Most social networks allow connections amongst many people based on shared *** networks have to offer shared data like videos,photos with minimum latency to the group,which could be challenging as the storage cost has...
详细信息
Most social networks allow connections amongst many people based on shared *** networks have to offer shared data like videos,photos with minimum latency to the group,which could be challenging as the storage cost has to be minimized and hence entire data replication is not a *** replication of data across a network of read-intensive can potentially lead to increased savings in cost and energy and reduce the end-user’s response *** simple and adaptive replication strategies exist,the solution is non-deter-ministic;the replicas of the data need to be optimized to the data usability,perfor-mance,and stability of the application *** resolve the non-deterministic issue of replication,metaheuristics are *** this work,Harmony Search and Tabu Search algorithms are used optimizing the replication process.A novel Har-mony-Tabu search is proposed for effective placement and replication of *** on large datasets show the effectiveness of the proposed *** is seen that the bandwidth saving for proposed harmony-Tabu replication per-forms better in the range of 3.57%to 18.18%for varying number of cloud data-centers when compared to simple replication,Tabu replication and Harmony replication algorithm.
Recommendation systems (RS) have become prevalent across different domains including music, e-commerce, e-learning, entertainment, and social media to address the issue of information overload. While traditional RS ap...
详细信息
The size of the medical information system is growing gradually. Due to this, traditional data analysis for extracting helpful information for any disease has become inefficient in providing accurate real-time valid i...
详细信息
Background: Epilepsy is a neurological disorder that leads to seizures. This occurs due to excessive electrical discharge by the brain cells. An effective seizure prediction model can aid in improving the lifestyle of...
详细信息
The detection of violence in videos has become an extremely valuable application in real-life situations, which aim to maintain and protect people’s safety. Despite the complexities inherent in videos and the abrupt ...
详细信息
In this study, tests were done to see what would happen if hydrogen (H2) and lemon grass oil (LO) were used for a lone-cylinder compression ignition engine as a partial diesel replacement. After starting the trial wit...
详细信息
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrela...
详细信息
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrelated or the original one,when tampering has no ***,standard version of non-malleable codes provide security against one time tampering *** ciphers are successfully employed in the construction of non-malleable *** construction fails to provide security when an adversary tampers the codeword more than *** non-malleable codes further allow an attacker to tamper the message for polynomial number of *** this work,we propose continuous version of non-malleable codes from block ciphers in split-state *** construction provides security against polynomial number of tampering attacks and it preserves *** the tam-pering experiment triggers self-destruct,the security of continuously non-malleable code reduces to security of the underlying leakage resilient storage.
The missing readings in various sensors of air pollution monitoring stations is a common issue. Those missing sensor readings may greatly influence the performance of monitoring and analysis of air pollution data. To ...
详细信息
Medical imaging, a cornerstone of disease diagnosis and treatment planning, faces the hurdles of subjective interpretation and reliance on specialized expertise. Deep learning algorithms show improvements in automatin...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
暂无评论