首页 > 最新文献

Comput.最新文献

英文 中文
An Analysis of Neighbor Discovery Protocol Attacks 邻居发现协议攻击分析
Pub Date : 2023-06-19 DOI: 10.3390/computers12060125
Firas Najjar, Q. Bsoul, H. Al-Refai
Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices on the network. The main risk of deploying NDP on public networks is the potential for hackers or attackers to launch various types of attacks, such as address spoofing attacks, denial-of-service attacks, and man-in-the-middle attacks. Although Secure Neighbor Discovery (SEND) is implemented to secure NDP, its complexity and cost hinder its widespread deployment. This research emphasizes the potential hazard of deploying IPv6 networks in public spaces, such as airports, without protecting NDP messages. These risks have the potential to crash the entire local network. To demonstrate these risks, the GNS3 testbed environment is used to generate NDP attacks and capture the resulting packets using Wireshark for analysis. The analysis results reveal that with just a few commands, attackers can execute various NDP attacks. This highlights the need to protect against the potential issues that come with deploying IPv6 on widely accessible public networks. In addition, the analysis result shows that NDP attacks have behavior that can be used to define various NDP attacks.
NDP (Neighbor Discovery Protocol)是IPv6网络中用于管理相邻设备间通信的一种网络协议。NDP负责将IPv6地址映射到MAC地址,并发现网络中相邻设备的可用性。在公共网络上部署NDP的主要风险是黑客或攻击者可能发动各种类型的攻击,例如地址欺骗攻击、拒绝服务攻击和中间人攻击。安全邻居发现(Secure Neighbor Discovery, SEND)是一种安全邻人发现(NDP)技术,但其复杂性和成本限制了其广泛应用。这项研究强调了在公共场所(如机场)部署IPv6网络而不保护NDP信息的潜在危险。这些风险有可能使整个本地网络崩溃。为了演示这些风险,我们使用GNS3测试平台环境生成NDP攻击,并使用Wireshark捕获生成的数据包进行分析。分析结果表明,攻击者只需几条命令,就可以执行各种ndmp攻击。这凸显了在广泛可访问的公共网络上部署IPv6所带来的潜在问题。此外,分析结果表明,NDP攻击具有可用于定义各种NDP攻击的行为。
{"title":"An Analysis of Neighbor Discovery Protocol Attacks","authors":"Firas Najjar, Q. Bsoul, H. Al-Refai","doi":"10.3390/computers12060125","DOIUrl":"https://doi.org/10.3390/computers12060125","url":null,"abstract":"Neighbor Discovery Protocol (NDP) is a network protocol used in IPv6 networks to manage communication between neighboring devices. NDP is responsible for mapping IPv6 addresses to MAC addresses and discovering the availability of neighboring devices on the network. The main risk of deploying NDP on public networks is the potential for hackers or attackers to launch various types of attacks, such as address spoofing attacks, denial-of-service attacks, and man-in-the-middle attacks. Although Secure Neighbor Discovery (SEND) is implemented to secure NDP, its complexity and cost hinder its widespread deployment. This research emphasizes the potential hazard of deploying IPv6 networks in public spaces, such as airports, without protecting NDP messages. These risks have the potential to crash the entire local network. To demonstrate these risks, the GNS3 testbed environment is used to generate NDP attacks and capture the resulting packets using Wireshark for analysis. The analysis results reveal that with just a few commands, attackers can execute various NDP attacks. This highlights the need to protect against the potential issues that come with deploying IPv6 on widely accessible public networks. In addition, the analysis result shows that NDP attacks have behavior that can be used to define various NDP attacks.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"51 1","pages":"125"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85294429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arabic Sentiment Analysis Based on Word Embeddings and Deep Learning 基于词嵌入和深度学习的阿拉伯语情感分析
Pub Date : 2023-06-19 DOI: 10.3390/computers12060126
Nasrin Elhassan, G. Varone, Rami Ahmed, M. Gogate, K. Dashtipour, Hani Almoamari, M. El-Affendi, B. Al-Tamimi, Faisal Albalwy, Amir Hussain
Social media networks have grown exponentially over the last two decades, providing the opportunity for users of the internet to communicate and exchange ideas on a variety of topics. The outcome is that opinion mining plays a crucial role in analyzing user opinions and applying these to guide choices, making it one of the most popular areas of research in the field of natural language processing. Despite the fact that several languages, including English, have been the subjects of several studies, not much has been conducted in the area of the Arabic language. The morphological complexities and various dialects of the language make semantic analysis particularly challenging. Moreover, the lack of accurate pre-processing tools and limited resources are constraining factors. This novel study was motivated by the accomplishments of deep learning algorithms and word embeddings in the field of English sentiment analysis. Extensive experiments were conducted based on supervised machine learning in which word embeddings were exploited to determine the sentiment of Arabic reviews. Three deep learning algorithms, convolutional neural networks (CNNs), long short-term memory (LSTM), and a hybrid CNN-LSTM, were introduced. The models used features learned by word embeddings such as Word2Vec and fastText rather than hand-crafted features. The models were tested using two benchmark Arabic datasets: Hotel Arabic Reviews Dataset (HARD) for hotel reviews and Large-Scale Arabic Book Reviews (LARB) for book reviews, with different setups. Comparative experiments utilized the three models with two-word embeddings and different setups of the datasets. The main novelty of this study is to explore the effectiveness of using various word embeddings and different setups of benchmark datasets relating to balance, imbalance, and binary and multi-classification aspects. Findings showed that the best results were obtained in most cases when applying the fastText word embedding using the HARD 2-imbalance dataset for all three proposed models: CNN, LSTM, and CNN-LSTM. Further, the proposed CNN model outperformed the LSTM and CNN-LSTM models for the benchmark HARD dataset by achieving 94.69%, 94.63%, and 94.54% accuracy with fastText, respectively. Although the worst results were obtained for the LABR 3-imbalance dataset using both Word2Vec and FastText, they still outperformed other researchers’ state-of-the-art outcomes applying the same dataset.
