Results 11 to 20 of about 1,098,399 (202)

A Method of Intrusion Detection Based on WOA-XGBoost Algorithm

open access: yesDiscrete Dynamics in Nature and Society, 2022
With the development of information technology, computer networks have become a part of people’s lives and work. However, computer viruses and malicious network attacks make network security face huge challenges, and more accurate detection of attacks ...
Yan Song, Haowei Li, Panfeng Xu, Dan Liu
doaj   +1 more source

Evaluation of Medical Level in China by Provinces Based on Principal Component Analysis and TOPSIS Model [PDF]

open access: yesZhongguo quanke yixue, 2023
Background During the nationwide epidemic of COVID-19 infection, the spatial agglomeration of medical resources in China has been highlighted, and there are obvious differences in medical level among provinces.
ZHOU Jie, HU Lingjuan, HUAI Qingyu
doaj   +1 more source

Treatment planning with a 2.5 MV photon beam for radiation therapy

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract Purpose The shallow depth of maximum dose and higher dose fall‐off gradient of a 2.5 MV beam along the central axis that is available for imaging on linear accelerators is investigated for treatment of shallow tumors and sparing the organs at risk (OARs) beyond it.
Navid Khaledi   +5 more
wiley   +1 more source

Evaluation of patient doses for routine digital radiography procedures toward establishing an institutional diagnostic reference levels: A case study in Sri Lanka

open access: yesJournal of Applied Clinical Medical Physics, Volume 23, Issue 12, December 2022., 2022
Abstract The present study was conducted as part of a comprehensive work to establish National Diagnostic Reference Levels (NDRLs) in Sri Lanka for the first time. DRLs can be used as an effective optimization tool for identifying unusually high or low patient doses during X‐ray examinations.
Sachith Welarathna   +3 more
wiley   +1 more source

Self-Powered Intelligent Human-Machine Interaction for Handwriting Recognition

open access: yesResearch, 2021
Handwritten signatures widely exist in our daily lives. The main challenge of signal recognition on handwriting is in the development of approaches to obtain information effectively.
Hang Guo   +7 more
doaj   +1 more source

Electromagnetic Security Vulnerabilities and Instruction Disassembly of Controller in Adaptive Controllers [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2021
A controller in adaptive control theory is a critical part in mission critical applications in military and computer-controlled systems. An ability to identify and follow the binary instruction execution in the controller part enables fault ...
Varghese Mathew Vaidyan, Akhilesh Tyagi
doaj  

Objective definition of rosette shape variation using a combined computer vision and data mining approach. [PDF]

open access: yesPLoS ONE, 2014
Computer-vision based measurements of phenotypic variation have implications for crop improvement and food security because they are intrinsically objective. It should be possible therefore to use such approaches to select robust genotypes.
Anyela Camargo   +5 more
doaj   +1 more source

Behavior authentication of Web users based on machine learning

open access: yes网络与信息安全学报, 2018
According to the security problem of Web user information,the user behavior was analyzed and authenticated by the method of machine learning.First of all,through the principal component analysis to reduce the dimension of the original data set,then use ...
Zenan WU, Liqin TIAN, Zhigang WANG
doaj   +3 more sources

Network intrusion detection method based on matrix factorization of their time and frequency representations

open access: yesETRI Journal, 2020
In the last few years, detection has become a powerful methodology for network protection and security. This paper presents a new detection scheme for data recorded over a computer network.
Spiros Chountasis   +2 more
doaj   +1 more source

Secure Multiparty Computation of Principal Component Analysis

open access: yesJournal of KIISE, 2015
In recent years, many research efforts have been made on privacy-preserving data mining (PPDM) in data of large volume. In this paper, we propose a PPDM solution based on principal component analysis (PCA), which can be widely used in computing correlation among sensitive data sets.
Myeong-Seon Gil   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy