69 Hits in 7.4 sec


Muhammad Ahsan, Arif Khoirul Anam, Erdi Julian, Andi Indra Jaya
Network intrusion is any unauthorized activity on a computer network. Attacks on the network computer system can be devastating and affect networks and company establishments.  ...  The best method for predicting network intrusion is a random forest with a dummy variable that has an Area Under Curve (AUC) value of 92.31% and an accuracy of 90.38%.  ...  ACKNOWLEDGMENT Acknowledgments are addressed to the Institut Teknologi Sepuluh Nopember who has provided support so that this research can be realized properly.  ... 
doi:10.30598/barekengvol16iss1pp057-064 fatcat:o3jpkdthlvalnejr53k734ryzu

Performance Study on Image Encryption Schemes [article]

Jolly Shah, Vikas Saxena
2011 arXiv   pre-print
So speed of this scheme generally varies based on encryption algorithm in use. It is vulnerable to chosen and known plaintext attacks since it is based only on permutations.  ...  The result will be permuted using a permutations matrix, which serves as the encryption key. The permutation step is followed by wavelet reconstruction; this will generate the encrypted image.  ... 
arXiv:1112.0836v1 fatcat:tjpfacnhpnbtnk76cyciyfvqoi

Visinity: Visual Spatial Neighborhood Analysis for Multiplexed Tissue Imaging Data [article]

Simon Warchol, Robert Krueger, Ajit Johnson Nirmal, Giorgio Gaglia, Jared Jessup, Cecily C. Ritch, John Hoffer, Jeremy Muhlich, Megan L. Burger, Tyler Jacks, Sandro Santagata, Peter K. Sorger (+1 others)
2022 bioRxiv   pre-print
Yet, existing analysis approaches focus on investigating small tissue samples on a per-cell basis, not taking into account the spatial proximity of cells, which indicates cell-cell interaction and specific  ...  In two case studies with biomedical experts, we demonstrate that Visinity can identify common biological processes within a human tonsil and uncover novel white-blood networks and immune-tumor interactions  ...  Finally, to test the statistical significance of identified spatial patterns, HistoCAT and ImaCYtE rely on permutation testing.  ... 
doi:10.1101/2022.05.09.490039 fatcat:5feb2z33yrcthlxsgb6bcqadxq

Advanced Butler Matrices With Integrated Bandpass Filter Functions

Vittorio Tornielli di Crestvolant, Petronilo Martin Iglesias, Michael J. Lancaster
2015 IEEE transactions on microwave theory and techniques  
The Butler matrix is the fundamental network to split and recombine the signal in multi-port power amplifiers, however, to suppress spurious frequencies generated by the amplifiers or to provide nearband  ...  The proposed solution has shown significant advantages in terms of size reduction compared to the traditional baseline consisting of a distribution network plus a bank of BPFs.  ...  ACKNOWLEDGMENT The authors wish to thank Fundación Prodintec for the building of the additive manufacturing Butler matrix, the ESA/ESTEC workshop for making the breadboards with milling, and Aurorasat  ... 
doi:10.1109/tmtt.2015.2460739 fatcat:z6pnb5ejkvei7iljdd7ldtotju

Toward the Chōra: Kristeva, Derrida, and Ulmer on Emplaced Invention

Thomas Rickert
2007 Philosophy & Rhetoric  
In rhetoric, the innumerable permutations of the topoi, or commonplaces, can be seen as such a nonbiological construct: the mind utilizes an external symbolic resource to generate and organize rhetorical  ...  One must have a plan, a method for achieving a plan, and a spatial arrangement or layout reflective of the plan; one then works as a rhetorical agent via ideas to achieve effects in the world "out there  ...  In his study of the origins of architecture, Indra McEwen argues that ch?  ... 
doi:10.5325/philrhet.40.3.0251 fatcat:yhbq6ogio5gsld6m2pre23vmxe

Network-Based Measures as Leading Indicators of Market Instability: The Case of the Spanish Stock Market

Gustavo Peralta
2015 Social Science Research Network  
The last column reports the average of the same set of measures over 1.000 realizations of networks made at random (Erdös-Rényi network) matched to the density of the optimal one.  ...  With this network in place, the authors compute the systemic relevance of financial firms in terms of their destabilizing power, the so-called realized systemic risk beta.  ...  Appendix D Centrality for each of the firms in IBEX-35 considering the most recent 250 trading days in the sample Centrality by firm Autocorrelation function of regressors  ... 
doi:10.2139/ssrn.2575537 fatcat:xulwhgngobhrrlhrfmcrjjgusu

A better entity detection of question for knowledge graph question answering through extracting position-based patterns

Mohammad Yani, Adila Alfa Krisnadhi, Indra Budi
2022 Journal of Big Data  
It is due to a complex question is composed of more than one fact or triple. This paper proposes a method to detect entities and their position on triples mentioned in a question.  ...  Furthermore, our approach can also define if an entity is a head or a tail of a triple mentioned in a question. We tested our approach to SimpleQuestions, LC-QuAD 2.0, and QALD series benchmarks.  ...  The encoding component works on an embedding of the input sequence through a series of encoder networks, each of which consists of a self-attention layer and a feed-forward neural network.  ... 
doi:10.1186/s40537-022-00631-1 fatcat:vek3srackjgjld3qjd2dak6izq

