Showing 2,841 - 2,860 results of 4,545 for search 'more (functional OR function) general', query time: 0.25s Refine Results
  1. 2841

    Research on IoT security situation awareness method based on evidence theory by Jian LI, Tinglu DONG, Jie LI

    Published 2022-04-01
    “…The security problem of IoT became more and more serious with its rapid development.Considering that the current IoT security situation awareness system lacks generality and excessively relies on expert knowledge, a IoT security situation awareness method based on improved D-S evidence theory was proposed in this paper.Fuzzy Gaussian membership function was used to calculate the vulnerability information membership matrix, which was normalized as evidence distribution matrix.The improved Topsis method was used to measure the evidence credibility.In order to fully restrain the credibility of conflicting evidence and improve the credibility of mutually supporting evidence, local credibility between two evidence was aggregated and the expected positive and negative solution vectors were improved according to the situation assessment scenario.And the weighted average method was used for vulnerability information fusion, to obtain the result of situational assessment.The result of situational awareness was fused with the time discount and high-risk vulnerability information discount evidence theory.At the same time, the IoT vulnerability information at different moments was considered comprehensively, the evidence was adaptively and dynamically weighted with the ratio information of high-risk vulnerability.The experimental results show that in the fusion of different numbers of evidence bodies and four common conflicting evidence, the improved Topsis method has higher fusion probability on credible proposition.In the aspect of situation assessment, the risk degree of current system is accurately assessed.And in the aspect of situational awareness, this discount evidence theory can predict the probability of high risk and critical risk, which is more effective than the traditional D-S evidence theory.According to this theory, a IoT security situational awareness method process was proposed, which would be used to guide engineering practice.In the future, the relationship between vulnerabilities can be considered and richer information between vulnerabilities can be extracted for vulnerability exploiting, so that the result of situation assessment is more accurate and reasonable.On the other hand, for situational awareness, game theory can be adopted in the process of dynamic game between the attacker and defender.…”
    Get full text
    Article
  2. 2842

    Boundaries on a binge: Explicating the role of intentionality in binge-watching motivations and problematic outcomes by Ezgi Ulusoy, Dominique S. Wirz, Allison Eden, Morgan E. Ellithorpe

    Published 2025-02-01
    “…Moreover, motivations for binge-watching, such as social interaction and enrichment, were more pronounced in intentional sessions, while unintentional sessions were driven more by situational factors like cliffhangers and curiosity. …”
    Get full text
    Article
  3. 2843

    Detecting Postural Instability in Parkinson’s Disease From IMU-Based Objective Measures by Kendal Smith, Diego Torricelli, Miguel Gonzalez-Sanchez, Javier Ricardo Perez-Sanchez, Elisa Luque-Buzo, Francisco Grandas, Juan Miguel Marin, Jorge Andres Gomez-Garcia

    Published 2025-01-01
    “…Parkinson’s Disease (PD) is a progressive neurological disorder that affects both motor and non-motor functions. A critical aspect of PD is postural instability, which is associated with a higher risk of falls and a significant decline in mobility. …”
    Get full text
    Article
  4. 2844

    Le sanctuaire romain du Vigneau à Pussigny (Indre-et-Loire) : un lieu de mémoire, de vie et d’accueil by Arnaud Coutelas, Sébastien Lepetz

    Published 2023-12-01
    “…Their development is mutual. The function of the latter is undoubtedly linked to the existence of the former. …”
    Get full text
    Article
  5. 2845

    A Case Report on an Atypical Presentation of the Syndrome of Irreversible Lithium-Effectuated Neurotoxicity (SILENT) in a War Veteran with Bipolar Disorder and PTSD by Miguela Marie Señga, Gemmalynn Sarapuddin, Edmundo Saniel

    Published 2020-01-01
    “…Despite clearance of the offending agent, the patient remained to have a generalized slowing on repeated EEG with only eye opening and nonpurposeful limb movements regained even after more than 2 months of lithium cessation. …”
    Get full text
    Article
  6. 2846

    Typology of Interaction between the International Financial Law and the EU Law by I. M. Lifshits

    Published 2020-07-01
    “…In the course of current functioning of the EU gives the priority to the second model. …”
    Get full text
    Article
  7. 2847

    LANGUAGE MEANS OF INTERTEXT EXPRESSION IN THE HISTORICAL NOVEL “MALLOWS” BY ROMAN IVANYCHUK by Oksana M. Nazarenko, Olena V. Skalatska

