Cloud Data Center (CDC) security remains a major challenge for business organizations and takes an important concern with research works. The attacker purpose is to guarantee the service unavailability and maximize th...
详细信息
The power consumption of programs and algorithms is currently a very active research field. This includes the investigation of the effect of different programming techniques on power consumption. Some programming tech...
详细信息
The objective of this paper is to discuss different scenarios for Principal Component Analysis classifier implemented for email filtering process (Ham vs. spam emails). The study highlights on the variation of the acc...
详细信息
Phishing attacks are common online, which have resulted in financial losses through using either malware or social engineering. Thus, phishing email detection with high accuracy has been an issue of great interest. Ma...
详细信息
ISBN:
(纸本)9781538637913
Phishing attacks are common online, which have resulted in financial losses through using either malware or social engineering. Thus, phishing email detection with high accuracy has been an issue of great interest. Machine learning-based detection methods, particularly Support Vector Machine (SVM), have been proved to be effective. However, the parameters of kernel method, whose default is that class numbers reciprocals in general, affect the classification accuracy of SVM. In order to improve the classification accuracy, this paper proposes a model, called Cuckoo Search SVM(CS-SVM). The CS-SVM extracts 23 features, which are used to construct the hybrid classifier. In the hybrid classifier, Cuckoo Search (CS) is integrated with SVM to optimize parameter selection of Radial Basis Function(RBF). Experiments are performed on a dataset consisting of 1,384 phishing emails and 20,071 non-phishing emails. Experimental results show that the proposed method has higher phishing email detection accuracy than SVM classifier with default parameter value. The CS-SVM classifier can obtain the highest accuracy of 99.52 percent.
In terms of the characteristics of time lag system,the method of multiple models adaptive predictive control based on particle swarm optimization(PSO) algorithm is *** Models can approach the dynamic character of the ...
In terms of the characteristics of time lag system,the method of multiple models adaptive predictive control based on particle swarm optimization(PSO) algorithm is *** Models can approach the dynamic character of the controlled *** can design corresponding controller to each *** can get final controlled variable with the limited controlled variable by means of *** controller adopts Predictive Control *** last the method gets the global optimum by PSO *** compare the method to PID in time lag *** result indicates the method not only can overcome inaccuracy of modeling and time variation of parameters but also has good control performance and stronger robustness.
In the era of the internet of things and full database interconnectivity, various sensitive information is gathered, stored and processed for every individual from many companies. Sometimes these datasets are made ava...
详细信息
The rising complexity of embedded digital applications and the growing importance of time-to-market require powerful modeling methods and tools to automate the design and implementation process. Electronic design auto...
详细信息
Computational offloading has been shown being a promising approach to prolong the battery life of smartphones. To come up with energy-efficient offloading strategies, it is crucial to understand how much energy is use...
详细信息
Terrain viewshed analysis is the basis of studying on the terrain applications such as observation point siting and shortest path *** the rapid development of digital photogrammetry and remote sensing,at the time of g...
Terrain viewshed analysis is the basis of studying on the terrain applications such as observation point siting and shortest path *** the rapid development of digital photogrammetry and remote sensing,at the time of getting large scale terrain data,it also puts forward higher requirements for the efficiency and method of the viewshed *** this paper,a parallel XDraw viewshed analysis algorithm is proposed on the process and *** algorithm presents a fine-grained data scheduling strategy between different ***,it divides DEM terrain data into a lot of triangular ***,the algorithm schedules the data with a triangular region in row or column as a thread and calculates the visibility of each grid unit on a row or *** results show that the proposed method can greatly improve the computational efficiency comparing with other existing methods.
Mobile shopping is defined as "the use of the wireless Internet service for shopping activities via a mobile device." Based on TAM Technology Acceptance Model and CRT(Cognitive Resource Theory),this study in...
Mobile shopping is defined as "the use of the wireless Internet service for shopping activities via a mobile device." Based on TAM Technology Acceptance Model and CRT(Cognitive Resource Theory),this study investigated how time pressure influenced consumers' mobile shopping *** was found that(1) time pressure positively affects mobile shopping intention,(2) access convenience,search convenience and transaction convenience mediates the influence of time pressure on mobile shopping intention,(3) the mediating effect of postpurchase convenience on the relationship between time pressure and mobile shopping intention is not *** theoretical and managerial implications are derived from these findings.
暂无评论