Adaptive neuron-fuzzy inference system combined with principal components analysis for determination of compound thiamphenicol powder on near-infrared spectroscopy

2012 ◽  
Vol 43 (4) ◽  
pp. 566-572 ◽  
Author(s):  
Nan Qu ◽  
Mingchao Zhu ◽  
Yulin Ren ◽  
Sen Dou
2014 ◽  
Vol 32 (No. 1) ◽  
pp. 31-36 ◽  
Author(s):  
M. Králová ◽  
Z. Procházková ◽  
V. Svobodová ◽  
E. Mařicová ◽  
B. Janštová ◽  
...  

We used the discriminant analysis of curd cheese during storage by Fourier transform near infrared spectroscopy method (FT-NIRs). Olomouc curd cheese samples were stored at 5 and at 20&deg;C during seven weeks. The spectra of samples were measured at the integration sphere in reflectance mode with the use of a compressive cell in the spectral range of 10&nbsp;000&ndash;4000 cm<sup>&ndash;1</sup> with 100 scans. Ten principal components were used for all the calibration models. Great similarity between the samples stored at 5 and 20&deg;C was found. Twelve samples stored at 20&deg;C for 1 week and 2 samples stored at 20&deg;C for 2 weeks were classified as samples stored at 5&deg;C. Different results were found out by comparing the storage time. 100% variability was described between the spectra scanned in different weeks of storage at 5&deg;C and 99.9% variability was obtained for the samples stored at 20&deg;C. Thus, the discriminant analysis of Olomouc curd cheese by FT-NIRs is a suitable method for the determination of ripening time. &nbsp;


2020 ◽  
Vol 12 (1) ◽  
pp. 51-62
Author(s):  
José Cícero Alves Silva ◽  
Diana Signor ◽  
Andréa Monteiro Santana Silva Brito ◽  
Carlos Eduardo Pellegrino Cerri ◽  
Plínio Barbosa de Camargo ◽  
...  

Author(s):  
Nitin Naik ◽  
Paul Jenkins ◽  
Nick Savage ◽  
Longzhi Yang

Abstract A honeypot is a concealed security system that functions as a decoy to entice cyberattackers to reveal their information. Therefore, it is essential to disguise its identity to ensure its successful operation. Nonetheless, cyberattackers frequently attempt to uncover these honeypots; one of the most effective techniques for revealing their identity is a fingerprinting attack. Once identified, a honeypot can be exploited as a zombie by an attacker to attack others. Several effective techniques are available to prevent a fingerprinting attack, however, that would be contrary to the purpose of a honeypot, which is designed to interact with attackers to attempt to discover information relating to them. A technique to discover any attempted fingerprinting attack is highly desirable, for honeypots, while interacting with cyberattackers. Unfortunately, no specific method is available to detect and predict an attempted fingerprinting attack in real-time due to the difficulty of isolating it from other attacks. This paper presents a computational intelligence enabled honeypot that is capable of discovering and predicting an attempted fingerprinting attack by using a Principal components analysis and Fuzzy inference system. This proposed system is successfully tested against the five popular fingerprinting tools Nmap, Xprobe2, NetScanTools Pro, SinFP3 and Nessus.


2013 ◽  
Vol 41 (12) ◽  
pp. 1928
Author(s):  
Zong-Liang CHI ◽  
Miao-Miao WANG ◽  
Xiao-Dong CONG ◽  
Shao-Guang LIU ◽  
Bao-Chang CAI

Sign in / Sign up

Export Citation Format

Share Document