Account services are playing important roles in building IT ecosystems, such as Google Accounts, Apple ID and Microsoft Your Account for the forthcoming windows 8. In this paper, we propose a novel mechanism to build ...
详细信息
Interval temporal logics are based on interval structures over linearly (or partially) ordered domains, where time intervals, rather than time instants, are the primitive ontological entities. In this paper we introdu...
详细信息
Interval temporal logics are based on interval structures over linearly (or partially) ordered domains, where time intervals, rather than time instants, are the primitive ontological entities. In this paper we introduce and study Right Propositional Neighborhood Logic over natural numbers with integer constraints for interval lengths, which is a propositional interval temporal logic featuring a modality for the `right neighborhood' relation between intervals and explicit integer constraints for interval lengths. We prove that it has the bounded model property with respect to ultimately periodic models and is therefore decidable. In addition, we provide an EXPSPACE procedure for satisfiability checking and we prove EXPSPACE-hardness by a reduction from the exponential corridor tiling problem.
This paper delves into the importance of addressing the data clumps model smell, emphasizing the need for prioritizing them before refactoring. Qualitative and quantitative criteria for identifying data clumps are out...
详细信息
The rapid growth of Internet of Things(IoT)devices has brought numerous benefits to the interconnected ***,the ubiquitous nature of IoT networks exposes them to various security threats,including anomaly intrusion ***...
详细信息
The rapid growth of Internet of Things(IoT)devices has brought numerous benefits to the interconnected ***,the ubiquitous nature of IoT networks exposes them to various security threats,including anomaly intrusion *** addition,IoT devices generate a high volume of unstructured *** intrusion detection systems often struggle to cope with the unique characteristics of IoT networks,such as resource constraints and heterogeneous data *** the unpredictable nature of network technologies and diverse intrusion methods,conventional machine-learning approaches seem to lack *** numerous research domains,deep learning techniques have demonstrated their capability to precisely detect *** study designs and enhances a novel anomaly-based intrusion detection system(AIDS)for IoT ***,a Sparse Autoencoder(SAE)is applied to reduce the high dimension and get a significant data representation by calculating the reconstructed ***,the Convolutional Neural Network(CNN)technique is employed to create a binary classification *** proposed SAE-CNN approach is validated using the Bot-IoT *** proposed models exceed the performance of the existing deep learning approach in the literature with an accuracy of 99.9%,precision of 99.9%,recall of 100%,F1 of 99.9%,False Positive Rate(FPR)of 0.0003,and True Positive Rate(TPR)of *** addition,alternative metrics,such as training and testing durations,indicated that SAE-CNN performs better.
Model-driven engineering (MDE) copes with the complexity of software development by using the principles of separation of concerns and automatic transformation. In MDE, stakeholders from diverse domains collaborate co...
详细信息
This work proposes a methodology to identify the parameters of a synchronous machine based on the finite element method (FEM). Several offline real-time tests to identify SM parameters are reproduced on a digital plat...
详细信息
ISBN:
(纸本)9781849193191
This work proposes a methodology to identify the parameters of a synchronous machine based on the finite element method (FEM). Several offline real-time tests to identify SM parameters are reproduced on a digital platform of a FEM based solver. The proposed methodology is divided into three basic steps: creation of the basic physical geometry of the synchronous machine, development and execution of parameter estimation tests on the digital platform, and post-processing to calculate the parameters from the test results. Simulations are shown for a salient-pole synchronous machine. The proposed method is envisioned to replace the real-time offline tests.
We present a congestion control algorithm for the Internet and assess its stability. The algorithm has low operation complexity and exercises control over sources without keeping per-flow information. Given the lack o...
详细信息
New storage requirements, analysis, and visualization of Big Data, which includes structured, semi-structured, and unstructured data, have caused the developers in the past decade to begin preferring Big Data database...
详细信息
The ability to reengineer object-oriented legacy systems has become a vital matter in today's software industry. Early adopters of the object-oriented programming paradigm are now facing the problem of transformin...
详细信息
In this paper, we present detection of malware in HTTPS traffic using k-NN classification. We focus on the metric space approach for approximate k-NN searches over dataset of sparse high-dimensional descriptors of net...
详细信息
暂无评论