The healthcare industry has witnessed an increase in the use of cloud storage, resulting in a significant demand for safeguarding medical records from potential attackers. In response to this challenge, reversible dat...
详细信息
This article presents LoRaDIP, a novel low-light image enhancement (LLIE) model based on deep image priors (DIPs). While DIP-based enhancement models are known for their zero-shot learning, their expensive computation...
详细信息
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have be...
详细信息
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have been developed to tackle these ***,most conventional Intrusion Detection System(IDS)models struggle with unseen cyberattacks and complex high-dimensional *** fact,this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system,named INTRUMER,which offers balanced accuracy,reliability,and security in cloud settings bymultiplemodulesworking together within *** traffic captured from cloud devices is first passed to the TC&TM module in which the Falcon Optimization Algorithm optimizes the feature selection process,and Naie Bayes algorithm performs the classification of *** selected features are classified further and are forwarded to the Heterogeneous Attention Transformer(HAT)*** this module,the contextual interactions of the network traffic are taken into account to classify them as normal or malicious *** classified results are further analyzed by the Explainable Prevention Module(XPM)to ensure trustworthiness by providing interpretable *** the explanations fromthe classifier,emergency alarms are transmitted to nearby IDSmodules,servers,and underlying cloud devices for the enhancement of preventive *** experiments on benchmark IDS datasets CICIDS 2017,Honeypots,and NSL-KDD were conducted to demonstrate the efficiency of the INTRUMER model in detecting network trafficwith high accuracy for different *** outperforms state-of-the-art approaches,obtaining better performance metrics:98.7%accuracy,97.5%precision,96.3%recall,and 97.8%*** results validate the robustness and effectiveness of INTRUMER in securing diverse cloud environments against sophisticated cyber threats.
In 2018, there were 1 million occurrences of non-melanoma cancer and 288,000 occurrences of malignant skin cancer (MM) recorded worldwide. Given the aging of the population and limited resources for medical care, a co...
详细信息
Lung cancer is the most lethal form of cancer. This paper introduces a novel framework to discern and classify pulmonary disorders such as pneumonia, tuberculosis, and lung cancer by analyzing conventional X-ray and C...
详细信息
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must...
详细信息
Machine learning (ML) with data analysis has many successful applications and is widely employed daily. Additionally, they have played a significant role in combating the global coronavirus (COVID-19) outbreak. Intern...
详细信息
Background In recent years,the demand for interactive photorealistic three-dimensional(3D)environments has increased in various fields,including architecture,engineering,and ***,achieving a balance between the quality...
详细信息
Background In recent years,the demand for interactive photorealistic three-dimensional(3D)environments has increased in various fields,including architecture,engineering,and ***,achieving a balance between the quality and efficiency of high-performance 3D applications and virtual reality(VR)remains *** This study addresses this issue by revisiting and extending view interpolation for image-based rendering(IBR),which enables the exploration of spacious open environments in 3D and ***,we introduce multimorphing,a novel rendering method based on the spatial data structure of 2D image patches,called the image *** this approach,novel views can be rendered with up to six degrees of freedom using only a sparse set of *** rendering process does not require 3D reconstruction of the geometry or per-pixel depth information,and all relevant data for the output are extracted from the local morphing cells of the image *** detection of parallax image regions during preprocessing reduces rendering artifacts by extrapolating image patches from adjacent cells in *** addition,a GPU-based solution was presented to resolve exposure inconsistencies within a dataset,enabling seamless transitions of brightness when moving between areas with varying light *** Experiments on multiple real-world and synthetic scenes demonstrate that the presented method achieves high"VR-compatible"frame rates,even on mid-range and legacy hardware,*** achieving adequate visual quality even for sparse datasets,it outperforms other IBR and current neural rendering *** Using the correspondence-based decomposition of input images into morphing cells of 2D image patches,multidimensional image morphing provides high-performance novel view generation,supporting open 3D and VR ***,the handling of morphing artifacts in the parallax image regions remains a topic for future resea
Parkinson's disease (PD) diagnosis involves the assessment of a variety of motor and non-motor symptoms. To accurately diagnose PD, it is necessary to differentiate its symptoms from those of other conditions. Dur...
详细信息
In recent years, agent technology has been used increasingly in information management and distributed computing. A CSE curriculum that cultivates the knowledge of agent technology will increase the likelihood that th...
ISBN:
(纸本)9781581132076
In recent years, agent technology has been used increasingly in information management and distributed computing. A CSE curriculum that cultivates the knowledge of agent technology will increase the likelihood that the next generation of IT professionals have the background needed to design and develop software systems that are scalable, reliable, adaptable, and secure. In this paper, we present the rationale and our practice in incorporating agent technology into the CSE curriculum. We develop agent-based teaching materials and software modules and apply them to existing CSE courses including artificial intelligence, parallel and distributed processing, networking, and software engineering. Promising results have been obtained in teaching two graduate level courses using agent components.
暂无评论