Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
95 result(s) for "Sugumaran, Vijayan"
Sort by:
DTIP-WINDGRU a novel drug-target interaction prediction with wind-enhanced gated recurrent unit
Background Identification of drug target interactions (DTI) is an important part of the drug discovery process. Since prediction of DTI using laboratory tests is time consuming and laborious, automated tools using computational intelligence (CI) techniques become essential. The prediction of DTI is a challenging process due to the absence of known drug-target relationship and no experimentally verified negative samples. The datasets with limited or unbalanced data, do not perform well. The models that use heterogeneous networks, non-linear fusion techniques, and heuristic similarity selection may need a lot of computational power and experience to implement and fine-tune. The latest developments in machine learning (ML) and deep learning (DL) models can be employed for effective DTI prediction process. Results To that end, this study develops a novel DTI Prediction model, namely, DTIP-WINDGRU Drug-Target Interaction Prediction with Wind-Enhanced GRU. The major aim is to determine the DTIs in both labelled and unlabelled samples accurately compared to traditional wet lab experiments. To accomplish this, the proposed DTIP-WINDGRU model primarily performs pre-processing and class labelling. In addition, drug-to-drug (D-D) and target-to-target (T-T) interactions are employed to initialize the weights of the GRU model and are employed for the, DTI prediction process. Finally, the Wind Driven Optimization (WDO) algorithm is utilized to optimally choose the hyperparameters involved in the GRU model. Conclusions For ensuring the effectual prediction results of the DTIP-WINDGRU model, a widespread experimentation process was carried out using four datasets. This comprehensive comparative study highlighted the better performance of the DTIP-WINDGRU model over existing techniques.
A Hybrid Genetic Algorithm for Software Architecture Re-Modularization
Software architectures have become highly heterogeneous and difficult to maintain due to software evolution and continuous change. Therefore, a software system usually must be restructured in terms of modules containing relatively dependent components to address the system complexity. However, it is challenging to re-modularize systems automatically to improve their maintainability. In this paper, we present a new mathematical programming model for the software re-modularization problem. In contrast to previous research, a novel metric based on the principle of complexity balance is introduced to address the issue of over-cohesiveness. In addition, a hybrid genetic algorithm (HGA) is designed to automatically determine high-quality re-modularization solutions. In the proposed HGA, a heuristic based on edge contraction and vectorization techniques is designed first to generate feature-rich solutions and subsequently implant these solutions as seeds into the initial population. Finally, a customized genetic algorithm (GA) is employed to improve the solution quality. Two sets of test problems are employed to evaluate the performance of the HGA. The first set includes sixteen real-world instances and the second set contains 900 large-scale simulated data. The proposed HGA is compared with two widely adopted algorithms, i.e., the multi-start hill-climbing algorithm (HCA) and the genetic algorithms with group number encoding (GNE). Experimental and statistical results demonstrate that in most cases, the HGA can guarantee better quality solutions than HCA and GNE.
Classification and security assessment of android apps
Current mobile platforms pose many privacy risks for the users. Android applications (apps) request access to device resources and data, such as storage, GPS location, camera, microphone, SMS, phone identity, and network information. Legitimate mobile apps, advertisements (ads), and malware all require access to mobile resources and data to function properly. Therefore, it is difficult for the user to make informed decisions that effectively balance their privacy and app functionality. This study analyzes the Android application permissions, ad networks and the impact on end-user’s privacy. Dangerous combinations of app permissions, and ad networks are used as features in our prediction models to understand the behavior of apps. Our models have a high classification accuracy of 95.9% considering the imbalance in real life between benign and malicious apps. Our assumption that certain app permissions can be a potential threat to the privacy of end users is confirmed to be one of the most impactful features of our prediction models. Since our study considers the impact of ad networks and malware permissions, it will help end-users make more informed decision about the app permissions they grant and understand that the app permissions open doors to more vulnerabilities, and at some point, benign apps can behave maliciously.
Explainable AI for zero-day attack detection in IoT networks using attention fusion model
The proposed research addresses the challenge of detecting malicious network traffic in IoT environments, focusing on enhancing detection accuracy while ensuring interpretability. The proposed attention fusion classification model utilizes both long-term and short-term attention mechanisms to capture temporal patterns and protocol-specific features, which improves the differentiation between benign and malicious traffic. Empirical results indicate strong performance, with precision-recall scores of 0.9999 for both the DDoS_TCP and DDoS_UDP classes, and a perfect score of 1.0000 for the Normal class. The model also demonstrates solid performance for the DDoS_HTTP (0.9791), Password (0.9418), and SQL_Injection (0.9461) classes. Furthermore, it excels at identifying complex behaviors in upload-based attacks and network vulnerabilities, achieving precision-recall scores of 0.9333 for the Uploading class and 0.9963 for the Vulnerability Scanner class. The binary classification accuracy is 99.9966%, and the multiclass accuracy for Zero-day attacks is 71.0926%. The results suggest that the model offers significant potential for improving IoT security. This study introduces the novel use of attention mechanisms for interpretability, enhancing the detection of a broad range of attack types, and contributes to advancing intrusion detection system capabilities. Future research can focus on expanding datasets, refining interpretability techniques, and addressing adversarial vulnerabilities for further model enhancement.