    Published 2024-12-01
    “…The orientation of the work requires the use of the following methods: descriptive and the method of observation, with the help of which the specifics and means of realizing the intertext in the historical novel are analyzed; analysis and synthesis – for systematization and generalization of research materials; the method of transformational analysis – to identify formal and semantic changes in the recipient text; the method of linguo-stylistic analysis – for the study of linguistic means of expression in the structure of an artistic text from a functional-aesthetic point of view; the method of stylistic analysis – to determine the stylistics of the intertext and the analysis of various stylistic passages found in the historical novel; the method of contextual-interpretative analysis – to clarify the functional load of the means of implementing intertextuality, in particular for the analysis of content categories of the text; elements of componential analysis – to establish the semantic features of relevant components of historical prose; the method of quantitative calculations – to identify the frequency of use of intertextual elements in the work. …”
    Get full text
    Article
  8. 2848

    Effects of Anisotropic Turbulent Ocean on Propagation of Asymmetric Bessel-Gaussian Beam by Lin Yu, Zhecheng Zhang, Yixin Zhang, Lifa Hu

    Published 2024-01-01
    “…The anisotropic turbulent condition is adopted to analyze turbulence impacts with more generality. The turbulence dominated by salinity fluctuation with lower anisotropy, larger temperature dissipation and smaller kinetic energy dissipation induces more beam spreading and wander. …”
    Get full text
    Article
  9. 2849

    Means of intracellular communication: touching, kissing, fusing by Anne Spang

    Published 2021-04-01
    “…Eukaryotic cells are complicated factories that need ensure productivity and functionality on the cellular level as well as being able to communicate with their environment. …”
    Get full text
    Article
  10. 2850

    A Fused Multiscale Pictorial Sequence Learning Mechanism Applied to Pavement Detection by Zhang Jiazhen, Wang Xiulai, Zhao Shuxu

    Published 2025-01-01
    “…The experimental results show that the multi-scale fusion features capture more complete information about the temporal trajectory than the single latent variable feature information, suggesting that the proposed algorithm exhibits better comprehensive performance and generalization ability than unimproved machine learning algorithms and typical deep learning classifiers.…”
    Get full text
    Article
  11. 2851
  12. 2852

    Comparison of clinical efficacy between Percutaneous Endoscopic Large channels nerve decompression through Translaminar approach and Percutaneous Endoscopy Conventional channels ne... by Junlin Liu, Qingquan Kong, Junsong Ma, Pin Feng, Bin Zhang

    Published 2025-05-01
    “…There was no statistically significant difference in functional scores between the two groups at each follow-up time point (p > 0.05). …”
    Get full text
    Article
  13. 2853
  14. 2854
  15. 2855

    Bayesian solution to the inverse problem and its relation to Backus–Gilbert methods by Luigi Del Debbio, Alessandro Lupo, Marco Panero, Nazario Tantalo

    Published 2025-02-01
    “…In our setup, we find that the determination of the algorithmic parameters based on a stability analysis provides results that are, on average, more conservative than those based on the maximisation of a likelihood function.…”
    Get full text
    Article
  16. 2856

    Preopenness Degree in RL-Fuzzy Bitopological Spaces by O. H. Khalil, K. E. El-Helow, A. Ghareeb

    Published 2022-01-01
    “…We find that our paper offers more general results since RL-fuzzy bitopology is a generalization of L-bitopology, RL-bitopology, and L-fuzzy topology.…”
    Get full text
    Article
  17. 2857

    Drawing to remember: external support of older adults' eyewitness performance. by Coral J Dando

    Published 2013-01-01
    “…Although healthy aging is accompanied by a general decline in memory functioning, environmental support at retrieval can improve older adults' (+65 years) episodic remembering. …”
    Get full text
    Article
  18. 2858

    Entanglement in BF theory. Part II. Edge-modes by Jackson R. Fliss, Stathis Vitouladitis

    Published 2025-07-01
    “…We explicitly evaluate the thermal partition function of this theory. Additionally we show that the extended Hilbert space is completely organized into representations of an infinite-dimensional, centrally extended current algebra which naturally generalizes 2d Kac-Moody algebras to arbitrary dimension and topology. …”
    Get full text
    Article
  19. 2859

    Performance of Machine Learning Classifiers for Diabetes Prediction by Mijala Manandhar, Shaikat Baidya, Babalpreet Kaur, Katia Atoji

    Published 2024-08-01
    “…Future research should focus on integrating multiple datasets and exploring more complex ML algorithms to enhance prediction accuracy and generalization. …”
    Get full text
    Article
  20. 2860

    Assessment and Optimization of Hydrological Connectivity for Effective Management of Water Resources in the Samian Watershed by Zeinab Hazbavi, Nazila Alaei

    Published 2024-09-01
    “…These independent water zones were located separately from the main river network and, as a result, contributed little to the hydrological cycle and energy transfer in the watershed, making them more fragile. To protect these water zones from destruction and disappearance and improve the overall ecological function of the water system, they had to be integrated into the hydrological connection pattern. …”
    Get full text
    Article