Since it is difficult to work out a complete and accurate analytical model for some complex nonlinear dynamical systems, we mainly propose a method for learning stable control with fast adaptive neural network. Furthe...
详细信息
ISBN:
(纸本)9781728172934
Since it is difficult to work out a complete and accurate analytical model for some complex nonlinear dynamical systems, we mainly propose a method for learning stable control with fast adaptive neural network. Furthermore, we provide a rigorous analytical evaluation of our proposed method in terms of stability. In order to validate the theoretical analysis, our proposed method has been applied in the stable control of a wheeled inverted pendulum (WIP) platform. It achieves high prediction accuracy and fast learning speed. In addition, the proposed method has incremental learning capabilities. When a new instance is provided, there is no need to retrain the entire training set, thus, the controller is more effective and more generalized.
The feed axis is a key component of machine tools. Once the feed axis fails, it will have a huge impact on the overall performance of machine tool. The traditional fault prediction methods of feed axis mostly judge ac...
详细信息
The papers presented in this special section were presented at the Thirteenth internationalconference on Intelligent computing (ICIC) that was held in Liverpool, UK, on August 7-10, 2017. ICIC was formed to provide a...
详细信息
The papers presented in this special section were presented at the Thirteenth internationalconference on Intelligent computing (ICIC) that was held in Liverpool, UK, on August 7-10, 2017. ICIC was formed to provide an annual forum dedicated to the emerging and challenging topics in artificial intelligence, machinelearning, bioinformatics, and computational biology, etc. It aims to bring together researchers and practitioners from both academia and industry to share ideas, problems, and solutions related to the multifaceted aspects of intelligent computing.
India is an agricultural country and this sector accounts for 18 percent of India's GDP. This sector is the backbone of the country and focuses on better yield by using pesticides and fertilizers to prevent plant ...
详细信息
The security community has witnessed an unprecedented upsurge in cyber attacks in recent years. These attacks have proved to be successful in achieving their catastrophic objectives. Intrusion detection and prevention...
详细信息
ISBN:
(数字)9781728166094
ISBN:
(纸本)9781728166094
The security community has witnessed an unprecedented upsurge in cyber attacks in recent years. These attacks have proved to be successful in achieving their catastrophic objectives. Intrusion detection and prevention systems remain the principal point of defense against these devastating attacks. However, most of the anomaly datasets in the past are neither up-to-date nor reliable. Researchers used various machinelearning techniques to classify anomaly-based attacks due to their capability to keep pace with the evolution of such attacks and gave encouraging predictions. Nevertheless, deep neural networks turned out to be revolutionary in detecting and characterizing such intrusions. In this paper, first of all, we propose an imagebased deep neural model to classify various attacks by using two comprehensive datasets called CICIDS2017 and CSE-CICIDS2018. Secondly, we provide a list of best network flow features to identify these attacks. We deploy a convolutional neural network model to classify and characterize different attacks with promising evaluation results.
Partially Observable Markov Decision Processes (POMDPs) are popular and flexible models for real-world decision-making applications that demand the information from past observations to make optimal decisions. Standar...
详细信息
Virtualization technologies in cloud computing brings merits for resource utilization and on-demand sharing. However, users can face new security risks when they use the virtualized platforms. The co-resident attack m...
详细信息
We proposed a network intrusion detection system that combines a stream machinelearning model in the fog layer and an online labeling model in the cloud layer. The stream learning model is based on the Adaptive XGBoo...
详细信息
ISBN:
(纸本)9781665437561
We proposed a network intrusion detection system that combines a stream machinelearning model in the fog layer and an online labeling model in the cloud layer. The stream learning model is based on the Adaptive XGBoost machinelearning algorithm, aiming to detect anomaly network traffic. The online labeling model is a batch machinelearning model based on the Random Forest algorithm and is responsible to label unknown traffic and provide updates to the stream learning model in the fog layer. The proposed solution effectively detects abnormal traffic in the fog layer that is connected with IoT devices. The stream learning model updates the model at a lower cost as compared to the batch learning approach. To evaluate the proposed system, contemporary datasets are used to test the accuracy of the models. The experiment results show that the proposed scheme effectively achieves good classification accuracy with the cloud layer providing updates to the fog layer. The result is about 17.6% and 9.0% better than the baseline method for the UNSW-NB15 dataset and CIC-IDS2017 dataset, respectively. In addition, the stream learning approach can provide higher throughput than the batch learning approach.
The proceedings contain 48 papers. The topics discussed include: predicting absenteeism at work using tree-based learners;a study on machinelearning for steganalysis;image-based silkworm egg classification and counti...
ISBN:
(纸本)9781450366120
The proceedings contain 48 papers. The topics discussed include: predicting absenteeism at work using tree-based learners;a study on machinelearning for steganalysis;image-based silkworm egg classification and counting using counting neural network;classification of grain discoloration via transfer learning and convolutional neural networks;multi-view neural network integrating knowledge for patient self-diagnosis;a new mammography lesion classification method based on convolutional neural network;backbone solving algorithm based on heuristic thinking;solving dietary planning problem using particle swarm optimization with genetic operators;MMSIA: improved max-min scheduling algorithm for load balancing on cloud computing;and an improvement of fuzzy logic based clustering combined for mobile sink algorithm.
The ever increasing need to ensure that code is reliably, efficiently and safely constructed has fueled the evolution of popular static binary code analysis tools. In identifying potential coding flaws in binaries, to...
详细信息
暂无评论