The development of autonomous vehicle driving systems and Intelligent Transportation System (ITS) have drawn massive attention since the 1980s. For the development of ITS, road sign detection and identification are co...
详细信息
While incorporating novel technologies aims to facilitate the inclusion of the future construction industry, the empirical investigation of diverse workers' performance is necessary to better understand the strate...
详细信息
Brain computer interface (BCI) is used to identify electrical activity in human brain using the electroencephalog-raphy (EEG). EEG records the electrical activity by placing the electrodes on the scalp. By using the r...
详细信息
In the contemporary world, big data analysis with PySpark and AWS has become quite handy. Large multinational companies, including Walmart, trivago, and countless others are using big data. And with the assistance of ...
In the contemporary world, big data analysis with PySpark and AWS has become quite handy. Large multinational companies, including Walmart, trivago, and countless others are using big data. And with the assistance of AWS, which offers a variety of services like glue, Athena, S3, etc., becoming extremely beneficial for cloud storage purposes and also for creating data migration pipelines. Any RDBMS database server might send tens of gigabytes of data to an Amazon S3 bucket using the ETL architecture. Our primary goal in this project is to use PySpark to construct an ETL pipeline for data migration. Amazon wireless devices review analysis, Amazon watches review analysis, Amazon books review analysis, Amazon shoes review analysis, and Amazon musical instruments review analysis are the five separate datasets on which we conducted our analysis. The datasets considered for the analysis are Amazon watch reviews, book reviews, shoe reviews, wireless device reviews and musical instrument reviews . The goal of the project is to obtain the ratio of the number of trustworthy, real reviews to untrusted reviews and a comparison in done in the form of graphs.
The requirements elicitation phase in the software development life cycle (SDLC) is both critical and challenging, especially in the context of big data and rapid technological advancement. Traditional approaches like...
详细信息
ISBN:
(数字)9798350355925
ISBN:
(纸本)9798350355932
The requirements elicitation phase in the software development life cycle (SDLC) is both critical and challenging, especially in the context of big data and rapid technological advancement. Traditional approaches like workshops and proto-typing, while useful, often struggle to keep pace with the massive data volumes and rapidly changing user demands characteristic of modern technology. This paper introduces a data-driven approach that utilizes deep learning (DL) and natural language processing (NLP) to enhance the requirements elicitation process by extracting requirements and classifying them into functional and non-functional categories. Our research involves a deep neural network (DNN) trained on a large dataset of transcriptions from client/user stories. This DNN can identify whether a specific text represents a functional requirement, a non-functional requirement, or neither. Our approach shows a marked improvement over previous methods, with a 33% increase in accuracy and an 18% increase in the F1 score. These results indicate the capability for deep learning techniques to play a vital role in elicitation.
Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the adminis...
详细信息
Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the administrator. Log poisoning and HTTP response splitting are two prominent harmful uses of this technique. Additionally, CRLF injection can be used by an attacker to exploit other vulnerabilities, such as cross-site scripting (XSS). Email injection, also known as email header injection, is another way that can be used to modify the behavior of emails. The Open Web Application Security Project (OWASP) is an organization that studies vulnerabilities and ranks them based on their level of risk. According to OWASP, CRLF vulnerabilities are among the top 10 vulnerabilities and are a type of injection attack. However, CRLF vulnerabilities can also lead to the discovery of other high-risk vulnerabilities, and it fosters a better approach to mitigate CRLF vulnerabilities in the early stage and help secure applications against known vulnerabilities. Although there has been a significant amount of research on other types of injection attacks, such as Structure Query Language Injection (SQL Injection). There has been less research on CRLF vulnerabilities and how to detect them with automated testing. There is room for further research to be done on this subject matter in order to develop creative solutions to problems. It will also help to reduce false positive alerts by checking the header response of each request. Automated alerts from security systems can provide a quicker and more accurate understanding of potential vulnerabilities and can help to reduce false positive alerts. Despite the extensive research on various types of vulnerabilities in web applications, CRLF vulnerabilities have only recently been included in the research. Utilizing automated testing as a recurring task can assist companies in receiving consistent updates about their systems and enhance the
Modern host-based intrusion detection systems (HIDS) rely on querying provenance graphs—graph representations of activity history on a system—to detect and respond to security threats present on a system. However, a...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
Modern host-based intrusion detection systems (HIDS) rely on querying provenance graphs—graph representations of activity history on a system—to detect and respond to security threats present on a system. However, as the complexity and number of applications running on a system increase, the size of provenance graphs also increase, and thus the latency to query them. State-of-the-art designs deliver query latencies that are impractical for modern threat detection. In this paper, we introduce a hyper-dimensional computing (HDC) approach to querying provenance graphs for HIDS. By encoding provenance graphs and attack patterns/signatures into hyper-dimensional vectors, we can implement a query engine using simple vector operations. Our approach is hardware accelerator compatible, providing further speedups under resource-constrained environments. Our evaluation on a real-world dataset shows that our approach achieves > 90% detection accuracy and up to 4, 242× speedups over the state-of-the-art. This shows that HDC-based approaches can effectively deal with scaling issues in modern HIDS.
