In this paper, we explored approaches that improve the performance of ensemble bagging classifiers for identifying the state of a computer system. The following algorithms are considered: Ensemble pruning, Advanced Vo...
In this paper, we explored approaches that improve the performance of ensemble bagging classifiers for identifying the state of a computer system. The following algorithms are considered: Ensemble pruning, Advanced Voting Algorithms, Dynamic Voting Strategies, Confidence Calibration, Adaptation through Meta-Features and Meta-Learning, which allow improving the voting procedure of the bagging meta-algorithm. Artificial data was generated as initial data, which complicates the classification task and contains an increased amount of noise. In the Google Collab environment, software models of algorithms have been developed, and their quality has been assessed. It was found that the use of the Ensemble pruning and Adaptation through Meta-Features algorithm is the most qualitative. In addition, the Ensemble pruning algorithm reduces the number of basic ensemble classifiers, and, as a result, increases the efficiency of computer system identification. Based on the results of the study, a method for identifying a computer system was proposed through the integrated use of a bagging classifier and an optimization procedure based on the Ensemble pruning algorithm.
AR navigation is one of the interactive ways to use augmented reality. By displaying virtual guides in physical space using a smartphone, users can navigate from point to point more naturally than by comparing the map...
AR navigation is one of the interactive ways to use augmented reality. By displaying virtual guides in physical space using a smartphone, users can navigate from point to point more naturally than by comparing the map to their immediate environment. Thanks to this great advantage, AR navigation can help in searching both inside the academic building and on the territory of the institute. In this paper, the authors used 3DUnity and AR Foundation to create a navigation system around the territory of NTU "KhPI" using augmented reality technology. This development will allow you to navigate the terrain of the KhPI campus, find the location of the desired building, and also look the route from building to building on the map. The whole process is displayed on the smartphone screen. Real-time synchronization allows users in real world to feel virtual space, thereby enhancing poignancy and interaction, and making effect more vivid and almost real.
The Hamming neural network is an effective tool for solving the problems of recognition and classification of discrete objects whose components are encoded with the binary bipolar alphabet, and the difference between ...
详细信息
ISBN:
(数字)9781728193526
ISBN:
(纸本)9781728193533
The Hamming neural network is an effective tool for solving the problems of recognition and classification of discrete objects whose components are encoded with the binary bipolar alphabet, and the difference between the number of identical bipolar components of the compared objects (vectors images) and the Hamming distance between them (Hamming distance is the number of mismatched bits in the binary vectors being compared) is used as the objects proximity measures. However, the Hamming neural network cannot be used to solve these problems in case the components of the compared objects (vectors) are encoded with the binary alphabet. It also cannot be used to evaluate the affinity (proximity) of objects (binary vectors) with Jaccard, Sokal and Michener, Kulzinsky functions, etc. In this regard, a generalized Hamming neural network architecture has been developed. It consists of two main blocks, which can vary being relatively independent on each other. The first block, consisting of one layer of neurons, calculates the proximity measures of the input image and the reference ones stored in the neuron relations weights of this block. Unlike the Hamming neural network, this block can calculate various proximity measures and signals about the magnitude of these proximity measures from the output of the first block neurons which are followed to the inputs of the second block elements. In the Hamming neural network, the Maxnet neural network is used as the second block, which gives out one maximum signal from the outputs of the first block neurons. If the inputs of the Maxnet network receive not only one but several identical maximum signals, then the second block, and, consequently, the Hamming network, cannot recognize the input vector, which is at the same minimum Hamming distance from two or more reference images stored in the first block. The proposed generalized architecture of the Hamming neural network allows using neural networks instead of the Maxnet network, whi
This book constitutes the refereed proceedings of the 8th International Conference on Flexible Query Answering Systems, FQAS 2009, held in Roskilde, Denmark, in October 2009. The 57 papers included in this volume were...
详细信息
ISBN:
(数字)9783642049576
ISBN:
(纸本)9783642049569
This book constitutes the refereed proceedings of the 8th International Conference on Flexible Query Answering Systems, FQAS 2009, held in Roskilde, Denmark, in October 2009. The 57 papers included in this volume were carefully reviewed and selected from 90 submissions. They are structured in topical sections on database management, information retrieval, extraction and mining, ontologies and semantic web, intelligent information extraction from texts, advances in fuzzy querying, personalization, preferences, context and recommendation, and Web as a stream.
The purpose of this research is to develop a functional model of the electrocardiological study using the methodology of functional modeling IDEF0. The functional model of the electrocardiological study are developed ...
The purpose of this research is to develop a functional model of the electrocardiological study using the methodology of functional modeling IDEF0. The functional model of the electrocardiological study are developed in the form of a contextual diagram, its decomposition, and decomposition of the activities "To perform registration and analysis of electrocardiograms" and "To perform diagnostics". Using the proposed functional model of the electrocardiological study, the structural diagram of the cardiological decision support system is developed based on the morphological analysis of biomedical signals with locally concentrated features. The modules of the proposed cardiological decision support system, as well as the modes of its operation, are considered. Further research is aimed at developing an information model of the electrocardiological study for the development of an informational structure of the cardiological decision support system based on the morphological analysis of electrocardiograms.
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit i...
详细信息
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit is embedded using Difference Expansion (DE). We consider two consecutive pixels from cover image, calculate the difference between them andthen embed n-1 bits secret message by modifying the pixel pair. Again, we consider that modified pixel pair to embed 1 bit secret message using embedding function. After that, we distribute these two stego pixel pairs among dual image depending on a shared secret key bit stream. At the receiver end, we extract the secret message successfully and recover original cover image from dual stego image without any distortion. Finally, we compare our scheme with other state-of-the-art methods and obtain reasonably better performance in terms of data embedding capacity.
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology fo...
详细信息
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology for developing security-critical e-commerce applications. We present an approach to model these applications with the Unified Modeling Language (UML) [1] extended by a UML profile to tailor our models to security applications. Our intent is to (semi-) automatically generate a formal specification suitable for verification as well as an implementation from the model. Therefore we offer a development method seamlessly integrating semi-formal and formal methods as well as the implementation. This is a significant advantage compared to other approaches not dealing with all aspects from abstract models down to code. Based on this approach we can prove security properties on the abstract protocol level as well as the correctness of the protocol implementation in Java with respect to the formal model using the refinement approach. In this paper we concentrate on the modeling with UML and some details regarding the transformation of this model into the formal specification. We illustrate our approach on an electronic payment system called Mondex [10]. Mondex has become famous for being the target of the first ITSEC evaluation of the highest level E6 which requires formal specification and verification.
Accelerated Processing Unit (APU) is a heterogeneous multicore processor that contains general-purpose CPU cores and a GPU in a single chip. It also supports Heterogeneous System Architecture (HSA) that provides coher...
详细信息
Most of the sensor devices in the Internet of Things systems are based on energy-efficient microcontrollers, the computing resources of which are limited, as well as the amount of available memory. Increasing the secu...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
Most of the sensor devices in the Internet of Things systems are based on energy-efficient microcontrollers, the computing resources of which are limited, as well as the amount of available memory. Increasing the security of the use of such devices with the help of neural networks is an important and urgent problem. The article describes the possibility of using artificial neural networks in small microcontrollers with limited resources. The purpose of this work is to check the possibility of calculating neural networks based on integer arithmetic to reduce the time of calculating a neural network and eliminate data normalization operations, as well as to evaluate the feasibility of using such neural networks in the field of security of the Internet of Things in comparison with traditional methods, such as black lists and white lists. The following results were obtained: when switching to integer arithmetic, compared to floating point, the accuracy of the result calculations is within the permissible error of neural network training, that is, it has not changed. Execution time decreased by $30-96 \%$ , depending on the architecture of the microcontroller. The program size is reduced by $22-48 \%$ , also depending on the microcontroller architecture. Conclusions: the possibility and expediency of using neural networks optimized for microcontrollers with limited resources was proved. This will increase the security of Internet of Things systems, especially against device authentication threats and intrusion detection. Prospects for further research are determined.
暂无评论