An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain
Due to industrialization and informatization of the construction industry, prefabricated construction has attracted wide attention from both research and practitioner communities. In prefabricated construction, there are exacting requirements for information sharing. Also, data in a prefabricated component supply chain tend to be dispersed in design, production, transportation and other stages. In other words, such data are significantly multi-source heterogeneous. Without an effective way of participating in supply chain dynamic collaboration, decision-making at various stages and resource allocation can be extremely challenging. This paper proposes a decision support framework for prefabricated component supply chain based on ontology and multi-agent. The framework comprises the ontology layer (i.e. provides data support for the model), the agent interaction layer (i.e. serves as the communication hub to coordinate the data transmission between modules), and the agent simulation layer (i.e. simulates interaction behavior of participants, and supports decision making). Using the Shanghai Chenxiang Road Station complex project as a case study, the paper demonstrates the validity of the proposed ontology and multi-agent based decision support framework.
Information credibility evaluation in online professional social network using tree augmented naïve Bayes classifier
In recent years, companies depend on the Internet for posting job advertisements and attracting qualified personnel. However, with the vast number of Internet users and the tremendous amount of information on the Internet, it is difficult to accurately evaluate the credibility of the information that candidates provide on the Internet. Therefore, we propose an approach to assess information credibility in terms of trustworthiness and authority to identify unreliable user profiles in online professional social networks. Our approach calculates the trustworthiness probabilities of user profile information using the Tree Augmented Naïve Bayes (TAN) classifier. It also measures the authority of individual users by applying the PageRank algorithm for analyzing the user interactions in the professional social networks. Finally, a group of LinkedIn users’ profiles is selected for conducting experiments to validate the proposed approach. Experiments based on a real-world scenario show that our approach integrating the TAN Bayes and PageRank algorithm outperforms other existing approaches in classification accuracy. In addition, the approach has been applied to another social network, namely, Maimai in China to further demonstrate its usefulness.
Reminisce: Blockchain Private Key Generation and Recovery Using Distinctive Pictures-Based Personal Memory
As a future game-changer in various industries, cryptocurrency is attracting people’s attention. Cryptocurrency is issued on blockchain and managed through a blockchain wallet application. The blockchain wallet manages user’s digital assets and authenticates a blockchain user by checking the possession of a user’s private key. The mnemonic code technique represents the most widely used method of generating and recovering a private key in blockchain wallet applications. However, the mnemonic code technique does not consider usability to generate and recover a user’s private key. In this study, we propose a novel approach for private key generation and recovery. Our approach is based on the idea that a user can hold long-term memory from distinctive pictures. The user can generate a private key by providing pictures and the location of the pictures. For recovering a private key, the user identifies the locations of the pictures that are used in the private key generation process. In this paper, we experiment with the security and usability of our approach and confirm that our proposed approach is sufficiently secure compared to the mnemonic code technique and accounts for usability.
DTIP-WINDGRU a novel drug-target interaction prediction with wind-enhanced gated recurrent unit
Identification of drug target interactions (DTI) is an important part of the drug discovery process. Since prediction of DTI using laboratory tests is time consuming and laborious, automated tools using computational intelligence (CI) techniques become essential. The prediction of DTI is a challenging process due to the absence of known drug-target relationship and no experimentally verified negative samples. The datasets with limited or unbalanced data, do not perform well. The models that use heterogeneous networks, non-linear fusion techniques, and heuristic similarity selection may need a lot of computational power and experience to implement and fine-tune. The latest developments in machine learning (ML) and deep learning (DL) models can be employed for effective DTI prediction process. To that end, this study develops a novel DTI Prediction model, namely, DTIP-WINDGRU Drug-Target Interaction Prediction with Wind-Enhanced GRU. The major aim is to determine the DTIs in both labelled and unlabelled samples accurately compared to traditional wet lab experiments. To accomplish this, the proposed DTIP-WINDGRU model primarily performs pre-processing and class labelling. In addition, drug-to-drug (D-D) and target-to-target (T-T) interactions are employed to initialize the weights of the GRU model and are employed for the, DTI prediction process. Finally, the Wind Driven Optimization (WDO) algorithm is utilized to optimally choose the hyperparameters involved in the GRU model. For ensuring the effectual prediction results of the DTIP-WINDGRU model, a widespread experimentation process was carried out using four datasets. This comprehensive comparative study highlighted the better performance of the DTIP-WINDGRU model over existing techniques.
How novice analysts understand supply chain process models: an experimental study of using diagrams and texts
PurposeProcess models specific to the supply chain domain are an important tool for the analysis of interorganizational interfaces and requirements of information technology (IT) systems supporting supply chain decision-making. The purpose of this study is to examine the effectiveness of supply chain process models for novice analysts in conveying domain semantics compared to alternative textual representations.Design/methodology/approachA laboratory experiment with graduate students as proxies for novice analysts was conducted. Participants were randomly assigned to either the diagram group, which worked with “thread diagrams” created from the modeling grammar “Supply Chain Operation Reference (SCOR) model”, or the text group, which worked with semantically equivalent textual representations. Domain understanding was measured using cognitively demanding information acquisition for two different domains.FindingsDiagram users were more accurate in identifying product-related information and organizing this information in a graph compared to those using the textual representation. The authors found considerable improvements in domain understanding, and using the diagrams was perceived as easy as using the texts.Originality/valueThe study's findings are unique in providing empirical evidence for supply chain process models being an effective representation for novice analysts. Such evidence is lacking in prior research because of the evaluation methods used, which are limited to scenario, case study and informed argument. This study adds the diagram user's perspective to that literature and provides a rigorous empirical evaluation by contrasting diagrammatic and textual representations.