期刊文献+
共找到193篇文章
< 1 2 10 >
每页显示 20 50 100
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
1
作者 Dahyeon Kim Namgi Kim Junho Ahn 《Computers, Materials & Continua》 SCIE EI 2024年第3期3867-3889,共23页
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof... This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules. 展开更多
关键词 FRAMEWORK AUTOMATION vulnerability analysis SECURITY GUIDELINES
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
2
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
3
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information Security Cloud Infrastructure Offerings Cloud Migration Security Measures Data Breaches Cloud Service Providers CYBERSECURITY Cloud Security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud Security Tools
下载PDF
Intelligent In-Vehicle Safety System Based on Yolov5
4
作者 Biyun Chen Wei Cai Jinwen Zhu 《Journal of Computer and Communications》 2024年第3期207-218,共12页
In order to reduce the occurrence of traffic accidents and assist drivers to avoid dangerous driving. This paper presents a smart in-vehicle safety system that utilises the Yolov5 algorithm. Yolov5 algorithm is used t... In order to reduce the occurrence of traffic accidents and assist drivers to avoid dangerous driving. This paper presents a smart in-vehicle safety system that utilises the Yolov5 algorithm. Yolov5 algorithm is used to anticipate driver fatigue and distraction behaviours, and remind drivers to pay attention to safe driving in time. The system continuously splits the frames and analyses the frame content through the video feedback from the front camera, compared to the traditional machine learning, Yolov5’s mosaic data is enhanced, resulting in a batch size enhancement of 92.3%, and it also uses the Drop Block mechanism to prevent overfitting. The hardware of this system uses STM32 microcontroller and uses system DMA interrupt control and buzzer alarm device to warn about dangerous driving behaviour. 展开更多
关键词 Behaviour Detection STM32 Pyside2 Yolov5 Dlib Open Source Library Perclos Model
下载PDF
The Effect of Applying Human Resources Information System in Corporate Performance in the Banking Sector in Jordanian Firms
5
作者 Mohammad Al-Tarawneh Haroon Tarawneh 《Intelligent Information Management》 2012年第2期32-38,共7页
This paper aimed to demonstrate the impact of the effectiveness of the Application of human Resources Management System in Corporate Performance which perspective of workers in the Banking Sector in Jordanian Firm, an... This paper aimed to demonstrate the impact of the effectiveness of the Application of human Resources Management System in Corporate Performance which perspective of workers in the Banking Sector in Jordanian Firm, and to achieve the purpose of the study questionnaire was developed to measure the impact of the effectiveness of the Applica-tion of human Resources Management System in Corporate Performance, and the sample consists of the study (500) employees in the banking sector, and used statistical methods appropriate to answer the study questions and test hy-potheses. The study found asset of results, including: 1) There is a significant effect between the quality of the output of human resources information system and institutional performance in banking sector in the Jordanian firm. 2) There is a statistically significant effect between motives and corporate performance in the banking sector in the Jordanian firm. 3) There is a significant effect between training and organizational performance in the banking sector in the Jordanian firm. The study was presented a set of recommendations, including: activating the role of human resources information system, where still the information system performs the function of traditional supply the decision maker authorized one to read the outputs historical information when they want, either directly or after completing a series of routine procedures that enable it, without that, this applies to access information system to avoid problems that many occur later. Must go beyond human resources information system (HRIS) traditional role in the process of selection and appointment of the new human resource to work in the organization, which is merely providing information to decision makers about the people who stepped forward to fill a job order that differentiation among those application. That the ambitious goal of that system to provide a base for data (data bank) includes all of the details of the employment available in the market. 展开更多
关键词 HUMAN RESOURCES (HR) HUMAN RESOURCES Information System (HRIS) CORPORATE Motives ORGANIZATIONAL Performance
下载PDF
An Information Systems Project Management Course Using a Service-Learning Model
6
作者 Randall McCoy Scott Wymer 《Computer Technology and Application》 2012年第5期335-341,共7页
关键词 计算机信息系统 项目管理 学习模型 课程 服务 应届毕业生 项目负责人 工商管理
下载PDF
Internet of Things Intrusion Detection System Based on Convolutional Neural Network
7
作者 Jie Yin Yuxuan Shi +5 位作者 Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li 《Computers, Materials & Continua》 SCIE EI 2023年第4期2119-2135,共17页
