GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Computer security-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (377 pages)
    Edition: 1st ed.
    ISBN: 9783319764511
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.733
    DDC: 005.8
    Language: English
    Note: Intro -- Preface -- Organization -- International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017) -- Honorary Chairs -- General Chairs -- International Advisory Committee -- Program Chairs -- Publicity Chairs -- Publication Chairs -- Organizing Chairs -- Organizing Committee -- Technical Program Committee -- Contents -- Algorithms and Security Analysis -- A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor D ... -- Abstract -- 1 Introduction -- 2 Data Clustering Based on Improved AFSA -- 2.1 AFSA and Its Improvement -- 2.2 Clustering Analysis Based on the Improved AFSA -- 3 Tensor Model and Recommendation Algorithm -- 3.1 Tensor and Tensor Decomposition -- 3.2 Tensor Decomposition with Dynamic Incremental Updating -- 3.3 Tensor Modeling and Recommendation Algorithm -- 4 Experiment Design and Data Analysis -- 4.1 Testing Datasets -- 4.2 Algorithm Evaluation Indices -- 4.3 Experiment Results and Discussions -- 5 Conclusion -- Acknowledgements -- References -- Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space -- Abstract -- 1 Introduction -- 2 Representation Based Classification -- 3 The Classification of the Nearest Neighbor Representation in Feature Space -- 4 Numerical Experiments -- 4.1 Results of Experiments on Standard Two-Class Datasets -- 4.2 Results of Experiment on Face Databases -- 5 Conclusion -- References -- A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM -- Abstract -- 1 Introduction -- 2 The Proposed Algorithm of Aesthetic QR Code -- 2.1 The Improved Salient Region Detection Algorithm -- 2.2 The Generation of SPBVM -- 2.3 The Synthetic Strategy -- 3 Experimental Results -- 3.1 Comparison Results with and Without Salient Region Detection -- 3.2 Correctness of QR Code Decoding. , 3.3 Comparison of Different Aesthetic QR Code Algorithms -- 4 Conclusion -- Acknowledgments -- References -- Compact Cat Swarm Optimization Algorithm -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Virtual Population and Sampling Mechanism -- 2.2 The Perturbation Vector Updating Rule -- 2.3 Cat Swarm Optimization -- 2.3.1 Seeking Mode -- 2.3.2 Tracing Mode -- 3 Compact Cat Swarm Optimization Algorithm -- 3.1 Initialization and Perturbation Vector Updating Rules -- 3.2 Seeking Mode -- 3.3 Tracing Mode -- 3.4 The Implementation Procedure and Details -- 4 Experimental Results and Analyze -- 4.1 Memory Usage for All Compared Algorithms -- 4.2 Comparisons for Convergence Result -- 5 Conclusion -- References -- Cryptanalysis and Detection Systems -- Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns -- Abstract -- 1 Introduction -- 2 Local Gabor Wavelets Patterns -- 3 The Proposed Method -- 3.1 Image Pre-processing -- 3.2 Feature Extraction with LGWP -- 3.3 Matching Block Pairs -- 3.4 Post-processing -- 4 Experimental Results -- 5 Conclusions -- References -- A Hybrid Intrusion Detection System for Contemporary Network Intrusion Dataset -- Abstract -- 1 Introduction -- 1.1 Cluster Analysis -- 1.2 Feature Selection -- 2 Methodology -- 2.1 Dataset -- 2.2 Discretization -- 2.3 Cluster Analysis -- 2.4 Correlation Based Feature Selection -- 2.5 Machine Learning Algorithm -- 3 Implementation and Results -- 3.1 Evaluation Metrics -- 3.2 Results with Cluster Analysis -- 3.3 Results with Enhanced Anomaly Model -- 3.4 Results with Proposed Method -- 3.5 Additional Testing -- 3.6 Compared with Other Work -- 4 Conclusions -- References -- Mitigating DoS Attacks in SDN Using Offloading Path Strategies -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Example -- 4 Experiment -- 5 Conclusion -- Acknowledgement -- References. , An Extension of Attack Trees -- Abstract -- 1 Introduction -- 2 Attack Trees -- 3 Graph Model: Attack Graphs -- 4 The Most Dangerous Path -- 5 Conclusion -- Acknowledgement -- References -- Face Detection in a Complex Background Using Cascaded Conventional Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Multi-scale Representation -- 2.2 Face Detection -- 3 The Proposed Approach -- 3.1 Overall Framework -- 3.2 Design of Cascade Network Architecture -- 3.3 Training -- 4 Experiments -- 4.1 Data Analysis -- 4.2 Evaluation on Face Detection -- 4.3 The Effectiveness of Joint Face Detection and Facial Landmarks -- 5 Conclusion -- References -- Cryptanalysis on the Anonymity of Li et al.'s Ciphertext-Policy Attribute-Based Encryption Scheme -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Access Structure -- 3 The Review of Li et al.'s Scheme -- 4 The Proposed Attack Method -- 4.1 Overview -- 4.2 The Proposed Attack -- 4.3 Analysis -- 4.4 A Simple Illustration -- 5 Conclusion -- Acknowledgement -- References -- Overlapping Community Detection with Two-Level Expansion by Local Clustering Coefficients -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Quality of Community Detection -- 2.2 Seed Set Expansion -- 3 Research Method -- 3.1 Seed Set Construction -- 3.2 Seed Set Expansion -- 4 Experiment Results -- 5 Conclusion -- References -- IoT and E-commerce Applications -- Writing Security Specification with Things That Flow -- Abstract -- 1 Introduction -- 2 Flowthing Model -- 3 Case Study -- 4 Conclusions -- References -- Automatically Generating Aspect Taxonomy for E-Commerce Domains to Assist Sentiment Mining -- 1 Introduction -- 1.1 Application -- 2 Related Work -- 2.1 Novelty -- 3 Proposed System -- 3.1 Review Crawler -- 3.2 Aspect Generator -- 3.3 Taxonomy Model -- 4 Evaluation -- 4.1 Experiment. , 4.2 Observations -- 4.3 Results -- 4.4 Feature Identification -- 4.5 Taxonomy Evaluation -- 4.6 Annotation Speed-up -- 5 Future Work -- 6 Conclusion -- References -- History Management for Network Information of IoT Devices -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Network Information Collection Tool -- 2.2 Analyzing Time-Series Data -- 3 Target Selection for History Management of Network Information -- 3.1 Collecting Network Information -- 3.2 Vulnerability Matching Information -- 3.3 Structure of History Management Set for Target Information -- 3.4 Analysis of Time-Series Data Using Euclidean Distance -- 4 Scenario Based Utilization Plan -- 4.1 Utilization of History Management in Infringement by Unauthorized Device in Wireless Network -- 5 Conclusion -- Acknowledgement -- References -- Privacy and Cloud Computing -- A Noise Generation Scheme Based on Huffman Coding for Preserving Privacy -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 3.1 Preliminary -- 3.2 Building Noise Matrix -- 3.3 Data Perturbation Procedure -- 4 Experiments -- 5 Conclusions -- References -- Privacy-Preserving Outsource Computing for Binary Vector Similarity -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Garbled Circuits -- 2.2 CP-ABE -- 3 System Framework -- 3.1 Key Generation -- 3.2 Data Uploading -- 3.3 Data Searching -- 4 Proposed Scheme -- 5 Discussion -- 6 Conclusion -- Acknowledgements -- References -- Strategies to Improve Auditing Performance and Soundness for Cloud Computation -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Cloud Computing System Model, Assumptions, and Security Requirements -- 2.2 Secure Cloud Computation Auditing -- 3 Our Proposed Data Strategy -- 3.1 Our Brief Cloud Computation Delegation and Auditing Scheme -- 3.2 The Off-Line Easy-Auditor Improving Strategy. , 3.3 The Function-Based Improving Strategy -- 3.4 The Mixed Improving Strategy -- 4 