Search results for "oftware"

showing 10 items of 7396 documents

Reference Standards for Software Evaluation

1990

AbstractThe field of automated ECG analysis was one of the earliest topics in Medical Informatics and may be regarded as a model both for computer-assisted medical diagnosis and for evaluating medical diagnostic programs. The CSE project has set reference standards of two kinds: In a broad sense, a standard how to perform a comprehensive evaluation study, in a narrow sense, standards as specific references for evaluating computer ECG programs. The evaluation methodology used within the CSE project is described as a basis for presentation of results which are published elsewhere in this issue.

Advanced and Specialized NursingSoftware Evaluationbusiness.industrymedia_common.quotation_subjectHealth InformaticsHealth informaticsField (computer science)Set (abstract data type)PresentationHealth Information ManagementMedicineSoftware verification and validationMedical diagnosisSoftware engineeringbusinessReference standardsmedia_commonMethods of Information in Medicine
researchProduct

State of the Art Literature Review on Network Anomaly Detection

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatComputer science05 social sciences050801 communication & media studiesDenial-of-service attack02 engineering and technology021001 nanoscience & nanotechnologyComputer securitycomputer.software_genrenetwork anomaly detection0508 media and communicationsAnomaly detectionState (computer science)tietoturva0210 nano-technologyverkkohyökkäyksetcomputer
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct

State of the Art Literature Review on Network Anomaly Detection with Deep Learning

2018

As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…

Advanced persistent threatbusiness.industryComputer scienceDeep learningdeep learning020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genrenetwork anomaly detectionkoneoppiminen0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAnomaly detectionState (computer science)Artificial intelligencetietoturvabusinessverkkohyökkäyksetcomputer
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct

The design of an agent based model of human activities and communications in cardiac resuscitation

2015

International audience; Cardio-pulmonary arrest is a common emergency situation causing over 400,000 deaths per year, more than a 1000 per day, in the USA alone. The goal of this work is to develop an agent based computer simulator that will allow trainers to experiment with different communication protocols, such as those found in air traffic control. This paper describes the first step in designing the simulator development. The design is based on an analysis of communications during real life training simulations using the FIPA standard categories.

Agent-based modelFOS: Computer and information sciencesComputer sciencebusiness.industryAir traffic controlAdvanced life supportCardiac resuscitationComputer Science - Computers and SocietyHandover[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Computers and Society (cs.CY)Computer Science - Multiagent SystemsSoftware engineeringbusinessCommunications protocolSimulationMultiagent Systems (cs.MA)
researchProduct

Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection

2014

[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…

Agent-based modelSoftware_OPERATINGSYSTEMSArticle SubjectApplied Mathematicslcsh:MathematicsComputer securitycomputer.software_genrelcsh:QA1-939ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAndroid malwareMalwareAndroid (operating system)MATEMATICA APLICADAcomputerAnalysisMathematics
researchProduct

ABM of Civil Violence: ODD Description

2017

This chapter contains a description of the proposed agent-based model, using the well-known “Overview, Design Concepts and Details” protocol. The model was implemented in NetLogo and is based on the same two types of agents—citizens and law-enforcement—as in Epstein’s model, but “citizen” agents have one subtype (“activist”) used for implementing network influence effects. The salient aspects of the model description are centered on the submodels for the risk perception, the expression of hardship in terms of value-sensitive relative deprivation, endogenous legitimacy feedback and network influence effects, which provide extensions to Epstein’s model. The model includes two networks called …

Agent-based modelTheoretical computer scienceNetLogoExpression (computer science)computer.software_genremedicine.disease_causeModel descriptionScripting languageSalientPolitical sciencemedicineRelative deprivationcomputerSocial psychologycomputer.programming_languageSocial influence
researchProduct

E-Hitz: A word frequency list and a program for deriving psycholinguistic statistics in an agglutinative language (Basque)

2007

We describe a Windows program that enables users to obtain a broad range of statistics concerning the properties of word and nonword stimuli in an agglutinative language (Basque), including measures of word frequency (at the whole-word and lemma levels), bigram and biphone frequency, orthographic similarity, orthographic and phonological structure, and syllable-based measures. It is designed for use by researchers in psycholinguistics, particularly those concerned with recognition of isolated words and morphology. In addition to providing standard orthographic and phonological neighborhood measures, the program can be used to obtain information about other forms of orthographic similarity, …

Agglutinative languagePeriodicityVocabularyComputer scienceSpeech recognitionmedia_common.quotation_subjectBigramExperimental and Cognitive Psychologycomputer.software_genreVocabularyPsycholinguisticsLemma (psycholinguistics)Arts and Humanities (miscellaneous)PhoneticsSimilarity (psychology)StatisticsDevelopmental and Educational PsychologyHumansGeneral PsychologyLanguagemedia_commonPsycholinguisticsbusiness.industryPhoneticsWord lists by frequencyPsychology (miscellaneous)Artificial intelligencebusinesscomputerSoftwareNatural language processingBehavior Research Methods
researchProduct

Methods matter: Testing competing models for designing short-scale Big-Five assessments

2015

Abstract Many psychological instruments are psychometrically inadequate because derived person-parameters are unfounded and models will be rejected using established psychometric criteria. One strategy towards improving the psychometric properties is to shorten instruments. We present and compare the following procedures for the abbreviation of self-report assessments on the Trait Self-Description Inventory in a sample of 14,347 participants: (a) Maximizing reliability/main loadings, (b) Minimizing modification indices/cross loadings, (c) the PURIFY Algorithm in Tetrad, (d) Ant Colony Optimization, and (e) a genetic algorithm. Ant Colony Optimization was superior to all other methods in imp…

AgreeablenessSocial PsychologyPsychometricsbusiness.industryAnt colony optimization algorithmsConscientiousnessSample (statistics)Machine learningcomputer.software_genreConfirmatory factor analysisGenetic algorithmTraitArtificial intelligencebusinessPsychologycomputerSocial psychologyGeneral PsychologyJournal of Research in Personality
researchProduct