Results 61 to 70 of about 37,104 (149)

Hyper clustering model for dynamic network intrusion detection

open access: yesIET Communications, EarlyView., 2022
Abstract Generally, the existing Intrusion Detection Systems (IDS) solutions suffer from low detection accuracy for some attack types compared with the overall detection accuracy of attacks. The data imbalance technically affects the ratio of detection accuracy of low frequent attacks class (e.g. zero‐day attack) compared to attacks with more instances.
Ali Saeed Alfoudi   +7 more
wiley   +1 more source

Relationship Between the First Undisturbed Sleep Period and Diuretic and Urine Storage States of the First Void After Sleep

open access: yesNeurourology and Urodynamics, EarlyView.
ABSTRACT Objective To explore why older men awaken to urinate within 3 h after falling asleep, we examined diuretic and urine storage states associated with the first void after falling asleep. Methods We enrolled 102 male patients, 50 years or older, hospitalized for prostate biopsy between November 2021 and September 2023. Patients were grouped based
Yasunori Akashi   +5 more
wiley   +1 more source

A neuro‐evolutionary approach for software defined wireless network traffic classification

open access: yesIET Communications, EarlyView., 2022
This paper takes a Software‐Defined Wireless Network (SDWN) architecture for network traffic classification into account. The proposed system uses optimization methods and semi‐supervised machine learning to accurately classify traffic while minimizing communication overhead between the controller and the SDWN switches.
Buddhadeb Pradhan   +5 more
wiley   +1 more source

The poor usability of OpenLDAP Access Control Lists

open access: yesIET Information Security, Volume 17, Issue 1, Page 89-101, January 2023., 2023
Abstract The usability of Access Control Lists (ACLs) of a widely used enterprise software for directory information services called OpenLDAP is addressed. A directory service is used to store a variety of data such as employee information and passwords, and can be seen as a critical infrastructure component of an enterprise. Security and in particular,
Yi Fei Chen   +2 more
wiley   +1 more source

A Facile Synthesis of 3‐Substituted Coumarins and Investigation of Their 3CLpro Inhibition Activity Against SARS‐CoV‐2

open access: yesChemistryOpen, EarlyView.
A user‐friendly protocol for the synthesis 3‐substituted coumarin derivatives was developed using Friedel‐Crafts alkylation and ozonolysis as key steps. Deactivation of 3‐chymotrypsin like protease (3CLpro) enzyme using these coumarin derivatives were investigated to explored their potential as 3CLpro inhibitors for Covid‐19 Therapeutics.
Manoj K. Choudhary   +5 more
wiley   +1 more source

DeepCatra: Learning flow‐ and graph‐based behaviours for Android malware detection

open access: yesIET Information Security, Volume 17, Issue 1, Page 118-130, January 2023., 2023
Abstract As Android malware grows and evolves, deep learning has been introduced into malware detection, resulting in great effectiveness. Recent work is considering hybrid models and multi‐view learning. However, they use only simple features, limiting the accuracy of these approaches in practice.
Yafei Wu   +4 more
wiley   +1 more source

Design, Synthesis, and In Silico Insights of new 4‐Piperazinylquinolines as Antiproliferative Agents against NCI Renal Cancer Cell Lines

open access: yesChemistryOpen, EarlyView.
A novel series of hybrid 4‐(4‐benzoylpiperazin‐1‐yl)‐6‐nitroquinoline‐3‐carbonitrile derivatives has been designed, synthetized and evaluated for anticancer properties on the NCI60 panel. Strong antiproliferative effects have been detected against renal cancer cells.
Gabriele La Monica   +4 more
wiley   +1 more source

The method of intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement

open access: yesIET Networks, EarlyView., 2022
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley   +1 more source

UKCropDiversity‐HPC: A collaborative high‐performance computing resource approach for sustainable agriculture and biodiversity conservation

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Diverse gene pools are fundamental to crop improvement, biodiversity maintenance and environmental management. The UKCropDiversity‐HPC high‐performance computing resource enables seven UK institutes to perform plant and conservation research with increased efficiency, cost‐effectiveness and environmental sustainability.
Lawrence Percival‐Alwyn   +13 more
wiley   +1 more source

Big Data Technology Fusion Back Propagation Neural Network in Product Innovation Design Method

open access: yesIET Networks, Accepted Article., 2022
This research uses big data technology to combine the process of product innovation design method, which has certain significance for the formation of intelligent and systematic product innovation design method. Meanwhile, while predicting the results of all products innovative design methods, it can improve the product's predictive innovative design ...
Ren Li, Qiang Zeng
wiley   +1 more source

Home - About - Disclaimer - Privacy