期刊文献+
共找到210,955篇文章
< 1 2 250 >
每页显示 20 50 100
PAD Class教学模式对英语专业学生写作焦虑影响的实证研究
1
作者 王颖 《外国语文》 北大核心 2024年第2期197-206,共10页
本研究以英语专业大一120名学生为实验对象,进行了为期16周的实证研究,以探讨PAD class教学模式对英语专业学生写作焦虑的影响。基于《二语写作焦虑量表》调查问卷结果表明:英语专业学生总体焦虑处于中等焦虑水平,PAD Class能有效降低... 本研究以英语专业大一120名学生为实验对象,进行了为期16周的实证研究,以探讨PAD class教学模式对英语专业学生写作焦虑的影响。基于《二语写作焦虑量表》调查问卷结果表明:英语专业学生总体焦虑处于中等焦虑水平,PAD Class能有效降低学生的写作总体焦虑,其中课堂焦虑、构思焦虑、自信焦虑明显降低,但回避焦虑没有达到显著水平;PAD Class模式对高中低不同写作水平学生的写作焦虑都有影响,对中、低水平学生的写作焦虑缓解比对高水平学生的影响效果更明显。 展开更多
关键词 PAD class 英语专业写作 写作焦虑 实证研究
下载PDF
A kind of signature scheme based on class groups of quadratic fields 被引量:1
2
作者 董晓蕾 曹珍富 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第6期583-587,共5页
Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic ... Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds. 展开更多
关键词 quadratic-field cryptosystem digital signature ideal class groups discrete logarithm problem
下载PDF
Hybrid treatment of varied orthodontic appliances for a patient with skeletal class II and temporomandibular joint disorders:A case report and review of literature 被引量:1
3
作者 Tong Lu Li Mei +2 位作者 Bao-Chao Li Zi-Wei Huang Huang Li 《World Journal of Clinical Cases》 SCIE 2024年第2期431-442,共12页
BACKGROUND The relation between orthodontic treatment and temporomandibular disorders(TMDs)is under debate;the management of TMD during orthodontic treatment has always been a challenge.If TMD symptoms occur during or... BACKGROUND The relation between orthodontic treatment and temporomandibular disorders(TMDs)is under debate;the management of TMD during orthodontic treatment has always been a challenge.If TMD symptoms occur during orthodontic treatment,an immediate pause of orthodontic adjustments is recommended;the treatment can resume when the symptoms are managed and stabilized.CASE SUMMARY This case report presents a patient(26-year-old,female)with angle class I,skeletal class II and TMDs.The treatment was a hybrid of clear aligners,fixed appliances and temporary anchorage devices(TADs).After 3 mo resting and treatment on her TMD,the patient’s TMD symptom alleviated,but her anterior occlusion displayed deep overbite.Therefore,the fixed appliances with TAD were used to correct the anterior deep-bite and level maxillary and mandibular deep curves.After the levelling,the patient showed dual bite with centric relation and maximum intercuspation discrepancy on her occlusion.After careful examination of temporomandibular joints(TMJ)position,the stable bite splint and Invisible Mandibular Advancement appliance were used to reconstruct her occlusion.Eventually,the improved facial appearance and relatively stable occlusion were achieved.The 1-year follow-up records showed there was no obvious change in TMJ morphology,and her occlusion was stable.CONCLUSION TMD screening and monitoring is of great clinical importance in the TMD susceptible patients.Hybrid treatment with clear aligners and fixed appliances and TADs is an effective treatment modality for the complex cases. 展开更多
关键词 Temporomandibular disorder Skeletal class II Deep overbite Dual bite Invisible mandibular advancement appliance Case report
下载PDF
Periodic Signature Change in Spacetimes of Embedding Class One
4
作者 Peter K. F. Kuhfittig 《International Journal of Astronomy and Astrophysics》 2022年第2期167-176,共10页
The idea of an oscillating Universe has remained a topic of interest even after the discovery of dark energy. This paper confirms this idea by means of another well-established theory in general relativity, the embedd... The idea of an oscillating Universe has remained a topic of interest even after the discovery of dark energy. This paper confirms this idea by means of another well-established theory in general relativity, the embedding of curved spacetimes in higher-dimensional flat spacetimes: an n-dimensional Riemannian space is said to be of embedding class m if m +n is the lowest dimension of the flat space in which the given space can be embedded;here . So a four-dimensional Riemannian space is of class two and can therefore be embedded in a six-dimensional flat space. A line element of class two can be reduced to a line element of class one by a suitable coordinate transformation. The extra dimension can be either spacelike or timelike, leading to accelerating and decelerating expansions, respectively. Accordingly, it is proposed in this paper that the free parameter occurring in the transformation be a periodic function of time. The result is a mathematical model that can be interpreted as a periodic change in the signature of the embedding space. This signature change may be the best model for an oscillating Universe and complements various models proposed in the literature. 展开更多