在过去的二十年里,社交媒体网络呈指数级增长,为互联网用户提供了就各种主题进行沟通和交换意见的机会。结果表明,意见挖掘在分析用户意见并应用这些意见来指导选择方面起着至关重要的作用,使其成为自然语言处理领域中最受欢迎的研究领域之一。尽管包括英语在内的几种语言已成为若干项研究的主题,但在阿拉伯文领域进行的研究却不多。语言的形态复杂性和各种方言使语义分析特别具有挑战性。此外,缺乏准确的预处理工具和有限的资源是制约因素。这项新颖的研究是由深度学习算法和词嵌入在英语情感分析领域的成就所激发的。基于监督机器学习进行了大量实验,其中利用词嵌入来确定阿拉伯语评论的情绪。介绍了卷积神经网络(cnn)、长短期记忆(LSTM)和CNN-LSTM混合算法这三种深度学习算法。这些模型使用的是通过Word2Vec和fastText等词嵌入学习到的特征,而不是手工制作的特征。这些模型使用两个基准阿拉伯语数据集进行测试:酒店阿拉伯语评论数据集(HARD)用于酒店评论,大规模阿拉伯语书评(LARB)用于书评,设置不同。对比实验使用了三种具有两词嵌入的模型和不同的数据集设置。本研究的主要新颖之处在于探索使用不同的词嵌入和不同的基准数据集设置在平衡、不平衡、二值和多分类方面的有效性。研究结果表明,对于CNN、LSTM和CNN-LSTM这三种模型,在大多数情况下,使用HARD 2-imbalance数据集应用fastText词嵌入获得了最好的结果。此外,本文提出的CNN模型在HARD基准数据集上的准确率分别达到94.69%、94.63%和94.54%,优于LSTM和CNN-LSTM模型。尽管使用Word2Vec和FastText的LABR 3-失衡数据集获得了最差的结果,但它们仍然优于使用相同数据集的其他研究人员的最新结果。
{"title":"Arabic Sentiment Analysis Based on Word Embeddings and Deep Learning","authors":"Nasrin Elhassan, G. Varone, Rami Ahmed, M. Gogate, K. Dashtipour, Hani Almoamari, M. El-Affendi, B. Al-Tamimi, Faisal Albalwy, Amir Hussain","doi":"10.3390/computers12060126","DOIUrl":"https://doi.org/10.3390/computers12060126","url":null,"abstract":"Social media networks have grown exponentially over the last two decades, providing the opportunity for users of the internet to communicate and exchange ideas on a variety of topics. The outcome is that opinion mining plays a crucial role in analyzing user opinions and applying these to guide choices, making it one of the most popular areas of research in the field of natural language processing. Despite the fact that several languages, including English, have been the subjects of several studies, not much has been conducted in the area of the Arabic language. The morphological complexities and various dialects of the language make semantic analysis particularly challenging. Moreover, the lack of accurate pre-processing tools and limited resources are constraining factors. This novel study was motivated by the accomplishments of deep learning algorithms and word embeddings in the field of English sentiment analysis. Extensive experiments were conducted based on supervised machine learning in which word embeddings were exploited to determine the sentiment of Arabic reviews. Three deep learning algorithms, convolutional neural networks (CNNs), long short-term memory (LSTM), and a hybrid CNN-LSTM, were introduced. The models used features learned by word embeddings such as Word2Vec and fastText rather than hand-crafted features. The models were tested using two benchmark Arabic datasets: Hotel Arabic Reviews Dataset (HARD) for hotel reviews and Large-Scale Arabic Book Reviews (LARB) for book reviews, with different setups. Comparative experiments utilized the three models with two-word embeddings and different setups of the datasets. The main novelty of this study is to explore the effectiveness of using various word embeddings and different setups of benchmark datasets relating to balance, imbalance, and binary and multi-classification aspects. Findings showed that the best results were obtained in most cases when applying the fastText word embedding using the HARD 2-imbalance dataset for all three proposed models: CNN, LSTM, and CNN-LSTM. Further, the proposed CNN model outperformed the LSTM and CNN-LSTM models for the benchmark HARD dataset by achieving 94.69%, 94.63%, and 94.54% accuracy with fastText, respectively. Although the worst results were obtained for the LABR 3-imbalance dataset using both Word2Vec and FastText, they still outperformed other researchers’ state-of-the-art outcomes applying the same dataset.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"66 1","pages":"126"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79535863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Clustering Techniques for Analyzing User Engagement Patterns in Twitter Data 探索聚类技术分析Twitter数据中的用户参与模式
Pub Date : 2023-06-19 DOI: 10.3390/computers12060124
Andreas Kanavos, Ioannis Karamitsos, Alaa Mohasseb
Social media platforms have revolutionized information exchange and socialization in today’s world. Twitter, as one of the prominent platforms, enables users to connect with others and express their opinions. This study focuses on analyzing user engagement levels on Twitter using graph mining and clustering techniques. We measure user engagement based on various tweet attributes, including retweets, replies, and more. Specifically, we explore the strength of user connections in Twitter networks by examining the diversity of edges. Our approach incorporates graph mining models that assign different weights to evaluate the significance of each connection. Additionally, clustering techniques are employed to group users based on their engagement patterns and behaviors. Statistical analysis was conducted to assess the similarity between user profiles, as well as attributes, such as friendship, followings, and interactions within the Twitter social network. The findings highlight the discovery of closely linked user groups and the identification of distinct clusters based on engagement levels. This research emphasizes the importance of understanding both individual and group behaviors in comprehending user engagement dynamics on Twitter.
