A new container scheduling algorithm based on multi-objective optimization
AbstractDocker container has been used in cloud computing at a rapid rate in the past 2 years, and Docker container resource scheduling problem has gradually become a research hot issue. It is...
View ArticleCircRNA circRNA_102171 promotes papillary thyroid cancer progression through...
AbstractBackgroundAs a type of recently discovered noncoding RNA, circular RNAs (circRNAs) exert pivot biological functions in diverse cancers. However, the role of circRNA_102171 in papillary thyroid...
View ArticleScreening of a beta-cypermethrin-degrading bacterial strain Brevibacillus...
AbstractA novel beta-cypermethrin (Beta-CP)-degrading strain isolated from activated sludge was identified as Brevibacillus parabrevis BCP-09 based on its morphological and physio-biochemical...
View ArticleComparative Study and Numerical Analysis
AbstractThis chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along...
View ArticleIdentifying Propagation Source in Large-Scale Networks
AbstractThe global diffusion of epidemics, rumors and computer viruses causes great damage to our society. It is critical to identify the diffusion sources and promptly quarantine them. However, one...
View ArticleIdentifying Propagation Source in Time-Varying Networks
AbstractIdentifying the propagation sources of malicious attacks in complex networks plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However,...
View ArticleUser Influence in the Propagation of Malicious Attacks
AbstractNetworks portray a multitude of interactions through which people meet, ideas are spread, and infectious diseases and malicious rumors propagate within a society. Recently, researchers have...
View ArticleIdentifying Multiple Propagation Sources
AbstractThe global diffusion of epidemics, computer viruses and rumors causes great damage to our society. One critical issue to identify the multiple diffusion sources so as to timely quarantine them....
View ArticleRestrain Malicious Attack Propagation
AbstractRestraining the propagation of malicious attacks in complex networks has long been an important but difficult problem to be addressed. In this chapter, we particularly use rumor propagation as...
View ArticleSource Identification Under Snapshots: A Sample Path Based Source Estimator
AbstractIn this chapter, we introduce a propagation source estimator under snapshot observations: a sample path based source estimator (Jordan Center). According to Chap. 5, a snapshot provides partial...
View ArticlePreliminary of Identifying Propagation Sources
AbstractThis chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious...
View ArticleIntroduction
AbstractWith the remarkable advances in computer technologies, our social, financial and professional existences become increasingly digitized, and governments, healthcare and military infrastructures...
View ArticleFuture Directions and Conclusion
AbstractWhile previous chapters provide a thorough description on malicious attack propagation and source identification, many interesting and promising issues remain unexplored. The development of...
View ArticleSource Identification Under Sensor Observations: A Gaussian Source Estimator
AbstractIn this chapter, we introduce a propagation source estimator under sensor observations: Gaussian source estimator. According to Chap. 5, sensors are firstly injected into networks, and then the...
View ArticleSource Identification Under Complete Observations: A Maximum Likelihood (ML)...
AbstractIn this chapter, we introduce a propagation source estimator under complete observations: a maximum likelihood source estimator (Rumor Center). According to Chap. 5, a complete observation...
View ArticlePreliminary of Modeling Malicious Attack Propagation
AbstractGraphs are usually used to represent networks in different fields such as computer science, biology, and sociology.
View ArticlePreparation and performance evaluation of organophilic nano-montmorillonite...
AbstractNano-montmorillonite (nano-MMT) plastic polymer electrolyte membrane was prepared by solution casting method. Organophilic modification of nano-MMT (OMMT) was used as the channels for Li+...
View ArticleJoint Visual-Textual Sentiment Analysis Based on Cross-Modality Attention...
AbstractRecently, many researchers have focused on the joint visual-textual sentiment analysis since it can better extract user sentiments toward events or topics. In this paper, we propose that visual...
View ArticleThe Association Rules Algorithm Based on Clustering in Mining Research in...
Abstract With the popularization of agricultural information technology, the use of data mining techniques to analyze the impact of different types of soil nutrient content and yield of corn has become...
View ArticleAnalysis of electro-optical intensity modulator for bunch arrival-time...
AbstractA bunch arrival-time monitor (BAM) based on an electro-optical intensity modulation scheme is currently under development at Shanghai Soft X-ray Free-Electron Laser to meet the high-resolution...
View Article