Techniques that exploit spectral-spatial information have proven to be very effective in hyperspectral image classification. Joint sparse representation classification (JSRC) is one such technique which has been exten...
详细信息
In this article, we present the first rigorous theoretical analysis of the generalisation performance of a Geometric Semantic Genetic Programming (GSGP) system. More specifically, we consider a hill-climber using the ...
详细信息
The flexibility and scale of networks achievable by modern cloud computer architectures, particularly Kubernetes (K8s)-based applications, are rivaled only by the resulting complexity required to operate at scale in a...
详细信息
The Feasibility Area (FA) in power system applications defines the region within which Power System State Variables (PSSVs) typically exist under normal operating conditions. Accurate characterization of the FA helps ...
详细信息
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv...
详细信息
Most social networks allow connections amongst many people based on shared *** networks have to offer shared data like videos,photos with minimum latency to the group,which could be challenging as the storage cost has...
详细信息
Most social networks allow connections amongst many people based on shared *** networks have to offer shared data like videos,photos with minimum latency to the group,which could be challenging as the storage cost has to be minimized and hence entire data replication is not a *** replication of data across a network of read-intensive can potentially lead to increased savings in cost and energy and reduce the end-user’s response *** simple and adaptive replication strategies exist,the solution is non-deter-ministic;the replicas of the data need to be optimized to the data usability,perfor-mance,and stability of the application *** resolve the non-deterministic issue of replication,metaheuristics are *** this work,Harmony Search and Tabu Search algorithms are used optimizing the replication process.A novel Har-mony-Tabu search is proposed for effective placement and replication of *** on large datasets show the effectiveness of the proposed *** is seen that the bandwidth saving for proposed harmony-Tabu replication per-forms better in the range of 3.57%to 18.18%for varying number of cloud data-centers when compared to simple replication,Tabu replication and Harmony replication algorithm.
This paper proposes a Poor and Rich Squirrel Algorithm (PRSA)-based Deep Maxout network to find fraud data transactions in the credit card system. Initially, input transaction data is passed to the data transformation...
详细信息
A sustainably governed water-ecosystem at village-level is crucial for the community's well-being. It requires understanding natures’ limits to store and yield water and balance it with the stakeholders’ needs, ...
详细信息
作者:
A.E.M.EljialyMohammed Yousuf UddinSultan AhmadDepartment of Information Systems
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i...
详细信息
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected.
Vehicular consumer electronics, such as autonomous vehicles (AVs), need collecting large amounts of private user information, which face the risk of privacy leakage. To protect the privacy of consumers, researchers ha...
详细信息
暂无评论