社交媒体平台给当今世界的信息交流和社交带来了革命性的变化。Twitter作为一个突出的平台,可以让用户与他人联系,表达自己的观点。本研究的重点是使用图挖掘和聚类技术分析Twitter上的用户参与度。我们根据各种tweet属性来衡量用户参与度,包括转发、回复等。具体来说,我们通过检查边缘的多样性来探索Twitter网络中用户连接的强度。我们的方法结合了图挖掘模型,分配不同的权重来评估每个连接的重要性。此外,基于用户的参与模式和行为,采用聚类技术对用户进行分组。统计分析是为了评估用户档案之间的相似性,以及Twitter社交网络中的友谊、关注和互动等属性。研究结果强调了密切联系的用户群体的发现,以及基于用户参与水平的不同集群的识别。本研究强调了理解个人和群体行为在理解Twitter用户参与动态中的重要性。
{"title":"Exploring Clustering Techniques for Analyzing User Engagement Patterns in Twitter Data","authors":"Andreas Kanavos, Ioannis Karamitsos, Alaa Mohasseb","doi":"10.3390/computers12060124","DOIUrl":"https://doi.org/10.3390/computers12060124","url":null,"abstract":"Social media platforms have revolutionized information exchange and socialization in today’s world. Twitter, as one of the prominent platforms, enables users to connect with others and express their opinions. This study focuses on analyzing user engagement levels on Twitter using graph mining and clustering techniques. We measure user engagement based on various tweet attributes, including retweets, replies, and more. Specifically, we explore the strength of user connections in Twitter networks by examining the diversity of edges. Our approach incorporates graph mining models that assign different weights to evaluate the significance of each connection. Additionally, clustering techniques are employed to group users based on their engagement patterns and behaviors. Statistical analysis was conducted to assess the similarity between user profiles, as well as attributes, such as friendship, followings, and interactions within the Twitter social network. The findings highlight the discovery of closely linked user groups and the identification of distinct clusters based on engagement levels. This research emphasizes the importance of understanding both individual and group behaviors in comprehending user engagement dynamics on Twitter.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"59 1","pages":"124"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74647336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the Development of a Proctoring System for Conducting Online Exams in Kazakhstan 哈萨克斯坦在线考试监考系统的开发研究
Pub Date : 2023-06-19 DOI: 10.3390/computation11060120
A. Nurpeisova, A. Shaushenova, Z. Mutalova, M. Ongarbayeva, S. Niyazbekova, Anargul Bekenova, Lyazzat Zhumaliyeva, S. Zhumasseitova
The demand for online education is gradually growing. Most universities and other institutions are faced with the fact that it is almost impossible to track how honestly test takers take exams remotely. In online formats, there are many simple opportunities that allow for cheating and using the use of outside help. Online proctoring based on artificial intelligence technologies in distance education is an effective technological solution to prevent academic dishonesty. This article explores the development and implementation of an online control proctoring system using artificial intelligence technology for conducting online exams. The article discusses the proctoring systems used in Kazakhstan, compares the functional features of the selected proctoring systems, and describes the architecture of Proctor SU. A prototype of the Proctor SU proctoring system has been developed. As a pilot program, the authors used this system during an online university exam and examined the results of the test. According to the author’s examination, students have a positive attitude towards the use of Proctor SU online proctoring. The proposed proctor system includes features of face detection, face tracking, audio capture, and the active capture of system windows. Models CNN, R-CNN, and YOLOv3 were used in the development process. The YOLOv3 model processed images in real time at 45 frames per second, and CNN and R-CNN processed images in real time at 30 and 38 frames per second. The YOLOv3 model showed better results in terms of real-time face recognition. Therefore, the YOLOv3 model was implemented into the Proctor SU proctoring system.
