GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (10)
  • Mathematics  (10)
  • 1
    Online Resource
    Online Resource
    World Scientific Pub Co Pte Ltd ; 2023
    In:  Stochastics and Dynamics Vol. 23, No. 01 ( 2023-02)
    In: Stochastics and Dynamics, World Scientific Pub Co Pte Ltd, Vol. 23, No. 01 ( 2023-02)
    Abstract: In this paper, we study a class of space-time fractional Anderson model driven by multiplicative Gaussian noise which is white/colored in time and has the covariance of a fractional Brownian motion with Hurst index [Formula: see text] in space. We prove the existence of the solution in the Skorohod sense and obtain the upper and lower bounds for the [Formula: see text] th moments for all [Formula: see text]. Then we can prove that solution of this equation in the Skorohod sense is weakly intermittent. We also deduce the Hölder continuity of the solution with respect to the time and space variables.
    Type of Medium: Online Resource
    ISSN: 0219-4937 , 1793-6799
    RVK:
    Language: English
    Publisher: World Scientific Pub Co Pte Ltd
    Publication Date: 2023
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    In: Software: Practice and Experience, Wiley
    Abstract: Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.
    Type of Medium: Online Resource
    ISSN: 0038-0644 , 1097-024X
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2022
    detail.hit.zdb_id: 120252-2
    detail.hit.zdb_id: 1500326-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Concurrency and Computation: Practice and Experience Vol. 33, No. 4 ( 2021-02-25)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 33, No. 4 ( 2021-02-25)
    Abstract: The Software plagiarism, which arises the problem of software piracy is a growing major concern nowadays. It is a serious risk to the software industry that gives huge economic damages every year. The customers may develop a modified version of the original software in other types of programming languages. Furthermore, the plagiarism detection in different types of source codes is a challenging task because each source code may have specific syntax rules. In this paper, we proposed a methodology for software plagiarism detection in multiprogramming languages based on machine learning approaches. The Principal Component Analysis (PCA) is applied for features extraction from source codes without losing the actual information. It extracts features by factor analysis and converts the dataset into normalized linear principal components which are further useful for predictions analysis. Then, the multinomial logistic regression model (MLR) is applied to these components to classify the source codes documents based on predictions. It gives the generalization of logistic regression to handle multiclass problems. Further, the predictors' performance in MLR is evaluated by 2 tailed z test. To apply the experiment, the dataset is collected in five different and popular languages, ie, C, C++, Java, C#, and Python. Each programming language taken in two different case studies, ie, binary search and Stack.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Oxford University Press (OUP) ; 2023
    In:  The Computer Journal Vol. 66, No. 8 ( 2023-08-14), p. 1870-1881
    In: The Computer Journal, Oxford University Press (OUP), Vol. 66, No. 8 ( 2023-08-14), p. 1870-1881
    Abstract: Completing the classification of tactics and techniques in cyber threat intelligence (CTI) is an important way to obtain tactics, techniques and procedures (TTPs) and portray the behavior of cyber attacks. However, the high level of abstraction of tactics and techniques information and their presence in CTI, usually in the form of natural language text, make it difficult for traditional manual analysis methods and feature engineering-based machine learning methods to complete the classification of tactics and techniques effectively. Meanwhile, flat deep learning methods do not perform well in classifying more fine-grained techniques due to their inability to exploit the hierarchical relationship between tactics and techniques. Therefore, this paper regards the tactics and techniques of TTPs defined in Adversarial Tactics, Techniques and Common Knowledge knowledge base as labels and proposes a Convolutional Neural Network (CNN) model based on hierarchical knowledge migration and attention mechanism for classifying tactics and techniques in CTI, named HM-ACNN (CNN based on hierarchical knowledge migration and attention mechanism). HM-ACNN classifies tactics and techniques into two phases, and the underlying network model for both phases is the Attention-based CNN network. The first step in HM-ACNN is converting the CTI text into a two-dimensional image based on the word embedding model, and then start training the classification of tactics through the CNN structure based on the attention mechanism before the classification of techniques. Secondly, after the tactics classification training is completed, the tactic-to-technique knowledge migration is then completed by transforming the parameters of the CNN layer and the attention layer in the tactics classification process based on the special hierarchical relationship between tactics and techniques. Then, the classification of techniques is finished by fine-tuning. The experimental results show that HM-ACNN performs well in the tactics and techniques classification tasks, and the metric F1 values reach 93.66% and 86.29%, which are better than other models such as CNN, Recurrent Neural Network and CRNN (Recurrent Convolutional Neural Networks).
