In the past fifteen years, artificial intelligence scientists have built several signal interpretation, or understanding, programs. These programs have combined "low" level signal processing algorithms with ...
详细信息
In the past fifteen years, artificial intelligence scientists have built several signal interpretation, or understanding, programs. These programs have combined "low" level signal processing algorithms with knowledge representation and reasoning techniques used in knowledge-based, or expert, systems. [4] They have shown how the use of task domain knowledge combined with symbolic manipulation techniques can be of use in making signal understanding systems more effective and efficient. HASP/SIAP is one such program that tries to interpret the meaning of passively collected sonar data. In this paper we explore some of the AI techniques that contribute in the "understanding" process. We also describe the organization of HASP/SIAP system as an example of a programming framework that show promise for applications in a class of similar problems.
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io...
详细信息
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in IoT applications,have led to major security *** are on the rise as a result of the usage of these technologies since present security measures are *** artificial intelligence(AI)based security solutions,such as intrusion detection systems(IDS),have been proposed in recent *** technologies that require data preprocessing and machine learning algorithm-performance augmentation require the use of feature selection(FS)techniques to increase classification accuracy by minimizing the number of features *** the other hand,metaheuristic optimization algorithms have been widely used in feature selection in recent *** this paper,we proposed a hybrid optimization algorithm for feature selection in *** proposed algorithm is based on grey wolf(GW),and dipper throated optimization(DTO)algorithms and is referred to as *** proposed algorithm has a better balance between the exploration and exploitation steps of the optimization process and thus could achieve better *** the employed IoT-IDS dataset,the performance of the proposed GWDTO algorithm was assessed using a set of evaluation metrics and compared to other optimization approaches in 2678 CMC,2023,vol.74,no.2 the literature to validate its *** addition,a statistical analysis is performed to assess the stability and effectiveness of the proposed *** results confirmed the superiority of the proposed approach in boosting the classification accuracy of the intrusion in IoT-based networks.
The paper presents the on-going EC-funded Tempus project "MSc and PhD studies in Aerospace Critical Computing" executed by the National Aerospace University, Kharkiv, Ukraine with the support of Newcastle Un...
详细信息
ISBN:
(纸本)9781605580760
The paper presents the on-going EC-funded Tempus project "MSc and PhD studies in Aerospace Critical Computing" executed by the National Aerospace University, Kharkiv, Ukraine with the support of Newcastle University and City University of London, UK and Åbo Akademi University, Turku, Finland. The state-of-the-art, completed work as well as the next steps of the development of master and doctoral courses for the specialty in critical software engineering, computer systems and networks are described. The inputs from each of the European consortium members are presented. Copyright 2008 ACM.
This paper introduces a calculus of weakest specification for supporting reuse of established components in deriving a design (in the sense of formal methods). The weakest specifunction generalizes the notions of weak...
详细信息
This paper introduces a calculus of weakest specification for supporting reuse of established components in deriving a design (in the sense of formal methods). The weakest specifunction generalizes the notions of weakest pre-specification and weakest parallel environment;but instead of calculating the weakest required component of a target specification, it calculates the weakest specification function whose value refines the target when applied to an established component. In particular it overcomes the restriction of those other calculi to taking merely one required component at a time. The theory of specifunctions is applied to a new weakest-design calculus in the context of BSP. The calculus is based on the par-seq specifunction which involves two required components: it places one established component in parallel with one required component and the result in sequence with another required component to meet a given specification. A calculus is provided for the par-seq specifunction and it is applied to the derivation of a distributed BSP algorithm for greatest common divisor.
The report considers the peculiarities of the distribution of computing resources in cloud systems. The most used classification of existing technologies of cloud services is considered. The advantages and disadvantag...
详细信息
ModelicaML is a UML profile for the creation of executable models. ModelicaML supports the Model-Based Systems Engineering (MBSE) paradigm and combines the power of the OMG UML standardized graphical notation for syst...
详细信息
ModelicaML is a UML profile for the creation of executable models. ModelicaML supports the Model-Based Systems Engineering (MBSE) paradigm and combines the power of the OMG UML standardized graphical notation for systems and software modeling, and the simulation power of Modelica. This addresses the increasing need for precise integrated modeling of products containing both software and hardware. This paper focuses on the implementation of executable UML state machines in ModelicaML and demonstrates that using Modelica as an action language enables the integrated modeling and simulation of continuous-time and reactive or event-based system dynamics. More specifically, this paper highlights issues that are identified in the UML specification and that are experienced with typical executable implementations of UML state machines. The issues identified are resolved and rationales for design decisions taken are discussed.
This paper considers the basic concepts of automated design and implementation of application graphical user interface supported by artificial neural networks and application of this approach to child computer interac...
详细信息
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes (1990). We show that their notion of quiescence as a necessary and suffici...
详细信息
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes (1990). We show that their notion of quiescence as a necessary and sufficient condition for safe runtime changes is too strict and violates the black-box design principle. We introduce a weaker condition, tranquility; easier to obtain, less disruptive for the system and still sufficient to ensure application consistency. We also present an implementation of this concept in a component middleware platform
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit i...
详细信息
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit is embedded using Difference Expansion (DE). We consider two consecutive pixels from cover image, calculate the difference between them andthen embed n-1 bits secret message by modifying the pixel pair. Again, we consider that modified pixel pair to embed 1 bit secret message using embedding function. After that, we distribute these two stego pixel pairs among dual image depending on a shared secret key bit stream. At the receiver end, we extract the secret message successfully and recover original cover image from dual stego image without any distortion. Finally, we compare our scheme with other state-of-the-art methods and obtain reasonably better performance in terms of data embedding capacity.
This paper introduces SPar, an internal C++ Domain-Specific Language (DSL) that supports the development of classic stream parallel applications. The DSL uses standard C++ attributes to introduce annotations tagging t...
详细信息
暂无评论