关键词 Signature Change Oscillating Universe Embedding class One
下载PDF
Class Imbalanced Problem:Taxonomy,Open Challenges,Applications and State-of-the-Art Solutions
5
作者 Khursheed Ahmad Bhat Shabir Ahmad Sofi 《China Communications》 SCIE CSCD 2024年第11期216-242,共27页
The study of machine learning has revealed that it can unleash new applications in a variety of disciplines.Many limitations limit their expressiveness,and researchers are working to overcome them to fully exploit the... The study of machine learning has revealed that it can unleash new applications in a variety of disciplines.Many limitations limit their expressiveness,and researchers are working to overcome them to fully exploit the power of data-driven machine learning(ML)and deep learning(DL)techniques.The data imbalance presents major hurdles for classification and prediction problems in machine learning,restricting data analytics and acquiring relevant insights in practically all real-world research domains.In visual learning,network information security,failure prediction,digital marketing,healthcare,and a variety of other domains,raw data suffers from a biased data distribution of one class over the other.This article aims to present a taxonomy of the approaches for handling imbalanced data problems and their comparative study on the classification metrics and their application areas.We have explored very recent trends of techniques employed for solutions to class imbalance problems in datasets and have also discussed their limitations.This article has also identified open challenges for further research in the direction of class data imbalance. 展开更多
关键词 class imbalance classification deep learning GANs sampling
下载PDF
BLS-identification:A device fingerprint classification mechanism based on broad learning for Internet of Things
6
作者 Yu Zhang Bei Gong Qian Wang 《Digital Communications and Networks》 SCIE CSCD 2024年第3期728-739,共12页
The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprin... The popularity of the Internet of Things(IoT)has enabled a large number of vulnerable devices to connect to the Internet,bringing huge security risks.As a network-level security authentication method,device fingerprint based on machine learning has attracted considerable attention because it can detect vulnerable devices in complex and heterogeneous access phases.However,flexible and diversified IoT devices with limited resources increase dif-ficulty of the device fingerprint authentication method executed in IoT,because it needs to retrain the model network to deal with incremental features or types.To address this problem,a device fingerprinting mechanism based on a Broad Learning System(BLS)is proposed in this paper.The mechanism firstly characterizes IoT devices by traffic analysis based on the identifiable differences of the traffic data of IoT devices,and extracts feature parameters of the traffic packets.A hierarchical hybrid sampling method is designed at the preprocessing phase to improve the imbalanced data distribution and reconstruct the fingerprint dataset.The complexity of the dataset is reduced using Principal Component Analysis(PCA)and the device type is identified by training weights using BLS.The experimental results show that the proposed method can achieve state-of-the-art accuracy and spend less training time than other existing methods. 展开更多
关键词 Device fingerprint Traffic analysis class imbalance Broad learning system Access authentication
下载PDF
Literature classification and its applications in condensed matter physics and materials science by natural language processing
7
作者 吴思远 朱天念 +5 位作者 涂思佳 肖睿娟 袁洁 吴泉生 李泓 翁红明 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期117-123,共7页
