11,695 research outputs found

    Statistical analysis driven optimized deep learning system for intrusion detection

    Get PDF
    Attackers have developed ever more sophisticated and intelligent ways to hack information and communication technology systems. The extent of damage an individual hacker can carry out upon infiltrating a system is well understood. A potentially catastrophic scenario can be envisaged where a nation-state intercepting encrypted financial data gets hacked. Thus, intelligent cybersecurity systems have become inevitably important for improved protection against malicious threats. However, as malware attacks continue to dramatically increase in volume and complexity, it has become ever more challenging for traditional analytic tools to detect and mitigate threat. Furthermore, a huge amount of data produced by large networks has made the recognition task even more complicated and challenging. In this work, we propose an innovative statistical analysis driven optimized deep learning system for intrusion detection. The proposed intrusion detection system (IDS) extracts optimized and more correlated features using big data visualization and statistical analysis methods (human-in-the-loop), followed by a deep autoencoder for potential threat detection. Specifically, a pre-processing module eliminates the outliers and converts categorical variables into one-hot-encoded vectors. The feature extraction module discard features with null values and selects the most significant features as input to the deep autoencoder model (trained in a greedy-wise manner). The NSL-KDD dataset from the Canadian Institute for Cybersecurity is used as a benchmark to evaluate the feasibility and effectiveness of the proposed architecture. Simulation results demonstrate the potential of our proposed system and its outperformance as compared to existing state-of-the-art methods and recently published novel approaches. Ongoing work includes further optimization and real-time evaluation of our proposed IDS.Comment: To appear in the 9th International Conference on Brain Inspired Cognitive Systems (BICS 2018

    Next-to-leading order QCD predictions for W+W+jj production at the LHC

    Full text link
    Because the LHC is a proton-proton collider, sizable production of two positively charged W-bosons in association with two jets is possible. This process leads to a distinct signature of same sign high-pt leptons, missing energy and jets. We compute the NLO QCD corrections to the QCD-mediated part of pp -> W+W+jj. These corrections reduce the dependence of the production cross-section on the renormalization and factorization scale to about +- 10 percent. We find that a large number of W+W+jj events contain a relatively hard third jet. The presence of this jet should help to either pick up the W+W+jj signal or to reject it as an unwanted background.Comment: 15 pages, 5 (lovely) figures, v3 accepted for publication in JHEP, corrects tables in appendi

    Project-Based Methodology to Lecture on Web Frameworks Applied to the Management of Health-Related Data

    Get PDF
    The management and processing of the data generated by healthcare systems is getting more and more attention because of the digitalization of a traditionally analogical sector such as healthcare. Various data management frameworks and solutions have emerged to face some of the multiple challenges present in this environment, includ ing: (a) Data privacy and security; (b) Inter-operability between het erogeneous systems; and (c) Usability and readability of health-related sensitive information. In this paper, the authors share their experience on lecturing on how to address such issues by developing web-based software from several points of views: (a) Healthcare professional needs and requirements in terms of usability, accessibility and easiness; (b) Technical requirements and knowledge required to develop all the layers of a fully functional example of a micro health information system; and (c) Technical require ments to share and distribute the data required by several agents of the healthcare environment, focusing on the adoption of international stan dards such as HL7; (d) Perform of all operations in a secure, available and reliable way. It is concluded that the application of Flipped Teaching among with Project-based Learning may have a very positive impact on both in grades and drop rates for late-years (junior and senior) courses within the Health Engineering bachelor’s degrees

    Monodromy--like Relations for Finite Loop Amplitudes

    Get PDF
    We investigate the existence of relations for finite one-loop amplitudes in Yang-Mills theory. Using a diagrammatic formalism and a remarkable connection between tree and loop level, we deduce sequences of amplitude relations for any number of external legs.Comment: 24 pages, 6 figures, v2 typos corrected, reference adde

    金剛石鉆進能量與花崗巖地層風化程度的關系

    Get PDF
    Based on experimental data from a drilling process monitoring system instrumented with a hydraulic rotary drill rig in fill-weathered granite formation, the diamond penetrating energy was analyzed. The result shows that the distribution of the penetrating energy in fill-weathered granite formation agrees with that in common weathered granite formation. A negative correlation between the viscous energy, kinetic energy, total penetrating energy and the weathered degree of granite existed, and a positive correlation between the thrust force energy and the weathered degree was presented, which indicates that there is a well response between the penetrating energy and the weathered degree of rock. However, the kinetic energy, thrust force energy and viscous energy are limited in identification of formation because of different effects in various drilling modes. The specific energy of diamond drilling (SEDD) increased with the weathered degree of rock and the values of SEDD can be classified into corresponding range according to the weathered degree of rock. It is shown that the SEDD in rotary drilling is apparently less than the specific energy of percussive drilling (SEPD) in both fill soil and very strongly weathered granite formation. Reversely, the SEDD is much more than the SEPD in lightly weathered hard rock.link_to_subscribed_fulltex