在线教育的需求正在逐渐增长。大多数大学和其他机构都面临着这样一个事实,即几乎不可能跟踪考生远程考试的诚实程度。在在线模式中,有许多简单的机会允许作弊和使用外部帮助。基于人工智能技术的远程教育在线监考是防止学术不诚信的有效技术解决方案。本文探讨了一种利用人工智能技术进行在线考试的在线控制监考系统的开发与实现。本文讨论了哈萨克斯坦使用的监考系统,比较了所选监考系统的功能特点,描述了Proctor SU的体系结构,并开发了Proctor SU监考系统的原型。作为一个试点项目,作者在一次在线大学考试中使用了该系统,并检查了考试结果。根据笔者的调查,学生对使用Proctor SU在线监考持积极的态度。提出的监控器系统包括人脸检测、人脸跟踪、音频捕获和系统窗口的主动捕获等功能。在开发过程中使用了CNN, R-CNN和YOLOv3模型。YOLOv3模型以45帧/秒的速度实时处理图像,CNN和R-CNN以30帧/秒和38帧/秒的速度实时处理图像。YOLOv3模型在实时人脸识别方面表现出更好的效果。因此,在Proctor SU监考系统中实现了YOLOv3模型。
{"title":"Research on the Development of a Proctoring System for Conducting Online Exams in Kazakhstan","authors":"A. Nurpeisova, A. Shaushenova, Z. Mutalova, M. Ongarbayeva, S. Niyazbekova, Anargul Bekenova, Lyazzat Zhumaliyeva, S. Zhumasseitova","doi":"10.3390/computation11060120","DOIUrl":"https://doi.org/10.3390/computation11060120","url":null,"abstract":"The demand for online education is gradually growing. Most universities and other institutions are faced with the fact that it is almost impossible to track how honestly test takers take exams remotely. In online formats, there are many simple opportunities that allow for cheating and using the use of outside help. Online proctoring based on artificial intelligence technologies in distance education is an effective technological solution to prevent academic dishonesty. This article explores the development and implementation of an online control proctoring system using artificial intelligence technology for conducting online exams. The article discusses the proctoring systems used in Kazakhstan, compares the functional features of the selected proctoring systems, and describes the architecture of Proctor SU. A prototype of the Proctor SU proctoring system has been developed. As a pilot program, the authors used this system during an online university exam and examined the results of the test. According to the author’s examination, students have a positive attitude towards the use of Proctor SU online proctoring. The proposed proctor system includes features of face detection, face tracking, audio capture, and the active capture of system windows. Models CNN, R-CNN, and YOLOv3 were used in the development process. The YOLOv3 model processed images in real time at 45 frames per second, and CNN and R-CNN processed images in real time at 30 and 38 frames per second. The YOLOv3 model showed better results in terms of real-time face recognition. Therefore, the YOLOv3 model was implemented into the Proctor SU proctoring system.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"13 1","pages":"120"},"PeriodicalIF":0.0,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75265592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Water Distribution through Explainable AI and Rule-Based Control 通过可解释的人工智能和基于规则的控制优化水分配
Pub Date : 2023-06-18 DOI: 10.3390/computers12060123
Enrico Ferrari, Damiano Verda, Nicolò Pinna, Marco Muselli
Optimizing water distribution both from an energy-saving perspective and from a quality of service perspective is a challenging task since it involves a complex system with many nodes, many hidden variables and many operational constraints. For this reason, water distribution systems need to handle a delicate trade-off between the effectiveness and computational time of the solution. In this paper, we propose a new computationally efficient method, named rule-based control, to optimize water distribution networks without the need for a rigorous formulation of the optimization problem. As a matter of fact, since it is based on a machine learning approach, the proposed method employs only a set of historical data, where the configuration can be labeled according to a quality criterion. Since it is a data-driven approach, it could be applied to any complex network where historical labeled data are available. In particular, rule-based control exploits a rule-based classification method that allows us to retrieve the rules leading to good or bad performances of the system, even without any information about its physical laws. The evaluation of the results on some simulated scenarios shows that the proposed approach is able to reduce energy consumption while ensuring a good quality of the service. The proposed approach is currently used in the water distribution system of the Milan (Italy) water main.