The exponential growth of literature is constraining researchers’access to comprehensive information in related fields.While natural language processing(NLP)may offer an effective solution to literature classificatio... The exponential growth of literature is constraining researchers’access to comprehensive information in related fields.While natural language processing(NLP)may offer an effective solution to literature classification,it remains hindered by the lack of labelled dataset.In this article,we introduce a novel method for generating literature classification models through semi-supervised learning,which can generate labelled dataset iteratively with limited human input.We apply this method to train NLP models for classifying literatures related to several research directions,i.e.,battery,superconductor,topological material,and artificial intelligence(AI)in materials science.The trained NLP‘battery’model applied on a larger dataset different from the training and testing dataset can achieve F1 score of 0.738,which indicates the accuracy and reliability of this scheme.Furthermore,our approach demonstrates that even with insufficient data,the not-well-trained model in the first few cycles can identify the relationships among different research fields and facilitate the discovery and understanding of interdisciplinary directions. 展开更多
关键词 natural language processing text mining materials science
下载PDF
博士后对学术职业环境满意吗?——基于Nature全球博士后调查数据比较分析
8
作者 朱华伟 《高教探索》 CSSCI 北大核心 2024年第4期81-91,共11页
本研究基于已有成果,将博士后学术职业环境划分为学术资源、职业保障、组织管理、科研强度四个维度。利用2020年Nature全球博士后教育调查数据,通过比较分析博士后对学术职业环境的感知与评价。研究发现,相比较国外发达国家博士后而言,... 本研究基于已有成果,将博士后学术职业环境划分为学术资源、职业保障、组织管理、科研强度四个维度。利用2020年Nature全球博士后教育调查数据,通过比较分析博士后对学术职业环境的感知与评价。研究发现,相比较国外发达国家博士后而言,我国接近四成博士后对学术职业环境感到满意。为了优化博士后学术职业环境,大学需强化对博士后科研资金的支持力度,保障博士后科研参与机会,减少非学术事务对博士后科研时间的挤占,规范导师指导;大学不断调适大学基层学术组织治理模式,优化院系对博士后学术职业发展的组织支持与服务质量;大学与博士后建立稳定性雇佣关系,不断提升工资薪酬水平,疏通博士后学术职业晋升渠道,营造良好的工作环境;高校实行服务型、便捷式的科研管理方式,制定灵活多元的学术评价机制,破除博士后对“学术GDP主义”的崇拜。 展开更多
关键词 博士后 学术职业环境 满意度 nature 比较
下载PDF
Extensive numerical simulations on competitive growth between the Edwards–Wilkinson and Kardar–Parisi–Zhang universality classes
9
作者 余成志 刘潇 +1 位作者 唐军 夏辉 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期298-307,共10页
Extensive numerical simulations and scaling analysis are performed to investigate competitive growth between the linear and nonlinear stochastic dynamic growth systems, which belong to the Edwards–Wilkinson(EW) and K... Extensive numerical simulations and scaling analysis are performed to investigate competitive growth between the linear and nonlinear stochastic dynamic growth systems, which belong to the Edwards–Wilkinson(EW) and Kardar–Parisi–Zhang(KPZ) universality classes, respectively. The linear growth systems include the EW equation and the model of random deposition with surface relaxation(RDSR), the nonlinear growth systems involve the KPZ equation and typical discrete models including ballistic deposition(BD), etching, and restricted solid on solid(RSOS). The scaling exponents are obtained in both the(1 + 1)-and(2 + 1)-dimensional competitive growth with the nonlinear growth probability p and the linear proportion 1-p. Our results show that, when p changes from 0 to 1, there exist non-trivial crossover effects from EW to KPZ universality classes based on different competitive growth rules. Furthermore, the growth rate and the porosity are also estimated within various linear and nonlinear growths of cooperation and competition. 展开更多
关键词 competitive growth scaling behavior discrete growth model Kardar–Parisi–Zhang universality class
下载PDF
基于“CLASS”的课堂师生互动研究——以数学特级教师吴正宪为例
10
作者 王妍 《现代中小学教育》 2024年第11期75-81,共7页
为考查我国目前小学课堂教学中的师生互动状况,本研究以“课堂师生互动质量评估系统(CLASS)”为研究工具,以小学数学特级教师吴正宪在其公开课中与学生互动表现作为研究对象。结合数据分析和课堂观察笔记,研究发现高质量的课堂师生互动... 为考查我国目前小学课堂教学中的师生互动状况,本研究以“课堂师生互动质量评估系统(CLASS)”为研究工具,以小学数学特级教师吴正宪在其公开课中与学生互动表现作为研究对象。结合数据分析和课堂观察笔记,研究发现高质量的课堂师生互动水平具有六个特点:积极的学习氛围、敏感地关注学生、明晰的行为规则、高效的课堂安排、启发式的教学引导和鼓励式的语言反馈。这些鲜明的特点和经验可以为其他教师提高与学生的互动质量提供努力的方向。 展开更多
关键词 class 课堂师生互动 特级教师 吴正宪
下载PDF
World Class Elite Breaststrokers Downward Kick EMG Muscle Activity of the Gluteus Maximus, Quadriceps Femoris, Hamstring, Gastrocnemius Medialis, Rectus Abdominal, and Erector Spinae
11
作者 Takahisa Ide William F.Johnson +10 位作者 Sadafumi Takise Noriko Inada Hiromasa Fujimori Takeharu Fujimori Emi Moronuki Ai Soma Kazuki Watanabe Asahi Nagahata Iryna Glavnyk Mark Nikolaev Bogdan Plavin 《Psychology Research》 2024年第2期64-69,共6页
This study analyzed the difference between using a downward breaststroke kick and a horizontal breaststroke kick in a sample of world class elite swimmers.We compared average muscle activity of the gluteus maximus,qua... This study analyzed the difference between using a downward breaststroke kick and a horizontal breaststroke kick in a sample of world class elite swimmers.We compared average muscle activity of the gluteus maximus,quadriceps femoris(vastus medialis and rectus femoris),hamstring/long head of the biceps femoris,gastrocnemius medialis,rectus abdominal,and erector spinae when using the downward breaststroke kick technique.We find that when this sample of swimmers utilized the downward breaststroke kick,max speed and velocity per stroke increased,measured by 12,788 EMG samples,where the results are highly correlated to duration of the aerodynamic buoyant force in breaststroke kick technique.The increases in performance observed from measuring the world class elite swimmers is highly correlated to the duration of the kick aerodynamic buoyant force.Among this sample of elite swimmers,the longer a swimmer demonstrates a buoyant force breaststroke kick,the lower the time in a 100 breaststroke. 展开更多
