Abstract: In this essay, the researcher is focusing on the deep learning systems and its major applications in various fields. Song Yukun uses the relu incentive algorithm and the convolution functions to make the program automatically recognize different things or same type of things with different features. Before actually processing the image recognition part, the researcher adds a transforming program which change all kinds of image into one small form. Then, using this modelled image, the program could delicately determine the type of the contents in the image. This technological program is automatic and performs as an essential part of artificial intelligences. The main work it does is imitating the learning process of human brain, which accumulate experiences from thousands of events. It realizes this function by adding different algorithms in the program including the relu incentive algorithm which “teaches” the program particular types of images. After massive input, this technological program could quickly solve current problems with the lack of human labor force doing repetitive but intelligent works like checking particular tumor in the X-ray films. Besides, learning by themselves, the programs could generate results more specific than humans do. This deep-learning principle could be widely utilized since everything in human lives are learning and accumulating experiences. It could change any previous mechanical program into “intelligent” programs which would have an acceleration in their delicacy of determination.Abstract: In this essay, the researcher is focusing on the deep learning systems and its major applications in various fields. Song Yukun uses the relu incentive algorithm and the convolution functions to make the program automatically recognize different things or same type of things with different features. Before actually processing the image recognition ...Show More
Abstract: Information systems handle large amount of data within enterprises by offering the possibility to collect, treat, keep and make information available. To achieve this, it is crucial to secure data from intrusion that disturb confidentiality, availability, and integrity of data. This integrity must follow the strategic alignment of the considered enterprise. Unfortunately, the goal of attackers is to affect the resources present in the system. Research in intrusion detection field is still in search of proposals to relevant problems. Many solutions exist supporting machine learning and datamining models. Nevertheless, these solutions based on signature and behavior approaches of intrusion detection, are more interested in data and have not a global view of processes. The aim of this paper is to use workflow mining for a Host-based intrusion detection by monitoring workflow event logs related to resources. With workflow mining, process execution are stored in event logs and the detection of intrusion can be realized by their analysis on the basis of a well-defined security policy. To achieve our goal, step by step, we start by the specification of different concepts manipulated. Afterwards, we provide a model of security policy and a model of intrusion detection that enables us to have a low rate of false alerts. Finally, we implement the solution via a prototype to observe how it can work.Abstract: Information systems handle large amount of data within enterprises by offering the possibility to collect, treat, keep and make information available. To achieve this, it is crucial to secure data from intrusion that disturb confidentiality, availability, and integrity of data. This integrity must follow the strategic alignment of the considered en...Show More