With the rapid development of computer technology and network technology,the number of electronic documents has expanded ***,comprehensively and accurately finding the information and information needed in this vast a...
详细信息
With the rapid development of computer technology and network technology,the number of electronic documents has expanded ***,comprehensively and accurately finding the information and information needed in this vast amount of information has become the focus of attention and has become a hot topic in the research *** a typical example of human language,Tibetan has the common way of thinking and language *** the development of Tibetan information technology,the efforts of many researchers in research institutes,institutions of higher learning and enterprises have achieved fruitful results,which has made Tibetan word processing technology *** the popularity of the Internet and the arrival of the era of big data,the data of Tibetan electronic resources has grown rapidly,and these data have become the cornerstone for the further development of Tibetan information *** present,many achievements have been made in the fields of Tibetan processing and statement processing,but there are still many unresolved problems.
This paper discusses a novel frame work approach of Software Defined Network based prevention on phishing attack with the help of the deep machine learning with CANTINA approach (DMLCA) in the cyberspace. Cyber securi...
详细信息
This paper discusses a novel frame work approach of Software Defined Network based prevention on phishing attack with the help of the deep machine learning with CANTINA approach (DMLCA) in the cyberspace. Cyber security is a significant concern in the operations of coalition, and is a complex challenge because of some needs in operational effectiveness and also the trust relationship limit which exists over the coalition partners. In networking, new promising paradigms like Software Defined Networks (SDN), offer a method to deal more efficiently with their security constraints. This machine learning approach is to deal with the phishing attack problem based on the SVM (support vector machine) and this machine learning technique with SVM helps to effectively to solve classification problems. The CANTINA approach helps to support the robust hyperlinks with the help of evaluating the term frequency (TF) and inverse document frequency and (IDF). This information retrieval algorithm helps to compare, classify and retrieve various documents. The objective is to improve the detection accuracy with the help of the DMLCA method with the various parameters such as detection accuracy based on the true positive ratio and false positive ratio, precision and recall.
Using a multi-agent paradigm in an RFID-based health information system is a very promising approach in many domains such as emergency situations, supervising the medication of elderly people and even automatic diagno...
详细信息
ISBN:
(纸本)9781538603581
Using a multi-agent paradigm in an RFID-based health information system is a very promising approach in many domains such as emergency situations, supervising the medication of elderly people and even automatic diagnosis. We propose a hybrid multi-agent system, which uses both mobile and static agents for retrieving various medical records of patients who undergo medical investigations in different medical units. This paper presents an analytical and experimental evaluation of the algorithm applied in the informationretrieval process, in order to reveal the parameters that play a role in the performance improvement of the hybrid multi-agent system.
In this paper we evaluate a selection of data retrievalalgorithms for storage efficiency, retrieval speed and partial matching capabilities using a large informationretrieval dataset. We evaluate standard data struc...
详细信息
In this paper we evaluate a selection of data retrievalalgorithms for storage efficiency, retrieval speed and partial matching capabilities using a large informationretrieval dataset. We evaluate standard data structures, for example inverted file lists and hash tables, but also a novel binary neural network that incorporates: single-epoch training, superimposed coding and associative matching in a binary matrix data structure. We identify the strengths and weaknesses of the approaches. From our evaluation, the novel neural network approach is superior with respect to training speed and partial match retrieval time. From the results, we make recommendations for the appropriate usage of the novel neural approach. (C) 2001 Elsevier Science Ltd. All rights reserved.
暂无评论