In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT d... In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT devices exposes them to more serious security concerns. First, aconvolutional neural network intrusion detection system for IoT devices isproposed. After cleaning and preprocessing the NSL-KDD dataset, this paperuses feature engineering methods to select appropriate features. Then, basedon the combination of DCNN and machine learning, this paper designs acloud-based loss function, which adopts a regularization method to preventoverfitting. The model consists of one input layer, two convolutional layers,two pooling layers and three fully connected layers and one output layer.Finally, a framework that can fully consider the user’s privacy protection isproposed. The framework can only exchange model parameters or intermediateresults without exchanging local individuals or sample data. This paperfurther builds a global model based on virtual fusion data, so as to achievea balance between data privacy protection and data sharing computing. Theperformance indicators such as accuracy, precision, recall, F1 score, and AUCof the model are verified by simulation. The results show that the model ishelpful in solving the problem that the IoT intrusion detection system cannotachieve high precision and low cost at the same time. 展开更多
关键词 Internet of things intrusion detection system convolutional neural network federated learning
下载PDF
Applying UML and Machine Learning to Enhance System Analysis and Design
8
作者 Aparna Gadhi Ragha Madhavi Gondu +2 位作者 Chinna Manikanta Bandaru Keerthana Chit Reddy Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第5期67-76,共10页
System analysis and design (SAD) is a crucial process in the development of software systems. The impact of modeling techniques and software engineering practices on SAD has been the focus of research for many years. ... System analysis and design (SAD) is a crucial process in the development of software systems. The impact of modeling techniques and software engineering practices on SAD has been the focus of research for many years. Two such techniques that have had a significant impact on SAD are Unified Modeling Language (UML) and machine learning. UML has been used to model the structure and behavior of software systems, while machine learning has been used to automatically learn patterns in data and make predictions. The purpose of this paper is to review the literature on the impact of UML and machine learning on SAD. We summarize the findings from several studies and highlight the key insights related to the benefits and limitations of these techniques for SAD. Our review shows that both UML and machine learning have had a positive impact on SAD, with UML improving communication and documentation, and machine learning improving the accuracy of predictions. However, there are also challenges associated with their use, such as the need for expertise and the difficulty of interpreting machine learning models. Our findings suggest that a combination of UML and machine learning can enhance SAD by leveraging the strengths of each technique. 展开更多
关键词 UML Machine Learning System Analysis DESIGN IMPLEMENTATION
下载PDF
Multi-soliton solutions, breather-like and bound-state solitons for complex modified Korteweg–de Vries equation in optical fibers
9
作者 兰中周 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期119-123,共5页
Under investigation in this paper is a complex modified Korteweg–de Vries(KdV) equation, which describes the propagation of short pulses in optical fibers. Bilinear forms and multi-soliton solutions are obtained thro... Under investigation in this paper is a complex modified Korteweg–de Vries(KdV) equation, which describes the propagation of short pulses in optical fibers. Bilinear forms and multi-soliton solutions are obtained through the Hirota method and symbolic computation. Breather-like and bound-state solitons are constructed in which the signs of the imaginary parts of the complex wave numbers and the initial separations of the two parallel solitons are important factors for the interaction patterns. The periodic structures and position-induced phase shift of some solutions are introduced. 展开更多
关键词 complex modified KdV equation multi-soliton solutions breather-like BOUND-STATE
下载PDF
AMachine Learning Approach to Cyberbullying Detection in Arabic Tweets
10
作者 Dhiaa Musleh Atta Rahman +8 位作者 Mohammed Abbas Alkherallah Menhal Kamel Al-Bohassan Mustafa Mohammed Alawami Hayder Ali Alsebaa Jawad Ali Alnemer Ghazi Fayez Al-Mutairi May Issa Aldossary Dalal A.Aldowaihi Fahd Alhaidari 《Computers, Materials & Continua》 SCIE EI 2024年第7期1033-1054,共22页
With the rapid growth of internet usage,a new situation has been created that enables practicing bullying.Cyberbullying has increased over the past decade,and it has the same adverse effects as face-to-face bullying,l... With the rapid growth of internet usage,a new situation has been created that enables practicing bullying.Cyberbullying has increased over the past decade,and it has the same adverse effects as face-to-face bullying,like anger,sadness,anxiety,and fear.With the anonymity people get on the internet,they tend to bemore aggressive and express their emotions freely without considering the effects,which can be a reason for the increase in cyberbullying and it is the main motive behind the current study.This study presents a thorough background of cyberbullying and the techniques used to collect,preprocess,and analyze the datasets.Moreover,a comprehensive review of the literature has been conducted to figure out research gaps and effective