VGIS (Virtual Geographic Information System) Platform is a unified oilfield operations management platform based on MaaS (Management as a Service) that integrates advanced technologies such as AIoT (Artificial Intelli...
详细信息
Community detection is indispensable for comprehending the structural organization and functional modules of complex networks. Convolutional neural networks (CNNs) have emerged as powerful instruments for graph data a...
详细信息
Data-driven models used for predictive classification and regression tasks are commonly computed using floating point arithmetic preserving accuracy by automatic scaling even in high non-linear functions. With respect...
详细信息
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally...
详细信息
In the fields of software engineering, the maintenance phase takes the most effort. Software Module Clustering (SMC), as a part of reverse engineering, is used for the purpose of creating structural models from the so...
详细信息
In the fields of software engineering, the maintenance phase takes the most effort. Software Module Clustering (SMC), as a part of reverse engineering, is used for the purpose of creating structural models from the source code enhancing its comprehensibility. Finding the best clusters is an NP-hard problem. The method of software module clustering aims to extract the best clusters, which involves Increase cohesion and reduce coupling. This re-search addresses a set of problems with the aim of solving them, which are drawback found in most previous studies. This paper adopts three main methods to solve Software Modules Clustering problem (SMCP), a Teaching-Learning-Based-optimization (TLBO) algorithm, a Black Widow optimization (BWO) algorithm, and the third is a hybrid algorithm combining the previous two methods. These algorithms were used to cluster software modules and were evaluated based on MQ (Modularity Quality), cohesion, coupling, and stability. To determine the optimal number of clusters for each reference program, the Louvain algorithm is used, which works on detecting communities in networks. The study also experintly examined the impact of the chaos, random, Lorenzo methods in the initial generation of solutions on the quality of the results and stability. Considering the results of the experiments conducted on eight standard applications, the hybrid algorithm performs better in SMC problems than the TLBO and BWO. The performance of these algorithms also improves significantly, when their initial populations are generated using the logistic Lorenz and Chaos method rather than a random one. 6.644548537, 6.318318013, and 4.375766992 are the average MQ of the clusters that were formed for the selected casses set using the Hybrid method, BWO, and TLBO, respectively.
Diabetic retinopathy (DR) is a common yet fatal complication of diabetic patients in which high levels of blood sugar damage the blood vessels in the retina, the light-sensitive eye tissue crucial for human vision. Ea...
详细信息
Accurate road extraction from Remote Sensing Imagery (RSI) is crucial for various applications, including urban planning, navigation, and disaster response. This study investigates automated road extraction in rural, ...
详细信息
Medical image registration is mainly used for 3D reconstruction of images, which has important clinical research significance. Therefore, accurate medical image registration is an important and highly challenging rese...
详细信息
Managing inventory has forever been a difficult problem for e-commerce sellers. Even today manual labor is used for the major part of the job. Without much automation in this industry growth has been stagnant because ...
详细信息
In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows that it is becoming enormously difficult for conventional defense mechanisms and architectures to...
详细信息
In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows that it is becoming enormously difficult for conventional defense mechanisms and architectures to neutralize modern cyber threats in a real-time situation. Disgruntled and rouge employees/agents and intrusive applications are two notorious classes of such modern threats, referred to as Insider Threats, which lead to data theft and privacy breaches. To counter such state-of-the-art threats, modern defense mechanisms require the incorporation of active threat analytics to proactively detect and mitigate any malicious intent at the employee or application level. Existing solutions to these problems intensively rely on co-relation, distance-based risk metrics, and human judgment. Especially when humans are kept in the loop for access-control policy-related decision-making against advanced persistent threats. As a consequence, the situation can escalate and lead to privacy/data breaches in case of insider threats. To confront such challenges, the security community has been striving to identify anomalous intent for advanced behavioral anomaly detection and auto-resiliency (the ability to deter an ongoing threat by policy tuning). Towards this dimension, we aim to review the literature in this domain and evaluate the effectiveness of existing approaches per our proposed criteria. According to our knowledge, this is one of the first endeavors toward developing evaluation-based standards to assess the effectiveness of relevant approaches in this domain while considering insider employees and intrusive applications simultaneously. There have been efforts in literature towards describing and understanding insider threats in general. However, none have addressed the detection and deterrence element in its entirety, hence making our contribution one of a kind. Towards the end of this article, we enlist and discuss the existing data sets. The data sets can help
暂无评论