Computational Intelligence
Recently Published Documents


TOTAL DOCUMENTS

4938
(FIVE YEARS 1707)

H-INDEX

58
(FIVE YEARS 24)

Author(s):  
Thanh Cong Truong ◽  
Jan Plucar ◽  
Bao Quoc Diep ◽  
Ivan Zelinka

<p>Recent years have witnessed a dramatic growth in utilizing computational intelligence techniques for various domains. Coherently, malicious actors are expected to utilize these techniques against current security solutions. Despite the importance of these new potential threats, there remains a paucity of evidence on leveraging these research literature techniques. This article investigates the possibility of combining artificial neural networks and swarm intelligence to generate a new type of malware. We successfully created a proof of concept malware named X-ware, which we tested against the Windows-based systems. Developing this proof of concept may allow us to identify this potential threat’s characteristics for developing mitigation methods in the future. Furthermore, a method for recording the virus’s behavior and propagation throughout a file system is presented. The proposed virus prototype acts as a swarm system with a neural network-integrated for operations. The virus’s behavioral data is recorded and shown under a complex network format to describe the behavior and communication of the swarm. This paper has demonstrated that malware strengthened with computational intelligence is a credible threat. We envisage that our study can be utilized to assist current and future security researchers to help in implementing more effective countermeasures</p>


Minerals ◽  
2022 ◽  
Vol 12 (1) ◽  
pp. 67
Author(s):  
Rajive Ganguli ◽  
Sean Dessureault ◽  
Pratt Rogers

This is an exciting time for the mining industry, as it is on the cusp of a change in efficiency as it gets better at leveraging data [...]


2022 ◽  
Vol 12 (1) ◽  
pp. 523
Author(s):  
Darius Plikynas ◽  
Audrius Indriulionis ◽  
Algirdas Laukaitis ◽  
Leonidas Sakalauskas

This paper presents an approach to enhance electronic traveling aids (ETAs) for people who are blind and severely visually impaired (BSVI) using indoor orientation and guided navigation by employing social outsourcing of indoor route mapping and assistance processes. This type of approach is necessary because GPS does not work well, and infrastructural investments are absent or too costly to install for indoor navigation. Our approach proposes the prior outsourcing of vision-based recordings of indoor routes from an online network of seeing volunteers, who gather and constantly update a web cloud database of indoor routes using specialized sensory equipment and web services. Computational intelligence-based algorithms process sensory data and prepare them for BSVI usage. In this way, people who are BSVI can obtain ready-to-use access to the indoor routes database. This type of service has not previously been offered in such a setting. Specialized wearable sensory ETA equipment, depth cameras, smartphones, computer vision algorithms, tactile and audio interfaces, and computational intelligence algorithms are employed for that matter. The integration of semantic data of points of interest (such as stairs, doors, WC, entrances/exits) and evacuation schemes could make the proposed approach even more attractive to BVSI users. Presented approach crowdsources volunteers’ real-time online help for complex navigational situations using a mobile app, a live video stream from BSVI wearable cameras, and digitalized maps of buildings’ evacuation schemes.


Sign in / Sign up

Export Citation Format

Share Document