In recent years, the number of new malware samples has shown a trend of rapid growth. The increasing number of malware has resulted in a huge number of signature databases that the host needs to save, which is difficu...
详细信息
In 2020, the new crown epidemic swept the world, and the world's medical resources will be significantly challenged. Medical staff manual venipuncture has a low accuracy rate and is prone to cause cross-infection....
详细信息
The competition for data resources has become an important part of the current market competition. The main sources of the college entrance examination data currently studied are third-party websites, or manually inpu...
The competition for data resources has become an important part of the current market competition. The main sources of the college entrance examination data currently studied are third-party websites, or manually input data from the official website. Both of these methods have major shortcomings. First of all, in terms of accuracy and limitation, there is no guarantee that the data is accurate. Secondly, in the process of using data, it will be clamped by a third party, so we use behavior simulation technology to collect data from the official website, and then resolve the data by solving the heterogeneity problem. Finally, the completeness and accuracy of the college entrance examination data can be guaranteed through this system platform.
In recent years, with the rapid development of the Internet, the Internet has become an indispensable part of society. However, with the increasing variety of malware and the application of encryption methods, the sec...
详细信息
ISBN:
(纸本)9781665438735
In recent years, with the rapid development of the Internet, the Internet has become an indispensable part of society. However, with the increasing variety of malware and the application of encryption methods, the security of Internet network is constantly threatened. How to detect and identify malicious software without affecting the normal operation of user hosts and violating user privacy by monitoring a small number of non-sensitive features while software is running dynamically, so as to protect user host information, has become an imminent issue in the field of network security. In this work, a new feature extraction method is developed and proved to be effective. This paper presents a characterization method to extract malware features from three aspects: derived features, vector space features of API and context features of API. XGBoos, LGBM, Improved TextCNN models are trained to predict test sets. Finally, these models are combined with Stacking model to output the final results.
The development of machinelearning provides a strong research foundation for the field of brain science. Compared with traditional research methods, the strategy based on machinelearning is more suitable for the big...
详细信息
Autonomous Underwater Vehicle (AUV) plays an important role in plenty of fields. It is a challenging task to design a high-performance formation controller for AUVs. In this paper, a formation control policy of dual u...
Autonomous Underwater Vehicle (AUV) plays an important role in plenty of fields. It is a challenging task to design a high-performance formation controller for AUVs. In this paper, a formation control policy of dual underwater vehicles based on the deep reinforcement learning method Deep Deterministic Policy Gradient method (DDPG) is proposed. The goal of our scenario is that the back AUV follows the front AUV at a certain safe distance. The policy trains the speed and direction of the back AUV, meanwhile, the customized reward function is used to ensure that the distance between the back AUV and the front AUV is within the safe distance range, and minimize the lateral deviation. The simulation results show the effectiveness of the deep reinforcement learning method in AUV formation control.
machinelearning is applied to every aspect of people’s life. Especially in the field of games, machines gradually show their own set of mechanisms and occupy a certain position in this field. In 2016, Alpha Go and L...
machinelearning is applied to every aspect of people’s life. Especially in the field of games, machines gradually show their own set of mechanisms and occupy a certain position in this field. In 2016, Alpha Go and Lee Sedol, the world champion of Go and a professional nine-dan player, had a man-machine battle with Go and won with a total score of 4-1. However generally, games such as Go and Chess are classified as games with complete information, while other games, such as poker, are games with incomplete information. In the game of incomplete information, traditional algorithms are no longer applicable due to the lack of information and the increase in uncertainty, and an independent algorithm system needs to be studied. This paper first introduces the application of machinelearning in known-complete information games, then explains the problems of machinelearning in multi-players known incomplete information games, summarizes the development of machinelearning in the field of incomplete information games at this stage, and finally prospects the future of machinelearning in the field of games. In general, machinelearning still has problems in the game of incomplete information, and future generations need to continue to study.
Since years machinelearning have played a significant part in the healthcare sector. Out of the various deep learning approaches, Convolutional Neural Networks has shown the most promising results in the classificati...
详细信息
The proceedings contain 15 papers presendted at a virtual meeting. The special focus in this conference is on Software Architecture Erosion and Architectural Consistency. The topics include: Interactive Elicitation of...
ISBN:
(纸本)9783031151156
The proceedings contain 15 papers presendted at a virtual meeting. The special focus in this conference is on Software Architecture Erosion and Architectural Consistency. The topics include: Interactive Elicitation of Resilience Scenarios Based on Hazard Analysis Techniques;Towards an Extensible Approach for Generative Microservice Development and Deployment Using LEMMA;applying Knowledge-Driven Architecture Composition with Gabble;architectural Optimization for Confidentiality Under Structural Uncertainty;foundations and Research Agenda for Simulation of Smart Ecosystems Architectures;Blended Graphical and Textual Modelling of UML-RT State-machines: An Industrial Experience;toward Awareness Creation of Common Challenges Women are Facing in Academia: A Study from a German Perspective;mapping Source Code to Modular Architectures Using Keywords;hierarchical Code-to-Architecture Mapping;Building the MSR Tool Kaiaulu: Design Principles and Experiences;self-adaptive machinelearning Systems: Research Challenges and Opportunities;behavioral Maps: Identifying Architectural Smells in Self-adaptive Systems at Runtime;an Architectural Approach for Enabling and Developing Cooperative Behaviour in Diverse Autonomous Robots.
Diabetes is a major metabolic disease that can seriously affect the whole human body. Nowadays, diabetes has become a common disease to mankind from young to old. The number of reported diabetic patients is escalating...
详细信息
暂无评论