techniques and practices in cyberbullying detection in various languages,and it was deduced that there is significant room for improvement in the Arabic language.As a result,the current study focuses on the investigation of shortlisted machine learning algorithms in natural language processing(NLP)for the classification of Arabic datasets duly collected from Twitter(also known as X).In this regard,support vector machine(SVM),Na飗e Bayes(NB),Random Forest(RF),Logistic regression(LR),Bootstrap aggregating(Bagging),Gradient Boosting(GBoost),Light Gradient Boosting Machine(LightGBM),Adaptive Boosting(AdaBoost),and eXtreme Gradient Boosting(XGBoost)were shortlisted and investigated due to their effectiveness in the similar problems.Finally,the scheme was evaluated by well-known performance measures like accuracy,precision,Recall,and F1-score.Consequently,XGBoost exhibited the best performance with 89.95%accuracy,which is promising compared to the state-of-the-art. 展开更多
关键词 Supervised machine learning ensemble learning CYBERBULLYING Arabic tweets NLP
下载PDF
A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing
11
作者 Yong Ma Han Zhao +5 位作者 Kunyin Guo Yunni Xia Xu Wang Xianhua Niu Dongge Zhu Yumin Dong 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期907-927,共21页
Mobile Edge Computing(MEC)is a technology designed for the on-demand provisioning of computing and storage services,strategically positioned close to users.In the MEC environment,frequently accessed content can be dep... Mobile Edge Computing(MEC)is a technology designed for the on-demand provisioning of computing and storage services,strategically positioned close to users.In the MEC environment,frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery,ultimately enhancing the quality of the user experience.However,due to the typical placement of edge devices and nodes at the network’s periphery,these components may face various potential fault tolerance challenges,including network instability,device failures,and resource constraints.Considering the dynamic nature ofMEC,making high-quality content caching decisions for real-time mobile applications,especially those sensitive to latency,by effectively utilizing mobility information,continues to be a significant challenge.In response to this challenge,this paper introduces FT-MAACC,a mobility-aware caching solution grounded in multi-agent deep reinforcement learning and equipped with fault tolerance mechanisms.This approach comprehensively integrates content adaptivity algorithms to evaluate the priority of highly user-adaptive cached content.Furthermore,it relies on collaborative caching strategies based onmulti-agent deep reinforcement learningmodels and establishes a fault-tolerancemodel to ensure the system’s reliability,availability,and persistence.Empirical results unequivocally demonstrate that FTMAACC outperforms its peer methods in cache hit rates and transmission latency. 展开更多
关键词 Mobile edge networks MOBILITY fault tolerance cooperative caching multi-agent deep reinforcement learning content prediction
下载PDF
The AI Paradox: Mapping the Unintended Disruptions in IT and Beyond
12
作者 Aparna Gadhi Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第7期105-112,共8页
In the realm of Artificial Intelligence (AI), there exists a complex landscape where promises of efficiency and innovation clash with unforeseen disruptions across Information Technology (IT) and broader societal real... In the realm of Artificial Intelligence (AI), there exists a complex landscape where promises of efficiency and innovation clash with unforeseen disruptions across Information Technology (IT) and broader societal realms. This paper sets out on a journey to explore the intricate paradoxes inherent in AI, focusing on the unintended consequences that ripple through IT and beyond. Through a thorough examination of literature and analysis of related works, this study aims to shed light on the complexities surrounding the AI paradox. It delves into how this paradox appears in various domains, such as algorithmic biases, job displacement, ethical dilemmas, and privacy concerns. By mapping out these unintended disruptions, this research seeks to offer a nuanced understanding of the challenges brought forth by AI-driven transformations. Ultimately, its goal is to pave the way for the responsible development and deployment of AI, fostering a harmonious integration of technological progress with societal values and priorities. 展开更多
关键词 Artificial Intelligence AI Paradox Unintended Disruptions Information Technology Ethical Dilemmas Privacy Concerns Job Displacement Algorithmic Biases
下载PDF
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
13
作者 Amardeep Singh Hamad Ali Abosaq +5 位作者 Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa 《Computers, Materials & Continua》 SCIE EI 2024年第4期857-873,共17页
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware operations.This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models.For this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is analyzed.In the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are developed.Later,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested methodology.The proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%F1-score.The empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual MLPmodels.In expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats. 展开更多
