Quantcast
Channel: Latest Results
Browsing all 1172 articles
Browse latest View live

A new container scheduling algorithm based on multi-objective optimization

AbstractDocker container has been used in cloud computing at a rapid rate in the past 2 years, and Docker container resource scheduling problem has gradually become a research hot issue. It is...

View Article


CircRNA circRNA_102171 promotes papillary thyroid cancer progression through...

AbstractBackgroundAs a type of recently discovered noncoding RNA, circular RNAs (circRNAs) exert pivot biological functions in diverse cancers. However, the role of circRNA_102171 in papillary thyroid...

View Article


Screening of a beta-cypermethrin-degrading bacterial strain Brevibacillus...

AbstractA novel beta-cypermethrin (Beta-CP)-degrading strain isolated from activated sludge was identified as Brevibacillus parabrevis BCP-09 based on its morphological and physio-biochemical...

View Article

Comparative Study and Numerical Analysis

AbstractThis chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along...

View Article

Identifying Propagation Source in Large-Scale Networks

AbstractThe global diffusion of epidemics, rumors and computer viruses causes great damage to our society. It is critical to identify the diffusion sources and promptly quarantine them. However, one...

View Article


Identifying Propagation Source in Time-Varying Networks

AbstractIdentifying the propagation sources of malicious attacks in complex networks plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However,...

View Article

User Influence in the Propagation of Malicious Attacks

AbstractNetworks portray a multitude of interactions through which people meet, ideas are spread, and infectious diseases and malicious rumors propagate within a society. Recently, researchers have...

View Article

Identifying Multiple Propagation Sources

AbstractThe global diffusion of epidemics, computer viruses and rumors causes great damage to our society. One critical issue to identify the multiple diffusion sources so as to timely quarantine them....

View Article


Restrain Malicious Attack Propagation

AbstractRestraining the propagation of malicious attacks in complex networks has long been an important but difficult problem to be addressed. In this chapter, we particularly use rumor propagation as...

View Article


Source Identification Under Snapshots: A Sample Path Based Source Estimator

AbstractIn this chapter, we introduce a propagation source estimator under snapshot observations: a sample path based source estimator (Jordan Center). According to Chap. 5, a snapshot provides partial...

View Article

Preliminary of Identifying Propagation Sources

AbstractThis chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious...

View Article

Introduction

AbstractWith the remarkable advances in computer technologies, our social, financial and professional existences become increasingly digitized, and governments, healthcare and military infrastructures...

View Article

Future Directions and Conclusion

AbstractWhile previous chapters provide a thorough description on malicious attack propagation and source identification, many interesting and promising issues remain unexplored. The development of...

View Article


Source Identification Under Sensor Observations: A Gaussian Source Estimator

AbstractIn this chapter, we introduce a propagation source estimator under sensor observations: Gaussian source estimator. According to Chap. 5, sensors are firstly injected into networks, and then the...

View Article

Source Identification Under Complete Observations: A Maximum Likelihood (ML)...

AbstractIn this chapter, we introduce a propagation source estimator under complete observations: a maximum likelihood source estimator (Rumor Center). According to Chap. 5, a complete observation...

View Article


Preliminary of Modeling Malicious Attack Propagation

AbstractGraphs are usually used to represent networks in different fields such as computer science, biology, and sociology.

View Article

Preparation and performance evaluation of organophilic nano-montmorillonite...

AbstractNano-montmorillonite (nano-MMT) plastic polymer electrolyte membrane was prepared by solution casting method. Organophilic modification of nano-MMT (OMMT) was used as the channels for Li+...

View Article


Joint Visual-Textual Sentiment Analysis Based on Cross-Modality Attention...

AbstractRecently, many researchers have focused on the joint visual-textual sentiment analysis since it can better extract user sentiments toward events or topics. In this paper, we propose that visual...

View Article

The Association Rules Algorithm Based on Clustering in Mining Research in...

Abstract With the popularization of agricultural information technology, the use of data mining techniques to analyze the impact of different types of soil nutrient content and yield of corn has become...

View Article

Analysis of electro-optical intensity modulator for bunch arrival-time...

AbstractA bunch arrival-time monitor (BAM) based on an electro-optical intensity modulation scheme is currently under development at Shanghai Soft X-ray Free-Electron Laser to meet the high-resolution...

View Article
Browsing all 1172 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>