The article presents the design of an application interface for associated medical data visualization and management for neurologists in a stroke clustering and prediction system called Stroke MD. The goal of the syst...
详细信息
ISBN:
(纸本)9781467375467
The article presents the design of an application interface for associated medical data visualization and management for neurologists in a stroke clustering and prediction system called Stroke MD. The goal of the system is to facilitate efficient visual data introduction and knowledge extraction based on a predictive model implementation. Aspects such as quality of the visualized data, type of the viewed data (risk factor groups, clustered groups, data alerts, conclusions etc.) and efficient user-software interaction directly influenced decisions about system design, in particular the design of the doctor's/patient's user interface sides, input methods and user-software interaction techniques, ending in to a hybrid setup of interface.
A rising variety of platforms and software programs have leveraged repository-stored datasets and remote access in recent years. As a result, datasets are more vulnerable to malicious attacks. As a result, network sec...
A rising variety of platforms and software programs have leveraged repository-stored datasets and remote access in recent years. As a result, datasets are more vulnerable to malicious attacks. As a result, network security has grown in importance as a research topic. The usage of intrusion detection systems is a well-known strategy for safeguarding computer networks. This paper proposes an anomaly detection method that blends rule-based and machine-learning-based methods. In order to construct the appropriate rules, a genetic algorithm is utilized. Principal component analysis is used to extract the relevant features aimed to improve the performance. The suggested method is validated experimentally using the KDD Cup 1999 dataset, which meets the requirement of using appropriate data. The proposed method is applied to detect and analyze four types of attacks in a well-known benchmark dataset: Neptune, Ipsweep, Pod, and Teardrop, utilizing Support Vector Machine, Decision Tree, and Naive Bayes algorithms. After testing the characteristics specified in the training phase, the data is classified into attack categories and normal behavior during the machine learning phase.
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
详细信息
It is the intent of this paper to describe an implementation of a curriculum compatable with the ACM “Curriculum Recommendations and Guide-lines for the Community and Junior College Career Program in computer Program...
ISBN:
(纸本)9781450374316
It is the intent of this paper to describe an implementation of a curriculum compatable with the ACM “Curriculum Recommendations and Guide-lines for the Community and Junior College Career Program in computerprogramming” (also known as the “Little Report”). In order to facilitate comparisons among curricula, this paper follows the “format” developed by members of the ACM C3S-CAJC working group.
The modelling of the educational processes and their operational support is a key aspect in the construction of more effective e-learning applications. Instructional models are usually described by means of an educati...
详细信息
The modelling of the educational processes and their operational support is a key aspect in the construction of more effective e-learning applications. Instructional models are usually described by means of an educational modelling language (EML). The EML used can be one of the available standards (e.g. IMS Learning Design), the customization of a standard to meet a specific application profile, or even a domain-specific EML specifically designed to best fit in the very particular needs of a learning scenario. In this paper we propose , a general authoring and operationalization architecture capable of dealing with all these possibilities in a highly modular and flexible way. We also outline a specific implementation of based on standard XML technologies and in the BPEL4WS workflow management language, and we describe how this implementation can be used to support IMS Learning Design.
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
The use of low- and no-code modeling tools is today an established way in practice to give non- programmers an opportunity to master their digital challenges independently, using the means of model- driven software de...
详细信息
In large projects parallelization of existing programs or refactoring of source code is time consuming as well as error-prone and would benefit from tool support. However, existing automatic transformation systems are...
详细信息
In large projects parallelization of existing programs or refactoring of source code is time consuming as well as error-prone and would benefit from tool support. However, existing automatic transformation systems are not extensively used because they either require tedious definitions of source code transformations or they lack general adaptability. In our approach, a programmer changes code inside a project, resulting in before and after source code versions. The difference (the generated transformation) is stored in a database. When presented with some arbitrary code, our tool mines the database to determine which of the generalized transformations possibly apply. Our system is different from a pure compiler based (semantics preserving) approach as we only suggest code modifications. Our contribution is a set of generalizing annotations that we have found by analyzing recurring patterns in open source projects. We show the usability of our system and the annotations by finding matches and applying generated transformations in real-world applications.
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas ex...
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas exist. However, when it comes to designing a generalised predictive controller (GPC) four parameters have to be specified. To choose those parameters is not a trivial task since they are not directly related to control or regulation performance. The presented tuning method exploits model-parameters to select suitable controller parameters. Additionally, a Rhinehart filter is incorporated in the design to decrease the impact of noise, therefore, a fifth parameter has to be optimised. The proposed method has been tested in simulation and on a real system.
Personalization is becoming very important direction in semantic web search for the users that needs to find appropriate information. In this paper, a classification of web personalization is proposed and semantic web...
详细信息
暂无评论