Ransomware is a continuing threat and has resulted in the battle between the development and detection of new techniques. Detection and mitigation systems have been developed and are in wide-scale use;however, their r...
详细信息
ISBN:
(纸本)9783030336172;9783030336165
Ransomware is a continuing threat and has resulted in the battle between the development and detection of new techniques. Detection and mitigation systems have been developed and are in wide-scale use;however, their reactive nature has resulted in a continuing evolution and updating process. this is largely because detection mechanisms can often be circumvented by introducing changes in the malicious code and its behaviour. In this paper, we demonstrate a classification technique of integrating both static and dynamic features to increase the accuracy of detection and classification of ransomware. We train supervised machine learning algorithms using a test set and use a confusion matrix to observe accuracy, enabling a systematic comparison of each algorithm. In this work, supervised algorithms such as the Naive Bayes algorithm resulted in an accuracy of 96% withthe test set result, SVM 99.5%, random forest 99.5%, and 96%. We also use Youden's index to determine sensitivity and specificity.
the effort of data mining, especially in relation to association rules in real world business applications, is significantly important. Recently, association rules algorithms have been developed to cope with multidime...
详细信息
Self-organizing maps (SOM) had been used for input data quantization and visual display of data, an important property that does not exist in most of clustering algorithms. Effective data clustering using SOM involves...
详细信息
ISBN:
(纸本)9783642153808
Self-organizing maps (SOM) had been used for input data quantization and visual display of data, an important property that does not exist in most of clustering algorithms. Effective data clustering using SOM involves two or three steps procedure. After proper network training, units can be clustered generating regions of neurons which are related to data clusters. the basic assumption relies on the data density approximation by the neurons through unsupervised learning. this paper presents a gradient-based SOM visualization method and compares it with U-matrix. It also discusses steps toward clustering using SOM and morphological operators. Results using benchmark datasets show that the new method is more robust to choice of parameters in the filtering phase than the conventional method. the paper also proposes an enhancing method to map visualization taking advantage of the neurons activity, which improve cluster detection especially in small maps.
Withthe development of automated vehicles and advanced driver assistance systems, the compression of the large amount of data generated by the vehicle camera sensors becomes a necessary processing step to improve the...
详细信息
ISBN:
(纸本)9781665497701
Withthe development of automated vehicles and advanced driver assistance systems, the compression of the large amount of data generated by the vehicle camera sensors becomes a necessary processing step to improve the automated driving system efficiency. H.264 is a widely adopted video compression scheme, and it has been designed for human vision. Rate control in H.264 uses fixed quantisation parameter, however, this process can lead to fluctuation in different regions of the image quality of each frame. In this paper, we propose a two-stage H.264 based video compression framework, named "Two Stage Compression (TSC)", to compress the automotive camera videos with different values of compression rate in different regions of each frame. In the first stage, each frame will be divided into the region-of-interest and the region-out-of-interest. In the second stage, different compression ratios will be applied based on the importance of the region. the experimental results show that under the same overall compression ratio, our proposed TSC increments the semantic-aware PSNR by 3.213 dB compared to uniform H.264 compression. Our method is also compared to uniform H.264 compression using a segmentation algorithm, with an improvement of 1.77% in mIOU, the average Intersection over Union.
Bloom filters are data structures that can efficiently represent a set of elements providing operations of insertion and membership testing. Nevertheless, these filters may yield false positive results when testing fo...
详细信息
ISBN:
(纸本)9783642153808
Bloom filters are data structures that can efficiently represent a set of elements providing operations of insertion and membership testing. Nevertheless, these filters may yield false positive results when testing for elements that have not been previously inserted. In general, higher false positive rates are expected for sets with larger cardinality with constant filter size. this paper shows that for sets where a distance metric can be defined, reducing the false positive rate is possible if elements to be inserted exhibit locality according to this metric. In this way, a hardware alternative to Bloom filters able to extract spatial locality features is proposed and analyzed.
Travel time prediction is important for freight transportation companies. Accurate travel time prediction can help these companies make better planning and task scheduling. For several reasons, most companies are not ...
