期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
肠道噬菌体组生物信息学分析方法的研究进展
1
作者 胡晴玥 李德志 刘箐 《微生物学杂志》 CAS CSCD 2022年第3期89-99,共11页
噬菌体是感染细菌的病毒,广泛存在于各类环境中。由于传统实验研究的局限性及噬菌体基因的特异性,导致对肠道噬菌体的研究很少。随着宏基因组测序技术的发展和各种生物信息分析软件的开发,可以通过噬菌体组学,加深对肠道噬菌体的认识。... 噬菌体是感染细菌的病毒,广泛存在于各类环境中。由于传统实验研究的局限性及噬菌体基因的特异性,导致对肠道噬菌体的研究很少。随着宏基因组测序技术的发展和各种生物信息分析软件的开发,可以通过噬菌体组学,加深对肠道噬菌体的认识。噬菌体组分析流程主要包括原始数据质量控制和预处理,病毒基因组序列的拼接组装,类病毒颗粒的筛选和系统分类注释以及进化分析和预测相应宿主细菌。本文对噬菌体组分析流程和其中所需要的常用生物信息分析工具和数据库进行详细的介绍,可以为肠道噬菌体研究以及相关的研究人员提供参考。 展开更多
关键词 肠道噬菌体 生物信息学 噬菌体组 病毒组 机器学习软件 数据库
下载PDF
A Practice Guide of Software Aging Prediction in a Web Server Based on Machine Learning 被引量:3
2
作者 Yongquan Yan Ping Guo 《China Communications》 SCIE CSCD 2016年第6期225-235,共11页
In the past two decades, software aging has been studied by both academic and industry communities. Many scholars focused on analytical methods or time series to model software aging process. While machine learning ha... In the past two decades, software aging has been studied by both academic and industry communities. Many scholars focused on analytical methods or time series to model software aging process. While machine learning has been shown as a very promising technique in application to forecast software state: normal or aging. In this paper, we proposed a method which can give practice guide to forecast software aging using machine learning algorithm. Firstly, we collected data from a running commercial web server and preprocessed these data. Secondly, feature selection algorithm was applied to find a subset of model parameters set. Thirdly, time series model was used to predict values of selected parameters in advance. Fourthly, some machine learning algorithms were used to model software aging process and to predict software aging. Fifthly, we used sensitivity analysis to analyze how heavily outcomes changed following input variables change. In the last, we applied our method to an IIS web server. Through analysis of the experiment results, we find that our proposed method can predict software aging in the early stage of system development life cycle. 展开更多
关键词 software aging software rejuvenation machine learning web server
下载PDF
Managing High Volume Data for Network Attack Detection Using Real-Time Flow Filtering
3
作者 Abhrajit Ghosh Yitzchak M. Gottlieb +5 位作者 Aditya Naidu Akshay Vashist Alexander Poylisher Ayumu Kubota Yukiko Sawaya Akira Yamada 《China Communications》 SCIE CSCD 2013年第3期56-66,共11页
In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to hi... In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to high volume data feeds that are common in large Tier-1 ISP networks and providing rich, timely information on observed attacks. It is a software solution that is designed to run on off-the-shelf hardware platforms and incorporates a scalable data processing architecture along with lightweight analysis algorithms that make it suitable for deployment in large networks. RTFF also makes use of state of the art machine learning algorithms to construct attack models that can be used to detect as well as predict attacks. 展开更多
关键词 network security intrusion detection SCALING
下载PDF
A Learning Evasive Email-Based P2P-Like Botnet
4
作者 Zhi Wang Meilin Qin +2 位作者 Mengqi Chen Chunfu Jia Yong Ma 《China Communications》 SCIE CSCD 2018年第2期15-24,共10页
Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution... Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution. But the real-world malware data distribution is not stable and changes with time. By exploiting the knowledge of the machine learning algorithm and malware data concept drift problem, we show a novel learning evasive botnet architecture and a stealthy and secure C&C mechanism. Based on the email communication channel, we construct a stealthy email-based P2 P-like botnet that exploit the excellent reputation of email servers and a huge amount of benign email communication in the same channel. The experiment results show horizontal correlation learning algorithm is difficult to separate malicious email traffic from normal email traffic based on the volume features and time-related features with enough confidence. We discuss the malware data concept drift and possible defense strategies. 展开更多
关键词 MALWARE BOTNET learning evasion command and control
下载PDF
An effective fault prediction model developed using an extreme learning machine with various kernel methods
5
作者 Lov KUMAR Anand TIRKEY Santanu-Ku.RATH 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第7期864-888,共25页
System analysts often use software fault prediction models to identify fault-prone modules during the design phase of the software development life cycle. The models help predict faulty modules based on the software m... System analysts often use software fault prediction models to identify fault-prone modules during the design phase of the software development life cycle. The models help predict faulty modules based on the software metrics that are input to the models. In this study, we consider 20 types of metrics to develop a model using an extreme learning machine associated with various kernel methods. We evaluate the effectiveness of the mode using a proposed framework based on the cost and efficiency in the testing phases. The evaluation process is carried out by considering case studies for 30 object-oriented software systems. Experimental results demonstrate that the application of a fault prediction model is suitable for projects with the percentage of faulty classes below a certain threshold, which depends on the efficiency of fault identification(low: 47.28%; median: 39.24%; high: 25.72%). We consider nine feature selection techniques to remove the irrelevant metrics and to select the best set of source code metrics for fault prediction. 展开更多
关键词 CK metrics Cost analysis Extreme learning machine Feature selection techniques Object-oriented software
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部