Search results for "machine"

showing 10 items of 2592 documents

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Surrogate Modelling for Oxygen Uptake Prediction Using LSTM Neural Network

2023

Oxygen uptake (V˙O2) is an important metric in any exercise test including walking and running. It can be measured using portable spirometers or metabolic analyzers. Those devices are, however, not suitable for constant use by consumers due to their costs, difficulty of operation and their intervening in the physical integrity of their users. Therefore, it is important to develop approaches for the indirect estimation of V˙O2-based measurements of motion parameters, heart rate data and application-specific measurements from consumer-grade sensors. Typically, these approaches are based on linear regression models or neural networks. This study investigates how motion data contribute to V˙O2 …

suorituskyky113 Computer and information sciencesBiochemistryAtomic and Molecular Physics and OpticsAnalytical ChemistryLSTM neural networkjuoksumittausmenetelmätoxygen uptakemachine learninghappikoneoppiminenmittarit (mittaus)Electrical and Electronic EngineeringINS/GPSInstrumentationrunning metricshapenotto
researchProduct

Automatic surrogate modelling technique selection based on features of optimization problems

2019

A typical scenario when solving industrial single or multiobjective optimization problems is that no explicit formulation of the problem is available. Instead, a dataset containing vectors of decision variables together with their objective function value(s) is given and a surrogate model (or metamodel) is build from the data and used for optimization and decision-making. This data-driven optimization process strongly depends on the ability of the surrogate model to predict the objective value of decision variables not present in the original dataset. Therefore, the choice of surrogate modelling technique is crucial. While many surrogate modelling techniques have been discussed in the liter…

surrogate modellingOptimization problemexploratory landscape analysisbusiness.industryComputer scienceautomatic algorithm selection0102 computer and information sciences02 engineering and technologyMachine learningcomputer.software_genre01 natural sciencesmonitavoiteoptimointiSurrogate modeloptimointi010201 computation theory & mathematicsalgoritmit0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessClassifier (UML)computer
researchProduct

A Self-Contained Biometric Sensor for Ubiquitous Authentication

2007

This paper describes a real-life behavior framework in simulation game based on Probabilistic State Machine (PSM) with Gaussian random distribution. According to the dynamic environment information, NPC can generate behavior planning autonomously associated with defined FSM. After planning process, we illuminate Gaussian probabilistic function for real-life action simulation in time and spatial domains. The expected value of distribution is estimated during behavior planning process and variance is determined by NPC personality in order to realize real life behavior simulation. We experiment the framework and Gaussian PSM on a restaurant simulation game. Furthermore we give some suggestions…

symbols.namesakeFinite-state machineTheoretical computer scienceComputer scienceGaussianAutonomous agentProbabilistic logicsymbolsVariance (accounting)Function (mathematics)Expected valueVirtual reality
researchProduct

Sensitivity analysis of Gaussian processes for oceanic chlorophyll prediction

2015

Gaussian Process Regression (GPR) for machine learning has lately been successfully introduced for chlorophyll content mapping from remotely sensed data. The method provides a fast, stable and accurate prediction of biophysical parameters. However, since GPR is a non-linear kernel regression method, the relevance of the features are not accessible. In this paper, we introduce a probabilistic approach for feature sensitivity analysis (SA) of the GPR in order to reveal the relative importance of the features (bands) being used in the regression process. We evaluated the SA on GPR ocean chlorophyll content prediction. The method revealed the importance of the spectral bands, thus allowing the …

symbols.namesakeKrigingGround-penetrating radarsymbolsProbabilistic logicFeature (machine learning)Kernel regressionSpectral bandsSensitivity (control systems)Biological systemGaussian processRemote sensingMathematics2015 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)
researchProduct

Moving beyond the Turing test

2012

Computers interacting with, not imitating, humans is the way forward.

symbols.namesakeTheoretical computer scienceGeneral Computer ScienceComputer scienceTuring testsymbolsMultitape Turing machineCommunications of the ACM
researchProduct

Generalizability and Simplicity as Criteria in Feature Selection: Application to Mood Classification in Music

2011

Classification of musical audio signals according to expressed mood or emotion has evident applications to content-based music retrieval in large databases. Wrapper selection is a dimension reduction method that has been proposed for improving classification performance. However, the technique is prone to lead to overfitting of the training data, which decreases the generalizability of the obtained results. We claim that previous attempts to apply wrapper selection in the field of music information retrieval (MIR) have led to disputable conclusions about the used methods due to inadequate analysis frameworks, indicative of overfitting, and biased results. This paper presents a framework bas…

ta113Acoustics and UltrasonicsComputer sciencebusiness.industryDimensionality reductionEmotion classificationFeature selectionOverfittingMachine learningcomputer.software_genreNaive Bayes classifierFeature (machine learning)Music information retrievalGeneralizability theoryArtificial intelligenceElectrical and Electronic EngineeringbusinesscomputerIEEE Transactions on Audio, Speech, and Language Processing
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct

A Cooperative Coevolution Framework for Parallel Learning to Rank

2015

We propose CCRank, the first parallel framework for learning to rank based on evolutionary algorithms (EA), aiming to significantly improve learning efficiency while maintaining accuracy. CCRank is based on cooperative coevolution (CC), a divide-and-conquer framework that has demonstrated high promise in function optimization for problems with large search space and complex structures. Moreover, CC naturally allows parallelization of sub-solutions to the decomposed sub-problems, which can substantially boost learning efficiency. With CCRank, we investigate parallel CC in the context of learning to rank. We implement CCRank with three EA-based learning to rank algorithms for demonstration. E…

ta113Cooperative coevolutionTheoretical computer scienceLearning to RankComputer sciencebusiness.industryRank (computer programming)Genetic ProgrammingEvolutionary algorithmContext (language use)Genetic programmingImmune ProgrammingMachine learningcomputer.software_genreEvolutionary computationComputer Science ApplicationsComputational Theory and MathematicsCooperative CoevolutionInformation RetrievalBenchmark (computing)Learning to rankArtificial intelligencebusinesscomputerInformation SystemsIEEE Transactions on Knowledge and Data Engineering
researchProduct

Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware

2013

Abstract. —In the modern world, a rapid growth of mali- cious software production has become one of the most signifi- cant threats to the network security. Unfortunately, wides pread signature-based anti-malware strategies can not help to de tect malware unseen previously nor deal with code obfuscation te ch- niques employed by malware designers. In our study, the prob lem of malware detection and classification is solved by applyin g a data-mining-based approach that relies on supervised mach ine- learning. Executable files are presented in the form of byte a nd opcode sequences and n-gram models are employed to extract essential features from these sequences. Feature vectors o btained are…

ta113Network securitybusiness.industryComputer scienceFeature vectorFeature extractionuhatBytecomputer.file_formatMachine learningcomputer.software_genrehaittaohjelmatSupport vector machineObfuscation (software)ComputingMethodologies_PATTERNRECOGNITIONnetworknetwork securityMalwareData miningArtificial intelligenceExecutabletietoturvabusinesscomputer2013 IEEE Globecom Workshops (GC Wkshps)
researchProduct