Cyber-attacks and intrusions in networks refer to malicious activities that breach or damage data. These activities include direct attacks, such as denial-of-service (DoS) attacks, which overwhelm servers with request...
详细信息
With the continuous growth of cloud computing and virtualization technology, network function virtualization (NFV) techniques have been significantly enhanced. NFV has many advantages such as simplified services, prov...
详细信息
With the continuous growth of cloud computing and virtualization technology, network function virtualization (NFV) techniques have been significantly enhanced. NFV has many advantages such as simplified services, providing more flexible services, and reducing network capital and operational costs. However, it also poses new challenges that need to be addressed. A challenging problem with NFV is resource management, since the resources required by each virtualized network function (VNF) change with dynamic traffic variations, requiring automatic scaling of VNF resources. Due to the resource consumption importance, it is essential to propose an efficient resource auto-scaling method in the NFV networks. Inadequate or excessive utilization of VNF resources can result in diminished performance of the entire service chain, thereby affecting network performance. Therefore, predicting VNF resource requirements is crucial for meeting traffic demands. VNF behavior in networks is complex and nonlinear, making it challenging to model. By incorporating machine learning methods into resource prediction models, network service performance can be improved by addressing this complexity. As a result, this paper introduces a new auto-scaling architecture and algorithm to tackle the predictive VNF problem. Within the proposed architecture, there is a predictive VNF auto-scaling engine that comprises two modules: a predictive task scheduler and a predictive VNF auto-scaler. Furthermore, a prediction engine with a VNF resource predictor module has been designed. In addition, the proposed algorithm called GPAS is presented in three phases, VNF resource prediction using genetic programming (GP) technique, task scheduling and decision-making, and auto-scaling execution. The GPAS method is simulated in the KSN framework, a network environment based on NFV/SDN. In the evaluation results, the GPAS method shows better performance in SLA violation rate, resource usage, and response time when co
Keyword search in relational databases allows the users to query these databases using natural language keywords, bridging the gap between structured data and intuitive querying. However, ambiguity in user queries as ...
详细信息
Effective management of electricity consumption (EC) in smart buildings (SBs) is crucial for optimizing operational efficiency, cost savings, and ensuring sustainable resource utilization. Accurate EC prediction enabl...
详细信息
The paper addresses the critical problem of application workflow offloading in a fog environment. Resource constrained mobile and Internet of Things devices may not possess specialized hardware to run complex workflow...
详细信息
Earthquakes have the potential to cause catastrophic structural and economic damage. This research explores the application of machine learning for earthquake prediction using LANL (Los Alamos National Laboratory) dat...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a significant *** development of secure communication methods that keep recipient-only data transmissions secret has always been an area of ***,several approaches,including steganography,have been developed by researchers over time to enable safe data *** this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,*** have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)*** this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this *** encoding the data and embedding it into a carry image,this review verifies that it has been ***,embedded text in photos conveys crucial signals about the *** review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data *** the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
With advancements in technology, the study of data hiding (DH) in images has become more and more important. In this paper, we introduce a novel data hiding scheme that employs a voting strategy to predict pixels base...
详细信息
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher...
详细信息
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inherent biases and computational burdens, especially when used to relax the rank function, making them less effective and efficient in real-world scenarios. To address these challenges, our research focuses on generalized nonconvex rank regularization problems in robust matrix completion, low-rank representation, and robust matrix regression. We introduce innovative approaches for effective and efficient low-rank matrix learning, grounded in generalized nonconvex rank relaxations inspired by various substitutes for the ?0-norm relaxed functions. These relaxations allow us to more accurately capture low-rank structures. Our optimization strategy employs a nonconvex and multi-variable alternating direction method of multipliers, backed by rigorous theoretical analysis for complexity and *** algorithm iteratively updates blocks of variables, ensuring efficient convergence. Additionally, we incorporate the randomized singular value decomposition technique and/or other acceleration strategies to enhance the computational efficiency of our approach, particularly for large-scale constrained minimization problems. In conclusion, our experimental results across a variety of image vision-related application tasks unequivocally demonstrate the superiority of our proposed methodologies in terms of both efficacy and efficiency when compared to most other related learning methods.
暂无评论