scholarly journals False Intel Detection In Crowd Source Knowledge Base

Wikidata is widely considered as the biggest Encyclopaedia on the internet and it is the new large-scale knowledge base of the WikimediaFoundation. Its knowledge is increasingly used within Wikipedia itself and various other kinds of information systems imposing high demands on its integrity. Wikidata, it can be edited by anyone and as a result, unfortunately it frequently gets vandalized exposing all information systems using it to the risk of spreading vandalized and falsified information. In this paper a new machine learning based approach to detect vandalism in wikidata is presented. We propose sector 47 features that exploit both content and context information and we report on 4 classifiers as of increasing effectiveness tailored to this learning task.

2021 ◽  
pp. 1-9
Author(s):  
Rosmalina Rosma ◽  
Yaya Suharya ◽  
Megantari Suhendar

Most people in Indonesia usually have plants at their homes, places of business and so on. Balad is a place of business, which has a minimalist garden on the second floor. The limited land owned by Balad has made business owners take advantage of the existing land conditions to raise crops on a small scale. The garden is usually planted with a variety of plants to beautify and make the gardens in Balad cool. Plants grown by business owners in order to grow properly must have adequate water consumption and adequate lighting. The provision of water or watering and lighting to plants is one of the important things to keep the plants alive. Seeing this condition, business owners must do regular watering so that these plants get sufficient water consumption. Nowadays everyone has their own preferences, the same applies to business owners in Balad, so that sometimes they are forgotten to care for plants due to limited time. Information systems on plant care based on the Internet of Things help in collecting information related to conditions such as humidity, temperature, soil fertility, and plant inspection that can be controlled via a smartphone using the internet network. Internet of Things makes use of plant owners to connect with their residence or place of business from anywhere and anytime. The remote sensor structure using Microcontroller ESP8266 is used to monitor the condition of plants in the Balad park, of course, to see conditions remotely. Designing Plant Care Information Systems based on the Internet of Things, can reduce costs and update productivity standards in maintaining small-scale plants and if needed can be developed on a large scale


2021 ◽  
Author(s):  
Julião Braga ◽  
Francisco Regateiro ◽  
Joaquim L. R. Dias ◽  
Itana Stiubiener

This paper describes the creation of a domain ontology to represent knowledge to populate a knowledge base to be used by agents, in the environment of Internet Infrastructure routing domains. Protégé 5 was used, which produces results suitable for both software-developed agents and humans. The knowledge created with Protégé is explicit and Protégé has itself inference machines capable of producing implicit knowledge. The resources available in Protégé 5 are presented and the ontology is made available for public use.The content produced with Protégé 5 will be used to populate the knowledge base of the Structure for Knowledge Acquisition, Use, Learning and Collaboration (SKAU), an environment to support intelligent agents over Internet Autonomous Systems domains.


2019 ◽  
Author(s):  
Julião Braga ◽  
Joao Silva ◽  
Patricia Endo ◽  
Nizam Omar

This article describes an environment for knowledge acquisition, learning, use and collaboration inter agents over Internet Infrastructure. Four agent types are used in a previously applied fourtier model, such as the use case on the Internet Routing Registry. This model, which can be implemented in each Autonomous System domain of the Internet infrastructure, is integrated into an environment with (a) capturing information from unstructured databases, (b) creating and updating training bases appropriate to machine learning algorithms and (c) creation and feeding of a knowledge base. Such resources become readily available to agents in each domain and to agents in all other domains with the aim of making them autonomous. The agents collaborate and interact with each other, through individual blockchain structures that also take care of operational security and integration aspects. In addition, a test bed to validate the entire model, including the functionalities of the agents, is also proposed and characterized.


