In the present article, we consider the Durrmeyer type integral modification of the generalized Baskakov operators. The special cases of our operators provides thewell-known Baskakov–Durrmeyer and Szász–Durrmey...
详细信息
作者:
Vyas, R.G.Faculty of Science
Department of Mathematics The Maharaja Sayajirao University of Baroda VadodaraGujarat India
Recently, Moricz and Veres generalized the classical results of Bernstein, Szasz, Zygmund and others related to the absolute convergence of single and multiple Fourier series. In this paper, we have extended this resu...
详细信息
The open source CFD library OpenFOAM is utilised to simulate the hydrodynamic impact process of 2D wedges. Incompressible multiphase flow solver interFoam is employed to calculate the free fall of structure from air i...
详细信息
Cloud computing provides a framework for supporting end users easily attaching powerful services and applications through Internet. To give secure and reliable services in cloud computing environment is an important i...
详细信息
Cloud computing provides a framework for supporting end users easily attaching powerful services and applications through Internet. To give secure and reliable services in cloud computing environment is an important issue. Providing security requires more than user authentication with passwords or digital certificates and confidentiality in data transmission, because it is vulnerable and prone to network intrusions that affect confidentiality, availability and integrity of Cloud resources and offered services. To detect DoS attack and other network level malicious activities in Cloud, use of only traditional firewall is not an efficient solution. In this paper, we propose a cooperative and hybrid network intrusion detection system (CH-NIDS) to detect network attacks in the Cloud environment by monitoring network traffic, while maintaining performance and service quality. In our NIDS framework, we use Snort as a signature based detection to detect known attacks, while for detecting network anomaly, we use Back-Propagation Neural network (BPN). By applying snort prior to the BPN classifier, BPN has to detect only unknown attacks. So, detection time is reduced. To solve the problem of slow convergence of BPN and being easy to fall into local optimum, we propose to optimize the parameters of it by using an optimization algorithm in order to ensure high detection rate, high accuracy, low false positives and low false negatives with affordable computational cost. In addition, in this framework, the IDSs operate in cooperative way to oppose the DoS and DDoS attacks by sharing alerts stored in central log. In this way, unknown attacks that were detected by any IDS can easily be detected by others IDSs. This also helps to reduce computational cost for detecting intrusions at others IDS, and improve detection rate in overall the Cloud environment. (C) 2016 The Authors. Published by Elsevier B.V.
In this paper, we firstly introduce a new combined approach to enhance the performance of classification in network traffic. The proposed combination mainly focuses on taking advantages of two classification algorithm...
详细信息
In real-time high dimensions optimization problem, how to quickly find the optimal solution and give timely response or decisive adjustment is very important. Inspired by the mutual parasitic behaviors, this paper sug...
详细信息
Sedentary lifestyle and recent advancement in physiological low powered sensors triggers the concept of Wireless Body Area Networks (WBAN) for efficient healthcare system. Proliferation of Cloud computingtechnology m...
详细信息
We develop a new accelerated stochastic gradient method for efficiently solving the convex regularized empirical risk minimization problem in mini-batch settings. The use of mini-batches has become a golden standard i...
ISBN:
(纸本)9781510860964
We develop a new accelerated stochastic gradient method for efficiently solving the convex regularized empirical risk minimization problem in mini-batch settings. The use of mini-batches has become a golden standard in the machine learning community, because the mini-batch techniques stabilize the gradient estimate and can easily make good use of parallel computing. The core of our proposed method is the incorporation of our new "double acceleration" technique and variance reduction technique. We theoretically analyze our proposed method and show that our method much improves the mini-batch efficiencies of previous accelerated stochastic methods, and essentially only needs size √n mini-batches for achieving the optimal iteration complexities for both non-strongly and strongly convex objectives, where n is the training set size. Further, we show that even in non-mini-batch settings, our method achieves the best known convergence rate for non-strongly convex and strongly convex objectives.
The brain-computer interface (BCI), identify brain patterns to translate thoughts into action. The identification relies on the performance of the classifier. In this paper identification of electroencephalogram (EEG)...
详细信息
In the age of smart and connected vehicles, there are significant issues in providing security for in-vehicle networking. Many security efforts for in-vehicle networks are still insufficient to build a lightweight sec...
详细信息
暂无评论