Graph data represents information efficiently and can be used to learn subsequent tasks easily. In the domain of biological science, recommender systems, social network analysis graph representation learning has becom...
详细信息
Nowadays, in order to solve the problem of information sharing in heterogeneous systems, federated database is a mature solution. However, the distributed database system also faces many performance bottlenecks. For e...
详细信息
Network Intrusion Detection systems (NIDSs) detect intrusion attacks in network traffic. In particular, machinelearning-based NIDSs have attracted attention because of their high detection rates of unknown attacks. A ...
详细信息
ISBN:
(纸本)9798350376975;9798350376968
Network Intrusion Detection systems (NIDSs) detect intrusion attacks in network traffic. In particular, machinelearning-based NIDSs have attracted attention because of their high detection rates of unknown attacks. A distributed processing framework for machine-learning-based NIDSs employing a scalable distributed stream processing system has been proposed in the literature. However, its performance, when machine-learningbased classifiers are implemented has not been comprehensively evaluated. In this study, we implement five representative classifiers (Decision Tree, Random Forest, Naive Bayes, SVM, and kNN) based on this framework and evaluate their throughput and latency. By conducting the experimental measurements, we investigate the difference in the processing performance among these classifiers and the bottlenecks in the processing performance of the framework.
Brain iron deposition, in particular deep gray matter nuclei, increases with advancing age. Hereditary Hemochromatosis (HH) is the most common inherited disorder of systemic iron excess in Europeans and recent studies...
详细信息
Clutter interference significantly affects the detection performance of radar systems. Therefore, simulating clutter during the radar development process is of paramount importance. In recent years, generative deep le...
详细信息
The paper discusses the methods for building monitoring systems. It analyses standard methods for detecting and responding with alert systemsbased on given values of time series metrics. A method for improving the al...
详细信息
In this paper discusses the methods of circuit training, visual analogue pain scale and Total Active Motion. Hardware and biotechnical systems for physical rehabilitation of patients with upper limb muscle dysfunction...
详细信息
This paper implies securing Internet-based Mobile Ad-hoc Networks (iMANETs) with semantic web techniques. To illustrate safety issues, ontologies will be utilised rather than taxonomies. These ontologies can be added ...
详细信息
All interactive systems need a model of their world that they can use to calculate effective behavior. For assurance, the model needs to be accurate but, in autonomous vehicles and many other AI applications, the mode...
详细信息
Requirements modeling is a crucial tool for requirements analysis and has been demonstrated to aid in the comprehension and analysis of requirements. However, constructing requirements models from natural language des...
详细信息
暂无评论