详细信息
ISBN:
(数字)9783319462578
ISBN:
(纸本)9783319462578;9783319462561
Travel time prediction is important for freight transportation companies. Accurate travel time prediction can help these companies make better planning and task scheduling. For several reasons, most companies are not able to obtain traffic flow data from traffic management authorities, but a large amount of trajectory data were collected everyday which has not been fully utilised. In this study, we aim to fill this gap and performed travel time prediction for freight vehicles at individual level using sparse Gaussian processes regression (SGPR) models with trajectory data. the results show that the prediction performance can be gradually improved by adding more mean speed estimates of traveled distance from the first 5 min as the real-time information. the overall performances of SGPR models are very similar to full GP, supported vector regression (SVR) and artificial neural network (ANN) models. the computational complexity of SGPR models is O(mn(2)), and it does not require lengthy model fitting process as SVR and ANN. this makes GP models more practicable for real-world practice in large-scale transportation data analyses.
Reinforcement learning involves learning to adapt to environments through the presentation of rewards - special input - serving as clues. To obtain quick rational policies, profit sharing, rational policy making algor...
详细信息
ISBN:
(纸本)9783642153808
Reinforcement learning involves learning to adapt to environments through the presentation of rewards - special input - serving as clues. To obtain quick rational policies, profit sharing, rational policy making algorithm, penalty avoiding rational policy making algorithm (PARP), PS-r* and PS-r# are used. they are called Exploitation-oriented learning (XoL). When applying reinforcement learning to actual problems, treatment of continuous-valued input and output are sometimes required. A method based on PARP is proposed as a XoL method corresponding to the continuous-valued input, but continuous-valued output cannot be treated. We study the treatment of continuous-valued output suitable for a XoL method in which the environment includes both a reward and a penalty. We extend PARP in the continuous-valued input to continuous-valued output. We apply our proposal to the pole-cart balancing problem and confirm its validity.
Within the automotive industry today, data collection, for legacy manufacturing equipment, largely relies on the data being pushed from the machine's PLCs to an upper system. Not only does this require programmers...
详细信息
ISBN:
(纸本)9783030034962;9783030034955
Within the automotive industry today, data collection, for legacy manufacturing equipment, largely relies on the data being pushed from the machine's PLCs to an upper system. Not only does this require programmers' efforts to collect and provide the data, but it is also prone to errors or even intentional manipulation. External monitoring, is available through Open Platform Communication (OPC), but it is time consuming to set up and requires expert knowledge of the system as well. A nomenclature based methodology has been devised for the external monitoring of unknown controls systems, adhering to a minimum set of rules regarding the naming and typing of the data points of interest, which can be deployed within minutes without human intervention. the validity of the concept will be demonstrated through implementation within an automotive body shop and the quality of the created log will be evaluated. the impact of such a fine grained monitoring effort on the communication infrastructure will also be measured within the manufacturing facility. It is concluded that, based on the methodology provided in this paper, it is possible to derive OPC groups and items from a PLC program without human intervention in order to obtain a detailed event log.
作者:
Wang, Jessica Jun LinSingh, SameerATR Lab
Computer Science Department School of Engineering Computer Science and Mathematics University of Exeter Harrison Building Exeter United Kingdom
the identification of human activity in video, for example whether a person is walking, clapping, waving, etc. is extremely important for video interpretation. Since different people would perform the same action acro...
详细信息
Improving energy efficiency by monitoring household electrical consumption is of significant importance withthe present-day climate change concerns. A solution for the electrical consumption management problem is the...
详细信息
ISBN:
(纸本)9783642153808
Improving energy efficiency by monitoring household electrical consumption is of significant importance withthe present-day climate change concerns. A solution for the electrical consumption management problem is the use of a non-intrusive load monitoring system (NILM). this system captures the signals from the aggregate consumption, extracts the features from these signals and classifies the extracted features in order to identify the switched on appliances. An effective device identification (ID) requires a signature to be assigned for each appliance. Moreover, to specify an ID for each device, signal processing techniques are needed for extracting the relevant features. this paper describes a technique for the steady-states recognition in an electrical digital signal as the first stage for the implementation of an innovative NILM. Furthermore, the final goal is to develop an intelligent system for the identification of the appliances by automatedlearning. the proposed approach is based on the ratio value between rectangular areas defined by the signal samples. the computational experiments show the method effectiveness for the accurate steady-states identification in the electrical input signals.
暂无评论