Concerning of the problems of high cost and unstable detection results of the traditional malicious code detection methods, a multi-neural network malicious code detection model based on depthwise separable convolution was proposed. By using the Depthwise Separable Convolution (DSC), SENet (Squeeze-and-Excitation Network) channel attention mechanism and Grey Level Co-occurrence Matrix (GLCM), three lightweight neural networks were connected with GLCM in parallel to detect malicious code families and their variants, then the detection results of multiple strong classifiers were fused via Naive Bayes classifier to improve the detection accuracy while reducing the computational cost. Experimental results on the hybrid dataset of MalVis + benign data show that the proposed model achieved the accuracy of 97.43% in the detection of malicious code families and their variants, which was 6.19 and 2.29 percentage points higher than those of ResNet50 and VGGNet models respectively, while its parameter quantity is only 68% of that of ResNet50 model and 13% of that of VGGNet model. On malimg dataset, the detection accuracy of this model achieved 99.31%. In conclusion, the proposed model has good detection effect with reduced parameters.
In order to deal with the problem of low pedestrian re-identification rate in video images due to small target pedestrians, occlusions and variable pedestrian postures, a dual-channel multi-scale integrated learning method was established based on efficient network EfficientNet. Firstly, EfficientNet-B1 (EfficientNet-Baseline1) network was used as the backbone structure. Secondly, a weighted Bidirectional Feature Pyramid Network (BiFPN) branch was used to integrate the extracted global features at different scales. In order to improve the identification rate of small target pedestrians, the global features with different semantic information were obtained. Thirdly, PCB (Part-based Convolutional Baseline) branch was used to extract deep local features to mine non-significant information of pedestrians and reduce the influence of pedestrian occlusion and posture variability on identification rate. Finally, in the training stage, the pedestrian features extracted by the two branch networks respectively were calculated by the Softmax loss function to obtain different subloss functions, and they were added for joint representation. In the test stage, the global features and deep local features obtained were spliced and fused, and the Euclidean distance was calculated to obtain the pedestrian re-identification matching results. The accuracy of Rank-1 of this method on Market1501 and DukeMTMC-Reid datasets reaches 95.1% and 89.1% respectively, which is 3.9 percentage points and 2.3 percentage points higher than that of the original backbone structure respectively. Experimental results show that the proposed model improves the accuracy of pedestrian re-identification effectively.
With the proliferation of Artificial Intelligence (AI) computing power to the edge of the network and even to terminal devices, the computing power network of end-edge-supercloud collaboration has become the best computing solution. The emerging new opportunities have spawned the deep integration between end-edge-supercloud computing and the network. However, the complete development of the integrated system is unsolved, including adaptability, flexibility, and valuability. Therefore, a computing power network for ubiquitous AI named ACPN was proposed with the assistance of blockchain. In ACPN, the end-edge-supercloud collaboration provides infrastructure for the framework, and the computing power resource pool formed by the infrastructure provides safe and reliable computing power for the users, the network satisfies users’ demands by scheduling resources, and the neural network and execution platform in the framework provide interfaces for AI task execution. At the same time, the blockchain guarantees the reliability of resource transaction and encourage more computing power contributors to join the platform. This framework provides adaptability for users of computing power network, flexibility for resource scheduling of networking computing power, and valuability for computing power providers. A clear description of this new computing power network architecture was given through a case.
To effectively control large-scale outbreak, the propagation properties of the leeching P2P (Peer-to-Peer) botnet was studied using dynamics theory. Firstly, a delayed differential-equation model was proposed according to the formation of the botnet. Secondly, the threshold expression of controlling botnet was obtained by the explicit mathematical analysis. Finally, the numerical simulations verified the correctness of theoretical analysis. The theoretical analysis and experimental results show that the botnet can be completely eliminated if the basic reproduction number is less than 1. Otherwise, the defense measures can only reduce the scale of botnet. The simulation results show that decreasing the infection rate of bot programs or increasing the immune rate of nodes in the network can effectively inhibit the outbreak of botnet. In practice, the propagation of bot programs can be controlled by some measures, such as uneven distribution of nodes in the network, timely downloading patch and so on.
Traditional hypernetwork model is biased towards the majority class, which leads to much higher accuracy on majority class than the minority when being tackled on imbalanced data classification problem. In this paper, a Boosting ensemble of cost-sensitive hypernetworks was proposed. Firstly, the cost-sensitive learning was introduced to hypernetwork model, to propose cost-sensitive hyperenetwork model. Meanwhile, to make the algorithm adapt to the cost of misclassification on positive class, cost-sensitive hypernetworks were integrated by Boosting. The proposed model revised the bias towards the majority class when traditional hypernetwork model was tackled on imbalanced data classification, and improved the classification accuracy on minority class. The experimental results show that the proposed scheme has advantages in imbalanced data classification.
Based on the business process, a composite model of manufacturing cloud services was proposed to improve the successful rate of the manufacturing cloud service composition and match the composite cloud service with the user business demand correctly. As the foundation, formal descriptions were given about concepts such as the manufacturing cloud service, the process node task, the service composability and the process matching. The model consisted of the business process engine, the business process, the selection logic, the evaluation logic, the monitoring logic, the knowledge base and the atomic cloud service set. With the function matching, the composability of optional services was checked. The load, the Quality of Service (QoS) and the business process information were also considered. Then suitable cloud services were selected and integrated into the business process to form the composite manufacturing cloud service. The process of the service composition was described in detail, and the realization method of it was offered. The composite service model was verified through an example. The results prove that the valid cloud service entities can be selected and combined effectively with the model, the successful rate of the service composition is raised, and users' manufacturing activities can be carried out smoothly.
Concerning the problem that Fireworks Explosion Optimization (FEO) algorithm is easy to be premature and has low solution precision, an elite Opposition-Based Learning (OBL) was proposed. In every iteration, OBL was executed by the current best individual to generate an opposition search populations in its dynamic search boundaries, thus the search space of the algorithm was guided to approximate the optimum space. This mechanism is helpful to improve the balance and exploring ability of the FEO. For keeping the diversity of population, the sudden jump probability of the individual to the current best individual was calculated, and based on it, the roulette mechanism was adopted to choose the individual which entered into the child population. The experimental simulation on five classical benchmark functions show that, compared with the related algorithm, the improved algorithm has higher convergence rate and accuracy for numerical optimization, and it is suitable to solve the high dimensional optimization problem.