Filters








24,763 Hits in 4.0 sec

IDS: An intelligent document system

C. K. S. Chong Hok Yuen, Bipin C. Desai, Pankaj Goyal, Fereidoon Sadri
1985 Open research Areas in Information Retrieval  
This paper describes an intelligent document system which allows the simultaneous presentation of different parts of the same or different referenced or related documents.  ...  Resume Cet article décrit un système intelligent de documentation permettant une vue simultanée des parties différentes d'un seul document ou même de plusieurs documents similaires ou relieé.  ...  Conclusions In this paper we have presented a design for an information system that would permit the storage and retrieval of intelligent documents. UPDATE.  ... 
dblp:conf/riao/YuenDGS85 fatcat:rdr7owszbfbirbvibcokfqyscy

Learning and Transferring IDs Representation in E-commerce

Kui Zhao, Yuechuan Li, Zhaoqian Shuai, Cheng Yang
2018 Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining - KDD '18  
In this paper, we propose an embedding based framework to learn and transfer the representation of IDs.  ...  Many machine intelligence techniques are developed in E-commerce and one of the most essential components is the representation of IDs, including user ID, item ID, product ID, store ID, brand ID, category  ...  D is the size of the dictionary that contains all item IDs.  ... 
doi:10.1145/3219819.3219855 dblp:conf/kdd/ZhaoLSY18 fatcat:ai3v4acclvhrvdlucovpz42ri4

RT-MOVICAB-IDS: Addressing real-time intrusion detection

Álvaro Herrero, Martí Navarro, Emilio Corchado, Vicente Julián
2013 Future generations computer systems  
This study presents a novel Hybrid Intelligent Intrusion Detection System (IDS) known as RT-MOVICAB-IDS that incorporates temporal control.  ...  This upgraded CBR is based on an anytime approximation, which allows the adaptation of this Artificial Intelligence paradigm to real-time requirements.  ...  force, dictionary, etc  ... 
doi:10.1016/j.future.2010.12.017 fatcat:6hceed7q2jhp7jfobn2oz4vs5e

In-IDE Code Generation from Natural Language: Promise and Challenges [article]

Frank F. Xu, Bogdan Vasilescu, Graham Neubig
2021 arXiv   pre-print
We first develop a plugin for the IDE that implements a hybrid of code generation and code retrieval functionality, and orchestrate virtual environments to enable collection of many user events.  ...  We perform the first comprehensive investigation of the promise and challenges of using such technology inside the IDE, asking "at the current state of technology does it improve developer productivity  ...  We thank William Qian, who was involved in development of an early version of the plugin.  ... 
arXiv:2101.11149v3 fatcat:3wyizxvtvnarjehq5koxbesq64

Conceptual Design of Python IDE with Embedded Turkish Spoken Chatbot that Analyzes and Corrects the Syntax Errors

Turgay Tugay BİLGİN, Erdem YAVUZ
2021 European Journal of Science and Technology  
This study provides a detailed review of interactive guidance using intelligent agents, and then introduces a concept model for a Conversation-based Turkish Python Integrated development environment (IDE  ...  The proposed Integrated development environment (IDE) has a well-designed UI that can be easily adapted by newcomers.  ...  The integrated development environment (IDE) outlined in this study is actually a complex system that brings together structures such as machine learning, intelligent agents, dialog-based agents, and chatbots  ... 
doi:10.31590/ejosat.1035421 fatcat:xpcmr6lz3zhrnmeniamazviome

Evaluation Of State Of The Art Ids Message Exchange Protocols

Robert Koch, Mario Golling, Gabi Dreo
2013 Zenodo  
Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.  ...  Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don't care about areas of responsibility.  ...  Fig. 1 . 1 Components of an Intrusion Detection System [4] Fig. 2 . 2 Facets of an increased information exchange (Information ExchangeCube) TABLE I EFFECTS I OF INCREASED INFORMATION EXCHANGE (bold  ... 
doi:10.5281/zenodo.1086549 fatcat:vfharntwvnh4vdf45aup2oj7bi

Clustering extension of MOVICAB-IDS to identify SNMP community searches

R. Sanchez, A. Herrero, E. Corchado
2014 Logic Journal of the IGPL  
This hybrid intelligent IDS combined different Artificial Intelligence (AI) paradigms to visualize network traffic for ID at packet level.  ...  It is an application layer protocol that supports the exchange of management information (operating system, version, routing tables and default TTL) between network devices.  ...  MObile VIsualisation Connectionist Agent-Based IDS (MOVICAB-IDS) was proposed [4, 5] as a novel IDS comprising a Hybrid Artificial Intelligent System (HAIS).  ... 
doi:10.1093/jigpal/jzu035 fatcat:w3n2jxg675ferawlfa2s35hly4

How to Improve the IoT Security Implementing IDS/IPS Tool using Raspberry Pi 3B+

Ruíz-Lagunas Juan Jesús, Antolino-Hernández Anastacio, Reyes-Gutiérrez Mauricio, Ferreira-Medina Heberto, Torres-Millarez Cristhian, Paniagua-Villagómez Omar
2019 International Journal of Advanced Computer Science and Applications  
We used an IDS / IPS as a protection tool for IoT systems, based on Raspberry Pi and Raspbian operating system. It is described in a block diagram the testing method used.  ...  system in an environment under threats.  ...  with an IDS and IPS" Spanish translate "Desarrollo e implementación de una arquitectura IoT segura, basado en pruebas de penetración, utilizando modelos fuzz y sistemas de detección con un IDS e IPS".  ... 
doi:10.14569/ijacsa.2019.0100952 fatcat:xcodinlvebbdpaafmiaxbdezdq

