Search results for "oftware"
showing 10 items of 7396 documents
Reference Standards for Software Evaluation
1990
AbstractThe field of automated ECG analysis was one of the earliest topics in Medical Informatics and may be regarded as a model both for computer-assisted medical diagnosis and for evaluating medical diagnostic programs. The CSE project has set reference standards of two kinds: In a broad sense, a standard how to perform a comprehensive evaluation study, in a narrow sense, standards as specific references for evaluating computer ECG programs. The evaluation methodology used within the CSE project is described as a basis for presentation of results which are published elsewhere in this issue.
State of the Art Literature Review on Network Anomaly Detection
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory
2018
Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization
2017
Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…
The design of an agent based model of human activities and communications in cardiac resuscitation
2015
International audience; Cardio-pulmonary arrest is a common emergency situation causing over 400,000 deaths per year, more than a 1000 per day, in the USA alone. The goal of this work is to develop an agent based computer simulator that will allow trainers to experiment with different communication protocols, such as those found in air traffic control. This paper describes the first step in designing the simulator development. The design is based on an analysis of communications during real life training simulations using the FIPA standard categories.
Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection
2014
[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…
ABM of Civil Violence: ODD Description
2017
This chapter contains a description of the proposed agent-based model, using the well-known “Overview, Design Concepts and Details” protocol. The model was implemented in NetLogo and is based on the same two types of agents—citizens and law-enforcement—as in Epstein’s model, but “citizen” agents have one subtype (“activist”) used for implementing network influence effects. The salient aspects of the model description are centered on the submodels for the risk perception, the expression of hardship in terms of value-sensitive relative deprivation, endogenous legitimacy feedback and network influence effects, which provide extensions to Epstein’s model. The model includes two networks called …
E-Hitz: A word frequency list and a program for deriving psycholinguistic statistics in an agglutinative language (Basque)
2007
We describe a Windows program that enables users to obtain a broad range of statistics concerning the properties of word and nonword stimuli in an agglutinative language (Basque), including measures of word frequency (at the whole-word and lemma levels), bigram and biphone frequency, orthographic similarity, orthographic and phonological structure, and syllable-based measures. It is designed for use by researchers in psycholinguistics, particularly those concerned with recognition of isolated words and morphology. In addition to providing standard orthographic and phonological neighborhood measures, the program can be used to obtain information about other forms of orthographic similarity, …
Methods matter: Testing competing models for designing short-scale Big-Five assessments
2015
Abstract Many psychological instruments are psychometrically inadequate because derived person-parameters are unfounded and models will be rejected using established psychometric criteria. One strategy towards improving the psychometric properties is to shorten instruments. We present and compare the following procedures for the abbreviation of self-report assessments on the Trait Self-Description Inventory in a sample of 14,347 participants: (a) Maximizing reliability/main loadings, (b) Minimizing modification indices/cross loadings, (c) the PURIFY Algorithm in Tetrad, (d) Ant Colony Optimization, and (e) a genetic algorithm. Ant Colony Optimization was superior to all other methods in imp…