10 research outputs found

    Forming of Learning Set for Neural Networks in Problems of Losless Data Compression

    Get PDF
    questions of forming of learning sets for artificial neural networks in problems of lossless data compression are considered. Methods of construction and use of learning sets are studied. The way of forming of learning set during training an artificial neural network on the data stream is offered

    A new approach to malware detection

    Get PDF
    Malware is a type of malicious programs, and is one of the most common and serious types of attacks on the Internet. Obfuscating transformations have been widely applied by attackers to malware, which makes malware detection become a more challenging issue. There has been extensive research to detect obfuscated malware. A promising research direction uses both control-flow graph and instruction classes of basic blocks as the signature of malware. This research direction is robust against certain obfuscation, such as variable substitution, instruction reordering. But only using instruction classes to detect obfuscated basic blocks will cause high false positives and false negatives. In this thesis, based on the same research direction, we proposed an improved approach to detect obfuscated malware. In addition to using CFG, our approach also uses functionalities of basic block as the signature of malware. Specifically, our contributions are presented as follows: 1) we design "signature calculation algorithm" to extract the signature of a malicious code fragment. "Signature calculation algorithm" is based on compiler optimization algorithm, but add and integrate memory sub-variable optimization, expression formalization and cross basic block propagation into it. 2) we formalize the expressions of assignment statements to facilitate comparing the functionalities of two expressions. 3) we design a detection algorithm to detect whether a program is an obfuscated malware instance. Our detection algorithm compares two aspects: CFG and the functionalities of basic blocks. 4) we implement the proposed approach, and perform experiments to compare our approach and the previous approach

    An Introduction to Database Systems

    Get PDF
    This textbook introduces the basic concepts of database systems. These concepts are presented through numerous examples in modeling and design. The material in this book is geared to an introductory course in database systems offered at the junior or senior level of Computer Science. It could also be used in a first year graduate course in database systems, focusing on a selection of the advanced topics in the latter chapters

    Data Structures & Algorithm Analysis in C++

    Get PDF
    This is the textbook for CSIS 215 at Liberty University.https://digitalcommons.liberty.edu/textbooks/1005/thumbnail.jp

    Framework for ubiquitous and voice enabled web applicattions development.

    Get PDF
    RESUMEN La cantidad de dispositivos con capacidad de conexión a Internet crece rápidamente. En la actualidad se dispone de teléfonos móviles basados en tecnología WAP (Wireless Application Protocol) o I-Mode, Agendas Digitales Personales, Kioskos Internet, teléfonos convencionales basados en acceso a la Web por medio de la voz, dispositivos basados en televisión interactiva, electrodomésticos, entre otros. Desarrollar una versión de una aplicación web para cada uno de los dispositivos con conectividad a la Web resulta inviable. Por otra parte, desarrollar aplicaciones web que puedan ser visualizados en forma apropiada y aprovechando al máximo las capacidades del dispositivo se constituye en una tarea compleja. En esta tesis se propone un framework, entendido como un marco de trabajo genérico, que sirva como guía para el desarrollo de portales web pervasivos que puedan ser accedidos desde múltiples dispositivos, evitando el desarrollo de un portal por cada uno y teniendo en cuenta las grandes variaciones pueden existir en sus capacidades. Adicionalmente se ha planteado un modelo de agrupamiento de dispositivos, que permita definir una serie de grupos, así como las características asociadas a los mismos, en forma tal que puedan generarse posteriormente los formatos asociados a estos grupos de dispositivos y no a elementos individuales y se ha propuesto y validado una arquitectura de referencia para el desarrollo de aplicaciones pervasivas, que no genere dependencia de tecnologías de servidor, y que permita incorporar la solución de agrupamiento planteada previamente. ____________________________________________________________________________________________________The purpose of the Ubiquitous or Pervasive Computing - an emergent paradigm of personalized computation- is to obtain device interoperability under different conditions. The devices were designed for different purposes by different companies or from different technological generations. The ever increasing market of web enabled devices has brought up diverse challenges related to the difficulty of visualizing content in a unified form to diverse clients, while at the same time taking into account the great differences in the capacities of these devices. It is not feasible to develop a separate application for each of these devices, simply because the number of different devices is too high and still growing. In the analysis of existing proposals dealing with the modelling of ubiquitous web applications, the link that exists between the logical and conceptual modelling and the physical modelling of the applications is not clear enough, and the way in which the context aspects related to web access from these devices cannot be specified. On the other hand, the available commercial products are supplier-specific. Every future platform change would a costly and painstaking process In this thesis we present a proposal of a framework for the development of web applications that can be accessed from different types of devices, such as PCs, PDAs, mobile phones based on diverse technologies (like WAP and I-Mode) and conventional telephones that access the web through voice gateways and voice portals. The proposed framework serves as a guide for the development of this type of applications and it can be deployed to different server configurations and software development technologies. In order to obtain this objective, a description of diverse theoretical elements related to dynamic generation of information that can be acceded by devices has been made, as well as a description of involved technologies whose hardware, software and connectivity characteristics vary remarkably. The theoretical study was carried out in parallel with tests based on the different technologies used. A multilingual-ubiquitous traffic information portal was used to test the theory in an operational environment

    Experimental Evaluation of Growing and Pruning Hyper Basis Function Neural Networks Trained with Extended Information Filter

    Get PDF
    In this paper we test Extended Information Filter (EIF) for sequential training of Hyper Basis Function Neural Networks with growing and pruning ability (HBF-GP). The HBF neuron allows different scaling of input dimensions to provide better generalization property when dealing with complex nonlinear problems in engineering practice. The main intuition behind HBF is in generalization of Gaussian type of neuron that applies Mahalanobis-like distance as a distance metrics between input training sample and prototype vector. We exploit concept of neuron’s significance and allow growing and pruning of HBF neurons during sequential learning process. From engineer’s perspective, EIF is attractive for training of neural networks because it allows a designer to have scarce initial knowledge of the system/problem. Extensive experimental study shows that HBF neural network trained with EIF achieves same prediction error and compactness of network topology when compared to EKF, but without the need to know initial state uncertainty, which is its main advantage over EKF

    Bioinspired metaheuristic algorithms for global optimization

    Get PDF
    This paper presents concise comparison study of newly developed bioinspired algorithms for global optimization problems. Three different metaheuristic techniques, namely Accelerated Particle Swarm Optimization (APSO), Firefly Algorithm (FA), and Grey Wolf Optimizer (GWO) are investigated and implemented in Matlab environment. These methods are compared on four unimodal and multimodal nonlinear functions in order to find global optimum values. Computational results indicate that GWO outperforms other intelligent techniques, and that all aforementioned algorithms can be successfully used for optimization of continuous functions

    Space Communications: Theory and Applications. Volume 3: Information Processing and Advanced Techniques. A Bibliography, 1958 - 1963

    Get PDF
    Annotated bibliography on information processing and advanced communication techniques - theory and applications of space communication
    corecore