从节能的角度和服务质量的角度优化水资源分配是一项具有挑战性的任务,因为它涉及一个具有许多节点、许多隐藏变量和许多操作约束的复杂系统。由于这个原因,配水系统需要在解决方案的有效性和计算时间之间进行微妙的权衡。在本文中,我们提出了一种新的计算效率高的方法,称为基于规则的控制,以优化配水网络,而不需要严格的优化问题的公式。事实上,由于它是基于机器学习方法,因此所提出的方法仅使用一组历史数据,其中配置可以根据质量标准进行标记。由于它是一种数据驱动的方法,因此它可以应用于任何具有历史标记数据的复杂网络。特别是,基于规则的控制利用基于规则的分类方法,使我们能够检索导致系统性能好坏的规则,即使没有任何关于其物理定律的信息。仿真结果表明,该方法能够在保证服务质量的同时降低能耗。提议的方法目前在米兰(意大利)主水管的配水系统中使用。
{"title":"Optimizing Water Distribution through Explainable AI and Rule-Based Control","authors":"Enrico Ferrari, Damiano Verda, Nicolò Pinna, Marco Muselli","doi":"10.3390/computers12060123","DOIUrl":"https://doi.org/10.3390/computers12060123","url":null,"abstract":"Optimizing water distribution both from an energy-saving perspective and from a quality of service perspective is a challenging task since it involves a complex system with many nodes, many hidden variables and many operational constraints. For this reason, water distribution systems need to handle a delicate trade-off between the effectiveness and computational time of the solution. In this paper, we propose a new computationally efficient method, named rule-based control, to optimize water distribution networks without the need for a rigorous formulation of the optimization problem. As a matter of fact, since it is based on a machine learning approach, the proposed method employs only a set of historical data, where the configuration can be labeled according to a quality criterion. Since it is a data-driven approach, it could be applied to any complex network where historical labeled data are available. In particular, rule-based control exploits a rule-based classification method that allows us to retrieve the rules leading to good or bad performances of the system, even without any information about its physical laws. The evaluation of the results on some simulated scenarios shows that the proposed approach is able to reduce energy consumption while ensuring a good quality of the service. The proposed approach is currently used in the water distribution system of the Milan (Italy) water main.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"99 1","pages":"123"},"PeriodicalIF":0.0,"publicationDate":"2023-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85760581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proactive Ransomware Detection Using Extremely Fast Decision Tree (EFDT) Algorithm: A Case Study 使用极快决策树(EFDT)算法的主动勒索软件检测:一个案例研究
Pub Date : 2023-06-15 DOI: 10.3390/computers12060121
Ibrahim Ba’abbad, O. Batarfi
Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim’s machine or encrypts his personal information. Numerous research has been conducted to stop and quickly recognize ransomware attacks. For proactive forecasting, artificial intelligence (AI) techniques are used. Traditional machine learning/deep learning (ML/DL) techniques, however, take a lot of time and decrease the accuracy and latency performance of network monitoring. In this study, we utilized the Hoeffding trees classifier as one of the stream data mining classification techniques to detect and prevent ransomware attacks. Three Hoeffding trees classifier algorithms are selected to be applied to the Resilient Information Systems Security (RISS) research group dataset. After configuration, Massive Online Analysis (MOA) software is utilized as a testing framework. The results of Hoeffding tree classifier algorithms are then assessed to choose the enhanced model with the highest accuracy and latency performance. In conclusion, the 99.41% classification accuracy was the highest result achieved by the EFDT algorithm in 66 ms.