关键词 swimming breaststroke downward kick EMG imagination world class elite swimmers
下载PDF
Simple and effective method for treating severe adult skeletal class II malocclusion: A case report
12
作者 Li-Li Xie Dan-Yang Chu Xiao-Feng Wu 《World Journal of Orthopedics》 2024年第10期965-972,共8页
BACKGROUND Severe skeletal class II malocclusion is the indication for combined orthodontic and orthognathic treatment.CASE SUMMARY A woman with a chief complaint of a protruding chin and an inability to close her lip... BACKGROUND Severe skeletal class II malocclusion is the indication for combined orthodontic and orthognathic treatment.CASE SUMMARY A woman with a chief complaint of a protruding chin and an inability to close her lips requested orthodontic camouflage.The treatment plan consisted of extracting the right upper third molar,right lower third molar,left lower second molar,and left upper third molar and moving the maxillary dentition distally using a convenient method involving microimplant nail anchors,push springs,long arm traction hooks,and elastic traction chains.After 52 months of treatment,her overbite and overjet were normal,and her facial profile was favorable.CONCLUSION This method can be used for distal movement of the maxillary dentition and to correct severe skeletal class II malocclusion in adults. 展开更多
关键词 Skeletal class II malocclusion Maxillary dentition Microimplant nail Simple and effective method Case report
下载PDF
Research and Practice of Flipped Classroom Teaching Mode of Integrated Business English Course Under MOOC Environment
13
作者 HU Lijun SONG Chengwen 《Sino-US English Teaching》 2024年第9期411-418,共8页
As an online course-teaching mode,Massive Open Online Course(MOOC)has drawn great attention from both teachers and students.It is necessary to give full play to the advantages of MOOC resources and to enhance teachers... As an online course-teaching mode,Massive Open Online Course(MOOC)has drawn great attention from both teachers and students.It is necessary to give full play to the advantages of MOOC resources and to enhance teachers’consciousness of“identity remodeling”in the process of Integrated Business English flipping classroom teaching.Combining the advantages of MOOC and flipped classroom teaching during before-,during-,and after-class will greatly help promote the overall quality of business English teaching in universities. 展开更多
关键词 MOOC Integrated Business English flipped class
下载PDF
Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
14
作者 Mohammed Abdalsalam Chunlin Li +1 位作者 Abdelghani Dahou Natalia Kryvinska 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1427-1467,共41页
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli... One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier. 展开更多
关键词 Artificial intelligence machine learning natural language processing data analytic DistilBERT feature extraction terrorism classification GTD dataset
下载PDF
The Alienation of Nature in Emily Dickinson’s Poems through the Prism of Taoism
15
作者 LI Dong-qing 《Journal of Literature and Art Studies》 2024年第3期186-193,共8页
In the poems created by the renowned American poet Emily Dickinson,those related to nature constitute a considerable proportion.However,Dickinson’s attitude toward nature is,in fact,contradictory.On the one hand,Dick... In the poems created by the renowned American poet Emily Dickinson,those related to nature constitute a considerable proportion.However,Dickinson’s attitude toward nature is,in fact,contradictory.On the one hand,Dickinson perceives nature as gentle and kind,akin to a mother.Nature is regarded as“heaven”and embodies harmony.On the other hand,nature possesses its own operational principles and harbors inherent cruelty.According to Dickinson,humans should refrain from excessive interference in the natural order.This article attempts to analyze the similarities in attitude towards nature between Dickinson’s poetry and Taoist philosophy. 展开更多
关键词 Emily Dickinson ALIENATION nature TAOISM
下载PDF
Thin-Shell Wormholes Admitting Conformal Motions in Spacetimes of Embedding Class One
