Decision tree algorithms are very useful approaches in data mining. Indeed, the C4.5 algorithm is a popular data classifier for machine learning. Nowadays there is a wide range of Big Data frameworks such as Hadoop an...
详细信息
Nowadays, social networks play a critical role in online social discourse, particularly during major events such as elections, health crises, and wars. Furthermore, individuals have spent significant time on social ne...
详细信息
Blood transfusion is a medical procedure that involves transfusing blood or one of its components from one or more donors into a patient. Digital technology and machine learning have played a crucial role in the blood...
详细信息
A consensus protocol is a crucial mechanism of distributed networks by which nodes can coordinate their actions and the current state of data. This article describes a BlockDAG consensus algorithm based on the Proof o...
详细信息
We derive and validate a generalization of the two-point visual control model, an accepted cognitive science model for human steering behavior. The generalized model is needed as current steering models are either ins...
详细信息
Cloud computing involves accessing and using computing resources, such as servers, storage, and software applications, over the Internet, enabling scalable access on demand. Cloud computing systems are becoming an ess...
详细信息
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, develo...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha...
详细信息
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are handy to use,but they are susceptible to stolen smart card attacks and few other notable security *** prefer to use Web applications that guarantee for security against several security attacks,especially insider attacks,which is *** of several existing schemes prove the security pitfalls of the protocols from preventing security attacks,specifically insider *** paper introduces LAPUP:a novel lightweight authentication protocol using physically unclonable function(PUF)to prevent security attacks,principally insider *** PUFs are used to generate the security keys,challenge-response pair(CRP)and hardware signature for designing the *** transmitted messages are shared as hash values and encrypted by the keys generated by *** messages are devoid of all possible attacks executed by any attacker,including insider *** is also free from stolen verifier attacks,as the databases are secured by using the hardware signature generated by *** analysis of the protocol exhibits the strength of LAPUP in preventing insider attacks and its resistance against several other security *** evaluation results of the communication and computation costs of LAPUP clearly shows that it achieves better performance than existing protocols,despite providing enhanced security.
Phaseless imaging is a prominent field of study in many imaging modalities. In practical applications, the phaseless measurements usually contain noise and outliers, limiting the reconstruction algorithms' perform...
详细信息
In the process of software development,the ability to localize faults is crucial for improving the efficiency of *** speaking,detecting and repairing errant behavior at an early stage of the development cycle consider...
详细信息
In the process of software development,the ability to localize faults is crucial for improving the efficiency of *** speaking,detecting and repairing errant behavior at an early stage of the development cycle considerably reduces costs and development *** have tried to utilize various methods to locate the faulty ***,failing test cases usually account for a small portion of the test suite,which inevitably leads to the class-imbalance phenomenon and hampers the effectiveness of fault ***,in this work,we propose a new fault localization approach named *** obtaining dynamic execution through test cases,ContextAug traces these executions to build an information model;subsequently,it constructs a failure context with propagation dependencies to intersect with new model-domain failing test samples synthesized by the minimum variability of the minority feature *** contrast to traditional test generation directly from the input domain,ContextAug seeks a new perspective to synthesize failing test samples from the model domain,which is much easier to augment test *** conducting empirical research on real large-sized programs with 13 state-of-the-art fault localization approaches,ContextAug could significantly improve fault localization effectiveness with up to 54.53%.Thus,ContextAug is verified as able to improve fault localization effectiveness.
暂无评论