The multi-day intermodal travel planning problem (MITPP) is an optimization problem (OP) and it generates the optimal sequences of point-of-interests (POIs) and hotels while searching for the most suitable transport m...
The multi-day intermodal travel planning problem (MITPP) is an optimization problem (OP) and it generates the optimal sequences of point-of-interests (POIs) and hotels while searching for the most suitable transport modes between POIs and hotels. Conventional methods and solvers using von Neumann computers provide good approximate solutions to the OPs, but the computation time grows exponentially dealing with large-scale or complex OPs. Meanwhile, Ising machines or quantum annealing machines are non-von Neumann computers that are designed to solve complex OPs. In this paper, we focus on solving the MITPP by a two-phase Ising-based method. The first POI clustering phase aims at generating POIs clusters for sightseeing days and the second POI routing phase generates travel routes for each day with the optimal transport modes. Practical factors such as POI satisfaction, POI duration, hotel fee, and transportation fee are included in the MITPP. We map these elements onto quadratic unconstrained binary optimization (QUBO) models. For evaluation, we use a real-world dataset in Sapporo, Japan. Empirical results confirm that the proposed method can effectively solve the MITPP both in terms of solution quality and execution time and outperforms a conventional solver, a conventional method, and the latest Ising-based method.
Freshwater harmful algal blooms (HABs) pose significant ecological and public health risks worldwide. Detecting HABs soon after they form is critical to managing the damage they cause. While in-situ measurements are m...
详细信息
ISBN:
(数字)9798331540081
ISBN:
(纸本)9798331540098
Freshwater harmful algal blooms (HABs) pose significant ecological and public health risks worldwide. Detecting HABs soon after they form is critical to managing the damage they cause. While in-situ measurements are more accurate at detecting and measuring their toxicity levels, satellite imagery is more adept.at capturing the spatial and temporal dynamics of these blooms over large geographic regions. Satellites can also more persistently monitor for HABs. In the past, empirical methods and machine learning methods have used multispectral satellite imagery to estimate HAB biomass. To build upon the current body of research, this paper investigates an approach to expedite HAB detection by utilizing a convolutional neural network (CNN) deployed onboard a CubeSat in low Earth orbit to detect HABs in near-real-time. The CNN is trained with multispectral imagery from the Sentinel-2 satellite constellation aggregated with in-situ cyanobacteria cell counts from the Seabass CAML dataset. The results successfully demonstrated the capability of a CNN to detect cyanobacterial blooms using multispectral imagery. After classifying HAB predictions into 5 severity classes, the best performing model achieved a RMSE of 1.33 between HAB severity levels. Training the CNN on 30m GSD imagery with RGB and red edge (B05) bands achieved a RMSE of 1.83 between HAB severity levels, which was inadequate for detecting HABs in small inland water bodies. Improved performance was observed with 10m ground sample distance (GSD) band combinations. The best performing networks utilized all of Sentinel-2's 10m and 20m spectral bands.
High throughput and energy efficient integrated cryptographic hash primitives are important for the continuous integrity checking and tampering detection in secure access management mechanisms of on-chip instrumentati...
High throughput and energy efficient integrated cryptographic hash primitives are important for the continuous integrity checking and tampering detection in secure access management mechanisms of on-chip instrumentation, such as the IJTAG. However, previous SHA-256 cores focus only on throughput. In this paper, we synthesize with a 32 nm CMOS Technology SHA-256 cores that can be integrated in ASICs, and we present insights on their achieved throughput and energy efficiency. Moreover, we present a novel clock-gated design for reducing dynamic power dissipation of SHA-256 cores; and a novel Multi-Vt design for reducing static power dissipation of SHA-256 cores. The proposed designs can achieve upto 25.9% improvement of the energy efficiency of existing SHA-256 designs, without impacting their performed throughput. To the best of our knowledge, this is the first work that applies low power design techniques on SHA-256 cores.
暂无评论