The application of target recognition and sorting has greatly improved the level of industrial automation, liberated human hands, and effectively saved resources and improved efficiency. The purpose of this paper is t...
详细信息
In the proposed study, the past research work has been reviewed which was based on softcomputing techniques for IDS and played a better role to detect the intrusion in computer networks. This study reviewed various r...
详细信息
Web shell is one of the most common network attack methods, and traditional detection methods may not detect complex and flexible variants of web shell attacks. In this paper, we present a comprehensive detection syst...
详细信息
ISBN:
(纸本)9781665403924
Web shell is one of the most common network attack methods, and traditional detection methods may not detect complex and flexible variants of web shell attacks. In this paper, we present a comprehensive detection system that can detect both PHP and JSP web shells. After file classification, we use different feature extraction methods, i.e. AST for PHP files and bytecode for JSP files. We present a detection model based on text processing methods including TF-IDF and Word2vec algorithms. We combine different kinds of machinelearning algorithms and perform a comprehensively controlled experiment. After the experiment and evaluation, we choose the detection machinelearning model of the best performance, which can achieve a high detection accuracy above 98%.
We introduce a modern Hopfield network with continuous states and a corresponding update rule. The new Hopfield network can store exponentially (with the dimension of the associative space) many patterns, retrieves th...
详细信息
Generative Adversarial Network (GAN) is a framework of deep learning in generative models. The generative model aims to synthesize a new data so that it has a distribution of distribution according to the original dat...
详细信息
ISBN:
(纸本)9781450366120
Generative Adversarial Network (GAN) is a framework of deep learning in generative models. The generative model aims to synthesize a new data so that it has a distribution of distribution according to the original data distribution. In the current development, GAN is not only used to synthesize data from noise alone, but in the current development it has begun to be used to translate data from a domain to data with a different domain. Several studies have been developed, such as CycleGAN, and Pix2pix. In this study, the face has not been used as an object of translation. In this study a model for translating images of face sketches into face images will be made.
The decomposition of 3D shapes into simple yet representative components is a very intriguing topic in computer vision as it is very useful for many possible applications. Superquadrics may be used with benefit to obt...
详细信息
Fall Detection is one of the most interesting and challenging research topics in the world today because of its implications in society and also because the complexity of processing Time Series (TS). Plenty of researc...
详细信息
Over the past decade, the anomaly-based Intrusion Detection System (IDS) has established itself with many studies proving its effectiveness, especially with deep learning models. However, these models have become more...
详细信息
ISBN:
(纸本)9781665461672
Over the past decade, the anomaly-based Intrusion Detection System (IDS) has established itself with many studies proving its effectiveness, especially with deep learning models. However, these models have become more complex, thus making them difficult for humans to explain the system's decisions. Meanwhile, research to increase the transparency of IDSs receives insufficient attention from the research community. Therefore, this study proposes an Explainable NIDS capable of accurately detecting attacks and providing explicit explanations for its decisions. Our proposed IDS employs the Shapley Additive exPlanations (SHAP) framework to account for IDS decisions. It assists our IDS in self-explain its decisions at both the local and global levels. The local explanation explains the IDS decisions for each specific sample, while the global level provides the feature's importance and shows the attacks' characteristics. To demonstrate the effectiveness, we evaluate our proposal on two well-known IDS datasets: KDD Cup 99 and CICIDS2017. In addition, we experiment with interpreting not only the machinelearning model but also the deep learning model. This research is expected to enhance the transparency of anomaly-based IDS and provide deeper insights for security experts.
Coupon marketing is a traditional but effective way to retain customers and stimulate new purchases. Recently, digital coupons have been widely used in e-commerce and distributed to almost everyone. However, the decis...
详细信息
ISBN:
(纸本)9781450366120
Coupon marketing is a traditional but effective way to retain customers and stimulate new purchases. Recently, digital coupons have been widely used in e-commerce and distributed to almost everyone. However, the decision on when and whom to issue the coupon is often based on managers' experience and calling for optimization and automation. Collaborated with a leading e-commerce platform, we propose an exploratory constrained reinforcement learning modeling to optimize digital coupon distribution policy under the constraint of maximum offering number. Our experimental results showed that the optimal policy could increase the cumulative total sales about 6% comparing to the original policy of the platform. This work enriches the applications of reinforcement learning in real-world business practices and provides useful implications for future study on constrained reinforcement learning.
The growing urbanization of cities and towns in the Gulf Cooperation Council (GCC) states as a result of socioeconomic change has primarily resulted in a great deal of strain on the few natural resources and the loss ...
The growing urbanization of cities and towns in the Gulf Cooperation Council (GCC) states as a result of socioeconomic change has primarily resulted in a great deal of strain on the few natural resources and the loss of productive areas. In fact, there hasn't been much focus on the spatial patterns of urbanization and how they affect the environment and agricultural resources, especially in Oman. It may be possible to better understand the connection between spatial growth patterns and its effects on agricultural production by predicting urban growth in Sohar City. This study aims to analyze spatiotemporal dynamics of land use/land cover (LULC) for the last six years (2017–2022) and its impacts especially on the reduction of agricultural land. The spatiotemporal data was obtained from Sentinel-2 with a cell size of 10 meters which was then cropped using the vector boundaries of Sohar city. Part of the data was labelled manually which was used to train supervised machinelearning technique for classifying the data into different land covers such as water bodies, trees, crops, etc. Accuracy assessment was carried out by com-paring the automatic classification results with ground truth and an accuracy of 93.4% was obtained. It has been found that built up area is increasing rapidly while hugely affecting the arable land. It's also interesting to see that during the COVID19 pandemic, this urban growth was stopped as evident from the satellite data. The results of this study could address the dangers and declines of urban sustainability for Sohar city, as well as provide geographical guidelines for observing future changes in LULC dynamics. The national strategy for future urban development in Oman also benefits from identifying regions of bare soil and vegetation that are amenable to urbanization.
暂无评论