82 research outputs found

    An Ontology-Driven Methodology To Derive Cases From Structured And Unstructured Sources

    Get PDF
    The problem-solving capability of a Case-Based Reasoning (CBR) system largely depends on the richness of its knowledge stored in the form of cases, i.e. the CaseBase (CB). Populating and subsequently maintaining a critical mass of cases in a CB is a tedious manual activity demanding vast human and operational resources. The need for human involvement in populating a CB can be drastically reduced as case-like knowledge already exists in the form of databases and documents and harnessed and transformed into cases that can be operationalized. Nevertheless, the transformation process poses many hurdles due to the disparate structure and the heterogeneous coding standards used. The featured work aims to address knowledge creation from heterogeneous sources and structures. To meet this end, this thesis presents a Multi-Source Case Acquisition and Transformation Info-Structure (MUSCATI). MUSCATI has been implemented as a multi-layer architecture using state-of-the-practice tools and can be perceived as a functional extension to traditional CBR-systems. In principle, MUSCATI can be applied in any domain but in this thesis healthcare was chosen. Thus, Electronic Medical Records (EMRs) were used as the source to generate the knowledge. The results from the experiments showed that the volume and diversity of cases improves the reasoning outcome of the CBR engine. The experiments showed that knowledge found in medical records (regardless of structure) can be leveraged and standardized to enhance the (medical) knowledge of traditional medical CBR systems. Subsequently, the Google search engine proved to be very critical in “fixing” and enriching the domain ontology on-the-fly

    An enhanced adaptive grey verhulst prediction model for network security situation

    Get PDF
    Situation prediction is an increasingly important focus in network security. The information of incoming security situation in the network is important and helps the network administrator to make good decisions before taking some defense remedies towards the attack exploitation. Although Grey Verhulst prediction model has demonstrated satisfactory results in other fields but some further investigations are still required to improve its performance in predicting incoming network security situation. In order to attain higher predictive accuracy of the existing Grey Verhulst prediction models, this paper tends to seek an enhancement of the adaptive Grey Verhulst security situation prediction model by forecasting the incoming residual based on the historical prediction residuals. The proposed model applied Kalman Filtering algorithm to predict the residual in the next time-frame and closer the deviation between the predicted and actual network security situation. Benchmark datasets such as DARPA 1999 and 2000 have been used to verify the accuracy of the proposed model. The results shown that the enhanced adaptive Grey Verhulst prediction model has better prediction capability in predicting incoming network security situation and also achieved a significant improvement Verhulst prediction models

    A novel adaptive grey verhulst model for network security situation prediction

    Get PDF
    Recently, researchers have shown an increased interest in predicting the situation of incoming security situation for organization’s network. Many prediction models have been produced for this purpose, but many of these models have various limitations in practical applications. In addition, literature shows that far too little attention has been paid in utilizing the grey Verhulst model predicting network security situation although it has demonstrated satisfactory results in other fields. By considering the nature of intrusion attacks and shortcomings of traditional grey Verhulst model, this paper puts forward an adaptive grey Verhust model with adjustable generation sequence to improve the prediction accuracy. The proposed model employs the combination methods of Trapezoidal rule and Simpson’s 1/3rd rule to obtain the background value in grey differential equation which will directly influence the forecast result. In order to verify the performance of the proposed model, benchmarked datasets, DARPA 1999 and 2000 have been used to highlight the efficacy of the proposed model. The results show that the proposed adaptive grey Verhulst surpassed GM(1,1) and traditional grey Verhulst in forecasting incoming security situation in a network

    A Review on Features’ Robustness in High Diversity Mobile Traffic Classifications

    Get PDF
    Mobile traffics are becoming more dominant due to growing usage of mobile devices and proliferation of IoT. The influx of mobile traffics introduce some new challenges in traffic classifications; namely the diversity complexity and behavioral dynamism complexity. Existing traffic classifications methods are designed for classifying standard protocols and user applications with more deterministic behaviors in small diversity. Currently, flow statistics, payload signature and heuristic traffic attributes are some of the most effective features used to discriminate traffic classes. In this paper, we investigate the correlations of these features to the less-deterministic user application traffic classes based on corresponding classification accuracy. Then, we evaluate the impact of large-scale classification on feature's robustness based on sign of diminishing accuracy. Our experimental results consolidate the needs for unsupervised feature learning to address the dynamism of mobile application behavioral traits for accurate classification on rapidly growing mobile traffics

    Security Methods in Internet of vehicles

    Full text link
    The emerging wireless communication technology known as vehicle ad hoc networks (VANETs) has the potential to both lower the risk of auto accidents caused by drivers and offer a wide range of entertainment amenities. The messages broadcast by a vehicle may be impacted by security threats due to the open-access nature of VANETs. Because of this, VANET is susceptible to security and privacy problems. In order to go beyond the obstacle, we investigate and review some existing researches to secure communication in VANET. Additionally, we provide overview, components in VANET in details

    Analysing visual field and diagnosing glaucoma progression using a hybrid of per location differences and artificial neural network ensembles

    Get PDF
    Visual function test results for glaucoma diagnosis is perceived to be subjective and problematic.In this paper, we aim to address the issues and problems associated with these current approaches.We present (a) a system architecture for analyzing visual field and diagnosing glaucoma progression; (b) a per location differences approach for analyzing visual field to obtain measurements of glaucoma progression; and (c) a neural network ensemble approach where several artifial neural network are jointly used to diagnose glaucoma progression.It is hoped that it would be possible to diagnose glaucoma progression with just one reading of a patient’s visual field

    A platform for enterprise-wide healthcare knowledge management

    Get PDF
    The importance of effective information and knowledge management in enterprises has spurred the development of numerous information and knowledge management software.Whilst emphasis is placed on effective document management, the essence of knowledge management is diluted as the focus is presently on managing uninterpreted data and information in document-type formats.To address this issue of the lack of true knowledge management in enterprises, especially in healthcare enterprises, we propose a Platform for Enterprise-Wide Healthcare Knowledge Management (KM-Platform).This platform is made up of two suites of applications and services, i.e. the Intelligent Agent-Based Knowledge Management Application Suite and the Strategic Visualisation, Planning and Coalition Formation Service Suite

    Distributed reflection denial of service attack: A critical review

    Get PDF
    As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks
    corecore