In every nation, agriculture has boosted the economy. Agriculture is currently dealing with a number of difficulties, such as irrigation and water management. Crop irrigation plays a crucial role in agricultural produ...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac...
详细信息
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing across the participating entities, a malicious agent may gain access to outsourced data from the cloud environment. A malicious agent is an entity that deliberately breaches the data. This information accessed might be misused or revealed to unauthorized parties. Therefore, data protection and prediction of malicious agents have become a demanding task that needs to be addressed appropriately. To deal with this crucial and challenging issue, this paper presents a Malicious Agent Identification-based Data Security (MAIDS) Model which utilizes XGBoost machine learning classification algorithm for securing data allocation and communication among different participating entities in the cloud system. The proposed model explores and computes intended multiple security parameters associated with online data communication or transactions. Correspondingly, a security-focused knowledge database is produced for developing the XGBoost Classifier-based Malicious Agent Prediction (XC-MAP) unit. Unlike the existing approaches, which only identify malicious agents after data leaks, MAIDS proactively identifies malicious agents by examining their eligibility for respective data access. In this way, the model provides a comprehensive solution to safeguard crucial data from both intentional and non-intentional breaches, by granting data to authorized agents only by evaluating the agent’s behavior and predicting the malicious agent before granting data. The performance of the proposed model is thoroughly evaluated by accomplishing extensive experiments, and the results signify that the MAIDS model predicts the malicious agents with high accuracy, precision, recall, and F1-scores up to 95.55%, 95.30%, 95.50%, and 95.20%, respectively. This enormously enhances the system’s sec
Predictive maintenance: A game changer in infrastructure and vehicle management, and able to cut maintenance expenses and downtime of smart transportation systems. This study explores ways in which smart transportatio...
详细信息
We place a high priority on making sure kids are safe. Yet in the modern world, there are a lot of threats to children's safety and challenges to achieving other safety goals. Parent can't always supervise the...
详细信息
Currently,applications accessing remote computing resources through cloud data centers is the main mode of operation,but this mode of operation greatly increases communication latency and reduces overall quality of se...
详细信息
Currently,applications accessing remote computing resources through cloud data centers is the main mode of operation,but this mode of operation greatly increases communication latency and reduces overall quality of service(QoS)and quality of experience(QoE).Edge computing technology extends cloud service functionality to the edge of the mobile network,closer to the task execution end,and can effectivelymitigate the communication latency ***,the massive and heterogeneous nature of servers in edge computing systems brings new challenges to task scheduling and resource management,and the booming development of artificial neural networks provides us withmore powerfulmethods to alleviate this ***,in this paper,we proposed a time series forecasting model incorporating Conv1D,LSTM and GRU for edge computing device resource scheduling,trained and tested the forecasting model using a small self-built dataset,and achieved competitive experimental results.
T- Data classification and extraction are fundamental tasks in the field of computer vision and data analysis. This abstract presents an overview of these concepts along with the utilization of Python and OpenCV, a po...
详细信息
Recent years have witnessed notable progressions in facial recognition technology which have been led by the inception of deep learning models-primarily Siamese Neural Networks. This article delves into the use of Sia...
详细信息
Objective: The objective is to develop a generalized deep learning system for sentiment analysis in a feedback system. This implies an intention to create a model that can effectively analyze sentiment across differen...
详细信息
Academic data mining impacts a large number of educational institutions, significantly, playing a prime role in accumulating, studying, and analyzing the academic data. The accumulated academic data can be processed a...
详细信息
The stakeholders of the present education system have a key focus on the chances of on-campus employability of their wards. Since software companies play prominent role as campus recruiters, there is a low demand for ...
详细信息
暂无评论