34 research outputs found

    Efficient classification using parallel and scalable compressed model and Its application on intrusion detection

    Full text link
    In order to achieve high efficiency of classification in intrusion detection, a compressed model is proposed in this paper which combines horizontal compression with vertical compression. OneR is utilized as horizontal com-pression for attribute reduction, and affinity propagation is employed as vertical compression to select small representative exemplars from large training data. As to be able to computationally compress the larger volume of training data with scalability, MapReduce based parallelization approach is then implemented and evaluated for each step of the model compression process abovementioned, on which common but efficient classification methods can be directly used. Experimental application study on two publicly available datasets of intrusion detection, KDD99 and CMDC2012, demonstrates that the classification using the compressed model proposed can effectively speed up the detection procedure at up to 184 times, most importantly at the cost of a minimal accuracy difference with less than 1% on average

    FuzzySkyline: QoS-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities

    Get PDF

    Privacy-Aware Fuzzy Range Query Processing Over Distributed Edge Devices

    Get PDF

    Privacy-Aware Fuzzy Skyline Parking Recommendation Using Edge Traffic Facilities

    Get PDF

    Aloperine attenuates high glucose-induced oxidative injury in Schwann cells via activation of NRF2/HO-1 pathway

    Get PDF
    Purpose: To determine the involvement of nuclear factor erythroid 2-related factor 2 (NRF2) and heme oxygenase-1 (HO-1) in the action of aloperine on Schwann cell injury caused by high glucose (HG).Methods: Cell viability was determined using MTT assay while the release of lactate dehydrogenase (LDH) was determined by biochemical assay. Apoptosis was assessed using flow cytometry, while the levels of malondialdehyde (MDA) were determined by Annexin V-FIT staining. Glutathione Stransferase (GST), glutathione peroxidase (GPX), and reactive oxygen species (ROS) were determined using enzyme-linked immunosorbent assay.Results: Treatment with HG suppressed RSC96 cell viability and increased LDH release, while aloperine reversed these results (p < 0.05). Apoptosis of RSC96 cells was induced by HG stimulation, but was abolished by aloperine. The levels of ROS, MDA, and GST were enhanced in cells followingtreatment with HG, but was reversed by aloperine (p < 0.05). The decreased level of GPX caused by HG in RSC96 cells was elevated by aloperine. Moreover, aloperine upregulated NRF2 and HO-1 in RSC96 cells treated with HG (p < 0.05).Conclusion: Aloperine attenuates HG-induced oxidative injury in Schwann cells via activation of NRF2/HO-1 pathway, suggesting its potential as a potent drug for the management of diabetic peripheral neuropathy. Keywords: Aloperine, Schwann cells, High glucose, Oxidative stress, NRF2, HO-

    Formalizing and verifying stochastic system architectures using Monterey Phoenix

    Get PDF
    The analysis of software architecture plays an important role in understanding the system structures and facilitate proper implementation of user requirements. Despite its importance in the software engineering practice, the lack of formal description and verification support in this domain hinders the development of quality architectural models. To tackle this problem, in this work, we develop an approach for modeling and verifying software architectures specified using Monterey Phoenix (MP) architecture description language. MP is capable of modeling system and environment behaviors based on event traces, as well as supporting different architecture composition operations and views. First, we formalize the syntax and operational semantics for MP; therefore, formal verification of MP models is feasible. Second, we extend MP to support shared variables and stochastic characteristics, which not only increases the expressiveness of MP, but also widens the properties MP can check, such as quantitative requirements. Third, a dedicated model checker for MP has been implemented, so that automatic verification of MP models is supported. Finally, several experiments are conducted to evaluate the applicability and efficiency of our approachNo Full Tex

    Maize Inbreds Exhibit High Levels of Copy Number Variation (CNV) and Presence/Absence Variation (PAV) in Genome Content

    Get PDF
    Following the domestication of maize over the past ∼10,000 years, breeders have exploited the extensive genetic diversity of this species to mold its phenotype to meet human needs. The extent of structural variation, including copy number variation (CNV) and presence/absence variation (PAV), which are thought to contribute to the extraordinary phenotypic diversity and plasticity of this important crop, have not been elucidated. Whole-genome, array-based, comparative genomic hybridization (CGH) revealed a level of structural diversity between the inbred lines B73 and Mo17 that is unprecedented among higher eukaryotes. A detailed analysis of altered segments of DNA conservatively estimates that there are several hundred CNV sequences among the two genotypes, as well as several thousand PAV sequences that are present in B73 but not Mo17. Haplotype-specific PAVs contain hundreds of single-copy, expressed genes that may contribute to heterosis and to the extraordinary phenotypic diversity of this important crop

    From Wireless Sensor Networks to Wireless Body Area Networks: Formal Modeling and Verification on Security Using PAT

    No full text
    Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN) and wireless body area networks (WBAN), formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN

    Bi-View Semi-Supervised Learning Based Semantic Human Activity Recognition Using Accelerometers

    No full text

    Anti-chain based algorithms for timed/probabilistic refinement checking

    No full text
    Refinement checking answers the question on whether an implementation model is a refinement of a specification model, which is of great value for system verification. Some refinement relationships, e.g., trace refinement and failures/divergence refinement, have been recognized for different verification purposes. In general, refinement checking algorithms often rely on subset construction, which incurs in the state space explosion problem. Recently the anti-chain based approach has been suggested for trace refinement checking, and the results show a significant improvement. In this paper, we investigate the problems of applying the anti-chain approach to timed refinement checking (a timed implementation vs. a timed or untimed specification) and probabilistic refinement checking (a probabilistic implementation vs. a non-probabilistic specification), and show that the state space can be reduced considerably by employing the anti-chain approach. All the algorithms have been integrated into the model checking tool PAT, and the experiments have been conducted to show the efficiency of the application of anti-chains
    corecore