随着时间的推移,一些恶意软件变种攻击了系统和数据。勒索软件是最有害的恶意软件之一,因为它会造成巨大的损失。为了获得赎金,勒索软件是一种锁定受害者的机器或加密其个人信息的软件。为了阻止和快速识别勒索软件攻击,已经进行了大量的研究。对于主动预测,使用人工智能(AI)技术。然而,传统的机器学习/深度学习(ML/DL)技术需要花费大量时间,并且降低了网络监控的准确性和延迟性能。在本研究中,我们利用Hoeffding树分类器作为流数据挖掘分类技术之一来检测和预防勒索软件攻击。选择了三种Hoeffding树分类器算法应用于弹性信息系统安全(RISS)研究组数据集。配置完成后,使用Massive Online Analysis (MOA)软件作为测试框架。然后评估Hoeffding树分类器算法的结果,以选择具有最高准确率和延迟性能的增强模型。综上所述,EFDT算法在66 ms内的分类准确率最高,达到99.41%。
{"title":"Proactive Ransomware Detection Using Extremely Fast Decision Tree (EFDT) Algorithm: A Case Study","authors":"Ibrahim Ba’abbad, O. Batarfi","doi":"10.3390/computers12060121","DOIUrl":"https://doi.org/10.3390/computers12060121","url":null,"abstract":"Several malware variants have attacked systems and data over time. Ransomware is among the most harmful malware since it causes huge losses. In order to get a ransom, ransomware is software that locks the victim’s machine or encrypts his personal information. Numerous research has been conducted to stop and quickly recognize ransomware attacks. For proactive forecasting, artificial intelligence (AI) techniques are used. Traditional machine learning/deep learning (ML/DL) techniques, however, take a lot of time and decrease the accuracy and latency performance of network monitoring. In this study, we utilized the Hoeffding trees classifier as one of the stream data mining classification techniques to detect and prevent ransomware attacks. Three Hoeffding trees classifier algorithms are selected to be applied to the Resilient Information Systems Security (RISS) research group dataset. After configuration, Massive Online Analysis (MOA) software is utilized as a testing framework. The results of Hoeffding tree classifier algorithms are then assessed to choose the enhanced model with the highest accuracy and latency performance. In conclusion, the 99.41% classification accuracy was the highest result achieved by the EFDT algorithm in 66 ms.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"35 1","pages":"121"},"PeriodicalIF":0.0,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85380269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spherical Subspace Potential Functional Theory 球面子空间势泛函理论
Pub Date : 2023-06-15 DOI: 10.3390/computation11060119
Á. Nagy
The recently introduced version of the density functional theory that employs a set of spherically symmetric densities instead of the density has a ‘set-representability problem’. It is not known if a density exists for a given set of the spherically symmetric densities. This problem can be eliminated if potentials are applied instead of densities as basic variables. Now, the spherical subspace potential functional theory is established.
最近引入的密度泛函理论版本采用了一组球对称密度而不是密度,这有一个“集合可表征性问题”。对于给定的一组球对称密度,是否存在密度是未知的。如果应用势而不是密度作为基本变量,这个问题就可以消除。建立了球面子空间势泛函理论。
{"title":"Spherical Subspace Potential Functional Theory","authors":"Á. Nagy","doi":"10.3390/computation11060119","DOIUrl":"https://doi.org/10.3390/computation11060119","url":null,"abstract":"The recently introduced version of the density functional theory that employs a set of spherically symmetric densities instead of the density has a ‘set-representability problem’. It is not known if a density exists for a given set of the spherically symmetric densities. This problem can be eliminated if potentials are applied instead of densities as basic variables. Now, the spherical subspace potential functional theory is established.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"7 1","pages":"119"},"PeriodicalIF":0.0,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88820377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Learning Framework for Supporting Digital Innovation Hubs 支持数字创新中心的学习框架
Pub Date : 2023-06-15 DOI: 10.3390/computers12060122
João Sarraipa, Majid Zamiri, Elsa Marcelino-Jesus, Andreia Artífice, R. Jardim-Gonçalves, N. Moalla
With the increasing demand for digital transformation and (digital) technology transfer (TT), digital innovation hubs (DIHs) are the new piece of the puzzle of our economy and industries’ landscapes. Evidence shows that DIHs can provide good opportunities to access needed innovations, technologies, and resources at a higher level than other organizations that can normally access them. However, it is critically important to note that DIHs are still evolving, under research, and under development. That is, there are many substantial aspects of DIHs that should be considered. For example, DIHs must cater to a wide spectrum of needs for TT. From this perspective, the contribution of this work is proposing a generic and flexible learning framework, aiming to assist DIHs in providing suitable education, training, and learning services that support the process of (digital) TT to companies. The proposed learning framework was designed, evaluated, and improved with the support of two EU projects, and these processes are discussed in brief. The primary and leading results gained in this way show that the learning framework has immense potential for application to similar cases, and it can facilitate and expedite the process of TT to companies. The study is concluded with some directions for future works.
