Intrusion Detection systems (IDS) constitute a critical line of defense in contemporary cybersecurity efforts, designed to identify and counteract unauthorized access and malicious activities within computer networks....
Intrusion Detection systems (IDS) constitute a critical line of defense in contemporary cybersecurity efforts, designed to identify and counteract unauthorized access and malicious activities within computer networks. Leveraging the capabilities of Machine Learning (ML) algorithms, IDS endeavors to distinguish potentially harmful alterations and security breaches. this study delves into the pivotal question of algorithm selection for optimal performance. Machine Learning-based Intrusion Detection systems (ML-IDS) are designed not only to enhance overall system security but also to strike a balance between minimizing false alarms and maximizing true alarm rates. To address this, we empirically evaluate five ML algorithms and present their performance in the context of network intrusion detection. those algorithms are as follows: Random Forest achieves an impressive accuracy rate of 99.88%, Gradient Boosting demonstrates robust performance at 99.76%, AdaBoost exhibits an accuracy of 90.00%, Decision Tree boasts a noteworthy accuracy of 99.80%, and Extremely Randomized Trees demonstrate substantial proficiency with an accuracy of 99.86%. this empirical exploration enriches our comprehension of these algorithms and offers critical insights to enhance the security of computersystems.
Legal artificial intelligence (LegalAI) is an emerging field that leverages AI technology to enhance legal services. Similar Case Matching (SCM), which calculates the relevance between a candidate and a target case, i...
详细信息
Schelling games use a game-theoretic approach to study the phenomenon of residential segregation. We consider four global measures of diversity, and prove asymptotically tight or almost tight bounds on the price of an...
详细信息
ISBN:
(纸本)9798400714269
Schelling games use a game-theoretic approach to study the phenomenon of residential segregation. We consider four global measures of diversity, and prove asymptotically tight or almost tight bounds on the price of anarchy with respect to these measures on both general graphs and common specific graphs. In addition we did simulations of our swap games.
In this paper, we present a compositional condition for ensuring safety of a collection of interacting systems modeled by inter-triggering hybrid automata (IthA). IthA is a modeling formalism for representing multi-ag...
详细信息
ISBN:
(纸本)9781450383394
In this paper, we present a compositional condition for ensuring safety of a collection of interacting systems modeled by inter-triggering hybrid automata (IthA). IthA is a modeling formalism for representing multi-agent systems in which each agent is governed by individual dynamics but can also interact with other agents through triggering actions. these triggering actions result in a jump/reset in the state of other agents according to a global resolution function. A sufficient condition for safety of the collection, inspired by responsibility-sensitive safety, is developed in two parts: self-safety relating to the individual dynamics, and responsibility relating to the triggering actions. the condition relies on having an over-approximation method for the resolution function. We further show how such over-approximations can be obtained and improved via communication. We use two examples, a job scheduling task on parallel processors and a highway driving example, throughout the paper to illustrate the concepts. Finally, we provide a comprehensive evaluation on how the proposed condition can be leveraged for several multi-agent control and supervision examples.
Voltage control becomes a crucial challenge as the penetration of renewable energy sources (RESs) increases in distribution systems. the intermittent and variable nature of RESs like solar and wind power can lead to s...
Voltage control becomes a crucial challenge as the penetration of renewable energy sources (RESs) increases in distribution systems. the intermittent and variable nature of RESs like solar and wind power can lead to several voltage problems, which can have detrimental effects on the stability and reliability of the distribution networks. this paper introduces a promising cooperative voltage control (CVC) technique for distribution systems with renewable-based distributed generations (DGs). the objectives of the CVC technique are regulating the voltages within the standard limits, maximizing the DGs’ power generation, and decreasing the number of control operations of the voltage control devices in the distribution systems. the proposed CVC consists of two control stages; the DG prosumers perform the first control stage, whereas the step voltage regulators manage the second stage. this paper describes only the first stage, the DG prosumers control stage, using a proposed target nodal voltage control (TNVC) approach. the TNVC approach aims to maximize the DG’s powers and mitigate the overvoltage problem using the optimized nodal voltage as a control signal. Our approach includes a unique feature that effectively reduces control performance degradation caused by infrequent data exchange among agents. the simulation results confirm the control performance of the proposed TNVC approach in achieving the desired objectives.