    Feynman rules for the rational part of the Electroweak 1-loop amplitudes

    Get PDF
    We present the complete set of Feynman rules producing the rational terms of kind R_2 needed to perform any 1-loop calculation in the Electroweak Standard Model. Our results are given both in the 't Hooft-Veltman and in the Four Dimensional Helicity regularization schemes. We also verified, by using both the 't Hooft-Feynman gauge and the Background Field Method, a huge set of Ward identities -up to 4-points- for the complete rational part of the Electroweak amplitudes. This provides a stringent check of our results and, as a by-product, an explicit test of the gauge invariance of the Four Dimensional Helicity regularization scheme in the complete Standard Model at 1-loop. The formulae presented in this paper provide the last missing piece for completely automatizing, in the framework of the OPP method, the 1-loop calculations in the SU(3) X SU(2) X U(1) Standard Model.Comment: Many thanks to Huasheng Shao for having recomputed, independently of us, all of the R2{\rm R_2} effective vertices. Thanks to his help and by comparing with an independent computation we performed in a general RξR_\xi gauge, we could fix, in the present version, the following formulae: the vertex AllˉA l \bar l in Eq. (3.6), the vertex Zϕ+ϕZ \phi^+ \phi^- in Eq. (3.8), Eqs (3.16), (3.17) and (3.18

    Interface identification in weathered granite strata based on a instrumented drilling system

    Get PDF
    A hydraulic rotary drill instrumented with a drilling process monitoring system (DPM) was used for site investigation in Hong Kong weathered granite foundation engineering. The penetrating parameters such as effective thrust force, rotational speed, flushing pressure, penetrating rate and displacement of the bit were monitored in real time. A varied slope was defined as a significant index for identification of dominative and subsidiary interfaces in the granite site. The result from t-test shows that the confidence of the DPM in identification of the geotechnical interfaces is 99%. Besides, the analysis of variation of the penetrating parameters at the interfaces indicates that there are different fluctuations at the interfaces in the curves of the parameters with borehole depth. The response degree of effective thrust force and penetrating rate to the variation of rock strength at the interfaces is 81.82% alone.link_to_subscribed_fulltex

    On BCFW shifts of integrands and integrals

    Full text link
    In this article a first step is made towards the extension of Britto-Cachazo-Feng-Witten (BCFW) tree level on-shell recursion relations to integrands and integrals of scattering amplitudes to arbitrary loop order. Surprisingly, it is shown that the large BCFW shift limit of the integrands has the same structure as the corresponding tree level amplitude in any minimally coupled Yang-Mills theory in four or more dimensions. This implies that these integrands can be reconstructed from a subset of their `single cuts'. The main tool is powercounting Feynman graphs in a special lightcone gauge choice employed earlier at tree level by Arkani-Hamed and Kaplan. The relation between shifts of integrands and shifts of its integrals is investigated explicitly at one loop. Two particular sources of discrepancy between the integral and integrand are identified related to UV and IR divergences. This is cross-checked with known results for helicity equal amplitudes at one loop. The nature of the on-shell residue at each of the single-cut singularities of the integrand is commented upon. Several natural conjectures and opportunities for further research present themselves.Comment: 43 pages, 6 figures, v2: minor improvement in exposition, typos fixed, bibliography update

    Theory and approach of identification of ground interfaces based on rock drillability index

    Get PDF
    Rock drillability index is a very key parameter in selection of drill bit type and determination of productivity in petroleum, mining and geology. Unfortunately, there are many limits in the current definition as well as experimental methods. Drillability is redefined and a new concept of drillability index is brought out from analysis. Under the new concept, the drillability index is defined as penetration rate under specific energy. Based on the coupling relationship among effective thrust, rotation speed, penetration rate and drillability index, a calculation formula is established. Besides, the sensitivity of the drillability index in identification of ground layer is analyzed and its physical signification is expatiated also. The result shows that the new index overcomes the blind area in the traditional concept and can be used in continuous identification of ground layer along borehole profile.link_to_subscribed_fulltex
    corecore