24,871 research outputs found

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection

    Get PDF
    The biological immune system (BIS) is characterized by networks of cells, tissues, and organs communicating and working in synchronization. It also has the ability to learn, recognize, and remember, thus providing the solid foundation for the development of Artificial Immune System (AIS). Since the emergence of AIS, it has proved itself as an area of computational intelligence. Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. The V-Detectors algorithm depends greatly on the random detectors generated in monitoring the status of a system. These randomly generated detectors suffer from not been able to adequately cover the non-self space, which diminishes the detection performance of the V-Detectors algorithm. This research therefore proposed CSDE-V-Detectors which entail the use of the hybridization of Cuckoo Search (CS) and Differential Evolution (DE) in optimizing the random detectors of the V-Detectors. The DE is integrated with CS at the population initialization by distributing the population linearly. This linear distribution gives the population a unique, stable, and progressive distribution process. Thus, each individual detector is characteristically different from the other detectors. CSDE capabilities of global search, and use of L´evy flight facilitates the effectiveness of the detector set in the search space. In comparison with V-Detectors, cuckoo search, differential evolution, support vector machine, artificial neural network, na¨ıve bayes, and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms other algorithms with an average detection rate of 95:30% on all the datasets. This signifies that CSDE-V-Detectors can efficiently attain highest detection rates and lowest false alarm rates for anomaly detection. Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks

    Applying Bourdieu to socio-technical systems: The importance of affordances for social translucence in building 'capital' and status to eBay's success

    Get PDF
    This paper introduces the work of Sociologist Pierre Bourdieu and his concepts of ‘the field’ and ‘capital’ in relation to eBay. This paper considers eBay to be a socio-technical system with its own set of social norms, rules and competition over ‘capital’. eBay is used as a case study of the importance of using a Bourdieuean approach to create successful socio-technical systems.Using a two-year qualitative study of eBay users as empirical illustration, this paper argues that a large part of eBay’s success is in the social and cultural affordances for social translucence and navigation of eBay’s website - in supporting the Bourdieuean competition over capital and status. This exploration has implications for wider socio-technical systems design which this paper will discuss - in particular, the importance of creating socially translucent and navigable systems, informed by Bourdieu’s theoretical insights, which support competition for ‘capital’ and status

    M-health review: joining up healthcare in a wireless world

    Get PDF
    In recent years, there has been a huge increase in the use of information and communication technologies (ICT) to deliver health and social care. This trend is bound to continue as providers (whether public or private) strive to deliver better care to more people under conditions of severe budgetary constraint

    Towards a user-centric and multidisciplinary framework for designing context-aware applications

    Get PDF
    Research into context-aware computing has not sufficiently addressed human and social aspects of design. Existing design frameworks are predominantly software orientated, make little use of cross-disciplinary work, and do not provide an easily transferable structure for cross-application of design principles. To address these problems, this paper proposes a multidisciplinary and user-centred design framework, and two models of context, which derive from conceptualisations within Psychology, Linguistics, and Computer Science. In a study, our framework was found to significantly improve the performance of postgraduate students at identifying the context of the user and application, and the usability issues that arise

    Securing the Elderly: A Developmental Approach to Hypermedia-Based Online Information Security for Senior Novice Computer Users

    Get PDF
    Whilst security threats to the general public continue to evolve, elderly computer users with limited skill and knowledge are left playing catch-up in an ever-widening gap in fundamental cyber-related comprehension. As a definable cohort, the elderly generally lack awareness of current security threats, and remain under-educated in terms of applying appropriate controls and safeguards to their computers and networking devices. This paper identifies that web-based computer security information sources do not adequately provide helpful information to senior citizen end-users in terms of both design and content
    • …
    corecore