A Method of Intrusion Detection Based on WOA-XGBoost Algorithm
With the development of information technology, computer networks have become a part of people’s lives and work. However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks ...
Yan Song, Haowei Li, Panfeng Xu, Dan Liu
doaj +1 more source
Evaluation of Medical Level in China by Provinces Based on Principal Component Analysis and TOPSIS Model [PDF]
Background During the nationwide epidemic of COVID-19 infection, the spatial agglomeration of medical resources in China has been highlighted, and there are obvious differences in medical level among provinces.
ZHOU Jie, HU Lingjuan, HUAI Qingyu
doaj +1 more source
PPCA: Privacy-preserving Principal Component Analysis Using Secure Multiparty Computation(MPC)
Privacy-preserving data mining has become an important topic. People have built several multi-party-computation (MPC)-based frameworks to provide theoretically guaranteed privacy, the poor performance of real-world algorithms have always been a challenge.
Fan, Xiaoyu+4 more
openaire +2 more sources
Self-Powered Intelligent Human-Machine Interaction for Handwriting Recognition
Handwritten signatures widely exist in our daily lives. The main challenge of signal recognition on handwriting is in the development of approaches to obtain information effectively.
Hang Guo+7 more
doaj +1 more source
An Introductory Tutorial on Brain–Computer Interfaces and Their Applications
The prospect and potentiality of interfacing minds with machines has long captured human imagination. Recent advances in biomedical engineering, computer science, and neuroscience are making brain–computer interfaces a reality, paving the way to ...
A. Bonci+4 more
semanticscholar +1 more source
Framework-based security measures for Internet of Thing: A literature review
This paper presents a review of state-of-the-art security frameworks for IoT applications. It aims to find out what alternatives have been proposed to guide IoT application developers in the implementation of security measures through all development ...
J. Rueda-Rueda, J. Portocarrero
semanticscholar +1 more source
Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers [PDF]
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault ...
Varghese Mathew Vaidyan, Akhilesh Tyagi
doaj
Objective definition of rosette shape variation using a combined computer vision and data mining approach. [PDF]
Computer-vision based measurements of phenotypic variation have implications for crop improvement and food security because they are intrinsically objective. It should be possible therefore to use such approaches to select robust genotypes.
Anyela Camargo+5 more
doaj +1 more source
Behavior authentication of Web users based on machine learning
According to the security problem of Web user information,the user behavior was analyzed and authenticated by the method of machine learning.First of all,through the principal component analysis to reduce the dimension of the original data set,then use ...
Zenan WU, Liqin TIAN, Zhigang WANG
doaj +3 more sources
In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network.
Spiros Chountasis+2 more
doaj +1 more source