On the Architecture of Pāṇini's Grammar [chapter]

Paul Kiparsky
2009 Lecture Notes in Computer Science  
a-yaj-a-i indra-aḿ a-yaj-e indra-am (26) 6.  ...  On the realizational view, there is no such expectation.  ...  . , the traditional interpretation adds an ad hoc exception to the general principle that an assigned accent supersedes earlier accents: namely, that vikaran . a accents (such as that on u in the above  ... 
doi:10.1007/978-3-642-00155-0_2 fatcat:6d4culehtbdrjbur53dcjdp3y4

The edge-isorperimetric problem on Sierpinski graphs [article]

L. H. Harper
2016 arXiv   pre-print
Some families of graphs, such as the n-cubes and Sierpinski gaskets, are self-similar. In this paper we show how such recursive structure can be used systematically to prove isoperimetric theorems.  ...  Figure 2 - 2 The stabilization order of SG 2 Figure 3 - 3 The derived network of S-O (SG 2 ) Theorem 1 . 1 The symmetry group of S(n, m) is S m , the symmetric group on m generators.  ...  That proof, based on the self-similarity of the stabilization order of Q n (also known as its Bruhat order (see [4] , Sect. 5.2)) seemed novel at first, until we realized that the first proof of Theorem  ... 
arXiv:1610.02089v1 fatcat:oofzwt47qzcpvfm5bixuyuhcbq

Integral Relativity of Awareness and Energy- The Continuum of Consciousness, Energy, Mind and Matter

Lex Neale
2018 NeuroQuantology  
Integral Relativity, as an extension of General Relativity, Special Relativity and Advanced Relativity, has four proposed Tenets: (1) The Equation of Energy with Awareness; (2) The Conservation of Awareness  ...  It is corroborated by the Observer Effect in all the related double slit and interferometer experiments, most notably those of Dean Radin's Sigma 7 rated results; by the "Unified Spacememory Network",  ...  The resulting spinor coding format, of eight triplet permutations resulting from the six polarities, is exactly and inevitably that used in computer coding, shown in Figure 9 as one Byte comprised of  ... 
doi:10.14704/nq.2018.16.8.1267 fatcat:c67grp6szne5bnl46khr6iht3a

Rapid Prototyping for Evaluating Vehicular Communications [chapter]

Tiago M., Miguel Gonzalez-Lopez, Carlos J., Luis Castedo
2011 Advanced Applications of Rapid Prototyping Technology in Modern Engineering  
L. . • MOWI : funded by Indra Sistemas S.  ...  From a general perspective, the impact on network simulation when using realistic PHY metrics was analyzed in (100).  ... 
doi:10.5772/21251 fatcat:ggrgcu44jrfnfe5ra4d5eob4y4

The galactic polity in Southeast Asia

Stanley Jeyaraja TAMBIAH
2013 HAU: Journal of Ethnographic Theory  
Although Ram Kamheng boasted of his vast area of control, Lu Thai (1347-1374), who succeeded a few generations later, ascended a throne that was on the verge of extinction.  ...  Similarly, the kingdom of Pegu in 1650 and the Mon kingdom of Rammanadesa of Lower Burma had their own permutations and variations of these schemes (Shorto 1963) . form).  ... 
doi:10.14318/hau3.3.033 fatcat:phc34vcmebh7rnjt7bra66cg74

Jnanadeepa: Pune Journal of Religious Studies Vol 24/2

Kuruvilla Pandikattu
2020 Zenodo  
Jan-Dec issue of Jnanadeepa 24/2 Topic: Humanising Social Life  ...  Indra realized that in the denominator of infinity which is the universe, he had no essential value or his existence meaningless.  ...  Therefore, Indra is unable to be generous. Indra seeks value from the things he possesses. But in the Indian philosophical thinking, ultimately all things must be consumed.  ... 
doi:10.5281/zenodo.3981940 fatcat:ioklpoaxzfcrhlzlzyq5e6q2jm

Jnanadeepa: Pune Journal of Religious Studies Vol 24/2

Kuruvilla Pandikattu
2020 Zenodo  
Jan-Dec issue of Jnanadeepa 24/2 Topic: Humanising Social Life  ...  Indra realized that in the denominator of infinity which is the universe, he had no essential value or his existence meaningless.  ...  Therefore, Indra is unable to be generous. Indra seeks value from the things he possesses. But in the Indian philosophical thinking, ultimately all things must be consumed.  ... 
doi:10.5281/zenodo.4020991 fatcat:zkxecnwcerawzi2awuifg6ch3q

Spin-orbit effects in pentavalent Iridates: Models and materials [article]

Sayantika Bhowal, Indra Dasgupta
2021 arXiv   pre-print
Spin-orbit effects in heavy 5d transition metal oxides, in particular, iridates, have received enormous current interest due to the prediction as well as the realization of a plethora of exotic and unconventional  ...  While a bulk of these works are based on tetravalent iridates (d^5), where the counter-intuitive insulating state of the rather extended 5d orbitals are explained by invoking strong spin-orbit coupling  ...  The structure consists of face-shared Ir 2 O 9 units, which are arranged on a triangular network, shown in (b).  ... 
arXiv:2108.04158v1 fatcat:ed7i3xmelvgobibvyffxvcparm
« Previous Showing results 1 — 15 out of 69 results