We are now living in the era of big data thanks to technological innovation. It is very important to discover valuable information in massive data. High utility itemset mining and frequent itemset mining are commonly ...
详细信息
This paper introduces a novel telehealth communication system, designed to enhance the security and integrity of medical data exchange. In the rapidly evolving digital healthcare landscape, the protection of sensitive...
详细信息
In this study, the performance and emissions of Al2O3 alkaline cottonseed biodiesel-powered compression ignition engines were predicted. An experiment was conducted using different biodiesel blends made from cottonsee...
详细信息
We study a temporal step size control of explicit Runge-Kutta(RK)methods for com-pressible computational fluid dynamics(CFD),including the Navier-Stokes equations and hyperbolic systems of conservation laws such as th...
详细信息
We study a temporal step size control of explicit Runge-Kutta(RK)methods for com-pressible computational fluid dynamics(CFD),including the Navier-Stokes equations and hyperbolic systems of conservation laws such as the Euler *** demonstrate that error-based approaches are convenient in a wide range of applications and compare them to more classical step size control based on a Courant-Friedrichs-Lewy(CFL)*** numerical examples show that the error-based step size control is easy to use,robust,and efficient,e.g.,for(initial)transient periods,complex geometries,nonlinear shock captur-ing approaches,and schemes that use nonlinear entropy *** demonstrate these properties for problems ranging from well-understood academic test cases to industrially relevant large-scale computations with two disjoint code bases,the open source Julia pack-ages *** with *** and the C/Fortran code SSDC based on PETSc.
Recent research has demonstrated that Non-Identically Distributed (Non-IID) data can negatively impact the performance of global models constructed in federated learning. To address this concern, multiple approaches h...
详细信息
A network intrusion detection system is critical for cyber security against llegitimate *** terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcat...
详细信息
A network intrusion detection system is critical for cyber security against llegitimate *** terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcategory of attack,host information,malicious scripts,*** terms of network perspectives,network traffic may contain an imbalanced number of harmful attacks when compared to normal *** is challenging to identify a specific attack due to complex features and data imbalance *** address these issues,this paper proposes an Intrusion Detection System using transformer-based transfer learning for Imbalanced Network Traffic(IDS-INT).IDS-INT uses transformer-based transfer learning to learn feature interactions in both network feature representation and imbalanced ***,detailed information about each type of attack is gathered from network interaction descriptions,which include network nodes,attack type,reference,host information,***,the transformer-based transfer learning approach is developed to learn detailed feature representation using their semantic ***,the Synthetic Minority Oversampling Technique(SMOTE)is implemented to balance abnormal traffic and detect minority ***,the Convolution Neural Network(CNN)model is designed to extract deep features from the balanced network ***,the hybrid approach of the CNN-Long Short-Term Memory(CNN-LSTM)model is developed to detect different types of attacks from the deep *** experiments are conducted to test the proposed approach using three standard datasets,i.e.,UNsWNB15,CIC-IDS2017,and *** explainable AI approach is implemented to interpret the proposed method and develop a trustable model.
The development of the Internet has brought convenience to people, but also caused security risks. How to establish a protection system that can not only effectively prevent computer network(CN)s from being attacked b...
详细信息
This paper concerns the project and implementation of a cryptographic tool based on the Catalan sequence. It explains the beginnings of cryptography and how people’s approach to transmitting messages has changed over...
详细信息
In the software landscape,understanding component impacts on system reliability is pivotal,especially given the unique complexities of modern software *** paper presents a model tailored for software reliability *** a...
详细信息
In the software landscape,understanding component impacts on system reliability is pivotal,especially given the unique complexities of modern software *** paper presents a model tailored for software reliability *** approach introduces the“component influence”to measure a single component’s effect on overall system ***,we adapt a state transition model to cater to the diverse architectures of software *** a discrete-time Markov chain,we predict software *** test our model on an actual software system,finding it notably accurate and superior to existing *** work offers a promising direction for those venturing into software reliability enhancement.
This paper is designed to provide a comprehensive overview of the latest developments in fault tolerance methods for cloud computing. Maintaining high availability and reliability of cloud environments requires fault ...
详细信息
暂无评论