随着数码转型和(数码)技术转移(TT)的需求日益增加,数码创新中心(DIHs)成为本港经济和工业格局的新拼图。有证据表明,与通常能够获得所需创新、技术和资源的其他组织相比,DIHs能够在更高的层次上提供获得所需创新、技术和资源的良好机会。然而,至关重要的是要注意到,DIHs仍在不断发展,正在研究和开发中。也就是说,应该考虑DIHs的许多实质性方面。例如,DIHs必须满足TT的广泛需求。从这个角度来看,这项工作的贡献是提出了一个通用的、灵活的学习框架,旨在帮助医疗机构提供合适的教育、培训和学习服务,以支持公司的(数字)TT过程。在两个欧盟项目的支持下,对拟议的学习框架进行了设计、评估和改进,并简要讨论了这些过程。通过这种方式获得的初步和主要结果表明,该学习框架在类似案例中具有巨大的应用潜力,它可以促进和加快对公司的技术支持过程。最后,对今后的工作进行了展望。
{"title":"A Learning Framework for Supporting Digital Innovation Hubs","authors":"João Sarraipa, Majid Zamiri, Elsa Marcelino-Jesus, Andreia Artífice, R. Jardim-Gonçalves, N. Moalla","doi":"10.3390/computers12060122","DOIUrl":"https://doi.org/10.3390/computers12060122","url":null,"abstract":"With the increasing demand for digital transformation and (digital) technology transfer (TT), digital innovation hubs (DIHs) are the new piece of the puzzle of our economy and industries’ landscapes. Evidence shows that DIHs can provide good opportunities to access needed innovations, technologies, and resources at a higher level than other organizations that can normally access them. However, it is critically important to note that DIHs are still evolving, under research, and under development. That is, there are many substantial aspects of DIHs that should be considered. For example, DIHs must cater to a wide spectrum of needs for TT. From this perspective, the contribution of this work is proposing a generic and flexible learning framework, aiming to assist DIHs in providing suitable education, training, and learning services that support the process of (digital) TT to companies. The proposed learning framework was designed, evaluated, and improved with the support of two EU projects, and these processes are discussed in brief. The primary and leading results gained in this way show that the learning framework has immense potential for application to similar cases, and it can facilitate and expedite the process of TT to companies. The study is concluded with some directions for future works.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"25 1","pages":"122"},"PeriodicalIF":0.0,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78835578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Parallel Computing Approach to Gene Expression and Phenotype Correlation for Identifying Retinitis Pigmentosa Modifiers in Drosophila 果蝇视网膜色素变性修饰因子基因表达和表型相关性的并行计算方法
Pub Date : 2023-06-14 DOI: 10.3390/computation11060118
Chawin Metah, Amal Khalifa, Rebecca A. S. Palu
As a genetic eye disorder, retinitis pigmentosa (RP) has been a focus of researchers to find a diagnosis through either genome-wide association (GWA) or RNAseq analysis. In fact, GWA and RNAseq are considered two complementary approaches to gaining a more comprehensive understanding of the genetics of different diseases. However, RNAseq analysis can provide information about the specific mechanisms underlying the disease and the potential targets for therapy. This research proposes a new approach to differential gene expression (DGE) analysis, which is the heart of the core-analysis phase in any RNAseq study. Based on the Drosophila Genetic Reference Panel (DGRP), the gene expression dataset is computationally analyzed in light of eye-size phenotypes. We utilized the foreach and the doParallel R packages to run the code on a multicore machine to reduce the running time of the original algorithm, which exhibited an exponential time complexity. Experimental results showed an outstanding performance, reducing the running time by 95% while using 32 processes. In addition, more candidate modifier genes for RP were identified by increasing the scope of the analysis and considering more datasets that represent different phenotype models.
色素性视网膜炎(RP)作为一种遗传性眼病,通过全基因组关联(GWA)或RNAseq分析寻找诊断方法一直是研究人员关注的焦点。事实上,GWA和RNAseq被认为是两种互补的方法,可以更全面地了解不同疾病的遗传学。然而,RNAseq分析可以提供有关该疾病的特定机制和潜在治疗靶点的信息。本研究提出了一种新的差异基因表达(DGE)分析方法,这是任何RNAseq研究的核心分析阶段的核心。基于果蝇遗传参考面板(DGRP),根据眼睛大小表型计算分析基因表达数据集。我们使用foreach和dopparallelr包在多核机器上运行代码,以减少原始算法的运行时间,这显示出指数级的时间复杂度。实验结果表明,在使用32个进程的情况下,该算法的运行时间缩短了95%。此外,通过扩大分析范围和考虑更多代表不同表型模型的数据集,鉴定出更多RP的候选修饰基因。
{"title":"A Parallel Computing Approach to Gene Expression and Phenotype Correlation for Identifying Retinitis Pigmentosa Modifiers in Drosophila","authors":"Chawin Metah, Amal Khalifa, Rebecca A. S. Palu","doi":"10.3390/computation11060118","DOIUrl":"https://doi.org/10.3390/computation11060118","url":null,"abstract":"As a genetic eye disorder, retinitis pigmentosa (RP) has been a focus of researchers to find a diagnosis through either genome-wide association (GWA) or RNAseq analysis. In fact, GWA and RNAseq are considered two complementary approaches to gaining a more comprehensive understanding of the genetics of different diseases. However, RNAseq analysis can provide information about the specific mechanisms underlying the disease and the potential targets for therapy. This research proposes a new approach to differential gene expression (DGE) analysis, which is the heart of the core-analysis phase in any RNAseq study. Based on the Drosophila Genetic Reference Panel (DGRP), the gene expression dataset is computationally analyzed in light of eye-size phenotypes. We utilized the foreach and the doParallel R packages to run the code on a multicore machine to reduce the running time of the original algorithm, which exhibited an exponential time complexity. Experimental results showed an outstanding performance, reducing the running time by 95% while using 32 processes. In addition, more candidate modifier genes for RP were identified by increasing the scope of the analysis and considering more datasets that represent different phenotype models.