Generative deep learning models are able to create realistic audio and video. This technology has been used to impersonate the faces and voices of individuals. These "deepfakes"are being used to spread misin...
详细信息
Deep learning has proven itself to be an incredible asset to the medical community. However, with offensive AI, the technology can be turned against medical community;adversarial samples can be used to cause misdiagno...
详细信息
The accurate identification of smart meter(SM)fault types is crucial for enhancing the efficiency of operationand maintenance(O&M)and the reliability of power ***,the intelligent classification of SM fault typesfa...
详细信息
The accurate identification of smart meter(SM)fault types is crucial for enhancing the efficiency of operationand maintenance(O&M)and the reliability of power ***,the intelligent classification of SM fault typesfaces significant challenges owing to the complexity of featuresand the imbalance between fault *** address these issues,this study presents a fault diagnosis method for SM incorporatingthree distinct *** first module employs acombination of standardization,data imputation,and featureextraction to enhance the data quality,thereby facilitating improvedtraining and learning by the *** enhance theclassification performance,the data imputation method considersfeature correlation measurement and sequential imputation,and the feature extractor utilizes the discriminative enhancedsparse *** tackle the interclass imbalance of datawith discrete and continuous features,the second module introducesan assisted classifier generative adversarial network,which includes a discrete feature generation ***,anovel Stacking ensemble classifier for SM fault diagnosis is *** contrast to previous studies,we construct a two-layerheuristic optimization framework to address the synchronousdynamic optimization problem of the combinations and hyperparametersof the Stacking ensemble classifier,enabling betterhandling of complex classification tasks using SM *** proposedfault diagnosis method for SM via two-layer stacking ensembleoptimization and data augmentation is trained and validatedusing SM fault data collected from 2010 to 2018 in Zhejiang Province,*** results demonstrate the effectivenessof the proposed method in improving the accuracyof SM fault diagnosis,particularly for minority classes.
In this paper we present TangiWheel, a collection manipulation widget for tabletop displays. Our implementation is flexible, allowing either multi-touch or interaction, or even a hybrid scheme to better suit user choi...
详细信息
In this paper we present TangiWheel, a collection manipulation widget for tabletop displays. Our implementation is flexible, allowing either multi-touch or interaction, or even a hybrid scheme to better suit user choice and convenience. Different TangiWheel aspects and features are compared with other existing widgets for collection manipulation. The study reveals that TangiWheel is the first proposal to support a hybrid input modality with large resemblance levels between touch and tangible interaction styles. Several experiments were conducted to evaluate the techniques used in each input scheme for a better understanding of tangible surface interfaces in complex tasks performed by a single user (e.g., involving a typical master-slave exploration pattern). The results show that tangibles perform significantly better than fingers, despite dealing with a greater number of interactions, in situations that require a large number of acquisitions and basic manipulation tasks such as establishing location and orientation. However, when users have to perform multiple exploration and selection operations that do not require previous basic manipulation tasks, for instance when collections are fixed in the interface layout, touch input is significantly better in terms of required time and number of actions. Finally, when a more elastic collection layout or more complex additional insertion or displacement operations are needed, the hybrid and tangible approaches clearly outperform finger-based interactions.
A number of researchers make efforts to examine the nature of user bug reporting, tracking, assignment policy, reward systems, and make recommendations for selecting the right combinations for an organization. These r...
详细信息
A number of researchers make efforts to examine the nature of user bug reporting, tracking, assignment policy, reward systems, and make recommendations for selecting the right combinations for an organization. These researchers suggest that tools, such as open source Bugzilla detect-tracking system can be helpful in collecting and analyzing error reports. A more effective bug classification system is needed to reduce bug-report duplication and assist in error-assignment. It has been observed that each of the bug-repair assignment has specific advantages, disadvantages, and effects on customer or user perceptions. Random bug assignment is one of the approaches that distributes bug workload to maintainers and better predicts the time required to close bug reports. The clustering policy is another approach that groups errors by their behavior, aiming to reduce effort when related bugs have the same cause.