16
作者 Peter K. F. Kuhfittig 《International Journal of Astronomy and Astrophysics》 2024年第3期162-171,共10页
This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while ... This paper discusses the feasibility of thin-shell wormholes in spacetimes of embedding class one admitting a one-parameter group of conformal motions. It is shown that the surface energy density σis positive, while the surface pressure is negative, resulting in , thereby signaling a violation of the null energy condition, a necessary condition for holding a wormhole open. For a Morris-Thorne wormhole, matter that violates the null energy condition is referred to as “exotic”. For the thin-shell wormholes in this paper, however, the violation has a physical explanation since it is a direct consequence of the embedding theory in conjunction with the assumption of conformal symmetry. These properties avoid the need to hypothesize the existence of the highly problematical exotic matter. 展开更多
关键词 Thin-Shell Wormholes Conformal Symmetry Embedding class One Exotic Matter
下载PDF
幼儿园自然探究活动中师幼互动的提升策略——基于CLASS评估调研分析
17
作者 牛娜娜 《教育导刊》 2024年第9期81-88,共8页
自然探究活动在培养幼儿实践能力与创造力方面具有显著优势,而活动中的师幼互动是保障活动质量的关键。使用CLASS评估系统,对广州市南沙区两所公办幼儿园教师在自然探究活动中的师幼互动情况展开实证调研的结果显示,教师在情感支持方面... 自然探究活动在培养幼儿实践能力与创造力方面具有显著优势,而活动中的师幼互动是保障活动质量的关键。使用CLASS评估系统,对广州市南沙区两所公办幼儿园教师在自然探究活动中的师幼互动情况展开实证调研的结果显示,教师在情感支持方面表现出积极态度,但在教育支持,尤其是促进幼儿概念发展和语言示范方面仍有待加强。其原因在于,教师科学素养较低,科学领域核心经验匮乏;教师组织管理能力存在短板,亟需深化有效教学策略;情感支持得分虚高,教师敏感性差异明显。基于此,需要加强专业培训,优化探究体验;提升师幼互动知识技能,补齐活动组织短板;优化情感支持策略,提升教师敏感性。 展开更多
关键词 自然探究活动 师幼互动 class评估系统
下载PDF
Problems and Development Suggestions of Nature Education in Jiangxi Province
18
作者 Hua LI Shinan XIANG Feiping CHEN 《Meteorological and Environmental Research》 2024年第1期46-47,56,共3页
The forest coverage rate of Jiangxi Province ranks second in China.It has rich natural resources,a long history of ancient color culture and rich red culture.In the development of nature education,Jiangxi Province has... The forest coverage rate of Jiangxi Province ranks second in China.It has rich natural resources,a long history of ancient color culture and rich red culture.In the development of nature education,Jiangxi Province has great potential and advantages.This paper introduces the development conditions of nature education in Jiangxi Province,summarizes the problems existing in the development of nature education in Jiangxi Province from the aspects of the types of nature education and the construction of nature education base,such as simple content and single form,imperfect infrastructure and lack of professionals,and puts forward some suggestions on the development of nature education in Jiangxi Province. 展开更多
关键词 Jiangxi Province nature education PROBLEM Development suggestion
下载PDF
The Macrolichens of Barluk Mountain National Nature Reserve, Xinjiang Province, China
19
作者 Dolathan Toksun Reyhangul Mamatali +3 位作者 Haiying Yong David H. S. Richardson Mark R. D. Seaward Anwar Tumur 《Open Journal of Forestry》 2024年第4期413-432,共20页
A checklist of the macrolichens (foliose, fruticose & squamulose) of Barluk Mountain National Nature Reserve located in northwestern China is presented. It was derived from 47 inventories of preserved and undevelo... A checklist of the macrolichens (foliose, fruticose & squamulose) of Barluk Mountain National Nature Reserve located in northwestern China is presented. It was derived from 47 inventories of preserved and undeveloped areas which yielded more than 670 collections containing 102 taxa (99 species, 1 subspecies, 2 varieties). Eight species were found that were new to Xinjiang, China. Twenty-eight species and 2 varieties were found on rock, 31 species on bark of deciduous and coniferous trees, 26 species on soil and 14 species and 1 subspecies over mosses. Foliose lichens were dominant with 76 species, followed by 16 species of squamulose lichens and 7 species of fruticose lichens. 展开更多
关键词 BIODIVERSITY Mountain Ecosystems Monitoring Climate Change nature Conservation
下载PDF
Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security
20
作者 Chirag Ganguli Shishir Kumar Shandilya +1 位作者 Michal Gregus Oleh Basystiuk 《Computer Systems Science & Engineering》 2024年第3期739-758,共20页
Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algori... Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses. 展开更多
关键词 Artificial bee colonization adaptive defense cyber attack nature inspired cyber security cyber security cyber physical infrastructure
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部