Conclusions -- References -- Information Hiding and Secret Sharing -- Reversible Image Steganography for Color Image Quantization Based on Lossless Index Coding -- Abstract -- 1 Introduction -- 2 The Proposed Technique -- 3 Simulation Results -- 4 Conclusions -- Acknowledgments -- References -- Capacity on Demand Steganography Through Adaptive Threshold Strategy -- Abstract -- 1 Introduction -- 2 Data Hiding by Adaptive Threshold Strategy -- 2.1 Adaptive Threshold Generation Scheme -- 2.2 The Embedding Procedure -- 2.3 The Extracting Procedure -- 3 Experimental Results and Discussion -- 3.1 Experimental Results -- 3.2 Discussion -- 4 Conclusion -- References -- Shamir's Secret Sharing Scheme in Parallel -- Abstract -- 1 Introduction -- 2 Shamir's TSSS -- 3 Sequential TSSS Algorithms -- 3.1 Sharing a Number -- 3.2 Sharing a Binary Data -- 4 Parallel Algorithms for Shamirʼs TSSS -- 5 Experimental Results -- 6 Concluding Remarks -- References -- Network Security and Applications -- A Cognitive Global Clock Synchronization Protocol in WSNs -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 Main Strategies of CGCSP -- 3.1 Synchronization Process of CGCSP -- 4 CGCSP Implementation -- 5 Simulations and Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Synchronization Accuracy -- 5.3 Energy Consumption -- 5.4 Performance Comparison -- 6 Conclusions and Future Research Direction -- Acknowledgements -- References -- A Generic Web Application Testing and Attack Data Generation Method -- Abstract -- 1 Introduction -- 1.1 Motivation and Objective -- 1.2 Overview -- 2 Background -- 2.1 Symbolic Execution -- 2.2 Web Security Issues -- 3 Related Work -- 3.1 Static/Dynamic Analysis Based Attack Detection -- 3.2 Symbolic Execution Based Attack Detection -- 4 Method. , 4.1 Symbolic Environment.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Milton : Taylor & Francis Group
    Keywords: Translating and interpreting--China
    Description / Table of Contents: Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Figures -- Tables -- Contributors -- Acknowledgements -- Editors' Introduction -- Part I Chinese Translation in Academic Settings -- 1 the Chinese Tradition of Translation Studies: Review, Reconstruction and Modernisation -- 1.1 Introduction: Chinese Tradition of Translation Studies Defined -- 1.1.1 the Idea of 'Tradition' -- 1.1.2 'translation Studies' and 'Chinese' Defined -- 1.1.3 Representing the Chinese TS Tradition -- 1.2 Reconstruction of the Chinese TS Tradition -- 1.3 Identity and Engagement -- 1.3.1 A Self-contained Identity? -- 1.3.2 Critical Engagement -- 1.4 From 'Taking Home' to 'Going Global' -- 1.4.1 'Taking Home' -- 1.4.2 'Going Global' -- 1.4.3 'Theory' vs. 'Discourse' -- 1.4.4 Emergence of Empirical and Analytical Research -- 1.5 Future Directions Beyond Utilitarianism -- 1.5.1 Utilitarianism Critiqued -- 1.5.2 Norms in Chinese and Xin-Da-Ya in English -- 1.5.3 Cross-lingual Naming in Translation -- 1.6 Concluding Remarks -- Notes -- Further Reading -- References -- 2 Global Chinese Translation Programmes: An Overview of Chinese English Translation/Interpreting Programmes -- 2.1 Introduction -- 2.2 Design of the Study -- 2.2.1 Investigation Questions -- 2.2.2 Investigation Methods -- Targeted Online Search -- Survey and/or Extended Discussions -- 2.2.3 Participants in the Data Collection -- 2.3 Findings of the Study -- 2.3.1 Growth of the Discipline -- Rapid Growth of Mti in China and Bumpy/Cyclic Growth Internationally -- Driven by the Market and Other Factors -- 2.3.2 Maturity of Chinese-English Translation and Interpreting -- Full Academic Progression Structure -- Full Curricula -- Non-text Based Teaching and Non-hierarchically Based Teaching -- Informed by Modern Theories -- Inclusion of Research -- Differentiation Through Specialisation.