An empirical study of high-speed software development practices was conducted in US companies. Fast development, along with low cost and high quality has formed a tripartite tension among softwareengineering goals. T...
详细信息
An empirical study of high-speed software development practices was conducted in US companies. Fast development, along with low cost and high quality has formed a tripartite tension among softwareengineering goals. The detailed case studies of Internet software development were reviewed in 10 companies and then knowledge was synthesized on best practice for quality and agility. Agile methodologies, including Extreme Programming and Scrum are found increasing in the software development field. Some of the problems identified in high speed software development, include demands of time-to-market compression, insufficient programmer productivity, ambiguous requirements, fluid requirements, lack of design time and experience, and changing environment. The solutions to the problems identified, include parallel development and frequent releases, greater reliance on tools and reusable components, production prototyping, customer implantation, multitiered architecture and emphasis on acquiring the right expertise and tailored methodology.
Nowadays, access control to Web pages relay mostly on identification and authentication. After successful authentication, however, subsequent access may not necessarily be performed by the same user. Aimed at separati...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
Nowadays, access control to Web pages relay mostly on identification and authentication. After successful authentication, however, subsequent access may not necessarily be performed by the same user. Aimed at separating identity authentication and behavior authentication in open network environments, this paper proposes an access control method based on the analysis of user behavior in Web browsing as an additional access control mechanism to traditional identity authentication. The paper provides the definition of user behavior, uses browsing time and navigated path to determine the normality of user behavior based on the result of comparing the value calculated using a proposed algorithm with a threshold, thus modeling user behavior in both temporal and spatial dimensions. The proposed method relies on a database that contains the frequency of previous access to the path by the same user. Experiment shows that the proposed method can detect abnormal behavior while adapting to continuous changes in user behavior and can thus be used to prevent the theft of user accounts to improve network security.
Context-aware systems keep on emerging in all of our daily activities. Context, which can be a location, a user, an actual activity, or physical conditions, plays a major role in such systems. Actually, everything we ...
详细信息
This paper presents a kernelized architecture (i.e., an architecture in which no subject is exempted from the simple-security and properties) for multilevel secure (mis) object-oriented database management systems (D...
This paper presents a kernelized architecture (i.e., an architecture in which no subject is exempted from the simple-security and properties) for multilevel secure (mis) object-oriented database management systems (DBMS’s) which support write-up. Relational mis DBMS’s typically do not allow write-up, due to integrity problems arising from the blind nature of write-up operations in these systems. In object-oriented DBMS’s, on the other hand, sending messages upwards in the security lattice does not present an integrity problem because such messages will be processed by appropriate methods in the destination object. However, supporting write-up operations in object-oriented systems is complicated by the fact that such operations are no longer primitive;but can be arbitrarily complex and therefore can take arbitrary amounts of processing time. We focus on support for remote procedure call (RPC) based writeup operations. Dealing with the timing of such write-up operations consequently has broad implications on confidentiality (due to the possibility of signaling channels), integrity, and performance. We present an asynchronous computational model for mis object-oriented databases, which achieves the conflicting goals of confidentiality, integrity, and efficiency (performance). This requires concurrent computations to be generated within a user session, and for them to be scheduled so the net effect is logically that of a sequential (RPC- based) computation. Our work utilizes an underlying message filter security model to enforce mandatory confidentiality. We demonstrate how our computational model can be implemented within the framework of a kernelized architecture. In doing so, we present various intra-session and inter-session concurrency schemes. The intra-session schemes are concerned with the scheduling and management of concurrent computations generated within a user session, and we present conservative as well as aggressive scheduling algorithms. The inter-sessio
The application of specification-based test methods to informal functional specifications requires considerable analysis on the part of the test engineer. We hypothesize that a large portion of this analysis is alread...
详细信息
暂无评论