As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increa...
详细信息
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of *** connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security *** paper proposes a model for the industrial control *** includes a malware containment strategy that integrates intrusion detection,quarantine,and ***,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment *** addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction ***,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is *** otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control *** earlier the immunization of key nodes,the *** the time exceeds the threshold,immunizing key nodes is almost *** analysis provides a better way to contain the malware in the industrial control network.
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r...
详细信息
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech recognition, and software engineering. Various deep learning techniques have been successfully employed to facilitate software engineering tasks, including code generation, software refactoring, and fault localization. Many studies have also been presented in top conferences and journals, demonstrating the applications of deep learning techniques in resolving various software engineering tasks. However,although several surveys have provided overall pictures of the application of deep learning techniques in software engineering,they focus more on learning techniques, that is, what kind of deep learning techniques are employed and how deep models are trained or fine-tuned for software engineering tasks. We still lack surveys explaining the advances of subareas in software engineering driven by deep learning techniques, as well as challenges and opportunities in each subarea. To this end, in this study, we present the first task-oriented survey on deep learning-based software engineering. It covers twelve major software engineering subareas significantly impacted by deep learning techniques. Such subareas spread out through the whole lifecycle of software development and maintenance, including requirements engineering, software development, testing, maintenance, and developer collaboration. As we believe that deep learning may provide an opportunity to revolutionize the whole discipline of software engineering, providing one survey covering as many subareas as possible in software engineering can help future research push forward the frontier of deep learning-based software engineering more systematically. For each of the selected subareas,we highlight the major advances achieved by applying deep learning techniques with pointers to the available datasets i
The outbreak of COVID-19 (also known as Coronavirus) has put the entire world at risk. The disease first appears in Wuhan, China, and later spread to other countries, taking a form of a pandemic. In this paper, we try...
详细信息
Identifying drug–target interactions (DTIs) is a critical step in both drug repositioning. The labor-intensive, time-consuming, and costly nature of classic DTI laboratory studies makes it imperative to create effici...
详细信息
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are ins...
详细信息
The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leadsto wide losses for various organizations. These dangers have proven that signature-based approaches are insufficientto prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious ExecutableDetection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE)files in hosts using Windows operating systems through collecting PE headers and applying machine learningmechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031benign files and 179,071 malware samples from diverse sources to ensure the efficiency of RMED *** most effective PE headers that can highly differentiate between benign and malware files were selected totrain the model on 15 PE features to speed up the classification process and achieve real-time detection formalicious executables. The evaluation results showed that RMED succeeded in shrinking the classification timeto 91 milliseconds for each file while reaching an accuracy of 98.42% with a false positive rate equal to 1.58. Inconclusion, this paper contributes to the field of cybersecurity by presenting a comprehensive framework thatleverages Artificial Intelligence (AI) methods to proactively detect and prevent cyber-attacks.
This study investigates a safe reinforcement learning algorithm for grid-forming(GFM)inverter based frequency *** guarantee the stability of the inverter-based resource(IBR)system under the learned control policy,a mo...
详细信息
This study investigates a safe reinforcement learning algorithm for grid-forming(GFM)inverter based frequency *** guarantee the stability of the inverter-based resource(IBR)system under the learned control policy,a modelbased reinforcement learning(MBRL)algorithm is combined with Lyapunov approach,which determines the safe region of states and *** obtain near optimal control policy,the control performance is safely improved by approximate dynamic programming(ADP)using data sampled from the region of attraction(ROA).Moreover,to enhance the control robustness against parameter uncertainty in the inverter,a Gaussian process(GP)model is adopted by the proposed algorithm to effectively learn system dynamics from *** simulations validate the effectiveness of the proposed algorithm.
Agricultural production is critical to the economy. This is one of the reasons why disease detection in plants is so important in agricultural settings, as plant disease is rather common. Farmers are not engaged in in...
详细信息
Agricultural production is critical to the economy. This is one of the reasons why disease detection in plants is so important in agricultural settings, as plant disease is rather common. Farmers are not engaged in increasing their agricultural productivity daily since there are no technologies in the previous system to detect diseases in various crops in an agricultural environment. With the exponential population growth, food scarcity is a huge concern globally. In addition to this, the productivity of agricultural products has been highly impacted by the rapid increase in phytopathological adversities. The main challenges in leaf segmentation and plant disease identification are prior knowledge is required for segmentation, the implementation still lacks the accuracy of results, and more tweaking is required. To reduce the devastating impacts of illnesses on the economy, early detection of illnesses in plants is therefore essential. This paper describes an approach for segmenting and detecting plant leaf diseases based on images acquired via the Internet of Things (IoT) network. Here, a plant leaf area is segmented with a UNet, whose trainable parameters are optimized using the Mayfly Bald Eagle Optimization (MBEO) algorithm. Further, plant type classification is carried out by the Deep batch normalized AlexNet (DbneAlexNet), optimized by the Sine Cosine Algorithm-based Rider Neural Network (SCA-based RideNN). Finally, the DbneAlexNet, with weights adapted by the MBEO algorithm, is used to identify plant disease. The Plant Village dataset is used to evaluate the proposed DbneAlexNet-MBEO for plant-type classification and disease detection. The efficiency of the UNet-MBEO for segmentation is examined based on the Dice coefficient and Intersectin over Union (IOU) and has achieved superior values of 0.927 and 0.907. Moreover, the DbneAlexNet-MBEO is examined considering accuracy, Test Negative Rate (TNR), and Test Positive Rate (TPR) and offered superior values of 0
In the age of technology, many people have fallen victim to fake images. Photo editing has become easier as the process of making photos becomes more efficient. With the image processing tools at their disposal, peopl...
详细信息
Graph is a powerful sparse data structure that intuitively represents entities and their *** graph traversal algorithms such as Breadth-First Search(BFS),Single-Source Shortest Path(SSSP),PageRank,and Weakly Connected...
详细信息
Graph is a powerful sparse data structure that intuitively represents entities and their *** graph traversal algorithms such as Breadth-First Search(BFS),Single-Source Shortest Path(SSSP),PageRank,and Weakly Connected Components(WCC)have extensive applications in social network analysis,risk management for finance,and recommendation ***,graph processing in CPUs and GPUs is not very efficient due to its irregular memory *** people have proposed software approaches to speed up graph processing,such as PowerGraph,PowerLyra,and Shentu,which address load imbalance issues by replicating high-degree *** and GridGraph attempt to improve memory access locality by scanning the edge list of graphs while localizing the range of vertices accessed in a *** and Gemini provide adaptive dual compute modes(bottom-up and topdown),which are particularly effective for BFS-like algorithms such as BFS and ***,pure software approaches have their limitations,and it is desired to see how hardware could be employed to accelerate graph processing.
Robotic arms are widely used in the automation industry to package and deliver classified objects. When the products are small objects with very similar shapes, such as screwdriver bits with slightly different threads...
详细信息
暂无评论