关键词 Cloud encryption RAAS ENSEMBLE threat detection deep learning CYBERSECURITY
下载PDF
A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
14
作者 Maria Gul Imran Ali Khan +9 位作者 Gohar Zaman Atta Rahman Jamaluddin Mir Sardar Asad Ali Biabani May IssaAldossary Mustafa Youldash Ashraf Saadeldeen Maqsood Mahmud Asiya Abdus Salam Dania Alkhulaifi 《Computers, Materials & Continua》 SCIE EI 2024年第4期1631-1657,共27页
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret... Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoreticalmodels aim to study and analyze the strategic behaviors of individuals within a crowd and their interactionsduring the evacuation. Game theoretical models have some limitations in the context of crowd evacuation. Thesemodels consider a group of individuals as homogeneous objects with the same goals, involve complex mathematicalformulation, and cannot model real-world scenarios such as panic, environmental information, crowds that movedynamically, etc. The proposed work presents a game theoretic model integrating an agent-based model to removethe obstacles from exits. The proposed model considered the parameters named: (1) obstacle size, length, andwidth, (2) removal time, (3) evacuation time, (4) crowd density, (5) obstacle identification, and (6) route selection.The proposed work conducts various experiments considering different conditions, such as obstacle types, obstacleremoval, and several obstacles. Evaluation results show the proposed model’s effectiveness compared with existingliterature in reducing the overall evacuation time, cell selection, and obstacle removal. The study is potentially usefulfor public safety situations such as emergency evacuations during disasters and calamities. 展开更多
关键词 Safe crowd evacuation public safety EMERGENCY transition probability COOPERATION
下载PDF
Existence of Monotone Positive Solution for a Fourth-Order Three-Point BVP with Sign-Changing Green’s Function
15
作者 Junrui Yue Yun Zhang Qingyue Bai 《Open Journal of Applied Sciences》 2024年第1期63-69,共7页
This paper is concerned with the following fourth-order three-point boundary value problem , where , we discuss the existence of positive solutions to the above problem by applying to the fixed point theory in cones a... This paper is concerned with the following fourth-order three-point boundary value problem , where , we discuss the existence of positive solutions to the above problem by applying to the fixed point theory in cones and iterative technique. 展开更多
关键词 Fourth-Order Three-Point Boundary Value Problem Sign-Changing Green’s Function Fixed Point Index Iterative Technique Monotone Positive Solution EXISTENCE
下载PDF
Dynamical Interaction Between Information and Disease Spreading in Populations of Moving Agents 被引量:2
16
作者 Lingling Xia Bo Song +2 位作者 Zhengjun Jing Yurong Song Liang Zhang 《Computers, Materials & Continua》 SCIE EI 2018年第10期123-144,共22页
Considering dynamical disease spreading network consisting of moving individuals,a new double-layer network is constructed,one where the information dissemination process takes place and the other where the dynamics o... Considering dynamical disease spreading network consisting of moving individuals,a new double-layer network is constructed,one where the information dissemination process takes place and the other where the dynamics of disease spreading evolves.On the basis of Markov chains theory,a new model characterizing the coupled dynamics between information dissemination and disease spreading in populations of moving agents is established and corresponding state probability equations are formulated to describe the probability in each state of every node at each moment.Monte Carlo simulations are performed to characterize the interaction process between information and disease spreading and investigate factors that influence spreading dynamics.Simulation results show that the increasing of information transmission rate can reduce the scale of disease spreading in some degree.Shortening infection period and strengthening consciousness for self-protection by decreasing individual’s scope of activity both can effectively reduce the final refractory density for the disease but have less effect on the information dissemination.In addition,the increasing of vaccination rate or decreasing of long-range travel can also reduce the scale of disease spreading. 展开更多
关键词 Complex networks Markov chains theory interaction process spreading dynamics double-layer network
下载PDF
Using an Adaptive Neuro-Fuzzy Inference System (AnFis) Algorithm for Automatic Diagnosis of Skin Cancer 被引量:1
17
作者 Suhail M. Odeh 《通讯和计算机(中英文版)》 2011年第9期751-755,共5页
关键词 自适应神经模糊推理系统 ANFIS模型 自动诊断 皮肤癌 算法 诊断系统 分类方法 最小二乘法
下载PDF
A Survey about Self-Healing Systems (Desktop and Web Application) 被引量:1
18
作者 Amjad A. Hudaib Hussam N. Fakhouri +1 位作者 Fatima Eid Al Adwan Sandi N. Fakhouri 《Communications and Network》 2017年第1期71-88,共18页