2020 ◽  
Vol 12 (16) ◽  
pp. 6434 ◽  
Author(s):  
Corey Dunn ◽  
Nour Moustafa ◽  
Benjamin Turnbull

With the increasing popularity of the Internet of Things (IoT) platforms, the cyber security of these platforms is a highly active area of research. One key technology underpinning smart IoT systems is machine learning, which classifies and predicts events from large-scale data in IoT networks. Machine learning is susceptible to cyber attacks, particularly data poisoning attacks that inject false data when training machine learning models. Data poisoning attacks degrade the performances of machine learning models. It is an ongoing research challenge to develop trustworthy machine learning models resilient and sustainable against data poisoning attacks in IoT networks. We studied the effects of data poisoning attacks on machine learning models, including the gradient boosting machine, random forest, naive Bayes, and feed-forward deep learning, to determine the levels to which the models should be trusted and said to be reliable in real-world IoT settings. In the training phase, a label modification function is developed to manipulate legitimate input classes. The function is employed at data poisoning rates of 5%, 10%, 20%, and 30% that allow the comparison of the poisoned models and display their performance degradations. The machine learning models have been evaluated using the ToN_IoT and UNSW NB-15 datasets, as they include a wide variety of recent legitimate and attack vectors. The experimental results revealed that the models’ performances will be degraded, in terms of accuracy and detection rates, if the number of the trained normal observations is not significantly larger than the poisoned data. At the rate of data poisoning of 30% or greater on input data, machine learning performances are significantly degraded.


Author(s):  
Fady Esmat Fathel Samann ◽  
Adnan Mohsin Abdulazeez ◽  
Shavan Askar

<p>Internet of Things (IoT) systems usually produce massive amounts of data, while the number of devices connected to the internet might reach billions by now. Sending all this data over the internet will overhead the cloud and consume bandwidth. Fog computing's (FC) promising technology can solve the issue of computing and networking bottlenecks in large-scale IoT applications. This technology complements the cloud computing by providing processing power and storage to the edge of the network. However, it still suffers from performance and security issues. Thus, machine learning (ML) attracts attention for enabling FC to settle its issues. Lately, there has been a growing trend in utilizing ML to improve FC applications, like resource management, security, lessen latency and power usage. Also, intelligent FC was studied to address issues in industry 4.0, bioinformatics, blockchain and vehicular communication system. Due to the ML vital role in the FC paradigm, this work will shed light on recent studies utilized ML in a FC environment. Background knowledge about ML and FC also presented. This paper categorized the surveyed studies into three groups according to the aim of ML implementation. These studies were thoroughly reviewed and compared using sum-up tables. The results showed that not all studies used the same performance metric except those worked on security issues. In conclusion, the simulations of proposed ML models are not sufficient due to the heterogeneous nature of the FC paradigm.</p>


2009 ◽  
pp. 134-144 ◽  
Author(s):  
Vincent C. Yen

The technology of Web services (WS) has been a hot area in the software industry for many years. Many organizations in the past 5 years have conducted surveys designed to get a profile of the state of Web services adoption in various subject areas. Some of those survey results are available free from the Internet. Since conducting a large scale Web services survey takes time and significant financial commitment, the research conducted in this chapter is a synthesis from published free survey results. All sources of surveys indicate Web services are being adopted more or less in all mid-size to large organizations because of realized benefits, and are anticipated to become a viable component of information systems infrastructure. Some of the current issues in Web services adoption and implementation are standards, training, and security.


2021 ◽  
pp. 222-238
Author(s):  
Jon R. Lindsay

The ubiquity of information technology augurs a new golden age of espionage. Intelligence is the use of deceptive means for strategic ends. It encompasses the collection of secrets, analysis and decision support, covert action and influence, and counterintelligence. Modern computational networks expand the opportunities for all these types of intelligence, for new types of actors to engage in intelligence activities, and for almost anyone or anything to become intelligence targets. Yet large-scale information systems also amplify the classic ethical, operational, and strategic challenges associated with intelligence. Many of the policy controversies associated with cybersecurity, for instance, are not simply novelties of the Internet age, but rather are symptomatic of the uneasy relationship between counterintelligence and democracy. Understanding the technology used for cyber intrusion may be necessary for understanding cyber conflict, but it is not sufficient for comprehending its strategic ends and limits: it is further necessary to understand the political logic of intelligence.


Sign in / Sign up

Export Citation Format

Share Document