The multitude of hardware and software applications generate a lot of data and burden security solutions that must acquire informations from all these heterogenous systems. Adding the current dynamic and complex cyber...
详细信息
The multitude of hardware and software applications generate a lot of data and burden security solutions that must acquire informations from all these heterogenous systems. Adding the current dynamic and complex cyber threats in this context, make it clear that new security solutions are needed. In this paper we propose a wrapper feature selection approach that combines two machine learning algorithms with an improved version of the Binary Bat Algorithm. Tests on the NSL-KDD dataset empirically prove that our proposed method can reduce the number of features with almost 60% and obtains good results in terms of attack detection rate and false alarm rate, even for unknown attacks.
In this paper we present a generalization of Yamamoto’s theorem relating eigenvalue moduli and singular values of a matrix. In our generalization a single matrix is replaced by a bounded set of matrices. The main res...
In this paper we present a generalization of Yamamoto’s theorem relating eigenvalue moduli and singular values of a matrix. In our generalization a single matrix is replaced by a bounded set of matrices. The main result of the paper includes also, as a special case, the equality between generalized spectral radius and joint spectral radius.
Agents aimed at accomplishing task specific goals require reasoning and learning capabilities;their internal architecture is built using artificial intelli- gence techniques like problem solving, knowledge representat...
详细信息
Agents aimed at accomplishing task specific goals require reasoning and learning capabilities;their internal architecture is built using artificial intelli- gence techniques like problem solving, knowledge representation or planning. But agents aimed at interacting with human users are expected to know more than that: they need to show believable behavior and social abilities. Emotions, with their influence on behavior and cognitive processes, are able to provide the required abilities. We believe that modeling human emotional mechanisms as faithfully as possible makes an agent suitable for performing in a human-agent interaction en- vironment. In this paper we present such an architecture, which aims at modeling the human affective mechanisms of primary and secondary emotions, personality and resource usage. The agent is integrated in a human-agent interaction sce- nario, showing how its affect infuences its behavior and the activities during a lesson in an e-learning system.
This paper describes the stage of initial validation of the model-based control of the plate heat exchanger (PHE) by simulation. For the distributed parameter model of PHE validated on the basis of the measurement dat...
详细信息
The e-Healthcare system can be improved greatly by involving of latest information technology. However now in absent and developing nations, conventional sheet built a system that applied in healthcare. In the sector ...
详细信息
ISBN:
(纸本)9781467375467
The e-Healthcare system can be improved greatly by involving of latest information technology. However now in absent and developing nations, conventional sheet built a system that applied in healthcare. In the sector of healthcare besides other business fields, cloud computing is evolving as a new computing model. Among the developing countries, Iraq is attempting to change to electronic health records utilizing services of cloud computing. Cloud computing is the emerging technology can be utilized to build up a composite network to enhance the system. Therefore, this paper recommended a model of designing flexible e-healthcare management system based on Cloud Computing and Service Oriented Architecture (SOA). Cloud and SOA are becoming ubiquitous nowadays. However, their applications are deployed in this area and desired to appear various period stringent also workable conditions. The suggested system has been improved and includes various fractions to develop healthcare system. Rich Internet Application (RIA) based on the client side, simple database cloud server and application side leads to achieving a scheme that creates a readily attainable network. Finally, the system proposed improves cost management, time, storing patients profile and taking the right doctor decision.
Inthis article we show how to utylize the pointer effectiveness in the matrix multiplication algorithm. To achieve this we proposed an advanced pointer-oriented matrix multiplication numerical recipe. We involved the ...
详细信息
Ambient Intelligence is an active research field that studies embed- ding computing elements into the environment - Weiser's concept of disap- pearing computer. Practical experiments are complex to orchestrate, be...
详细信息
Ambient Intelligence is an active research field that studies embed- ding computing elements into the environment - Weiser's concept of disap- pearing computer. Practical experiments are complex to orchestrate, because of the technical expertise required in hardware, software engineering and machine learning. The entry barrier for running such an experiment is very high, requiring coordinated e orts at all levels in a research team, and an actual laboratory with sensors in order to collect the data. In this work, we show how the power of Amazon's EC2 cloud can be lever- aged in conjunction with a record and replay system for sensor data in order to allow researchers from anywhere in the world to run such experiments. The software infrastructure used for the experiments is open-source and freely available at https: // github. com/ ami-lab/ AmI-Platform . This platform is used in the AmI Laboratory (EF 210) of the University Po- litehnica of Bucharest.
Smart Grid is the future of electricity based on information and telecommunication technology. This article presents the characteristics of the new technological developments in this field, some of the standards inclu...
详细信息
Smart Grid is the future of electricity based on information and telecommunication technology. This article presents the characteristics of the new technological developments in this field, some of the standards included in it, along with several implementation strategies. The validity of the novel proposed approach was demonstrated by simulation with a dedicated module which allows checking how each part of the architecture responds to various case studies. Taking into account the novelty of the subject, this paper brings new opportunities to explore and develop this subject.
This paper concentrates on the possibilities of the application of the virtual commissioning procedure for the design and verification of the control systems for the continuous industrial processes. After short review...
详细信息
ISBN:
(纸本)9781479987023
This paper concentrates on the possibilities of the application of the virtual commissioning procedure for the design and verification of the control systems for the continuous industrial processes. After short review and defining the motivation and recognizing the bottlenecks, the case study is presented. It is based on the laboratory pneumatic setup representing the nonlinear continuous process of the higher relative degree. The stages of its modeling are presented and the potential possibilities of the application of the virtual commissioning for its control are discussed, based on the practical results.
In the last decades, social choice theory has gained a significant popularity. Its main application areas are social sciences, political sciences, economic sciences and computerscience. Computational social choice is...
详细信息
In the last decades, social choice theory has gained a significant popularity. Its main application areas are social sciences, political sciences, economic sciences and computerscience. Computational social choice is a new research area situated at the intersection of social choice theory and computerscience. Another popular and relatively new research area is swarm intelligence that aims to propose and use bio-inspired algorithms for solving optimization problems. In this paper we propose a methodology of comparing various swarm intelligence algorithms using voting methods (an important topic in social choice theory). Also, as a case study, we use our methodology to compare three swarm intelligence algorithms (Particle Swarm Optimization, Cat Swarm Optimization, and Artificial Bee Colony) on several minimization functions. For the interpretation of our comparison results, we use two important theorems: No Free Lunch Theorem (from optimization theory) and Arrow's Impossibility Theorem (from voting theory).
暂无评论