GLORIA

GEOMAR Library Ocean Research Information Access

You have 0 saved results.
Mark results and click the "Add To Watchlist" link in order to add them to this list.

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2015
    In:  IEEE Transactions on Computers Vol. 64, No. 8 ( 2015-8-1), p. 2382-2393
    In: IEEE Transactions on Computers, Institute of Electrical and Electronics Engineers (IEEE), Vol. 64, No. 8 ( 2015-8-1), p. 2382-2393
    Type of Medium: Online Resource
    ISSN: 0018-9340
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2015
    detail.hit.zdb_id: 1473005-4
    detail.hit.zdb_id: 218504-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2023
    In:  IEEE Transactions on Knowledge and Data Engineering Vol. 35, No. 11 ( 2023-11-1), p. 11769-11783
    In: IEEE Transactions on Knowledge and Data Engineering, Institute of Electrical and Electronics Engineers (IEEE), Vol. 35, No. 11 ( 2023-11-1), p. 11769-11783
    Type of Medium: Online Resource
    ISSN: 1041-4347 , 1558-2191 , 2326-3865
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2023
    detail.hit.zdb_id: 1001468-8
    detail.hit.zdb_id: 2026620-0
    SSG: 24,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    World Scientific Pub Co Pte Ltd ; 2023
    In:  Stochastics and Dynamics Vol. 23, No. 01 ( 2023-02)
    In: Stochastics and Dynamics, World Scientific Pub Co Pte Ltd, Vol. 23, No. 01 ( 2023-02)
    Abstract: In this paper, we study a class of space-time fractional Anderson model driven by multiplicative Gaussian noise which is white/colored in time and has the covariance of a fractional Brownian motion with Hurst index [Formula: see text] in space. We prove the existence of the solution in the Skorohod sense and obtain the upper and lower bounds for the [Formula: see text] th moments for all [Formula: see text]. Then we can prove that solution of this equation in the Skorohod sense is weakly intermittent. We also deduce the Hölder continuity of the solution with respect to the time and space variables.
    Type of Medium: Online Resource
    ISSN: 0219-4937 , 1793-6799
    RVK:
    Language: English
    Publisher: World Scientific Pub Co Pte Ltd
    Publication Date: 2023
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Oxford University Press (OUP) ; 2023
    In:  The Computer Journal Vol. 66, No. 8 ( 2023-08-14), p. 1870-1881
    In: The Computer Journal, Oxford University Press (OUP), Vol. 66, No. 8 ( 2023-08-14), p. 1870-1881
    Abstract: Completing the classification of tactics and techniques in cyber threat intelligence (CTI) is an important way to obtain tactics, techniques and procedures (TTPs) and portray the behavior of cyber attacks. However, the high level of abstraction of tactics and techniques information and their presence in CTI, usually in the form of natural language text, make it difficult for traditional manual analysis methods and feature engineering-based machine learning methods to complete the classification of tactics and techniques effectively. Meanwhile, flat deep learning methods do not perform well in classifying more fine-grained techniques due to their inability to exploit the hierarchical relationship between tactics and techniques. Therefore, this paper regards the tactics and techniques of TTPs defined in Adversarial Tactics, Techniques and Common Knowledge knowledge base as labels and proposes a Convolutional Neural Network (CNN) model based on hierarchical knowledge migration and attention mechanism for classifying tactics and techniques in CTI, named HM-ACNN (CNN based on hierarchical knowledge migration and attention mechanism). HM-ACNN classifies tactics and techniques into two phases, and the underlying network model for both phases is the Attention-based CNN network. The first step in HM-ACNN is converting the CTI text into a two-dimensional image based on the word embedding model, and then start training the classification of tactics through the CNN structure based on the attention mechanism before the classification of techniques. Secondly, after the tactics classification training is completed, the tactic-to-technique knowledge migration is then completed by transforming the parameters of the CNN layer and the attention layer in the tactics classification process based on the special hierarchical relationship between tactics and techniques. Then, the classification of techniques is finished by fine-tuning. The experimental results show that HM-ACNN performs well in the tactics and techniques classification tasks, and the metric F1 values reach 93.66% and 86.29%, which are better than other models such as CNN, Recurrent Neural Network and CRNN (Recurrent Convolutional Neural Networks).
