Search results for "Artificial"

showing 10 items of 7394 documents

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

An adaptive probabilistic approach to goal-level imitation learning

2010

Imitation learning has been recognized as a promising technique to teach robots advanced skills. It is based on the idea that robots could learn new behaviors by observing and imitating the behaviors of other skilled actors. We propose an adaptive probabilistic graphical model which copes with three core issues of any imitative behavior: observation, representation and reproduction of skills. Our model, Growing Hierarchical Dynamic Bayesian Network (GHDBN), is hierarchical (i.e. able to characterize structured behaviors at different levels of abstraction), and growing (i.e. skills are learned or updated incrementally - and at each level of abstraction - every time a new observation sequence…

business.industryComputer scienceProbabilistic logicMachine learningcomputer.software_genreRobotArtificial intelligenceGraphical modelRobotics Imitation Learning Machine Learning Bayesian ModelsbusinessRepresentation (mathematics)Hidden Markov modelcomputerDynamic Bayesian networkHumanoid robotAbstraction (linguistics)2010 IEEE/RSJ International Conference on Intelligent Robots and Systems
researchProduct

The Influence of Requirements in Software Model Development in an Industrial Environment

2017

Textual description of requirements is a specification technique that is widely used in industry, where time is key for success. How requirements are specified textually greatly depends on human factors. In order to study how requirements processing is affected by the level of detail in textual descriptions, this paper compares enriched textual requirements specifications with non-enriched ones. To do this, we have conducted an experiment in industry with 19 engineers of CAF (Construcciones y Auxiliares de Ferrocarril), which is a supplier of railway solutions. The experiment is a crossover design that analyzes efficiency, effectiveness, and perceived difficulty starting from a written spec…

business.industryComputer scienceProcess (engineering)Level of detail (writing)020207 software engineering02 engineering and technologyElectronic mailSoftware0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingSoftware requirementsSoftware engineeringbusinessSoftware measurementNatural language2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
researchProduct

An adaptive probabilistic graphical model for representing skills in PbD settings

2010

business.industryComputer scienceProgramming by demonstrationBayesian probabilityProbabilistic logicMachine learningcomputer.software_genreUnsupervised learningArtificial intelligenceGraphical modelMachine Learning Imitation Learning Incremental Learning Dynamic Bayesian Network Growing Hierarchical Dynamic Bayesian NetworkAutomatic programmingbusinessHidden Markov modelcomputerDynamic Bayesian network
researchProduct

Validation of Semantic Analyses of Unstructured Medical Data for Research Purposes

2019

BACKGROUND: In secondary data there are often unstructured free texts. The aim of this study was to validate a text mining system to extract unstructured medical data for research purposes. METHODS: From a radiological department, 1,000 out of 7,102 CT findings were randomly selected. These were manually divided into defined groups by 2 physicians. For automated tagging and reporting, the text analysis software Averbis Extraction Platform (AEP) was used. Special features of the system are a morphological analysis for the decomposition of compound words as well as the recognition of noun phrases, abbreviations and negated statements. Based on the extracted standardized keywords, findings rep…

business.industryComputer sciencePublic Health Environmental and Occupational HealthMEDLINEcomputer.software_genreSemantics030210 environmental & occupational healthNoun phraseMedical RecordsSecondary data ; Text-mining ; Validation ; Unstrukturierte Freitext ; Unstructured free text ; Validierung ; SekundärdatenSemantics03 medical and health sciences0302 clinical medicineText miningSoftwareCohen's kappaCompoundGermanyData Mining030212 general & internal medicineArtificial intelligencebusinesscomputerReliability (statistics)Natural language processing
researchProduct

Service level guarantee framework for IoT environments

2017

Nowadays, providing IoT environments with service level guarantee is a challenging task. We propose a framework for IoT service level guarantee thanks to several specific Service Level Agreements (SLAs) for IoT environments. We specify different SLAs for each entity contributing in our IoT architecture in order to conclude a global SLA called IoT-SLA (iSLA). These different SLAs enable IoT service provision with Quality of Service (QoS) guarantee. Achieving this guarantee requires several communications and interactions between the components of the proposed IoT architecture. These interactions allow an IoT Service Provider (IoT-SP) to conclude the iSLA with an IoT Client (IoT-C). We specif…

business.industryComputer scienceQuality of service020206 networking & telecommunications02 engineering and technologyService providerTask (project management)Order (business)Service level0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessInternet of ThingsComputer networkProceedings of the 1st International Conference on Internet of Things and Machine Learning
researchProduct

A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning

2019

Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…

business.industryComputer scienceRSSReal-time computingComputingMilieux_LEGALASPECTSOFCOMPUTING020206 networking & telecommunications02 engineering and technologycomputer.file_formatHybrid algorithmData setsymbols.namesakeInertial measurement unitDead reckoning0202 electrical engineering electronic engineering information engineeringsymbolsWireless020201 artificial intelligence & image processingbusinessParticle filterVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Gaussian processcomputer2019 19th International Symposium on Communications and Information Technologies (ISCIT)
researchProduct

Fast algorithm for detection of reference spheres in digital panoramic radiography.

2009

In this paper, an algorithm for detection of reference spheres from digital panoramic radiographic images is presented. The proposed algorithm was tested on a database of 107 digital panoramic radiographic images which were used for dental diagnostics. Results show that the proposed method exhibits for detection of reference spheres, a sensitivity of 97.33% and specificity of 93.85%. Performance time differed between 0.55 and 2.36s depending on image size. The aim of this work was to provide a fast ellipse detection algorithm to reduce measuring time on preoperative implant planning by lowering the computational cost.

business.industryComputer scienceRadiographyHealth InformaticsRadiography Dental DigitalEllipseFast algorithmSensitivity and SpecificityComputer Science ApplicationsDental ImplantationSurgery Computer-AssistedPattern recognition (psychology)HumansComputer visionSPHERESArtificial intelligenceSensitivity (control systems)Diagnosis Computer-AssistedbusinessImage resolutionAlgorithmsSoftwareComputers in biology and medicine
researchProduct

Emulating Human Supervision in an Intelligent Tutoring System for Arithmetical Problem Solving

2014

This paper presents an intelligent tutoring system (ITS) for the learning of arithmetical problem solving. This is based on an analysis of a) the cognitive processes that take place during problem solving; and b) the usual tasks performed by a human when supervising a student in a one-to-one tutoring situation. The ITS is able to identify the solving strategy that the student is following and offer adaptive feedback that takes into account both the problem's constraints and the decisions previously made by the user. An observational study shows the ITS's accuracy at emulating expert human supervision, and a randomized experiment reveals that the ITS significantly improves students' learning…

business.industryComputer scienceRandomized experimentGeneral EngineeringComputer-Assisted InstructionCognitionIntelligent tutoring systemComputer Science ApplicationsEducationArithmetic functionObservational studyArtificial intelligencebusinessMathematics instructionIEEE Transactions on Learning Technologies
researchProduct

Chapter 3. Prosodic versatility, hierarchical rank and pragmatic function in conversational markers

2019

business.industryComputer scienceRank (computer programming)Artificial intelligencecomputer.software_genrebusinesscomputerNatural language processingPragmatic function
researchProduct