We determine thresholds pc for random-site percolation on a triangular lattice for all available neighborhoods containing sites from the first to the fifth coordination zones, including their complex combinations. The...
详细信息
In an increasingly globalized world, being able to understand texts in different languages (even more so in different alphabets and charsets) has become a necessity. This can be strategic even while moving and travell...
详细信息
We present results on the Central Exclusive Production of charged particle pairs h+h− (h = π, K, p), pp → p + h+h− + p, obtained with the STAR experiment at RHIC in proton-proton collisions at a center-of-mass energ...
详细信息
The wounded-nucleon and -quark models are compared using d+Au collisions at sNN = 200 GeV. The shape of the wounded-quark emission function seems to be universal for different centralities, in contrast to the wounded-...
详细信息
To enhance the accuracy and reliability of big data network traffic intrusion detection, an innovative detection model based on the two-branch convolution and gated recurrent unit was constructed, and its application ...
详细信息
ISBN:
(数字)9798350377033
ISBN:
(纸本)9798350377040
To enhance the accuracy and reliability of big data network traffic intrusion detection, an innovative detection model based on the two-branch convolution and gated recurrent unit was constructed, and its application effectiveness in the field of software engineering was thoroughly explored. This model first performs preprocessing operations on the original network traffic data, and then imports it as input information into the core architecture system jointly composed of the two-branch convolution and gated recurrent unit. Among them, the two-branch convolution focuses on quickly and accurately extracting the multi-dimensional features of the network traffic data, while the gated recurrent unit emphasizes on modeling and analyzing the long-term correlation patterns in the feature sequence. Through the organic combination of the two, the potential features of the data are deeply mined. Subsequently, the obtained feature output is directly transmitted to the classifier, so as to achieve accurate discrimination of various types of network traffic such as normal traffic, DoS attack traffic, DDoS attack traffic, port scanning traffic, and SQL injection attack traffic. The comparison experiment data shows that for network traffic data from different sources and with diverse patterns, the detection accuracy rate of this model is as high as 84.3%. This result strongly verifies its high efficiency and practicality in the field of big data network traffic intrusion detection, provides a solid technical guarantee foundation for the network security protection link in software engineering, has important theoretical and practical values, and is expected to promote the further development and application expansion of network security technologies.
Estimating the global state of a networked system is an important problem in many application *** classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it often ob...
详细信息
Estimating the global state of a networked system is an important problem in many application *** classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it often observes states at a very high *** inefficiency has motivated the idea of event-based method,which leverages the evolution dynamics in question and makes observations only when some rules are triggered(i.e.,only when certain conditions hold).This paper initiates the investigation of using the event-based method to estimate the equilibrium in the new application domain of cybersecurity,where equilibrium is an important metric that has no closed-form *** specifically,the paper presents an event-based method for estimating cybersecurity equilibrium in the preventive and reactive cyber defense dynamics,which has been proven globally *** presented study proves that the estimated equilibrium from our trigger rule i)indeed converges to the equilibrium of the dynamics and ii)is Zeno-free,which assures the usefulness of the event-based *** examples show that the event-based method can reduce 98%of the observation cost incurred by the periodic *** order to use the event-based method in practice,this paper investigates how to bridge the gap between i)the continuous state in the dynamics model,which is dubbed probability-state because it measures the probability that a node is in the secure or compromised state,and ii)the discrete state that is often encountered in practice,dubbed sample-state because it is sampled from some *** bridge may be of independent value because probability-state models have been widely used to approximate exponentially-many discrete state systems.
Classification of high-dimensional low sample size (HDLSS) data poses a challenge in a variety of real-world situations, such as gene expression studies, cancer research, and medical imaging. This article presents the...
详细信息
A child is the utmost innocent and vulnerable human being. Yet, children fall easy target to many types of violence, all over the place and each single day. Globally, one billion children face certain form of emotiona...
A child is the utmost innocent and vulnerable human being. Yet, children fall easy target to many types of violence, all over the place and each single day. Globally, one billion children face certain form of emotional, physical or sexual crimes each single year. To prevent and address crimes against children, a multifaceted approach combining law enforcement, healthcare workers, educators, researchers and social service providers is necessary. Modern technology and advanced tools are widely in use for criminal investigations from crime data. Although crime data set solely comprises the number of crimes reported in each state for various years, clustering can still be used to group states in India according to the crime cases against children. In this paper, we apply Expectation-Maximization (EM) cluster methodology in WEKA platform to find patterns and trends in child crime rate data and cluster states in India based on crime cases against children which may help to create efficient interventions to stop and deal with crimes against children.
We discuss the annular electron confinement on the liquid helium surface induced by a submerged tubular electrode. For a shallow liquid layer the resulting potential has a minimum off the symmetry axis of the electrod...
详细信息
Zeolitic imidazolate frameworks (ZIFs) have received enormous attention due to unique physi-chemical properties, but are rarely reported for applications in electrically conductive hydrogels (ECHs) arising from low in...
详细信息
暂无评论