    Type of Medium: Online Resource
    ISSN: 0010-4620 , 1460-2067
    RVK:
    RVK:
    Language: English
    Publisher: Oxford University Press (OUP)
    Publication Date: 2023
    detail.hit.zdb_id: 1477172-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Concurrency and Computation: Practice and Experience Vol. 33, No. 11 ( 2021-06-10)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 33, No. 11 ( 2021-06-10)
    Abstract: Speech emotion recognition is an important technique for human‐computer interface applications. Due to contain rich information of emotion, the spectral feature is widely used for emotion recognition. However, the recognition performance is limited because of imprecise extracted rule and uncertain size of resolution of spectral feature. To address this issue, motivated by speech coding, we introduced psychoacoustics model, provided a perception spectral subband partition method for obtaining more precise frequency resolution. Moreover, we also provided a new spectral feature on the divided subband frequency signals. The proposed feature includes emotional perception entropy, spectral inclination, and spectral flatness. Then, a Support Vector Machine classifier is used to recognize emotion categories. The experiment results show that the proposed spectral feature is superior to the traditional MFCC feature, and also better than the state‐of‐the‐art Fourier feature and multi‐resolution amplitude feature.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    World Scientific Pub Co Pte Ltd ; 2019
    In:  Stochastics and Dynamics Vol. 19, No. 03 ( 2019-06), p. 1950018-
    In: Stochastics and Dynamics, World Scientific Pub Co Pte Ltd, Vol. 19, No. 03 ( 2019-06), p. 1950018-
    Abstract: In this paper, we consider the self-normalized asymptotic properties of the parameter estimators in the fractional Ornstein–Uhlenbeck process. The deviation inequalities, Cramér-type moderate deviations and Berry–Esseen bounds are obtained. The main methods include the deviation inequalities and moderate deviations for multiple Wiener–Itô integrals [P. Major, Tail behavior of multiple integrals and U-statistics, Probab. Surv. 2 (2005) 448–505; On a multivariate version of Bernsteins inequality, Electron. J. Probab. 12 (2007) 966–988; M. Schulte and C. Thäle, Cumulants on Wiener chaos: Moderate deviations and the fourth moment theorem, J. Funct. Anal. 270 (2016) 2223–2248], as well as the Delta methods in large deviations [F. Q. Gao and X. Q. Zhao, Delta method in large deviations and moderate deviations for estimators, Ann. Statist. 39 (2011) 1211–1240] . For applications, we propose two test statistics which can be used to construct confidence intervals and rejection regions in the hypothesis testing for the drift coefficient. It is shown that the Type II errors tend to be zero exponential when using the proposed test statistics.
