The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate method...
The subject of the study is methods of balancing raw data. The purpose of the article is to improve the quality of intrusion detection in computer networks by using class balancing methods. Task: to investigate methods of balancing classes and to develop a classification method on imbalanced data to increase the level of network security. The methods used are: methods of artificial intelligence, machine learning. The following results were obtained: Class balancing methods based on Undersampling, Oversampling and their combinations were studied. The following methods were chosen for further research: SMOTEENN, SVMSMOTE, BorderlineSMOTE, ADASYN, SMOTE, KMeansSMOTE. The UNSW-NB 15 set was used as the source data, which contains information about the normal functioning of the network and during intrusions. A decision tree based on the CART (Classification And Regression Tree) algorithm was used as the basic classifier. According to the research results, it was found that the use of the SMOTEENN method provides an opportunity to improve the quality of detection of intrusions in the functioning of the network. Conclusions. The scientific novelty of the obtained results lies in the complex use of data balancing methods and the method of data classification based on decision trees to detect intrusions into computer networks, which made it possible to reduce the number of Type II errors.
The article presents a study of the syntactic compatibility of verbs of motion in the Vakh dialect of the Khanty language. The study was conducted with the help of the tools of the platform for documentation of the Ur...
详细信息
The article presents a study of the syntactic compatibility of verbs of motion in the Vakh dialect of the Khanty language. The study was conducted with the help of the tools of the platform for documentation of the Uralic languages Lingvodoc. The purpose of the article is to describe patterns of syntactic valency that Vakh Khanty verbs of motion have.
In this study, we present a straightforward teaching strategy for teaching the Python programming language. Our method emphasizes a clear progression from fundamental to sophisticated concepts. Beginning with a thorou...
详细信息
The principle of network construction and the principle of request signals service of Secondary surveillance radar systems predetermined the work of the respondents of the considered systems in conditions of intra-sys...
ISBN:
(数字)9781538652640
ISBN:
(纸本)9781538652657
The principle of network construction and the principle of request signals service of Secondary surveillance radar systems predetermined the work of the respondents of the considered systems in conditions of intra-system and intentional correlated and uncorrelated interferences. The article estimates the impact of masking fluctuation interferences on the quality of the request signals detection. It is shown that the choice of time-interval codes as the request signals predetermined the low noise immunity of the considered systems when a channel is exposed by the fluctuation interference.
This paper presents methods for solving problems using the method of fuzzy logic. This method serves to study the characteristics of determining the level of compliance of a candidate for an existing vacant position. ...
This paper presents methods for solving problems using the method of fuzzy logic. This method serves to study the characteristics of determining the level of compliance of a candidate for an existing vacant position. When measuring compliance with database requirements based on the results of assessing compliance with the requirements of an employee for a position. The use of artificial intelligence in personnel records gives high efficiency and serves for decision making.
The paper focuses on the role of version redundancy, which increases with the expansion of critical applications and the tightening of their functional safety requirements. International standards governing these requ...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
The paper focuses on the role of version redundancy, which increases with the expansion of critical applications and the tightening of their functional safety requirements. International standards governing these requirements have already fixed the importance of version redundancy to counter common cause failures in safety-related systems. The problem of hidden faults inherent in these systems is equally acute, undermining confidence in the fault tolerance of circuit solutions important for functional safety. We suggest that this problem be seen as a growth problem where the system rises to the level of diversification in modes of operation by dividing them into normal and emergency and checkability circuits, but components continue to be stamped at a lower level of replication. Then the solution to the problem is to raise the components to the level of the system by developing their version redundancy. We demonstrate this development for FPGA components with LUT-oriented architecture and offer a method to improve the FPGA-ready project by natural version redundancy of its program code. The method generates a set of program code versions and selects versions that improve the checkability of circuits with respect to constant faults and the trustworthiness of results, respectively, in normal and emergency mode to reduce a set of hidden faults. The method is illustrated by an iterative array multiplier implemented in an FPGA project. Versions are generated, evaluated, and selected using the program developed for this.
In this study, we present an improved approach to optimizing the parameters of sensor sensing elements using quartz resonators with an interelectrode gap. We combine graphical and analytical methods to solve the multi...
详细信息
ISBN:
(数字)9798350378627
ISBN:
(纸本)9798350378634
In this study, we present an improved approach to optimizing the parameters of sensor sensing elements using quartz resonators with an interelectrode gap. We combine graphical and analytical methods to solve the multi-criteria optimization problem. The work focuses on the modes of operation of a quartz resonator equipped with an interelectrode gap in sensors with a frequency output, determining a set of optimal parameters and representing them as surfaces in a particular optimization parameter space. The presented results reveal specific areas on the surface of the objective function where optimization of design and technological parameters is possible, taking into account technological influences and features of the sensor design, including the initial value of the interelectrode gap. By using an improved mathematical model for the oscillations of a quartz resonator with an electrode gap, this study achieves results with an accuracy of ($8 . . .11$)% higher than previous studies, demonstrating the effectiveness of the proposed method in improving the design and functionality of piezoelectric sensors for advanced applications.
Formal methods (in a broad sense) have been around almost since the beginning of computer science. Nonetheless, there is a perception in the formal methods community that take-up by industry is low considering the pot...
详细信息
The Internet of Things (IoT) today already connects billions of different IoT devices with the Internet. With the advent of new services and services, new challenges arise: how to make a cloud service publicly availab...
The Internet of Things (IoT) today already connects billions of different IoT devices with the Internet. With the advent of new services and services, new challenges arise: how to make a cloud service publicly available, and reliable, how and where to store data. The article considers an example of the implementation of an IoT application with cloud components, considers the implementation of connecting IoT components to a cloud provider, and presents the IoT architecture. The focus is on the architecture and implementation of data exchange protocols, the implementation of protocols? for data collection and management of remote system components Given the large amount of data transmitted by IoT devices to the cloud, data compression and interaction with cloud services is a very relevant topic. Therefore, the article also offers recommendations for managing the traffic of IoT devices. The purpose of this article is to provide a description and algorithm for connecting IoT devices to the cloud, to bring together disparate information, and make it open and understandable to beginners and academic researchers.
暂无评论