Data centers are being distributed worldwide by cloud service providers(CSPs)to save energy costs through efficient workload alloca-tion *** CSPs are challenged by the significant rise in user demands due to their ext...
详细信息
Data centers are being distributed worldwide by cloud service providers(CSPs)to save energy costs through efficient workload alloca-tion *** CSPs are challenged by the significant rise in user demands due to their extensive energy consumption during workload *** research studies have examined distinct operating cost mitigation techniques for geo-distributed data centers(DCs).However,oper-ating cost savings during workload processing,which also considers string-matching techniques in geo-distributed DCs,remains *** this research,we propose a novel string matching-based geographical load balanc-ing(SMGLB)technique to mitigate the operating cost of the geo-distributed *** primary goal of this study is to use a string-matching algorithm(i.e.,Boyer Moore)to compare the contents of incoming workloads to those of documents that have already been processed in a data center.A successful match prevents the global load balancer from sending the user’s request to a data center for processing and displaying the results of the previously processed workload to the user to save *** the contrary,if no match can be discovered,the global load balancer will allocate the incoming workload to a specific DC for processing considering variable energy prices,the number of active servers,on-site green energy,and traces of incoming *** results of numerical evaluations show that the SMGLB can minimize the operating expenses of the geo-distributed data centers more than the existing workload distribution techniques.
In recent years, there have been several attempts to help visually impaired and illiterate people to overcome their reading limitations through developing different applications. However, most of these applications ar...
详细信息
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly prominent.A piece of code,known as a Webshell,is usually uploaded to the target servers to achieve multiple *** Webshell attacks has become a hot spot in current ***,the traditional Webshell detectors are not built for the cloud,making it highly difficult to play a defensive role in the cloud ***,a Webshell detection system based on deep learning that is successfully applied in various scenarios,is proposed in this *** system contains two important components:gray-box and neural network *** gray-box analyzer defines a series of rules and algorithms for extracting static and dynamic behaviors from the code to make the decision *** neural network analyzer transforms suspicious code into Operation Code(OPCODE)sequences,turning the detection task into a classification *** experiment results show that SmartEagleEye achieves an encouraging high detection rate and an acceptable false-positive rate,which indicate its capability to provide good protection for the cloud environment.
The purpose of much research in the hybrid classification area is to reduce the number of deep features. However, many approaches overlook the relation between deep features and specific classes or diseases. This stud...
详细信息
The importance of object detection within computer vision, especially in the context of detecting small objects, has notably increased. This thorough survey extensively examines small object detection across various a...
详细信息
Advances in machine vision systems have revolutionized applications such as autonomous driving,robotic navigation,and augmented *** substantial progress,challenges persist,including dynamic backgrounds,occlusion,and l...
详细信息
Advances in machine vision systems have revolutionized applications such as autonomous driving,robotic navigation,and augmented *** substantial progress,challenges persist,including dynamic backgrounds,occlusion,and limited labeled *** address these challenges,we introduce a comprehensive methodology toenhance image classification and object detection *** proposed approach involves the integration ofmultiple methods in a complementary *** process commences with the application of Gaussian filters tomitigate the impact of noise *** images are then processed for segmentation using Fuzzy C-Meanssegmentation in parallel with saliency mapping techniques to find the most prominent *** Binary RobustIndependent Elementary Features(BRIEF)characteristics are then extracted fromdata derived fromsaliency mapsand segmented *** precise object separation,Oriented FAST and Rotated BRIEF(ORB)algorithms *** Algorithms(GAs)are used to optimize Random Forest classifier parameters which lead toimproved *** method stands out due to its comprehensive approach,adeptly addressing challengessuch as changing backdrops,occlusion,and limited labeled data concurrently.A significant enhancement hasbeen achieved by integrating Genetic Algorithms(GAs)to precisely optimize *** minor adjustmentnot only boosts the uniqueness of our system but also amplifies its overall *** proposed methodologyhas demonstrated notable classification accuracies of 90.9%and 89.0%on the challenging Corel-1k and MSRCdatasets,***,detection accuracies of 87.2%and 86.6%have been *** ourmethod performed well in both datasets it may face difficulties in real-world data especially where datasets havehighly complex *** these limitations,GAintegration for parameter optimization shows a notablestrength in enhancing the overall adaptability and performance of our system.
In academic institutions, processing and evaluating documents such as exam scripts remains a labor-intensive process susceptible to human error. Traditional digitization systems face significant challenges in handling...
详细信息
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless ***,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to impl...
详细信息
The Internet of Things(IoT)is a growing technology that allows the sharing of data with other devices across wireless ***,IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT *** this framework,a Covariance Linear Learning Embedding Selection(CL2ES)methodology is used at first to extract the features highly associated with the IoT ***,the Kernel Distributed Bayes Classifier(KDBC)is created to forecast attacks based on the probability distribution value *** addition,a unique Mongolian Gazellas Optimization(MGO)algorithm is used to optimize the weight value for the learning of the *** effectiveness of the proposed CL2ES-KDBC framework has been assessed using several IoT cyber-attack datasets,The obtained results are then compared with current classification methods regarding accuracy(97%),precision(96.5%),and other *** analysis of the CL2ES-KDBC system on IoT intrusion datasets is performed,which provides valuable insight into its performance,efficiency,and suitability for securing IoT networks.
Image captioning is a technique that generates concise and meaningful descriptions of the visual contents present in an image. Image captioning frameworks generally employ an encoder-decoder-based pipeline to generate...
详细信息
暂无评论