Results 21 to 30 of about 8,778 (137)
Curve Decision Fusion-Based Saturation Attack Detection Method in SDN [PDF]
Saturation attacks against Software Defined Network (SDN) switches and controllers are major security issues in SDN. When using ensemble learning methods to detect saturation attacks, existing methods typically use simple distance or entropy calculations
Yunhe CUI, Jianpeng ZHAO, Hongzhen YANG, Xianchao LI
core +1 more source
ABSTRACT This study examines multilingual practices in research interviews, focusing on English lexical insertions in Chinese‐language research interviews with teachers of Chinese in Australian secondary schools, and treating these code‐switches as analytically meaningful rather than incidental.
Chengwen Yuan, Tianwei Zhang, Gary Bonar
wiley +1 more source
Research progress and prospect of intelligent prediction and disaster risk assessment of open-pit mining surface deformation [PDF]
Research on the prediction and disaster risk assessment of surface deformation in open-pit mines serves to improve the accuracy of disaster warning and make safety control decisions.
GENG Huikai +5 more
core +1 more source
Accountability in Government Use of AI: Citizen Concerns and Preferences
ABSTRACT Government adoption of AI opens the “pandora's box” of accountability, a core aspect of public value. Despite the centrality of governmental AI accountability, citizens' concerns and preferences in holding governments accountable for AI usage remain poorly understood.
Naikang Feng, Yanto Chandra
wiley +1 more source
Abstract We examine whether and how public participation in policymaking contributes towards fostering stakeholder support for policy proposals formulated in the bureaucratic arena. We explain how key markers of procedural fairness describing both the participation process and policymakers' presentations of it during the decision justification stage co‐
Adriana Bunea, Idunn Nørbech
wiley +1 more source
Research of Combination Rules of Conflicting Evidence in D-S Evidence Theory [PDF]
D-S证据理论在推理应用中,证据理论合成规则,提供了一种处理多数据源不确定信息推理和融合的有效方法。近年来,在医学诊断、目标识别、军事等许多应用领域,需要综合考虑来自各个方面多源的不确定信息,用以完成问题的求解,证据理论的合成规则在这方面的求解发挥了重要作用。本文的主要工作及贡献如下: 1.系统描述了证据理论研究的现状、存在问题、最新进展和决策系统的相关内容,并且深入了解和分析了证据理论和决策支持系统相关定义和内容,对相关存在问题和解决方法进行了分析。 2.从D ...
吴成朋
core
ABSTRACT What are the conditions under which business corporations expand their institutional power? This paper argues that institutional power is affected by the architecture of the “acquisition regime”—the set of formal (and informal) rules that govern how states purchase public services.
Reut Marciano, Shir Gal
wiley +1 more source
在一个使用了电流与振动双传感器的断路器实时监测系统上,运用D-S证据理论、Dempster合成法则,对断路器故障进行了判断,以考察D-S证据理论用于状态监测中信息融合的可靠度。
程磊, 李正瀛, 尹小根, 何俊佳
doaj
AS-level model for restraining DoS attacks [PDF]
Combined with the next generation security architecture,a novel AS-level defense scheme was proposed to restrain DoS attacks in the Internet.And the deficiencies of previous capability schemes were analyzed in detail,especially on requesting/withdrawing ...
Guang JIN +3 more
core +1 more source
Emotion and the Advocacy Coalition Framework: An Affective Dynamics Perspective
ABSTRACT Despite extensive evidence that emotion and cognition are deeply intertwined, the Advocacy Coalition Framework (ACF) lacks an analytically independent emotional mechanism in its causal architecture—an omission that may be particularly consequential in policy subsystems structured around morally charged, identity‐laden policy disputes.
Moshe Maor
wiley +1 more source