    Type of Medium: Online Resource
    ISSN: 0010-4620 , 1460-2067
    RVK:
    RVK:
    Language: English
    Publisher: Oxford University Press (OUP)
    Publication Date: 2023
    detail.hit.zdb_id: 1477172-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Concurrency and Computation: Practice and Experience Vol. 33, No. 4 ( 2021-02-25)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 33, No. 4 ( 2021-02-25)
    Abstract: The Software plagiarism, which arises the problem of software piracy is a growing major concern nowadays. It is a serious risk to the software industry that gives huge economic damages every year. The customers may develop a modified version of the original software in other types of programming languages. Furthermore, the plagiarism detection in different types of source codes is a challenging task because each source code may have specific syntax rules. In this paper, we proposed a methodology for software plagiarism detection in multiprogramming languages based on machine learning approaches. The Principal Component Analysis (PCA) is applied for features extraction from source codes without losing the actual information. It extracts features by factor analysis and converts the dataset into normalized linear principal components which are further useful for predictions analysis. Then, the multinomial logistic regression model (MLR) is applied to these components to classify the source codes documents based on predictions. It gives the generalization of logistic regression to handle multiclass problems. Further, the predictors' performance in MLR is evaluated by 2 tailed z test. To apply the experiment, the dataset is collected in five different and popular languages, ie, C, C++, Java, C#, and Python. Each programming language taken in two different case studies, ie, binary search and Stack.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    In: Software: Practice and Experience, Wiley
    Abstract: Autonomous vehicles (AV) can not only improve traffic safety and congestion, but also have strategic significance for the development of the transportation industry. With the continuous updating of core technologies such as artificial intelligence, sensor detection, synchronous positioning, and high‐precision mapping, the development of AV has been promoted. When 5G network is combined with Internet of Vehicles, the problems of AV can be solved by taking advantage of 5G ultra‐large bandwidth, low latency and high reliability. However, when the user controls the vehicle remotely, a real‐time and reliable authentication process is needed, while minimizing the overhead of security protocols. Therefore, this article proposes a practical and secure multifactor user authentication protocol for AV in 5G network. By introducing non‐interactive zero‐knowledge proof technology and physical uncloning function, the protocol completes mutual authentication and key agreement without revealing any sensitive information. The article proves the security of the protocol through BAN logic and the simulation of Scyther. And it can resist malicious attacks and provide more security features. The informal security analysis shows that the protocol can meet the proposed security requirements. Finally, we evaluate the efficiency of the protocol, and the results show that the protocol can provide better performance.
    Type of Medium: Online Resource
    ISSN: 0038-0644 , 1097-024X
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2022
    detail.hit.zdb_id: 120252-2
    detail.hit.zdb_id: 1500326-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Wiley ; 2021
    In:  Concurrency and Computation: Practice and Experience Vol. 33, No. 11 ( 2021-06-10)
    In: Concurrency and Computation: Practice and Experience, Wiley, Vol. 33, No. 11 ( 2021-06-10)
    Abstract: Speech emotion recognition is an important technique for human‐computer interface applications. Due to contain rich information of emotion, the spectral feature is widely used for emotion recognition. However, the recognition performance is limited because of imprecise extracted rule and uncertain size of resolution of spectral feature. To address this issue, motivated by speech coding, we introduced psychoacoustics model, provided a perception spectral subband partition method for obtaining more precise frequency resolution. Moreover, we also provided a new spectral feature on the divided subband frequency signals. The proposed feature includes emotional perception entropy, spectral inclination, and spectral flatness. Then, a Support Vector Machine classifier is used to recognize emotion categories. The experiment results show that the proposed spectral feature is superior to the traditional MFCC feature, and also better than the state‐of‐the‐art Fourier feature and multi‐resolution amplitude feature.
