Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Engineering

Moving Targets: Addressing Concept Drift In Supervised Models For Hacker Communication Detection, Susan Mckeever, Brian Keegan, Andrei Quieroz Jun 2020

Moving Targets: Addressing Concept Drift In Supervised Models For Hacker Communication Detection, Susan Mckeever, Brian Keegan, Andrei Quieroz

Conference papers

Abstract—In this paper, we are investigating the presence of concept drift in machine learning models for detection of hacker communications posted in social media and hacker forums. The supervised models in this experiment are analysed in terms of performance over time by different sources of data (Surface web and Deep web). Additionally, to simulate real-world situations, these models are evaluated using time-stamped messages from our datasets, posted over time on social media platforms. We have found that models applied to hacker forums (deep web) presents an accuracy deterioration in less than a 1-year period, whereas models applied to Twitter (surface …


Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez Jun 2020

Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez

Conference papers

Accurate traffic classification is fundamentally important for various network activities such as fine-grained network management and resource utilisation. Port-based approaches, deep packet inspection and machine learning are widely used techniques to classify and analyze network traffic flows. However, over the past several years, the growth of Internet traffic has been explosive due to the greatly increased number of Internet users. Therefore, both port-based and deep packet inspection approaches have become inefficient due to the exponential growth of the Internet applications that incurs high computational cost. The emerging paradigm of software-defined networking has reshaped the network architecture by detaching the control …


A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin Jun 2020

A Proactive-Restoration Technique For Sdns, Ali Malik, Ruairí De Fréin

Conference papers

Failure incidents result in temporarily preventing the network from delivering services properly. Such a deterioration in services called service unavailability. The traditional fault management techniques, i.e. protection and restoration, are inevitably concerned with service unavailability due to the convergence time that is required to achieve the recovery when a failure occurs. However, with the global view feature of software-defined networking a failure prediction is becoming attainable, which in turn reduces the service interruptions that originated by failures. In this paper, we propose a proactive restoration technique that reconfigure the vulnerable routes which are likely to be affected if the …


Exploration Of Approaches To Arabic Named Entity Recognition, Husamelddin Balla, Sarah Jane Delany Jan 2020

Exploration Of Approaches To Arabic Named Entity Recognition, Husamelddin Balla, Sarah Jane Delany

Conference papers

Abstract. The Named Entity Recognition (NER) task has attracted significant attention in Natural Language Processing (NLP) as it can enhance the performance of many NLP applications. In this paper, we compare English NER with Arabic NER in an experimental way to investigate the impact of using different classifiers and sets of features including language-independent and language-specific features. We explore the features and classifiers on five different datasets. We compare deep neural network architectures for NER with more traditional machine learning approaches to NER. We discover that most of the techniques and features used for English NER perform well on Arabic …


Active Learning For Auditory Hierarchy, William Coleman, Sarah Jane Delany, Charlie Cullen, Ming Yan Jan 2020

Active Learning For Auditory Hierarchy, William Coleman, Sarah Jane Delany, Charlie Cullen, Ming Yan

Conference papers

Much audio content today is rendered as a static stereo mix: fundamentally a fixed single entity. Object-based audio envisages the delivery of sound content using a collection of individual sound ‘objects’ controlled by accompanying metadata. This offers potential for audio to be delivered in a dynamic manner providing enhanced audio for consumers. One example of such treatment is the concept of applying varying levels of data compression to sound objects thereby reducing the volume of data to be transmitted in limited bandwidth situations. This application motivates the ability to accurately classify objects in terms of their ‘hierarchy’. That is, whether …


Brexit Election: Forecasting A Conservative Party Victory Through The Pound Using Arima And Facebook's Prophet, James Usher, Pierpaolo Dondio Jan 2020

Brexit Election: Forecasting A Conservative Party Victory Through The Pound Using Arima And Facebook's Prophet, James Usher, Pierpaolo Dondio

Conference papers

On the 30th October, 2019, the markets watched as British Prime Minister, Boris Johnson, took a massive political gamble to call a general election to break the Withdrawal Agreement stalemate in the House of Commons to “Get BREXIT Done”. The pound had been politically sensitive owing to BREXIT uncertainty. With the polls indicating a Conservative win on 4thDecember, 2019, the margin of victory could be observed through increases in the pound. The outcome of a Conservative party victory would benefit the pound by removing the current market turbulence. We look to provide a short-term forecast of the pound. Our approach …


Android Compcache Based On Graphics Processing Unit, Muder Almi'ani, Abdu Razaque, Saleh Atiewi, Mohammed Alweshah, Ayman Al-Dmour, Basel Magableh Jan 2020

Android Compcache Based On Graphics Processing Unit, Muder Almi'ani, Abdu Razaque, Saleh Atiewi, Mohammed Alweshah, Ayman Al-Dmour, Basel Magableh

Conference papers

Android systems have been successfully developed to meet the demands of users. The following four methods are used in Android systems for memory management: backing swap, CompCache, traditional Linux swap, and low memory killer. These memory management methods are fully functioning.
However, Android phones cannot swap memory into solid-state drives, thus slowing the processor and reducing storage lifetime. In addition, the compression and decompression processes consume additional energy and latency. Therefore, the CompCache requires an extension. An extended Android CompCache using a graphics processing unit to compress and decompress memory pages on demand and reduce the latency is introduced in …


Sla-Aware Routing Strategy For Multi-Tenant Software-Defined Networks, Ali Malik, Ruairí De Fréin Jan 2020

Sla-Aware Routing Strategy For Multi-Tenant Software-Defined Networks, Ali Malik, Ruairí De Fréin

Conference papers

A crucial requirement for the network service provider is to satisfy the Service Level Agreements (SLA) that it has made with its customers. Coexisting network tenants may have agreed different SLAs, and thus, the service provider must be able to provide QoS differentiation in order to meet his contractual commitments. Current one-size-fits-all routing models are not appropriate for all network tenants if their individual SLA requirements are to be efficiently met. We propose a SDN-based multi-cost routing approach which allocates network resources based on a portfolio of tenant SLA, which achieves the goal of accommodating multiple tenants, given their SLAs. …