    Type of Medium: Online Resource
    Pages: 1 online resource (653 pages)
    Edition: 1st ed.
    ISBN: 9781317383024
    Series Statement: Routledge Language Handbooks Series
    DDC: 495.1802
    Language: English
    Note: Description based on publisher supplied metadata and other sources
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2021-06-30
    Description: Western North Pacific tropical cyclone (TC) model tracks are analyzed in two large multimodelensembles, spanning a large variety of models and multiple future climate scenarios. Two methodologiesare used to synthesize the properties of TC tracks in this large data set: cluster analysis and mass momentellipses. First, the models’ TC tracks are compared to observed TC tracks’ characteristics, and a subset ofthe models is chosen for analysis, based on the tracks’ similarity to observations and sample size. Potentialchanges in track types in a warming climate are identified by comparing the kernel smoothed probabilitydistributions of various track variables in historical and future scenarios using a Kolmogorov-Smirnovsignificance test. Two track changes are identified. The first is a statistically significant increase in thenorth-south expansion, which can also be viewed as a poleward shift, as TC tracks are prevented fromexpanding equatorward due to the weak Coriolis force near the equator. The second change is an eastwardshift in the storm tracks that occur near the central Pacific in one of the multimodel ensembles, indicatinga possible increase in the occurrence of storms near Hawaii in a warming climate. The dependence of theresults on which model and future scenario are considered emphasizes the necessity of including multiplemodels and scenarios when considering future changes in TC characteristics.
    Description: Published
    Description: 9721–9744
    Description: 4A. Oceanografia e clima
    Description: JCR Journal
    Repository Name: Istituto Nazionale di Geofisica e Vulcanologia (INGV)
    Type: article
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2022-05-25
    Description: Author Posting. © American Meteorological Society, 2013. This article is posted here by permission of American Meteorological Society for personal use, not for redistribution. The definitive version was published in Journal of Climate 26 (2013): 9247–9290, doi:10.1175/JCLI-D-12-00593.1.
    Description: This is the second part of a three-part paper on North American climate in phase 5 of the Coupled Model Intercomparison Project (CMIP5) that evaluates the twentieth-century simulations of intraseasonal to multidecadal variability and teleconnections with North American climate. Overall, the multimodel ensemble does reasonably well at reproducing observed variability in several aspects, but it does less well at capturing observed teleconnections, with implications for future projections examined in part three of this paper. In terms of intraseasonal variability, almost half of the models examined can reproduce observed variability in the eastern Pacific and most models capture the midsummer drought over Central America. The multimodel mean replicates the density of traveling tropical synoptic-scale disturbances but with large spread among the models. On the other hand, the coarse resolution of the models means that tropical cyclone frequencies are underpredicted in the Atlantic and eastern North Pacific. The frequency and mean amplitude of ENSO are generally well reproduced, although teleconnections with North American climate are widely varying among models and only a few models can reproduce the east and central Pacific types of ENSO and connections with U.S. winter temperatures. The models capture the spatial pattern of Pacific decadal oscillation (PDO) variability and its influence on continental temperature and West Coast precipitation but less well for the wintertime precipitation. The spatial representation of the Atlantic multidecadal oscillation (AMO) is reasonable, but the magnitude of SST anomalies and teleconnections are poorly reproduced. Multidecadal trends such as the warming hole over the central–southeastern United States and precipitation increases are not replicated by the models, suggesting that observed changes are linked to natural variability.
    Description: The authors acknowledge the support of NOAA/Climate Program Office/Modeling, Analysis, Predictions and Projections (MAPP) program as part of the CMIP5 Task Force.
