Multi-level Information Security Realized in Ortho-Stannic Acid Magnesium with a Single Activator of Tb3+

Author(s):  
Wei-Sheng Liu ◽  
shanshan zhao ◽  
Zhenbin Wang ◽  
Yuanying Lin ◽  
Bin Yu

Nowadays, with the development of technology, the safely performance of traditional single- or dual-mode luminescent materials used for anti-counterfeiting has been significantly reduced due to their single and predictable readout...

Author(s):  
Olga Nikolaevna Yarkova ◽  
◽  
Anastasiya Sergeevna Yarkova ◽  

The paper presents a model of nonlinear programming that allows us to determine the optimal distribution of costs for improving the protective properties of a multi-level information security system that minimizes the risk of unauthorized access to data for a system described by the Markov model. A study of the protective properties depending on the allocated investments of the system was carried out.


Author(s):  
Ольга Николаевна Яркова ◽  
Анастасия Сергеевна Яркова ◽  
Алена Владимировна Труфанова

В работе предложен алгоритм формирования стратегии распределения инвестиций на улучшение защитных свойств системы по уровням доступа, обеспечивающей, при выделенных финансовых средствах, наилучший уровень надежности многоуровневой системы защиты информации в целом. In this article, we propose an algorithm for forming a strategy for allocating investments to improve the security properties of the system by access levels, which provides the best level of reliability of a multi-level information security system as a whole with allocated financial resources.


Author(s):  
Xiaoqi Lu ◽  
Yu Gu ◽  
Lidong Yang ◽  
Baohua Zhang ◽  
Ying Zhao ◽  
...  

Objective: False-positive nodule reduction is a crucial part of a computer-aided detection (CADe) system, which assists radiologists in accurate lung nodule detection. In this research, a novel scheme using multi-level 3D DenseNet framework is proposed to implement false-positive nodule reduction task. Methods: Multi-level 3D DenseNet models were extended to differentiate lung nodules from falsepositive nodules. First, different models were fed with 3D cubes with different sizes for encoding multi-level contextual information to meet the challenges of the large variations of lung nodules. In addition, image rotation and flipping were utilized to upsample positive samples which consisted of a positive sample set. Furthermore, the 3D DenseNets were designed to keep low-level information of nodules, as densely connected structures in DenseNet can reuse features of lung nodules and then boost feature propagation. Finally, the optimal weighted linear combination of all model scores obtained the best classification result in this research. Results: The proposed method was evaluated with LUNA16 dataset which contained 888 thin-slice CT scans. The performance was validated via 10-fold cross-validation. Both the Free-response Receiver Operating Characteristic (FROC) curve and the Competition Performance Metric (CPM) score show that the proposed scheme can achieve a satisfactory detection performance in the falsepositive reduction track of the LUNA16 challenge. Conclusion: The result shows that the proposed scheme can be significant for false-positive nodule reduction task.


2021 ◽  
Author(s):  
Congcong Luo ◽  
bing yao ◽  
Hengheng Zhu ◽  
Xi-Hua Du ◽  
Yan Chen ◽  
...  

Fluorescent liquid crystalline in luminescent materials have attracted interest for their unique feature of fluorescence in response to external stimulus and their applicability in information security and anti-counterfeiting. Herein, fluorescent...


2021 ◽  
Author(s):  
Pengshuai Yin ◽  
Yupeng Fang ◽  
Qingyao Wu ◽  
QiLin Wan

Abstract Background: Automatic vessel structure segmentation is an essential step towards an automatic disease diagnosis system. The task is challenging due to the variance shapes and sizes of vessels across populations.Methods: A multiscale network with dual attention is proposed to segment vessels in different sizes. The network injects spatial attention module and channel attention module on feature map which size is 1 8 of the input size. The network also uses multiscale input to receive multi-level information, and the network uses the multiscale output to gain more supervision. Results: The proposed method is tested on two publicly available datasets: DRIVE and CHASEDB1. The accuracy, AUC, sensitivity, specificity on DRIVE dataset is 0.9615, 0.9866, 0.7693, and 0.9851, respectively. On the CHASEDB1 dataset, the metrics are 0.9797, 0.9895, 0.8432, and 0.9863 respectively. The ablative study further shows effectiveness for each part of the network. Conclusions: Multiscale and dual attention mechanism both improves the performance. The proposed architecture is simple and effective. The inference time is 12ms on a GPU and has potential for real-world applications. The code will be made publicly available.


Author(s):  
Yu “Andy” Wu ◽  
Carol Stoak Saunders

Governance of the information security function is critical to effective security. In this paper, the authors present a conceptual model for security governance from the perspective of decision rights allocation. Based on Da Veiga and Eloff’s (2007) framework for security governance and two high-level information security documents published by the National Institute of Standards and Technology (NIST), the authors present seven domains of information security governance. For each of the governance domains, they propose a main decision type, using the taxonomy of information technology decisions defined by Weill and Ross (2004). This framework recommends the selection of decision rights allocation patterns that are proper to those decision types to ensure good security decisions. As a result, a balance can be achieved between decisional authority and responsibility for information security.


2018 ◽  
Vol 26 (6) ◽  
pp. 1551-1560
Author(s):  
徐 斌 XU Bin ◽  
温广瑞 WEN Guang-rui ◽  
苏 宇 SU Yu ◽  
张志芬 ZHANG Zhi-fen ◽  
陈 峰 CHEN Feng ◽  
...  

2020 ◽  
Vol 63 ◽  
pp. 248-255 ◽  
Author(s):  
Joel Weijia Lai ◽  
Jie Chang ◽  
L. K. Ang ◽  
Kang Hao Cheong

Sign in / Sign up

Export Citation Format

Share Document