The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a method for developing executable algorithms for quantitative cyber-risk assessment. Exploiting techniques from security risk modeling and actuarial approaches, the method pragmatically combines use of available empirical data and expert judgments. The input to the algorithms are indicators providing information about the target of analysis, such as suspicious events observed in the network...
Simulink is widely used for avionics and automotive systems design within model driven approach. For system verification and validation effectively, it is essential to generate test cases for Simulink models which guarantee high coverage of requirements and completeness required by safety-critical systems certification. However, for large-scale Simulink models, there is limited ability of test generation...
A novel dynamic modeling method based on multi-kernel support vector machine with immune sliding optimization (ISA-MKSVM) is proposed in this paper. Multi-kernel SVM is an effective tool to solve the diversity of data features, and the immune sliding algorithm optimizes the parameters of multi-kernel SVM. The proposed algorithm can obtain a good dynamic performance by re-defining the affinity of the...
A new approach is introduced in this paper for dynamic modeling and dimensionality reduction from time series of curves. For this purpose, a dynamic mixture of experts model whose regression coefficients evolve from curve to curve according to a Gaussian random walk over low dimensional factors, is proposed. The resulting model is neither else than a particular state-space model involving discrete...
In this paper, we present a big-data self organizing network (Bi-SON) framework aiming to optimize energy efficiency of ultra-dense small cells. Although small cell can enhance the capacity of cellular mobile networks, ultra-dense small cells suffer from severe interference and poor energy efficiency. The self organizing network (SON) can automatically manage and optimize the system performance. However,...
This paper establishes an online identification algorithm which can provide the model status in real time base on TVARMA model for small unmanned helicopter. First, the TVARMA model used for describing the small unmanned helicopter is shown. After that, a recursive algorithm is elaborated to solve the parameters in the TVARMA model. Then a flight experiment data is used to identify the TVARMA model...
For the multi-rate sampling systems with time series correlation data, a multi-rate fault detection algorithm based dynamic principal component analysis is proposed. The same sampling rate can be achieved in the algorithm by interpolation-filter-decimation, and then dynamic principal component analysis is implemented. The proposed method not only makes full use of the samples in a large number of...
In the HLA simulation system, there exist two kinds of model combination technology: the federation member level and the model level. In this paper, two kinds of model combination technology are introduced in detail, and through the comparison their advantages and disadvantages are analyzed. It shows that the combination on the member level is more applicable for the small simulation system, and the...
In this paper, we study on the problem of large scale social network community detection method, which is an important issue in Online Social Networks data mining. The proposed social network community detection system aims to divide the social network into several communities according to internal relationships among users. Particularly, this system is made up of two steps, that is, 1) detecting...
In this paper, we realize a literature survey on the issue of community detection over time, first we present some basic concepts about networks modeled as graphs, then we state in an non exhaustive way the research fields arising from social networks. We present some of the existing models and methods to track communities over time. Community detection in networks is a prevailing subject in the area...
These days, cloud computing is growing more popular, as users are becoming more interested in migrating their tasks on these ubiquitous systems. However, due to the large number of providers and services available, selecting the best option would be a very time-consuming process. This paper presents a multi-agent approach to assist the selection and provisioning of resources in a multi-cloud environment...
In order to improve the design of intrusion detection model, this paper according to the analysis of generic intrusion detection model and intrusion detection model based on data mining, design for intrusion detection intrusion detection systems based on improved fuzzy C-means algorithm, In the model, the design of each module, Detailed description of the various parts and the parts functions of the...
This paper analyzes the advantages and disadvantages of equipment, combat simulation data association rules commonly used in the analysis of discrete algorithms, and it proposed and implemented a discretization algorithm based on attribute importance and incompatible degrees, through theoretical research and analysis of algorithm, and experimental comparison, it proves the correctness and validity...
Crime and terrorism in the 21st century call for advancement in the modeling and simulation of criminal events in the complex environment. This presentation reviews the field of computational criminology, an emerging blend of criminology, computer science and applied mathematics. Modern concerns about public safety and security include a focus on a range of events from less serious everyday crimes...
This paper is aim to improve the discrimination capability of LDA model through unsupervised feature selection. Experimental results show that if the interference of general word and general topic can be removed, the discrimination capability of LDA model will be increased. The key problem is how to find supervised information to evaluate features. The LDA topics are assumed reasonable. Therefore,...
In the data grid environment, when users access to files, how to select the best site to obtain files from multiple replicas and reach the highest QOS (quality of service) in the cost of same price is a problem that need to be studied urgently, that is replica selection. In this paper, it proposes a new combination algorithm based on genetic algorithm and ant algorithm, which not only solves the inefficient...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.