首页 > 最新文献

Journal of Autonomous Intelligence最新文献

英文 中文
Network intrusion detection using ensemble weighted voting classifier based honeypot framework 利用基于蜜罐框架的集合加权投票分类器进行网络入侵检测
Pub Date : 2024-01-08 DOI: 10.32629/jai.v7i3.1081
Parvathi Pothumani, Sreenivasa Reddy
The Internet of Things (IoT) is a new model that connects physical objects and the Internet and has become one of the most important technological developments in computing. It is estimated that by 2022, one trillion physical objects will be connected to the Internet. The poor accessibility and lack of interoperability of many of these devices in a vast heterogeneous landscape make it difficult to design specific security measures and implement specific defences mechanism in addition, IoT networks are still open and vulnerable to network disruption attacks. Therefore, there is a need for additional security tools related to IoT. Intrusion Detection System could serve this purpose. Intrusion detection is the process of monitoring and analyzing network traffic in order to detect potential security breaches and unauthorized access to a IOT network. It involves the use of various technologies and techniques to identify and respond to potential threats in real-time. Network intrusion detection helps organizations protect their valuable assets, including sensitive data, intellectual property, and financial resources, from cyberattacks. By detecting and responding to potential security breaches in a timely manner, network intrusion detection systems can help organizations prevent or mitigate the impact of security incidents, minimize downtime and financial losses, and maintain the integrity of their operations and reputation. Weighted soft voting is a technique used in network intrusion detection to improve the accuracy and reliability of the detection process. It involves combining the results of multiple intrusion detection systems (IDS) based on decision tree, random forest and XGBoost using a weighted approach that assigns different levels of importance to each system based on its performance and reliability. The basic idea behind weighted soft voting is to give more weight to the predictions of IDS that have higher accuracy and lower false positive rates, and less weight to those that have lower accuracy and higher false positive rates. The proposed approach can help reduce the impact of false alarms and increase the sensitivity and specificity of the intrusion detection process.
物联网(IoT)是一种连接物理对象和互联网的新模式,已成为计算机领域最重要的技术发展之一。据估计,到 2022 年,将有一万亿个物理物体连接到互联网。在巨大的异构环境中,许多设备的可访问性差且缺乏互操作性,因此很难设计特定的安全措施和实施特定的防御机制,此外,物联网网络仍然是开放的,很容易受到网络中断攻击。因此,需要更多与物联网相关的安全工具。入侵检测系统可以实现这一目的。入侵检测是对网络流量进行监控和分析的过程,目的是检测潜在的安全漏洞和对物联网网络的未经授权访问。它涉及使用各种技术和工艺来实时识别和应对潜在威胁。网络入侵检测可帮助组织保护其宝贵资产,包括敏感数据、知识产权和财务资源免受网络攻击。通过及时发现和应对潜在的安全漏洞,网络入侵检测系统可以帮助企业预防或减轻安全事件的影响,最大限度地减少停机时间和经济损失,并维护其运营和声誉的完整性。加权软投票是一种用于网络入侵检测的技术,可提高检测过程的准确性和可靠性。它采用加权方法将基于决策树、随机森林和 XGBoost 的多个入侵检测系统 (IDS) 的结果结合起来,根据每个系统的性能和可靠性赋予其不同的重要程度。加权软投票背后的基本思想是,给准确率高、误报率低的 IDS 预测赋予更多权重,而给准确率低、误报率高的 IDS 预测赋予较少权重。所提出的方法有助于减少误报的影响,提高入侵检测过程的灵敏度和特异性。
{"title":"Network intrusion detection using ensemble weighted voting classifier based honeypot framework","authors":"Parvathi Pothumani, Sreenivasa Reddy","doi":"10.32629/jai.v7i3.1081","DOIUrl":"https://doi.org/10.32629/jai.v7i3.1081","url":null,"abstract":"The Internet of Things (IoT) is a new model that connects physical objects and the Internet and has become one of the most important technological developments in computing. It is estimated that by 2022, one trillion physical objects will be connected to the Internet. The poor accessibility and lack of interoperability of many of these devices in a vast heterogeneous landscape make it difficult to design specific security measures and implement specific defences mechanism in addition, IoT networks are still open and vulnerable to network disruption attacks. Therefore, there is a need for additional security tools related to IoT. Intrusion Detection System could serve this purpose. Intrusion detection is the process of monitoring and analyzing network traffic in order to detect potential security breaches and unauthorized access to a IOT network. It involves the use of various technologies and techniques to identify and respond to potential threats in real-time. Network intrusion detection helps organizations protect their valuable assets, including sensitive data, intellectual property, and financial resources, from cyberattacks. By detecting and responding to potential security breaches in a timely manner, network intrusion detection systems can help organizations prevent or mitigate the impact of security incidents, minimize downtime and financial losses, and maintain the integrity of their operations and reputation. Weighted soft voting is a technique used in network intrusion detection to improve the accuracy and reliability of the detection process. It involves combining the results of multiple intrusion detection systems (IDS) based on decision tree, random forest and XGBoost using a weighted approach that assigns different levels of importance to each system based on its performance and reliability. The basic idea behind weighted soft voting is to give more weight to the predictions of IDS that have higher accuracy and lower false positive rates, and less weight to those that have lower accuracy and higher false positive rates. The proposed approach can help reduce the impact of false alarms and increase the sensitivity and specificity of the intrusion detection process.","PeriodicalId":508223,"journal":{"name":"Journal of Autonomous Intelligence","volume":"11 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139445847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of lanes, obstacles and drivable areas for self-driving cars using multifusion perception metrics 利用多重融合感知指标检测自动驾驶汽车的车道、障碍物和可驾驶区域
