The nonlinear adaptation algorithm is considered as applied to stabilization of the center of mass of a moving object subject to nonrandom noise in the control variable. An unknown disturbance is a bounded and continu...
详细信息
While Bernal stacked bilayer graphene bears two distinct atom types in its lattice, there exists no analytical framework addressing the number of atomic environments that emerge in twisted bilayer graphene superlattic...
详细信息
We consider a dynamic continuous gas production at a deposit. We set and solve the optimization control problem for maximum profit, taking into account the discount factor. The problem posed relates to some optimal co...
详细信息
A polydyne cam and knife follower system are studied. The effect of cam angular velocity and follower guides internal dimensions on Lyapunov parameter is considered. Wolf algorithm is used to quantify largest Lyapunov...
详细信息
Converting source codes to feature vectors can be useful in programming-related tasks, such as plagiarism detection on ACM contests. We present a brand-new method for feature extraction from C++ files, which includes ...
详细信息
Converting source codes to feature vectors can be useful in programming-related tasks, such as plagiarism detection on ACM contests. We present a brand-new method for feature extraction from C++ files, which includes both features describing syntactic and lexical properties of an AST tree and features characterizing disassembly of source code. We propose a method for solving the plagiarism detection task as a classification problem. We prove the effectiveness of our feature set by testing on a dataset that contains50 ACM problems and ~90 k solutions for them. Trained xgboost model gets a relative binary f1-score=0.745 on the test set.
作者:
Mucahit SoyluResul DasInonu University
Department of Organized Industrial Zone Vocational School Computer Programming Malatya Turkiye Firat University
Faculty of Technology Department of Software Engineering 23119 Elazig Turkiye
This study proposes a hybrid approach for visualizing cyberattacks by combining the deep learning-based GAT model with JavaScript-based graph visualization tools. The model processes large, heterogeneous data from the...
This study proposes a hybrid approach for visualizing cyberattacks by combining the deep learning-based GAT model with JavaScript-based graph visualization tools. The model processes large, heterogeneous data from the UNSW-NB15 dataset to generate dynamic and meaningful graphs. In the data cleaning phase, missing and erroneous data were removed, unnecessary columns were discarded, and the data was transformed into a format suitable for modeling. Then, the data was converted into homogeneous graphs, and heterogeneous structures were created for analysis using the GAT model. GAT prioritizes relationships between nodes in the graph with an attention mechanism, effectively detecting attack patterns. The analyzed data was then converted into interactive graphs using tools like SigmaJS, with attacks between the same nodes grouped to reduce graph complexity. Users can explore these dynamic graphs in detail, examine attack types, and track events over time. This approach significantly benefits cybersecurity professionals, allowing them to better understand, track, and develop defense strategies against cyberattacks.
A developed adaptive forecasting model for cloud resource allocation is presented. It employs principal component analysis on a sequence of virtual machine (VM) requests. Requests are processed to detect anomalies, an...
A developed adaptive forecasting model for cloud resource allocation is presented. It employs principal component analysis on a sequence of virtual machine (VM) requests. Requests are processed to detect anomalies, and adaptive predictions are computed using EEMD-ARIMA or EEMD-RT-ARIMA methods. The choice between EEMD-ARIMA and EEMD-RT-ARIMA methods is determined by comparing the execution time values ${\mathrm {R}}_{\mathrm {{i}}}$ (sequential series test) with the threshold value ${\mathrm {R}}_{\mathrm {{t d}}}$. If ${\mathrm {R}}_{\mathrm {{i}}} \gt {\mathrm {Rtd}}$, EEMD-ARIMA is used; if ${\mathrm {R}}_{\mathrm {{i}}} \leq {\mathrm {R}}_{\mathrm {{t d}}}$, EEMD-RT-ARIMA is applied. This adaptive approach enables the selection of a prediction method based on data characteristics and resource demands. To optimize the selection of the ${\mathrm {R}}_{\mathrm {{t d}}}$ threshold, the impact on accuracy and time costs is examined. A quartile method is utilized to detect dynamic spikes, and cubic spline interpolation is employed to smooth data. EEMDRT-ARIMA-based forecasting enhances accuracy through preprocessing of dynamic spikes and adaptive method selection. Calculations of time costs indicate that this method reduces forecasting time by 1.5 times by extracting core component sequences.
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on ...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on the collected data about the cyberattacks. It makes it possible to give an answer about the cyberattacks' existence in the computer networks and its hosts. Developed attack detection approach consists of training and detection stages. The mechanism of attack detection system is based on the cyberattacks' features gathering from network or hosts, extracting the subset of acquired set and generation the attacks' detection rules. Genetic algorithms are used for the minimization of the feature set, which allows effective using of the system resources for attacks detection. In order to detect the attacks, the proposed technique involves the rule generation. The attacks' features are described by the set of sub-rules. It is suggested to use the feature with the smallest domain for generating the minimal set for rules. It is possible to select the optimal feature after all selected features which were discovered while applying the genetic algorithm. The sub-rule set is used with the aim to reduce false positive rate.
A solution for the problem of controlling the unmanned quadrotor vehicles group flight in presence of obstacles of complex form is proposed. A traditional approach to construction of the target function does not solve...
详细信息
Major challenge in the analysis of clinical data and knowledge discovery is to suggest an integrated, advanced and efficient tools, methods and technologies for access and processing of progressively increasing amount...
详细信息
暂无评论