    Description: 2014-06-01
    Keywords: North America ; Regional effects ; Coupled models ; Decadal variability ; Interannual variability ; Intraseasonal variability
    Repository Name: Woods Hole Open Access Server
    Type: Article
    Format: application/pdf
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    ISSN: 1520-6882
    Source: ACS Legacy Archives
    Topics: Chemistry and Pharmacology
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Electronic Resource
    Electronic Resource
    s.l. : American Chemical Society
    Analytical chemistry 65 (1993), S. 2093-2095 
    ISSN: 1520-6882
    Source: ACS Legacy Archives
    Topics: Chemistry and Pharmacology
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Electronic Resource
    Electronic Resource
    s.l. : American Chemical Society
    The @journal of physical chemistry 〈Washington, DC〉 93 (1989), S. 7916-7920 
    Source: ACS Legacy Archives
    Topics: Chemistry and Pharmacology , Physics
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Electronic Resource
    Electronic Resource
    College Park, Md. : American Institute of Physics (AIP)
    The Journal of Chemical Physics 94 (1991), S. 6698-6707 
    ISSN: 1089-7690
    Source: AIP Digital Archive
    Topics: Physics , Chemistry and Pharmacology
    Notes: The complete harmonic force field of acetone has been computed at the Hartree–Fock level with the 4–21 basis set of Gaussian orbitals. Seven scale factors optimized for related molecules were used to scale the computed force field. The mean deviation from the experimental vibrational frequencies is only 9.7 cm−1, except for the two methyl torsions. In order to obtain the best possible force field, a new set of seven scale factors was derived by fitting the computed spectrum of acetone to the observed spectrum. The only major change was for the C–C–C bending scaling factor. The final mean deviation was only 5.2 cm−1. The ground state rotational spectra of pyrazole and γ-pyrone have been reinvestigated in the millimeter-wave range. Thanks to millimeter-wave spectroscopy, accurate rotational and centrifugal distortion constants have been determined for acetone, pyrazole, and γ-pyrone. The experimental quartic centrifugal distortion constants are compared with the values calculated from ab initio force fields. A good agreement is found, even for the two-top molecule acetone for which the differences between the experimental and calculated T constants are smaller than 10%.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Electronic Resource
    Electronic Resource
    College Park, Md. : American Institute of Physics (AIP)
    The Journal of Chemical Physics 89 (1988), S. 5535-5541 
    ISSN: 1089-7690
    Source: AIP Digital Archive
    Topics: Physics , Chemistry and Pharmacology
    Notes: A systematic study of the dependence of the band gap, the linear optical susceptibility, the polarizability α, and the second hyperpolarizability γ, on the number of repeat unit is conducted for the thiophene series from monomer to hexamer. The linear optical susceptibilities for oligomers have been determined from the refractive index measurements on vacuum deposited films using the m lines technique. The orientationally averaged polarizabilities 〈α〉 have been measured from refractive index measurements of THF solutions. The orientationally averaged second hyperpolarizabilities 〈γ〉 have been measured by degenerate four-wave mixing studies of THF solutions. The validity of the Lorentz–Lorenz approximation is tested and found to be satisfactory. The experimental values of 〈α〉 and 〈γ〉 for thiophene and 〈α〉 for bithiophene are found to be in qualitative agreement with those obtained by a recent ab initio calculation which used the finite field method and included diffuse polarization functions. The experimentally observed dependence of 〈α〉 and 〈γ〉 on the number N of the thiophene repeat unit is compared with that predicted by a free electron model, PPP methods, and the ab initio calculations. For the case of polarizability, the repeat unit dependence is in good agreement with that predicted by the ab initio calculations but for the case of second hyperpolarizability, the agreement is not as good.
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Electronic Resource
    Electronic Resource
    s.l. : American Chemical Society
    Inorganic chemistry 32 (1993), S. 4700-4707 
    ISSN: 1520-510X
    Source: ACS Legacy Archives
    Topics: Chemistry and Pharmacology
    Type of Medium: Electronic Resource
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...