Pub Date : 2024-01-08 DOI: 10.32629/jai.v7i3.1059
A. Kishore Kumar, Venkatesh Palanisamy
Autonomous vehicles have been a recent trend and active research area from the onset of machine learning and deep learning algorithms. Computer vision and deep learning techniques have simplified the operations of continuous monitoring and decision-making capabilities of autonomous vehicles. A navigation system is facilitated by a visual system, where sensors and collectors process input in form of images or videos, and the navigation system will be making certain decisions to adhere to the safety of drivers and passers-by. This research article contemplates the model of obstacle detection, lane detection, and how the vehicle is supposed to act in terms of autonomous driving situation. This situation should resemble human driving conditions and should ensure maximum safety to both the stakeholders. A unified neural network for detecting lanes, objects, obstacles and to advise the driving speed is defined in this architecture. As far as autonomous driving is considered, these target elements are considered to be the predominant areas of focus for autonomous driving vehicles. Since capturing the images or videos have to be performed in real-time scenarios and processing them for relevant decision making have to be completed at a swift pace, a concept of context tensors is introduced in the decoders for discriminating the tasks based on priority. Every task is associated with the other tasks and also the decision-making process and hence this architecture will continue to learn every day. From the obtained results, it is evident that multitask networks can be improved using the proposed method in terms of accuracy, decision-making capability and reduced computational time. This model investigates the performance using Berkeley deep drive datasets which are considered to be a challenging dataset.
从机器学习和深度学习算法开始,自动驾驶汽车已成为一种最新趋势和活跃的研究领域。计算机视觉和深度学习技术简化了自动驾驶汽车持续监控和决策能力的操作。导航系统由视觉系统提供便利,传感器和采集器处理图像或视频形式的输入,导航系统将做出某些决策,以确保驾驶员和路人的安全。这篇研究文章探讨了障碍物检测、车道检测模型,以及车辆在自动驾驶情况下应如何行动。这种情况应类似于人类的驾驶条件,并应最大限度地确保利益相关者的安全。在这一架构中,定义了一个统一的神经网络,用于检测车道、物体、障碍物,并为驾驶速度提供建议。就自动驾驶而言,这些目标要素被认为是自动驾驶汽车的主要关注领域。由于必须在实时场景中捕捉图像或视频,并迅速处理这些图像或视频以做出相关决策,因此解码器中引入了上下文张量的概念,以便根据优先级区分任务。每项任务都与其他任务以及决策过程相关联,因此该架构每天都在不断学习。从获得的结果可以看出,使用所提出的方法可以提高多任务网络的准确性、决策能力并减少计算时间。该模型使用伯克利深度驱动数据集对性能进行了研究,该数据集被认为是一个具有挑战性的数据集。
{"title":"Detection of lanes, obstacles and drivable areas for self-driving cars using multifusion perception metrics","authors":"A. Kishore Kumar, Venkatesh Palanisamy","doi":"10.32629/jai.v7i3.1059","DOIUrl":"https://doi.org/10.32629/jai.v7i3.1059","url":null,"abstract":"Autonomous vehicles have been a recent trend and active research area from the onset of machine learning and deep learning algorithms. Computer vision and deep learning techniques have simplified the operations of continuous monitoring and decision-making capabilities of autonomous vehicles. A navigation system is facilitated by a visual system, where sensors and collectors process input in form of images or videos, and the navigation system will be making certain decisions to adhere to the safety of drivers and passers-by. This research article contemplates the model of obstacle detection, lane detection, and how the vehicle is supposed to act in terms of autonomous driving situation. This situation should resemble human driving conditions and should ensure maximum safety to both the stakeholders. A unified neural network for detecting lanes, objects, obstacles and to advise the driving speed is defined in this architecture. As far as autonomous driving is considered, these target elements are considered to be the predominant areas of focus for autonomous driving vehicles. Since capturing the images or videos have to be performed in real-time scenarios and processing them for relevant decision making have to be completed at a swift pace, a concept of context tensors is introduced in the decoders for discriminating the tasks based on priority. Every task is associated with the other tasks and also the decision-making process and hence this architecture will continue to learn every day. From the obtained results, it is evident that multitask networks can be improved using the proposed method in terms of accuracy, decision-making capability and reduced computational time. This model investigates the performance using Berkeley deep drive datasets which are considered to be a challenging dataset.","PeriodicalId":508223,"journal":{"name":"Journal of Autonomous Intelligence","volume":"40 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139446555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the visualization of information of Chinese traditional music with human-computer interaction from the perspective of metaverse 元宇宙视角下人机交互的中国传统音乐信息可视化研究