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"47 1","pages":"118"},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88664895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Time Frequency Compactness of the Slepian Basis of Order Zero for Engineering Applications 零阶Slepian基的时频紧性在工程中的应用
Pub Date : 2023-06-13 DOI: 10.3390/computation11060116
Zuwen Sun, N. Baddour
Time and frequency concentrations of waveforms are often of interest in engineering applications. The Slepian basis of order zero is an index-limited (finite) vector that is known to be optimally concentrated in the frequency domain. This paper proposes a method of mapping the index-limited Slepian basis to a discrete-time vector, hence obtaining a time-limited, discrete-time Slepian basis that is optimally concentrated in frequency. The main result of this note is to demonstrate that the (discrete-time) Slepian basis achieves minimum time-bandwidth compactness under certain conditions. We distinguish between the characteristic (effective) time/bandwidth of the Slepians and their defining time/bandwidth (the time and bandwidth parameters used to generate the Slepian basis). Using two different definitions of effective time and bandwidth of a signal, we show that when the defining time-bandwidth product of the Slepian basis increases, its effective time-bandwidth product tends to a minimum value. This implies that not only are the zeroth order Slepian bases known to be optimally time-limited and band-concentrated basis vectors, but also as their defining time-bandwidth products increase, their effective time-bandwidth properties approach the known minimum compactness allowed by the uncertainty principle. Conclusions are also drawn about the smallest defining time-bandwidth parameters to reach the minimum possible compactness. These conclusions give guidance for applications where the time-bandwidth product is free to be selected and hence may be selected to achieve minimum compactness.
波形的时间和频率集中在工程应用中经常引起人们的兴趣。零阶的Slepian基是已知在频域中最优集中的索引受限(有限)向量。本文提出了一种将有索引限制的Slepian基映射到离散时间向量的方法,从而得到一个最优集中在频率上的有时间限制的离散Slepian基。本文的主要结果是证明(离散时间)Slepian基在一定条件下达到最小时间-带宽紧性。我们区分了Slepian的特征(有效)时间/带宽和它们的定义时间/带宽(用于生成Slepian基的时间和带宽参数)。利用信号有效时间和带宽的两种不同定义,表明当Slepian基的定义时间带宽积增加时,其有效时间带宽积趋于最小值。这意味着,不仅已知零阶Slepian基是最优时间限制和带宽集中的基向量,而且随着它们的定义时间带宽积的增加,它们的有效时间带宽性质接近不确定性原理允许的已知最小紧度。同时也得出了关于最小的定义时间带宽参数以达到尽可能小的紧凑性的结论。这些结论为时间带宽乘积可以自由选择的应用提供了指导,因此可以选择以实现最小的紧凑性。
{"title":"On the Time Frequency Compactness of the Slepian Basis of Order Zero for Engineering Applications","authors":"Zuwen Sun, N. Baddour","doi":"10.3390/computation11060116","DOIUrl":"https://doi.org/10.3390/computation11060116","url":null,"abstract":"Time and frequency concentrations of waveforms are often of interest in engineering applications. The Slepian basis of order zero is an index-limited (finite) vector that is known to be optimally concentrated in the frequency domain. This paper proposes a method of mapping the index-limited Slepian basis to a discrete-time vector, hence obtaining a time-limited, discrete-time Slepian basis that is optimally concentrated in frequency. The main result of this note is to demonstrate that the (discrete-time) Slepian basis achieves minimum time-bandwidth compactness under certain conditions. We distinguish between the characteristic (effective) time/bandwidth of the Slepians and their defining time/bandwidth (the time and bandwidth parameters used to generate the Slepian basis). Using two different definitions of effective time and bandwidth of a signal, we show that when the defining time-bandwidth product of the Slepian basis increases, its effective time-bandwidth product tends to a minimum value. This implies that not only are the zeroth order Slepian bases known to be optimally time-limited and band-concentrated basis vectors, but also as their defining time-bandwidth products increase, their effective time-bandwidth properties approach the known minimum compactness allowed by the uncertainty principle. Conclusions are also drawn about the smallest defining time-bandwidth parameters to reach the minimum possible compactness. These conclusions give guidance for applications where the time-bandwidth product is free to be selected and hence may be selected to achieve minimum compactness.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"96 1","pages":"116"},"PeriodicalIF":0.0,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83643130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1