Computational Intelligence Paradigms

Author(s):  
El-Sayed M. El-Alfy ◽  
Wasan Shaker Awad

The evolution of communication networks and information systems, to support wireless access, cloud and grid computing, and big data, provides great business opportunities. However, it also generates a new trend of sophisticated network threats and offers several challenges in securing information and systems confidentiality, integrity and availability. The traditional techniques used by security experts are mostly static and lack the much needed characteristics of adaptation and self-organization, computational efficiency and error resilience to deal with evolving attacks. The inherent characteristics of computational intelligence (CI) paradigms provide a promising alternative that has gained popularity resulting in significant applications in information security. There is a plethora of CI paradigms commonly used in this domain including artificial neural networks, evolutionary computing, fuzzy systems, and swarm intelligence. This chapter provides an overview of the widely-recognized CI paradigms and shades the light on some of their potential applications in information security.

Author(s):  
El-Sayed M. El-Alfy ◽  
Wasan Awad

The evolution of communication networks and information systems, to support wireless access, cloud and grid computing, and big data, provides great business opportunities. However, it also generates a new trend of sophisticated network threats and offers several challenges in securing information and systems confidentiality, integrity and availability. The traditional techniques used by security experts are mostly static and lack the much needed characteristics of adaptation and self-organization, computational efficiency and error resilience to deal with evolving attacks. The inherent characteristics of computational intelligence (CI) paradigms provide a promising alternative that has gained popularity resulting in significant applications in information security. There is a plethora of CI paradigms commonly used in this domain including artificial neural networks, evolutionary computing, fuzzy systems, and swarm intelligence. This chapter provides an overview of the widely-recognized CI paradigms and shades the light on some of their potential applications in information security.


2000 ◽  
Vol 32 (01) ◽  
pp. 1-18 ◽  
Author(s):  
F. Baccelli ◽  
K. Tchoumatchenko ◽  
S. Zuyev

Consider the Delaunay graph and the Voronoi tessellation constructed with respect to a Poisson point process. The sequence of nuclei of the Voronoi cells that are crossed by a line defines a path on the Delaunay graph. We show that the evolution of this path is governed by a Markov chain. We study the ergodic properties of the chain and find its stationary distribution. As a corollary, we obtain the ratio of the mean path length to the Euclidean distance between the end points, and hence a bound for the mean asymptotic length of the shortest path. We apply these results to define a family of simple incremental algorithms for constructing short paths on the Delaunay graph and discuss potential applications to routeing in mobile communication networks.


2020 ◽  
Vol 6 (4) ◽  
pp. 120-126
Author(s):  
A. Malikov

In this paper we can see that identified computer incidents are subject for diagnostics, during which the characteristics of information security violations are clarified (purpose, causes, consequences, etc.). To diagnose computer incidents, we can use methods of automation while collection and processing the events that occur as a result of the implementation of scenarios for information security violations. Artificial neural networks can be used to solve the classification problem of assigning diagnostic data set (information image of a computer incident) to one of the possible values of the violation characteristic. The purpose of this work is to adapt the structure of an artificial neural network that allows the accuracy diagnostics of computer incidents when new training examples appear.


2021 ◽  
Vol 5 (4) ◽  
pp. 50
Author(s):  
Rafik Gouiaa ◽  
Moulay A. Akhloufi ◽  
Mozhdeh Shahbazi

Automatically estimating the number of people in unconstrained scenes is a crucial yet challenging task in different real-world applications, including video surveillance, public safety, urban planning, and traffic monitoring. In addition, methods developed to estimate the number of people can be adapted and applied to related tasks in various fields, such as plant counting, vehicle counting, and cell microscopy. Many challenges and problems face crowd counting, including cluttered scenes, extreme occlusions, scale variation, and changes in camera perspective. Therefore, in the past few years, tremendous research efforts have been devoted to crowd counting, and numerous excellent techniques have been proposed. The significant progress in crowd counting methods in recent years is mostly attributed to advances in deep convolution neural networks (CNNs) as well as to public crowd counting datasets. In this work, we review the papers that have been published in the last decade and provide a comprehensive survey of the recent CNNs based crowd counting techniques. We briefly review detection-based, regression-based, and traditional density estimation based approaches. Then, we delve into detail regarding the deep learning based density estimation approaches and recently published datasets. In addition, we discuss the potential applications of crowd counting and in particular its applications using unmanned aerial vehicle (UAV) images.


Sign in / Sign up

Export Citation Format

Share Document