Pub Date : 2024-01-03 DOI: 10.32629/jai.v7i3.1361
Yujing Cao, Jinwan Park
In the metaverse environment, establish an immersive human-computer interaction system for Chinese traditional music based on virtual reality technology. Design the system’s functionality according to the Y model, and construct a four-layered system architecture. Collect high-quality instructional audio and utilize polygon modeling technology to create contextualized scenes of Chinese traditional music, as well as high-fidelity models of characters and instruments. Implement motion capture through inertial sensor technology for performance action data mapping. Utilize a metaverse engine platform to realize interactive functions and conduct performance optimization. The system is capable of eliciting learners’ intrinsic experiences, enabling interactive self-directed learning and creative exploration of Chinese traditional music performance, demonstrating significant practical value.
在元宇宙环境中,建立基于虚拟现实技术的中国传统音乐沉浸式人机交互系统。根据 Y 模型设计系统功能,构建四层系统架构。收集高质量的教学音频,利用多边形建模技术创建中国传统音乐的情境化场景,以及高保真的人物和乐器模型。通过惯性传感器技术实现动作捕捉,绘制表演动作数据图。利用元数据引擎平台实现交互功能,并进行性能优化。该系统能够激发学习者的内在体验,实现交互式自主学习和对中国传统音乐表演的创造性探索,具有重要的实用价值。
{"title":"Research on the visualization of information of Chinese traditional music with human-computer interaction from the perspective of metaverse","authors":"Yujing Cao, Jinwan Park","doi":"10.32629/jai.v7i3.1361","DOIUrl":"https://doi.org/10.32629/jai.v7i3.1361","url":null,"abstract":"In the metaverse environment, establish an immersive human-computer interaction system for Chinese traditional music based on virtual reality technology. Design the system’s functionality according to the Y model, and construct a four-layered system architecture. Collect high-quality instructional audio and utilize polygon modeling technology to create contextualized scenes of Chinese traditional music, as well as high-fidelity models of characters and instruments. Implement motion capture through inertial sensor technology for performance action data mapping. Utilize a metaverse engine platform to realize interactive functions and conduct performance optimization. The system is capable of eliciting learners’ intrinsic experiences, enabling interactive self-directed learning and creative exploration of Chinese traditional music performance, demonstrating significant practical value.","PeriodicalId":508223,"journal":{"name":"Journal of Autonomous Intelligence","volume":"52 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139451926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CROA-based feature selection with BERT model for detecting the offensive speech in Twitter data 利用基于 CROA 的特征选择和 BERT 模型检测 Twitter 数据中的攻击性言论
Pub Date : 2024-01-03 DOI: 10.32629/jai.v7i3.1122
R. J. Anandhi, V. S. A. Devi, B. S. K. Devi, Balasubramanian Prabhu kavin, Gan Hong Seng
Online hate speech has flourished on social networking sites due to the widespread availability of mobile computers and other Web knowledge. Extensive research has shown that online exposure to hate speech has real-world effects on marginalized communities. Research into methods of automatically identifying hate speech has garnered significant attention. Hate speech can affect any demographic, while some populations are more vulnerable than others. Relying solely on progressive learning is insufficient for achieving the goal of automatic hate speech identification. It need access to large amounts of labelled data to train a model. Inaccurate statistics on hate speech and preconceived notions have been the biggest obstacles in the field of hate speech research for a long time. This research provides a novel strategy for meeting these needs by combining a transfer-learning attitude-based BERT (Bidirectional Encoder Representations from Transformers) with a coral reef optimization-based approach (CROA). A feature selection (FC) optimization strategy for coral reefs, a coral reefs optimization method mimics coral behaviours for reef location and development. We might think of each potential answer to the problem as a coral trying to establish itself in the reefs. The results are refined at each stage by applying specialized operators from the coral reefs optimization algorithm. When everything is said and done, the optimal solution is chosen. We also use a cutting-edge fine-tuning method based on transfer learning to assess BERT’s ability to recognize hostile contexts in social media communications. The paper evaluates the proposed approach using Twitter datasets tagged for racist, sexist, homophobic, or otherwise offensive content. The numbers show that our strategy achieves 5%–10% higher precision and recall compared to other approaches.