The complexity of computer architectures, software, web applications, and its large spread worldwide using the internet and the rapid increase in the number of users in companion with the increase of maintenance cost ... The complexity of computer architectures, software, web applications, and its large spread worldwide using the internet and the rapid increase in the number of users in companion with the increase of maintenance cost are all factors guided many researchers to develop software, web applications and systems that have the ability of self-healing. The aim of the self healing software feature is to fast recover the application and keep it running and available for 24/7 as optimal as possible. This survey provides an overview of self-healing software and system that is especially useful in all of those situations in which the involvement of humans is costly and hard to recover and needs to be automated with self healing. There are different aspects which will make us understand the different benefits of these self-healing systems. Finally, the approaches, techniques, mechanisms and individual characteristics of self healing are classified in different tables and then summarized. 展开更多
关键词 COMPUTER Architecture SELF-HEALING Systems SELF-HEALING PRINCIPLES Software SELF-HEALING Web-Self-Healing
下载PDF
Automatic Heart Disease Diagnosis System Based on Artificial Neural Network (ANN) and Adaptive Neuro-Fuzzy Inference Systems (ANFIS) Approaches 被引量:1
19
作者 Mohammad A. M. Abushariah Assal A. M. Alqudah +1 位作者 Omar Y. Adwan Rana M. M. Yousef 《Journal of Software Engineering and Applications》 2014年第12期1055-1064,共10页
This paper aims to design and implement an automatic heart disease diagnosis system using?MATLAB. The Cleveland data set for heart diseases was used as the main database for training and testing the developed system. ... This paper aims to design and implement an automatic heart disease diagnosis system using?MATLAB. The Cleveland data set for heart diseases was used as the main database for training and testing the developed system. In order to train and test the Cleveland data set, two systems were developed. The first system is based on the Multilayer Perceptron (MLP) structure on the Artificial Neural Network (ANN), whereas the second system is based on the Adaptive Neuro-Fuzzy Inference Systems (ANFIS) approach. Each system has two main modules, namely, training and testing,?where 80% and 20% of the Cleveland data set were randomly selected for training and testing?purposes respectively. Each system also has an additional module known as case-based module,?where the user has to input values for 13 required attributes as specified by the Cleveland data set,?in order to test the status of the patient whether heart disease is present or absent from that particular patient. In addition, the effects of different values for important parameters were investigated in the ANN-based and Neuro-Fuzzy-based systems in order to select the best parameters that obtain the highest performance. Based on the experimental work, it is clear that the Neuro-Fuzzy system outperforms the ANN system using the training data set, where the accuracy for each system was 100% and 90.74%, respectively. However, using the testing data set, it is clear that the ANN system outperforms the Neuro-Fuzzy system, where the best accuracy for each system was 87.04% and 75.93%, respectively. 展开更多
关键词 HEART Disease ANN ANFIS Multilayer PERCEPTRON NEURO-FUZZY CLEVELAND Data Set
下载PDF
Standardized Evaluation of Camera-based Driver State Monitoring Systems
20
作者 Renran Tian Keyu Ruan +3 位作者 Lingxi Li Jialiang Le Jeff Greenberg Saeed Barbat 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2019年第3期716-732,共17页
Driver state sensing technologies, such as vehicular systems, start to be widely considered by automotive manufacturers. To reduce the cost and minimize the intrusiveness towards driving, the majority of these systems... Driver state sensing technologies, such as vehicular systems, start to be widely considered by automotive manufacturers. To reduce the cost and minimize the intrusiveness towards driving, the majority of these systems rely on the in-cabin camera(s) and other optical sensors. With their great capabilities in detecting and intervening of driver distraction and inattention,these technologies may become key components in future vehicle safety and control systems. However, to the best of our knowledge,currently, there is no common standard available to objectively compare the performance of these technologies. Thus, it is imperative to develop one standardized process for evaluation purposes.In this paper, we propose one systematic and standardized evaluation process after successfully addressing three difficulties:1) defining and selecting the important influential individual and environmental factors, 2) countering the effects of individual differences and randomness in driver behaviors, and 3) building a reliable in-vehicle driver head motion tracking tool to collect ground-truth motion data. We have collected data on a large scale on a commercial driver state-sensing platform. For each subject, 30 to 40 minutes of head motion data was collected and included variables, such as lighting conditions, head/face features,and camera locations. The collected data was analyzed based on a proposed performance measure. The results show that the developed process can efficiently evaluate an individual camerabased driver state sensing product, which builds a common base for comparing the performance of different systems. 展开更多
关键词 DATA analysis DATA COLLECTION DRIVER state sensing human FACTORS performance EVALUATION
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部