970 resultados para Nature inspired algorithms
Resumo:
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. It is hoped that biologically inspired approaches in this area, including the use of immune-based systems will be able to meet this challenge. Here we review the algorithms used, the development of the systems and the outcome of their implementation. We provide an introduction and analysis of the key developments within this field, in addition to making suggestions for future research.
Resumo:
Phylogenetic inference consist in the search of an evolutionary tree to explain the best way possible genealogical relationships of a set of species. Phylogenetic analysis has a large number of applications in areas such as biology, ecology, paleontology, etc. There are several criterias which has been defined in order to infer phylogenies, among which are the maximum parsimony and maximum likelihood. The first one tries to find the phylogenetic tree that minimizes the number of evolutionary steps needed to describe the evolutionary history among species, while the second tries to find the tree that has the highest probability of produce the observed data according to an evolutionary model. The search of a phylogenetic tree can be formulated as a multi-objective optimization problem, which aims to find trees which satisfy simultaneously (and as much as possible) both criteria of parsimony and likelihood. Due to the fact that these criteria are different there won't be a single optimal solution (a single tree), but a set of compromise solutions. The solutions of this set are called "Pareto Optimal". To find this solutions, evolutionary algorithms are being used with success nowadays.This algorithms are a family of techniques, which aren’t exact, inspired by the process of natural selection. They usually find great quality solutions in order to resolve convoluted optimization problems. The way this algorithms works is based on the handling of a set of trial solutions (trees in the phylogeny case) using operators, some of them exchanges information between solutions, simulating DNA crossing, and others apply aleatory modifications, simulating a mutation. The result of this algorithms is an approximation to the set of the “Pareto Optimal” which can be shown in a graph with in order that the expert in the problem (the biologist when we talk about inference) can choose the solution of the commitment which produces the higher interest. In the case of optimization multi-objective applied to phylogenetic inference, there is open source software tool, called MO-Phylogenetics, which is designed for the purpose of resolving inference problems with classic evolutionary algorithms and last generation algorithms. REFERENCES [1] C.A. Coello Coello, G.B. Lamont, D.A. van Veldhuizen. Evolutionary algorithms for solving multi-objective problems. Spring. Agosto 2007 [2] C. Zambrano-Vega, A.J. Nebro, J.F Aldana-Montes. MO-Phylogenetics: a phylogenetic inference software tool with multi-objective evolutionary metaheuristics. Methods in Ecology and Evolution. En prensa. Febrero 2016.
Resumo:
Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to the IDS problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.
Resumo:
Tropical Rainfall Measuring Mission (TRMM) rainfall retrieval algorithms are evaluated in tropical cyclones (TCs). Differences between the Precipitation Radar (PR) and TRMM Microwave Imager (TMI) retrievals are found to be related to the storm region (inner core vs. rainbands) and the convective nature of the precipitation as measured by radar reflectivity and ice scattering signature. In landfalling TCs, the algorithms perform differently depending on whether the rainfall is located over ocean, land, or coastal surfaces. Various statistical techniques are applied to quantify these differences and identify the discrepancies in rainfall detection and intensity. Ground validation is accomplished by comparing the landfalling storms over the Southeast US to the NEXRAD Multisensor Precipitation Estimates (MPE) Stage-IV product. Numerous recommendations are given to algorithm users and developers for applying and interpreting these algorithms in areas of heavy and widespread tropical rainfall such as tropical cyclones.
Resumo:
Bangla OCR (Optical Character Recognition) is a long deserving software for Bengali community all over the world. Numerous e efforts suggest that due to the inherent complex nature of Bangla alphabet and its word formation process development of high fidelity OCR producing a reasonably acceptable output still remains a challenge. One possible way of improvement is by using post processing of OCR’s output; algorithms such as Edit Distance and the use of n-grams statistical information have been used to rectify misspelled words in language processing. This work presents the first known approach to use these algorithms to replace misrecognized words produced by Bangla OCR. The assessment is made on a set of fifty documents written in Bangla script and uses a dictionary of 541,167 words. The proposed correction model can correct several words lowering the recognition error rate by 2.87% and 3.18% for the character based n- gram and edit distance algorithms respectively. The developed system suggests a list of 5 (five) alternatives for a misspelled word. It is found that in 33.82% cases, the correct word is the topmost suggestion of 5 words list for n-gram algorithm while using Edit distance algorithm the first word in the suggestion properly matches 36.31% of the cases. This work will ignite rooms of thoughts for possible improvements in character recognition endeavour.
Resumo:
A series of 7 cerium double-decker complexes with various tetrapyrrole ligands including porphyrinates, phthalocyaninates, and 2,3-naphthalocyaninates have been prepared by previously described methodologies and characterized with elemental analysis and a range of spectroscopic methods. The molecular structures of two heteroleptic \[(na)phthalocyaninato](porphyrinato) complexes have also been determined by X-ray diffraction analysis which exhibit a slightly distorted square antiprismatic geometry with two domed ligands. Having a range of tetrapyrrole ligands with very different electronic properties, these compounds have been systematically investigated for the effects of ligands on the valence of the cerium center. On the basis of the spectroscopic (UV−vis, near-IR, IR, and Raman), electrochemical, and structural data of these compounds and compared with those of the other rare earth(III) counterparts reported earlier, it has been found that the cerium center adopts an intermediate valence in these complexes. It assumes a virtually trivalent state in cerium bis(tetra-tert-butylnaphthalocyaninate) as a result of the two electron rich naphthalocyaninato ligands, which facilitate the delocalization of electron from the ligands to the metal center. For the rest of the cerium double-deckers, the cerium center is predominantly tetravalent. The valences (3.59−3.68) have been quantified according to their LIII-edge X-ray absorption near-edge structure (XANES) profiles.