This paper presents the advantages of information foraging theory matched with traditional information retrieval theory and user behavior analysis theory, a search content framework for information foraging theory is ...This paper presents the advantages of information foraging theory matched with traditional information retrieval theory and user behavior analysis theory, a search content framework for information foraging theory is described, on a thor- ough review of the two research branches i.e. the basic concept of information foraging theory and the elementary mod- els of information foraging theory, an extended framework is proposed,. Several problems for future research are also identified through.展开更多
A shrinkage estimator and a maximum likelihood estimator are proposed in this paper for combination of bioassays. The shrinkage estimator is obtained in closed form which incorporates prior information just on the com...A shrinkage estimator and a maximum likelihood estimator are proposed in this paper for combination of bioassays. The shrinkage estimator is obtained in closed form which incorporates prior information just on the common log relative potency after the homogeneity test for combination of bioassays is accepted. It is a practical improvement over other estimators which require iterative procedure to obtain the estimator for the relative potency. A real data is also used to show the superiorities for the newly-proposed procedures.展开更多
Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior chara...Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work av展开更多
文摘This paper presents the advantages of information foraging theory matched with traditional information retrieval theory and user behavior analysis theory, a search content framework for information foraging theory is described, on a thor- ough review of the two research branches i.e. the basic concept of information foraging theory and the elementary mod- els of information foraging theory, an extended framework is proposed,. Several problems for future research are also identified through.
基金the National Natural Science Foundation of China(No.10671044)the Science & Technology Bureau of Guangzhou Municipal Government(2004J1-C0333)Guangzhou advanced University(2004)
文摘A shrinkage estimator and a maximum likelihood estimator are proposed in this paper for combination of bioassays. The shrinkage estimator is obtained in closed form which incorporates prior information just on the common log relative potency after the homogeneity test for combination of bioassays is accepted. It is a practical improvement over other estimators which require iterative procedure to obtain the estimator for the relative potency. A real data is also used to show the superiorities for the newly-proposed procedures.
文摘Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work av