由于移动电脑和其他网络知识的普及,网上仇恨言论在社交网站上大行其道。大量研究表明,在网上接触仇恨言论会对边缘化群体产生现实影响。对仇恨言论自动识别方法的研究引起了广泛关注。仇恨言论可能影响任何人群,而某些人群比其他人群更容易受到影响。仅仅依靠渐进式学习不足以实现仇恨言论自动识别的目标。它需要获取大量标记数据来训练模型。长期以来,不准确的仇恨言论统计数据和先入为主的观念一直是仇恨言论研究领域的最大障碍。本研究通过将基于迁移学习态度的 BERT(来自变压器的双向编码器表征)与基于珊瑚礁优化的方法 (CROA) 相结合,为满足这些需求提供了一种新颖的策略。珊瑚礁优化方法是一种针对珊瑚礁的特征选择(FC)优化策略,它模仿珊瑚的行为来确定珊瑚礁的位置和发展。我们可以把问题的每一个潜在答案都看作是试图在珊瑚礁中建立自己的珊瑚。通过应用珊瑚礁优化算法中的专门运算符,在每个阶段对结果进行完善。一切完成后,就会选出最佳解决方案。我们还使用基于迁移学习的尖端微调方法来评估 BERT 识别社交媒体传播中敌对语境的能力。本文使用标记有种族主义、性别歧视、仇视同性恋或其他攻击性内容的 Twitter 数据集对所提出的方法进行了评估。结果表明,与其他方法相比,我们的策略的精确度和召回率提高了 5%-10%。
{"title":"CROA-based feature selection with BERT model for detecting the offensive speech in Twitter data","authors":"R. J. Anandhi, V. S. A. Devi, B. S. K. Devi, Balasubramanian Prabhu kavin, Gan Hong Seng","doi":"10.32629/jai.v7i3.1122","DOIUrl":"https://doi.org/10.32629/jai.v7i3.1122","url":null,"abstract":"Online hate speech has flourished on social networking sites due to the widespread availability of mobile computers and other Web knowledge. Extensive research has shown that online exposure to hate speech has real-world effects on marginalized communities. Research into methods of automatically identifying hate speech has garnered significant attention. Hate speech can affect any demographic, while some populations are more vulnerable than others. Relying solely on progressive learning is insufficient for achieving the goal of automatic hate speech identification. It need access to large amounts of labelled data to train a model. Inaccurate statistics on hate speech and preconceived notions have been the biggest obstacles in the field of hate speech research for a long time. This research provides a novel strategy for meeting these needs by combining a transfer-learning attitude-based BERT (Bidirectional Encoder Representations from Transformers) with a coral reef optimization-based approach (CROA). A feature selection (FC) optimization strategy for coral reefs, a coral reefs optimization method mimics coral behaviours for reef location and development. We might think of each potential answer to the problem as a coral trying to establish itself in the reefs. The results are refined at each stage by applying specialized operators from the coral reefs optimization algorithm. When everything is said and done, the optimal solution is chosen. We also use a cutting-edge fine-tuning method based on transfer learning to assess BERT’s ability to recognize hostile contexts in social media communications. The paper evaluates the proposed approach using Twitter datasets tagged for racist, sexist, homophobic, or otherwise offensive content. The numbers show that our strategy achieves 5%–10% higher precision and recall compared to other approaches.","PeriodicalId":508223,"journal":{"name":"Journal of Autonomous Intelligence","volume":"16 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139451453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Autonomous Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1