tomography
Published 2017-01-01“…Different locations and healing patterns of horizontal root fractures bear different prognoses. …”
Get full text
Article -
1073
A weighted pattern matching approach for classification of imbalanced data with a fireworks-based algorithm for feature selection
Published 2019-04-01“…This paper proposes a novel instance-based classification algorithm called Weighted Pattern Matching based Classification (PMC+) for classifying imbalanced data. …”
Get full text
Article -
1074
-
1075
-
1076
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
1077
-
1078
Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors
Published 2025-04-01“…This research proposes a hybrid deep learning framework that combines techniques from computer vision and sequence modeling, namely, ViT-inspired patch extraction, multi-head attention, and BiLSTM networks, to authenticate users continuously from smartphone sensor data. …”
Get full text
Article -
1079
A Review of Oscillators in Hydrokinetic Energy Harnessing Through Vortex-Induced Vibrations
Published 2025-03-01Get full text
Article -
1080