The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have be...
详细信息
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have been developed to tackle these ***,most conventional Intrusion Detection System(IDS)models struggle with unseen cyberattacks and complex high-dimensional *** fact,this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system,named INTRUMER,which offers balanced accuracy,reliability,and security in cloud settings bymultiplemodulesworking together within *** traffic captured from cloud devices is first passed to the TC&TM module in which the Falcon Optimization Algorithm optimizes the feature selection process,and Naie Bayes algorithm performs the classification of *** selected features are classified further and are forwarded to the Heterogeneous Attention Transformer(HAT)*** this module,the contextual interactions of the network traffic are taken into account to classify them as normal or malicious *** classified results are further analyzed by the Explainable Prevention Module(XPM)to ensure trustworthiness by providing interpretable *** the explanations fromthe classifier,emergency alarms are transmitted to nearby IDSmodules,servers,and underlying cloud devices for the enhancement of preventive *** experiments on benchmark IDS datasets CICIDS 2017,Honeypots,and NSL-KDD were conducted to demonstrate the efficiency of the INTRUMER model in detecting network trafficwith high accuracy for different *** outperforms state-of-the-art approaches,obtaining better performance metrics:98.7%accuracy,97.5%precision,96.3%recall,and 97.8%*** results validate the robustness and effectiveness of INTRUMER in securing diverse cloud environments against sophisticated cyber threats.
In recent times, AI and UAV have progressed significantly in several applications. This article analyzes applications of UAV with modern green computing in various sectors. It addresses cutting-edge technologies such ...
详细信息
Lung cancer is the most lethal form of cancer. This paper introduces a novel framework to discern and classify pulmonary disorders such as pneumonia, tuberculosis, and lung cancer by analyzing conventional X-ray and C...
详细信息
Software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty *** are exploring machine learning to predict softwa...
详细信息
Software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty *** are exploring machine learning to predict software bugs,but a more precise and general approach is *** bug prediction is crucial for software evolution and user training,prompting an investigation into deep and ensemble learning ***,these studies are not generalized and efficient when extended to other ***,this paper proposed a hybrid approach combining multiple techniques to explore their effectiveness on bug identification *** methods involved feature selection,which is used to reduce the dimensionality and redundancy of features and select only the relevant ones;transfer learning is used to train and test the model on different datasets to analyze how much of the learning is passed to other datasets,and ensemble method is utilized to explore the increase in performance upon combining multiple classifiers in a *** National Aeronautics and Space Administration(NASA)and four Promise datasets are used in the study,showing an increase in the model’s performance by providing better Area Under the Receiver Operating Characteristic Curve(AUC-ROC)values when different classifiers were *** reveals that using an amalgam of techniques such as those used in this study,feature selection,transfer learning,and ensemble methods prove helpful in optimizing the software bug prediction models and providing high-performing,useful end mode.
Link prediction in complex networks is a fundamental problem with applications in diverse domains, from social networks to biological systems. Traditional approaches often struggle to capture intricate relationships i...
详细信息
Recently, image inpainting has been proposed as a solution for restoring the polluted image in the field of computer vision. Further, face inpainting is a subfield of image inpainting, which refers to a set of image e...
详细信息
With artificial intelligence propelling rapid technological advances, many tools and frameworks have surfaced to assist virtual learning settings. They all make unique claims about how best to facilitate distance educ...
详细信息
Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex *** Architecture is one of the recent technique...
详细信息
Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex *** Architecture is one of the recent techniques in which Enterprise Systems can be developed as fine-grained smaller components and deployed *** methodology brings numerous benefits like scalability,resilience,flexibility in development,faster time to market,*** the advantages;Microservices bring some challenges *** microservices need to be invoked one by one as a *** most applications,more than one chain of microservices runs in parallel to complete a particular requirement To complete a user’s *** results in competition for resources and the need for more inter-service communication among the services,which increases the overall latency of the application.A new approach has been proposed in this paper to handle a complex chain of microservices and reduce the latency of user requests.A machine learning technique is followed to predict the weighting time of different types of *** communication time among services distributed among different physical machines are estimated based on that and obtained insights are applied to an algorithm to calculate their priorities dynamically and select suitable service instances to minimize the latency based on the shortest queue waiting *** were done for both interactive as well as non interactive workloads to test the effectiveness of the *** approach has been proved to be very effective in reducing latency in the case of long service chains.
Potatoes are one of the world's most popular and economically important crops. For many uses in agriculture, breeding, and trading, accurate recognition of potato breeds is important. In recent years, deep learnin...
详细信息
In a cloud environment,graphics processing units(GPUs)are the primary devices used for high-performance *** exploit flexible resource utilization,a key advantage of cloud *** users share GPUs,which serve as coprocesso...
详细信息
In a cloud environment,graphics processing units(GPUs)are the primary devices used for high-performance *** exploit flexible resource utilization,a key advantage of cloud *** users share GPUs,which serve as coprocessors of central processing units(CPUs)and are activated only if tasks demand GPU *** a container environment,where resources can be shared among multiple users,GPU utilization can be increased by minimizing idle time because the tasks of many users run on a single ***,unlike CPUs and memory,GPUs cannot logically multiplex their ***,GPU memory does not support over-utilization:when it runs out,tasks will ***,it is necessary to regulate the order of execution of concurrently running GPU tasks to avoid such task failures and to ensure equitable GPU sharing among *** this paper,we propose a GPU task execution order management technique that controls GPU usage via time-based *** technique seeks to ensure equal GPU time among users in a container environment to prevent task *** the meantime,we use a deferred processing method to prevent GPU memory shortages when GPU tasks are executed simultaneously and to determine the execution order based on the GPU usage *** the order of GPU tasks cannot be externally adjusted arbitrarily once the task commences,the GPU task is indirectly paused by pausing the *** addition,as container pause/unpause status is based on the information about the available GPU memory capacity,overuse of GPU memory can be prevented at the *** a result,the strategy can prevent task failure and the GPU tasks can be experimentally processed in appropriate order.
暂无评论