    Type of Medium: Online Resource
    ISSN: 0219-4937 , 1793-6799
    RVK:
    Language: English
    Publisher: World Scientific Pub Co Pte Ltd
    Publication Date: 2019
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    In: Scientific Programming, Hindawi Limited, Vol. 2021 ( 2021-5-8), p. 1-8
    Abstract: This study was to analyze the diagnostic value of magnetic resonance imaging (MRI) for gastric cancer (GC) lesions and the treatment effect of complete laparoscopic radical resection (CLSRR). A malignant tumor recognition algorithm was constructed in this study based on the backprojection (BP) and support vector machine (SVM), which was named BPS. 78 GC patients were divided into an experimental group (received CLSRR) and a control group (received assisted laparoscopic radical resection (ALSRR)), with 39 cases in each group. It was found that the BPS algorithm showed lower relative mean square error (MSE) in axle x (OMSE, x) and axle y (OMSE, x), but the classification accuracy (CA) was the opposite ( P 〈 0.05 ). The postoperative hospital stay, analgesia duration, first exhaust time (FET), and first off-bed activity time (FOBA) for patients in the experimental group were less ( P 〈 0.05 ). The operation time of the experimental group (270.56 ± 90.55 min) was significantly longer than that of the control group (228.07 ± 75.26 min) ( P 〈 0.05 ). There were 3 cases of anastomotic fistula, 1 case of acute peritonitis, and 2 cases of lung infections in the experimental group, which were greatly less than those in the control group (7 cases, 4 cases, and 3 cases) ( P 〈 0.05 ). In short, the BPS algorithm was superior in processing MRI images and could improve the diagnostic effect of MRI images. The CLSRR could reduce the length of hospital stay and the probability of complications in GC patients, so it could be used as a surgical plan for the clinical treatment of advanced GC.
    Type of Medium: Online Resource
    ISSN: 1875-919X , 1058-9244
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Elsevier BV ; 2022
    In:  Information Sciences Vol. 593 ( 2022-05), p. 385-397
    In: Information Sciences, Elsevier BV, Vol. 593 ( 2022-05), p. 385-397
    Type of Medium: Online Resource
    ISSN: 0020-0255
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2022
    detail.hit.zdb_id: 218760-7
    detail.hit.zdb_id: 1478990-5
    SSG: 24,1
    SSG: 7,11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Oxford University Press (OUP) ; 2018
    In:  The Computer Journal Vol. 61, No. 8 ( 2018-08-01), p. 1202-1215
    In: The Computer Journal, Oxford University Press (OUP), Vol. 61, No. 8 ( 2018-08-01), p. 1202-1215
    Type of Medium: Online Resource
    ISSN: 0010-4620 , 1460-2067
    RVK:
    RVK:
    Language: English
    Publisher: Oxford University Press (OUP)
    Publication Date: 2018
    detail.hit.zdb_id: 1477172-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Oxford University Press (OUP) ; 2022
    In:  The Computer Journal ( 2022-11-29)
    In: The Computer Journal, Oxford University Press (OUP), ( 2022-11-29)
    Abstract: Identification and extraction of Tactics, Techniques and Procedures (TTPs) for Cyber Threat Intelligence (CTI) restore the full picture of cyber attacks and guide the analysts to assess the system risk. Existing frameworks can hardly provide uniform and complete processing mechanisms for TTPs information extraction without adequate knowledge background. A multi-instance learning approach named SeqMask is proposed in this paper as a solution. SeqMask extracts behavior keywords from CTI evaluated by the semantic impact, and predicts TTPs labels by conditional probabilities. Still, the framework has two mechanisms to determine the validity of keywords. One using expert experience verification. The other verifies the distortion of the classification effect by blocking existing keywords. In the experiments, SeqMask reached 86.07% and 73.99% in F1 scores for TTPs classifications. For the top 20% of keywords, the expert approval rating is 92.20%, where the average repetition of keywords whose scores between 100% and 90% is 60.02%. Particularly, when the top 65% of the keywords were blocked, the F1 decreased to about 50%; when removing the top 50%, the F1 was under 31%. Further, we also validate the possibility of extracting TTPs from full-size CTI and malware whose F1 are improved by 2.16% and 0.81%.
    Type of Medium: Online Resource
    ISSN: 0010-4620 , 1460-2067
    RVK:
    RVK:
    Language: English
    Publisher: Oxford University Press (OUP)
    Publication Date: 2022
    detail.hit.zdb_id: 1477172-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...