In the domain of automotive manufacturing, specification documents represent intricate descriptions detailing every aspect of a product, design, or service. Conventionally, these specifications demand the deployment o...
In the domain of automotive manufacturing, specification documents represent intricate descriptions detailing every aspect of a product, design, or service. Conventionally, these specifications demand the deployment of expert teams to manually identify crucial data from the extensive documentation. the need to automate the extraction of candidate information from these documents is increasingly pressing in this industry. this research encounters two central challenges: Firstly, the queries for the specifications input by users are typically concise and ambiguous; secondly, not every word in a query carries the same significance. In response to these challenges, we propose LeCAR, which exploits contextual data to clarify query sentences and concentrate the search scope. Our experiments validate that the proposed method outperforms existing techniques that employ pre-trained language models, all without necessitating additional training data.
this paper analyzes Click-through rate prediction (CTR), a critical component within recommender systems aiming to forecast the personalized probability of user-item click events. Recent advancements have shown that i...
this paper analyzes Click-through rate prediction (CTR), a critical component within recommender systems aiming to forecast the personalized probability of user-item click events. Recent advancements have shown that incorporating user behavior sequences into CTR prediction models can yield significant performance improvements. However, CTR prediction models primarily rely on implicit positive feedback, such as clicks, from user-item interactions while overlooking the negative feedback, such as unclicks. Moreover, the implicit feedback obtained from users often contains noisy data, which hampers the accuracy of user interest modeling. As a solution, we propose a novel framework for estimating click-through rates, leveraging the modeling of Denoised Implicit feedback Behavior (DIB). DIB integrates the complete implicit feedback behavior of users into the click-through rate estimation task and aims to mitigate the influence of noise in implicit feedback on the model’s accuracy. through extensive experiments conducted on real-world, largescale datasets, we demonstrate that DIB outperforms state-of-the-art models by a substantial margin, resulting in an approximate 5% improvement in Area Under the Curve (AUC).
Recently, the utilization of Radio Frequency (RF) devices has increased exponentially over numerous vertical platforms. this rise has led to an abundance of Radio Frequency Interference (RFI) continues to plague RF sy...
Recently, the utilization of Radio Frequency (RF) devices has increased exponentially over numerous vertical platforms. this rise has led to an abundance of Radio Frequency Interference (RFI) continues to plague RF systems today. the continued crowding of the RF spectrum makes RFI efficient and lightweight mitigation critical. Detecting and localizing the interfering signals is the foremost step for mitigating RFI concerns. Addressing these challenges, we propose a novel and lightweight approach, namely RaFID, to detect and locate the RFI by incorporating deep neural networks (DNNs) and statistical analysis via batch-wise mean aggregation and standard deviation (SD) calculations. RaFID investigates the generation of an expected signal using DNNs within the time domain. We performed the statistical analysis to compare our generated expected signal withthe received signal to detect the existence of interference and determine interference frequency. Experimental results show that signal estimation is accurate, with a mean squared error of 0.012 and an average run-time of 0.5 seconds.
Usability and user acceptance play an important role in the development of new systems. In the present study, a new generation of laser control software from TRUMPF Laser GmbH was evaluated regarding its usability and...
详细信息
the paper discusses the existing approaches to considering individual educational trajectories and ways of their practical implementation in the activities of educational organizations. To develop a graduate's com...
the paper discusses the existing approaches to considering individual educational trajectories and ways of their practical implementation in the activities of educational organizations. To develop a graduate's competence model, we present a method that is based on an analysis of industry requirements and professional standards. the proposed method was used to develop an up-to-date list of professional competencies of a radio engineer (master's degree). Moreover, a model of an educational program was developed that supports individual educational trajectories for an enlarged group of training areas and specialties 11.04.00 “Electronics, Radio engineering, and Communication systems”. this model describes the volume of the main structural elements, the content of blocks and modules of the educational program, and tools for building an individual educational trajectory, taking into account the current legislation. the proposed approach to building an individual educational trajectory is employed from the moment a student enters the educational process until the moment he enters the state final attestation.
暂无评论