We introduce the first ‘living lab’ for scholarly recommender systems. This lab allows recommender-system researchers to conduct online evaluations of their novel algorithms for scholarly recommendations, i.e., reco...
详细信息
The development of cyberspace brings both opportunities and threats, among which Distributed Denial of service (DDoS) is one of the most destructive attacks. A mass of DDoS attack detection methods have been proposed....
详细信息
The development of cyberspace brings both opportunities and threats, among which Distributed Denial of service (DDoS) is one of the most destructive attacks. A mass of DDoS attack detection methods have been proposed. But more or less there are some problems, either the construction process is complex, or low accuracy, or poor generalization ability. To overcome these problems, in this paper, we propose a new DDoS detection method which combines the Long Short Term Memory (LSTM) and Bayes approach, referred to as LSTM-BA. Through LSTM method, we can identify parts of DDoS attacks with high confidence outputs from LSTM module. For those outputs with low confidence, we further use Bayes method for the second judgment to improve the accuracy. Our proposed method has been validated using publicly available datasets of ISCX2012. The results demonstrate that LSTM-BA has a better performance. More exactly, LSTM-BA achieves 98.15% detection accuracy, which is improved by 0.16% compared with the state-of-the-art method.
The alarming cases of cataract within the last decade and the projection of cataract cases within the next few decades call for urgent intervention by early diagnosis. Formal ways of detecting cataract such as physica...
The alarming cases of cataract within the last decade and the projection of cataract cases within the next few decades call for urgent intervention by early diagnosis. Formal ways of detecting cataract such as physical examination, tests and diagnosis are clinic and professional bound. Hence the need for automation process. Some works have been done on computer Aided Diagnosis (CAD) of cataract with tools such as Expert systems, which are limited to their knowledgebase thus inaccurate. Early diagnosis of cataract enables quick intervention and treatment. This paper presents a web-based computer Aided Diagnostic for cataract detection system using Convolutional Neural Network that can be used by any nonprofessional outside the clinic environment. The systems model trained on a data set of 100 eye images using transfer learning which were retrieved from google image search results of “normal human eyes” and “human eye cataract”. It utilized ImageNet model developed in ILSVRC2012 using the Convolutional Neural Network classifier and transferred its knowledge using Transfer learning to train a new model. The new model gained the ability to classify eye images into “Normal” and “Cataractious”. The system was designed to take images as inputs and achieved a Sensitivity of 69%, a Specificity of 86%, Precision of 86%, F-Score of 56% and AUC of 84.56%. Its accuracy score was 78% which was influenced using the model trained during the ImageNet image classification using deep convolutional neural network.
In order to solve the internal networking, remote communication and optimization control of the end devices in the Internet of Building Equipment, this paper presents an Internet of Building Equipment system based on ...
详细信息
A computer-assisted Non-invasive Diabetes Mellitus Detection system through facial key block analysis is designed and developed in this paper. There are four main steps in our system: facial image capture through a no...
详细信息
ISBN:
(纸本)9781538652183
A computer-assisted Non-invasive Diabetes Mellitus Detection system through facial key block analysis is designed and developed in this paper. There are four main steps in our system: facial image capture through a non-invasive device, automatic location of the key blocks based on the positions of the two pupils, key block texture feature extraction using Local Binary Pattern with cell-size 21, and classification with Support Vector Machines. In the first step of this system, a specially designed facial image capture device has been developed to capture the facial image of each patient in a standard designed environment. According to Traditional Chinese Medicine theory, various facial regions can reflect the health status of different inner organs. Based on this, four key blocks are located automatically using the positions of the two pupils and used in Diabetes Mellitus detection instead of employing the whole facial image. For the last two steps, an experiment which selects the best value of Local Binary Pattern cell-size and the better classifier of two traditional classifiers (k-Nearest Neighbors and Support Vector Machines) is implemented and its results are applied in this system. In order to test the system performance, the facial images of 200 volunteers consisting of 100 Diabetes Mellitus patients and 100 healthy persons are captured and analyzed through this system. Based on the test result, the computer-assisted Non-invasive Diabetes Mellitus Detection system through facial key block analysis is proven to be effective and efficient at distinguishing Diabetes Mellitus from Healthy patients in real time.
Exercises are an essential part of learning university-level mathematics. Automated assessments provide an easy and flexible way to create new exercises for students. Moreover, students' performances may be monito...
详细信息
Exercises are an essential part of learning university-level mathematics. Automated assessments provide an easy and flexible way to create new exercises for students. Moreover, students' performances may be monitored in real time. In 2012, we started to test a mathematical exercise creation system originally created in Lappeenranta University of Technology (LUT). The functionality of this system was jointly piloted by LUT and the National Defence University (NDU). The system was tested in the NDU basic mathematics course with 137 cadets. We show in this article that students who used the automated exercise system scored better on examinations than the students from the previous and following year who could not use the system. A statistical summary of the students' results is presented at the end of this paper to support this conclusion. We will also compare this system to the other systems in the market and consider whether it makes sense for universities to develop this kind of system or whether it is simply a waste of time and money. (C) 2018 The Authors. Published by Elsevier Ltd.
The fifteen papers in this special section focus on cloud computer security and privacy. The emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and reso...
详细信息
The fifteen papers in this special section focus on cloud computer security and privacy. The emerging paradigm of cloud computing provides a new way to address the constraints of limited energy, capabilities, and resources. Researchers and practitioners have embraced cloud computing as a new approach that has the potential for a profound impact in our daily life and world economy. However, security and privacy protection is a critical concern in the development and adoption of cloud computing. To avoid system fragility and defend against vulnerabilities exploration from cyber attacker, various cyber security techniques and tools have been developed for cloud systems.
The monitoring and warning system of main agro-meteorological disasters in Zhejiang Province is researched and developed herein based on technology of WebGIS. According to SOA and B/S structure, the system is construc...
详细信息
Recently, cloud radio access network (C-RAN) with caching as a service (CaaS) was proposed to merge the functionalities of communication, computing, and caching (CCC) together. In this paper, we dissect the interactio...
详细信息
In China, there are more than 13 million visual-impaired people, which obtain information by touching and hearing rather than vision. To help them access to information more conveniently, many efforts have been made i...
详细信息
ISBN:
(纸本)9783319942742;9783319942735
In China, there are more than 13 million visual-impaired people, which obtain information by touching and hearing rather than vision. To help them access to information more conveniently, many efforts have been made in China: Firstly, it provides digital resources by building China Digital Library for Visual Impairment;Secondly, it develops a software called Sunshine Screen Reader to help visual-impaired people search through the computer;Also, it promotes SunshineReader, a portable device, to enable visual-impaired people obtain information from electronic documents and printed text. All these efforts achieve demonstrable results in narrowing down the gap between visual-impaired people and information. Generally speaking, most information can be accessed by CDLVI, Sunshine Screen Reader and SunshineReader.
暂无评论