期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Corpus-Based Behavioral Profile Study of the Near-Synonyms: Serious, Severe, Grave, Grievous
1
作者 Qi Chen 《Journal of Contemporary Educational Research》 2024年第3期60-68,共9页
Using Corpus of Contemporary American English as the source data,this paper carries out a corpus-based behavioral profile study to investigate four near-synonymous adjectives(serious,severe,grave,and grievous),focusin... Using Corpus of Contemporary American English as the source data,this paper carries out a corpus-based behavioral profile study to investigate four near-synonymous adjectives(serious,severe,grave,and grievous),focusing on their register and the types of nouns they each modify.Although sharing core meaning,these adjectives exhibit variations in formality levels and usage patterns.The identification of fine-grained usage differences complements the current inadequacies in describing these adjectives.Furthermore,the study reaffirms the effectiveness of the corpus-based behavioral profile approach in examining synonym differences. 展开更多
关键词 CORPUS behavioral profile Near-synonym Corpus of Contemporary American English(COCA)
下载PDF
The Study of Fueling Method and Particle Confinement Improvement
2
作者 ZHOU Yan DENG Zhongchao YAO Lianghua XIAO Zhenggui DING Xuantong LIU Yong WANG Enyao 《Southwestern Institute of Physics Annual Report》 2004年第1期14-16,共3页
Several high performance tokamak operation regimes have been achieved experimentally in the experiments with the peaked density profiles. The regimes include the improved Ohmic confinement in ASDEX, the pellet enhance... Several high performance tokamak operation regimes have been achieved experimentally in the experiments with the peaked density profiles. The regimes include the improved Ohmic confinement in ASDEX, the pellet enhanced performance mode in Alcator-C, and the super-shot mode in TFTR. In these regimes, peaked core density profiles are always existent, and almost always go with the internal transport barriers, these barriers generally produced by sheared radial electric field. In addition to enhance confinement, the peaked density profile is also needed for the optimized fusion reaction rate and alpha heating power in tokamak plasma, and combined peaked density profile and peaked temperature profile, would make the ignition condition easy obtained. It is desirable to seek and analyze the density profile control schemes that effectively lead to density profile peaking in particle transports experimental investigation. 展开更多
关键词 Particle confinement Density profile behavior Fueling method
下载PDF
A Novel Approach for Android Malware Detection Based on Intelligent Computing
3
作者 Manh Vu Minh Cho Do Xuan 《Computers, Materials & Continua》 SCIE EI 2024年第12期4371-4396,共26页
Detecting malware on mobile devices using the Android operating system has become a critical challenge in the field of cybersecurity,in the context of the rapid increase in the number of malware variants and the frequ... Detecting malware on mobile devices using the Android operating system has become a critical challenge in the field of cybersecurity,in the context of the rapid increase in the number of malware variants and the frequency of attacks targeting Android devices.In this paper,we propose a novel intelligent computational method to enhance the effectiveness of Android malware detection models.The proposed method combines two main techniques:(1)constructing a malware behavior profile and(2)extracting features from the malware behavior profile using graph neural networks.Specifically,to effectively construct an Android malware behavior profile,this paper proposes an information enrichment technique for the function call graph of malware files,based on new graph-structured features and semantic features of the malware’s source code.Additionally,to extract significant features from the constructed behavior profile,the study proposes using the GraphSAGE graph neural network.With this novel intelligent computational method,a variety of significant features of the malware have been effectively represented,synthesized,and extracted.The approach to detecting Android malware proposed in this paper is a new study and has not been explored in previous research.The experimental results on a dataset of 40,819 Android software indicate that the proposed method performs well across all metrics,with particularly impressive accuracy and recall scores of 99.03%and 99.19%,respectively,which outperforms existing state-of-the-art methods. 展开更多
关键词 Android malware detection malware behavior profile function call graph graph neural network graph-structured features semantic features
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部