Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be re...
详细信息
ISBN:
(纸本)1601320752
Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be regarded as classification problem, we use Artificial Neural networks for detection. Using a benchmark study and set from the KDD (Knowledge Data Discovery and Data Mining) competition designed by DARPA and Multi-layered perceptron neural network, this Paper will aim to solve a multi class problem using MLP in to distinguish the attack records from normal ones, and also identify the attack type. In addition, it shows how to use Tikhonov regularization parameter to optimize the optimal network architecture in order to increase the system performance. The results show that the designed system is capable of classifying records with 98.34% accuracy with two hidden layers of neuron. Finally, the performance of the benchmark study is compared with our results.
Systems of polynomial equations over an algebraically-closed field K can be used to concisely model many combinatorial problems. In this way, a combinatorial problem is feasible (e.g., a graph is 3-colorable, hamilton...
详细信息
ISBN:
(纸本)9781595939043
Systems of polynomial equations over an algebraically-closed field K can be used to concisely model many combinatorial problems. In this way, a combinatorial problem is feasible (e.g., a graph is 3-colorable, hamiltonian, etc.) if and only if a related system of polynomial equations has a solution over K. In this paper, we investigate an algorithm aimed at proving combinatorial infeasibility based on the observed low degree of Hilbert's Nullstellensatz certificates for polynomial systems arising in combinatorics and on large-scale linear-algebra computations over K. We report on experiments based on the problem of proving the non-3-colorability of graphs. We successfully solved graph problem instances having thousands of nodes and tens of thousands of edges.
This paper presents dynamic behaviors of autonomous solid oxide fuel cells (SOFC) with AC bus control. Both voltage and frequency control are utilized to achieve load-sharing of the studied SOFC feeding isolated loads...
详细信息
This paper presents dynamic behaviors of autonomous solid oxide fuel cells (SOFC) with AC bus control. Both voltage and frequency control are utilized to achieve load-sharing of the studied SOFC feeding isolated loads. A DC-to-DC converter is connected to the output terminals of the studied SOFC for stabilizing output voltage and current fluctuations under different loading conditions. The PWM inverter connected to the output terminals of the DC-to-DC converter is operated under voltage-controlled mode to regulate the voltage profile across the connected loads. It can be concluded from the simulation results that the proposed voltage and frequency droop controllers of the PWM inverter may operate satisfactory under stand-alone mode.
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected err...
详细信息
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected error for some binary symmetric and non-symmetric channels protected by appropriate codes. In detail, communication via different binary symmetric channels (BSCs), generalized erasure channels and symmetrized binary non symmetric channels (BNSCs) is investigated. Simple upper bounds are given, relating the new formulas to that one of the BSC Finally the results in connection with an inequality for proper codes are applied to multi wavelength optical transmission through channels generated by semiconductor lasers.
The paper contains our study regarding the reduction of urban noise using the sonic barrier walls as to the EMPARA procedure, which is based on the simplified standard method for measurements and computing of surface ...
详细信息
The paper contains our study regarding the reduction of urban noise using the sonic barrier walls as to the EMPARA procedure, which is based on the simplified standard method for measurements and computing of surface traffic noise inside urban agglomeration, as they are given in SRM2 laws (Netherlands standards). The studies are made taking into account all parameters that characterize the noise attenuation. The graphical representations are made considering "n-1" constant parameters, and one parameter varying with time. In this way we obtained the influence of each parameter in the diminution of the urban noise using the noise barrier walls. In addition we realized a measurement for a real barrier wall inside the city of Oradea. Our study also contains a FEM model for the analyzed configuration. The comparison between measurements and computation was fair enough, which means that our theoretical study is acceptable and characterizes the noise pollution and its diminution in the urban agglomeration. The measurement-device was a CENTER 322 Sound Lever Meter.
We present an analysis of the feasibility of executing a parallel bioinspired model of laser dynamics, based on cellular automata (CA), on the usual target platform of this kind of applications: a heterogeneous non-de...
详细信息
Safety-related systems mostly comprise hardware and software solutions. Due to the increasing application of complex hardware and software systems, the software systems have to be considered regarding safety as well a...
详细信息
Numerical approximate computations can solve large and complex problems *** have the advantage of high *** they only give approximate results,whereas we need exact results in some *** is a gap between approximate comp...
详细信息
Numerical approximate computations can solve large and complex problems *** have the advantage of high *** they only give approximate results,whereas we need exact results in some *** is a gap between approximate computations and exact results. In this paper,we build a bridge by which exact results can be obtained by numerical approximate computations.
With single thread performance starting to plateau, HW architects have turned to chip level multiprocessing (CMP) to increase processing power. All major microprocessor companies are aggressively shipping multi-core p...
详细信息
ISBN:
(纸本)1595936025
With single thread performance starting to plateau, HW architects have turned to chip level multiprocessing (CMP) to increase processing power. All major microprocessor companies are aggressively shipping multi-core products in the mainstream computing market. Moore's law will largely be used to increase HW thread-level parallelism through higher core counts in a CMP environment. CMPs bring new challenges into the design of the software system stack. In this tutorial, we talk about the shift to multi-core processors and the programming implications. In particular, we focus on transactional programming. Transactions have emerged as a promising alternative to lock-based synchronization that eliminates many of the problems associated with lock-based synchronization. We discuss the design of both hardware and software transactional memory and quantify the tradeoffs between the different design points. We show how to extend the Java and C languages with transactional constructs, and how to integrate transactions with compiler optimizations and the language runtime (e.g., memory manager and garbage collection).
In this paper, a new multipurpose Lightweight Grid (LWG) system is introduced, under the acronym Computational Basic Reprogrammable Adaptive (CoBRA) grid. It provides the functionality grid users require, and offers g...
详细信息
暂无评论