    Type of Medium: Online Resource
    ISSN: 1532-0626 , 1532-0634
    URL: Issue
    RVK:
    Language: English
    Publisher: Wiley
    Publication Date: 2021
    detail.hit.zdb_id: 2052606-4
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    World Scientific Pub Co Pte Ltd ; 2019
    In:  Stochastics and Dynamics Vol. 19, No. 03 ( 2019-06), p. 1950018-
    In: Stochastics and Dynamics, World Scientific Pub Co Pte Ltd, Vol. 19, No. 03 ( 2019-06), p. 1950018-
    Abstract: In this paper, we consider the self-normalized asymptotic properties of the parameter estimators in the fractional Ornstein–Uhlenbeck process. The deviation inequalities, Cramér-type moderate deviations and Berry–Esseen bounds are obtained. The main methods include the deviation inequalities and moderate deviations for multiple Wiener–Itô integrals [P. Major, Tail behavior of multiple integrals and U-statistics, Probab. Surv. 2 (2005) 448–505; On a multivariate version of Bernsteins inequality, Electron. J. Probab. 12 (2007) 966–988; M. Schulte and C. Thäle, Cumulants on Wiener chaos: Moderate deviations and the fourth moment theorem, J. Funct. Anal. 270 (2016) 2223–2248], as well as the Delta methods in large deviations [F. Q. Gao and X. Q. Zhao, Delta method in large deviations and moderate deviations for estimators, Ann. Statist. 39 (2011) 1211–1240] . For applications, we propose two test statistics which can be used to construct confidence intervals and rejection regions in the hypothesis testing for the drift coefficient. It is shown that the Type II errors tend to be zero exponential when using the proposed test statistics.
    Type of Medium: Online Resource
    ISSN: 0219-4937 , 1793-6799
    RVK:
    Language: English
    Publisher: World Scientific Pub Co Pte Ltd
    Publication Date: 2019
    SSG: 11
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    In: Scientific Programming, Hindawi Limited, Vol. 2021 ( 2021-5-8), p. 1-8
    Abstract: This study was to analyze the diagnostic value of magnetic resonance imaging (MRI) for gastric cancer (GC) lesions and the treatment effect of complete laparoscopic radical resection (CLSRR). A malignant tumor recognition algorithm was constructed in this study based on the backprojection (BP) and support vector machine (SVM), which was named BPS. 78 GC patients were divided into an experimental group (received CLSRR) and a control group (received assisted laparoscopic radical resection (ALSRR)), with 39 cases in each group. It was found that the BPS algorithm showed lower relative mean square error (MSE) in axle x (OMSE, x) and axle y (OMSE, x), but the classification accuracy (CA) was the opposite ( P 〈 0.05 ). The postoperative hospital stay, analgesia duration, first exhaust time (FET), and first off-bed activity time (FOBA) for patients in the experimental group were less ( P 〈 0.05 ). The operation time of the experimental group (270.56 ± 90.55 min) was significantly longer than that of the control group (228.07 ± 75.26 min) ( P 〈 0.05 ). There were 3 cases of anastomotic fistula, 1 case of acute peritonitis, and 2 cases of lung infections in the experimental group, which were greatly less than those in the control group (7 cases, 4 cases, and 3 cases) ( P 〈 0.05 ). In short, the BPS algorithm was superior in processing MRI images and could improve the diagnostic effect of MRI images. The CLSRR could reduce the length of hospital stay and the probability of complications in GC patients, so it could be used as a surgical plan for the clinical treatment of advanced GC.
    Type of Medium: Online Resource
    ISSN: 1875-919X , 1058-9244
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2021
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2016
    In:  IEEE Transactions on Knowledge and Data Engineering Vol. 28, No. 5 ( 2016-5-1), p. 1340-1353
    In: IEEE Transactions on Knowledge and Data Engineering, Institute of Electrical and Electronics Engineers (IEEE), Vol. 28, No. 5 ( 2016-5-1), p. 1340-1353
    Type of Medium: Online Resource
    ISSN: 1041-4347
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2016
    detail.hit.zdb_id: 1001468-8
    detail.hit.zdb_id: 2026620-0
    SSG: 24,1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...