AN APPROACH FOR IDS BY COMBINING SVM AND ANT COLONY ALGORITHM

Subaira.A.S .
2014 International Journal of Research in Engineering and Technology  
An IDS is a mechanism that monitors network or system actions for malicious activities and produces reports to a management station [1] .  ...  As declared in [12] a computational intelligence was used for intrusion detection System.  ... 
doi:10.15623/ijret.2014.0303086 fatcat:534vuss4dffydaotngmzk3uqda

In-IDE Code Generation from Natural Language: Promise and Challenges

Frank F. Xu, Bogdan Vasilescu, Graham Neubig
2022 ACM Transactions on Software Engineering and Methodology  
In this article, we perform the first comprehensive investigation of the promise and challenges of using such technology inside the PyCharm IDE, asking, "At the current state of technology does it improve  ...  To facilitate the study, we first develop a plugin for the PyCharm IDE that implements a hybrid of code generation and code retrieval functionality, and we orchestrate virtual environments to enable collection  ...  ACKNOWLEDGMENTS We thank William Qian, who was involved in development of an early version of the plugin.  ... 
doi:10.1145/3487569 fatcat:zxbzzwczsjbfzkus6drsuvsjwu

Bi-directional Recurrent Neural network for Intrusion Detection System (IDS) in the internet of things (IoT)

Aimable Dushimimana, Tchi Tao, Richard Kindong, Angelique Nishyirimbere
2020 International Journal of Advanced Engineering Research and Science  
In this study a novel algorithm (BRNN) out-performed both RNN(Recurrent Neural Network) and GRNN(Gated Recurrent Neural Network) because it considers both information from the past and the future with  ...  Intrusion Detection System (IDS). Intrusion detection describes an application security practice used to mitigate attacks and block new threats.  ...  User to Root Attack (U2R): is a class of exploit in which the attacker starts out with access to a normal user account on the system (perhaps gained by sniffing passwords, a dictionary attack, or social  ... 
doi:10.22161/ijaers.73.68 fatcat:zq5p7zi7k5gsfep5kr3zw4ojce

Relating Graphical Features with Concept Classes for Automatic News Video Indexing

Ichiro Ide, Reiko Hamada, Shuichi Sakai, Hidehiko Tanaka
1999 International Joint Conference on Artificial Intelligence  
We will propose an indexing method, which considers image contents together with textual information, to ensure the consistency of the video contents and the indexes.  ...  However, most of these methods tend to be textual information driven, which do not thoroughly consider the image contents.  ...  the contents and the indexes [Ide et al., 1999] .  ... 
dblp:conf/ijcai/IdeHST99 fatcat:yotjuebynrdlxbj2qsdedb6goe

An Easy Way to Deploy the Re-ID System on Intelligent City: Cross-Domain Few-Shot Person Reidentification

Xili Dai, Cheng Yang, Bin Liu, Haigang Gong, Xiaojun Yuan
2022 Mobile Information Systems  
An intelligent urban system relies on different types of electronic and/or sensor technologies to collect data to facilitate education, security, healthcare, etc.  ...  One example is using re-ID systems for law enforcement tasks such as suspect identification. One common obstacle is quickly deploying a re-ID system to new city, such as data label deficiency.  ...  Person reidenti cation (re-ID) plays an important role in intelligent security city, especially in law enforcement areas.  ... 
doi:10.1155/2022/4522578 doaj:debc9a5389bf44ad9ffe3062b8c00f50 fatcat:zeozynvgd5blpexjgpwn4rkdne

Research and development automatically generate detection rules for IDS based on machine learning technology

Nguyen Huy Trung, Le Hai Viet, Tran Duc Thang
2022 Journal of Science and Technology on Information security  
In this paper, the authors present a method to automatically generate network attack detection rules for the IDS system based on the results of training machine learning models.  ...  Through testing, the author proves that the system that automatically generates network attack detection rules for IDS based on machine learning meets the requirements of increasing the ability to detect  ...  An Intrusion Detection System An Intrusion Detection System (IDS) is a software or hardware system that automates the process of monitoring events occurring in a computer system or network, analyzing them  ... 
doi:10.54654/isj.v2i14.203 fatcat:5q5p6tn2xva2jmhpfmvqeugnxm

The Detection Efficiency Improvement of the Distribution Equipment Based on the Intelligent Industrial Technology

Lisheng Li, http://www.jiii.org/index.php?m=content&c=index&a=show&catid=61&id=294, Yan Wen, Hailei Meng, Di Fan, Zhimin Shao, Shidong Zhang
2019 Journal of Industrial and Intelligent Information  
An intelligent industrial detection system is proposed for the batch inspection of distribution network equipment.  ...  The intelligent detection system is a pilot project for the large-scale and high-precision inspection of the distribution network equipment.   ...  Real-time database structure is shown in Fig. 6 3) Maintenance for detection information and data dictionary According to all kinds outline of equipment inspection, the system maintains from the  ... 
doi:10.18178/jiii.7.2.42-47 fatcat:7rqy2jgpljhcbnl23jduagx7vu
« Previous Showing results 1 — 15 out of 24,763 results