The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we analyse the behaviour of osteosarcoma cancer cells which are either exposed to the anticancer agent Topotecan or not exposed to any external agent. For the analyses of cell lineage data encoded from time lapse microscopy, we choose data mining tools that generate interpretable models of the data, and we address their statistical significance. We consider the mortality of unexposed...
A method based on Frenkel-Poole emission is proposed to model the I-V data of the amorphous state (high resistance state) in mushroom-type phase-change memory (PCM) devices. We found the I-V characteristics in the high resistance state are dominated by (i) the size of the amorphous GST (aGST) volume and (ii) the trap density of the amorphized GST material. Neither (i) nor (ii) can't be resolved by...
Covert channels are widely used for secret information transmission on networks. Although existing packet length based covert channels have great tamper resistance, they fail to deliver normal network traffic especially when the amounts of covert messages increase. As such, they are vulnerable to detections due to abnormal network traffic. Hence, in this paper, we are motivated to design a protocol-independent...
Summary form only given. Single-walled carbon nanotube (CNT) films are a new class of transparent, conductive, and flexible materials, and they exhibit uniform physical and electronic properties. Several promising device applications of CNT films have recently been demonstrated, such as thin film transistors, optoelectronic devices, and chemical sensors. For many of these applications, intrinsic noise...
A method to approximate nFET passgate resistance using the compact EKV model is presented. The model picks a mobility that has a greater effect on channel current than higher-order MOS effects in order to approximate the worst-case current over a drain-source voltage range. The model is compared to data taken from an IC that was fabricated in a 0.5 mum, scalable CMOS process available through MOSIS.
Exploratory data analysis is a data analysis methods to analysis data and find the inherent law based on the actual distribution of data. This article explored the use of data analysis, aiming at a communication operator for a pseudo-family customer to identify customers to focus on customers and achieve targeted marketing.
A simple semiempirical model ID(VGS, VDS) for short-channel MOSFETs applicable in all regions of device operation is presented. The model is based on the so-called ldquotop-of-the-barrier-transportrdquo model, and we refer to it as the ldquovirtual sourcerdquo (VS) model. The simplicity of the model comes from the fact that only ten parameters are used. Of these parameters, six are directly obtainable...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Ensuring public security is an important issue for every government, and effective public security depends on the efficiency of criminal justice processes and procedures. The procedures of the criminal justice may be viewed as the upper-, middle-, and down-stream sections of a supply chain. Like their business counterparts, most law enforcement agencies have to deal with logistics, information flow,...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.