In general, cloud security is capable of providing various information, applications, services, etc. using extensive policies and progressive technologies. On the other hand, loss of data, confidentiality breaches, an...
详细信息
Presently,video surveillance is commonly employed to ensure security in public places such as traffic signals,malls,railway stations,etc.A major chal-lenge in video surveillance is the identification of anomalies that...
详细信息
Presently,video surveillance is commonly employed to ensure security in public places such as traffic signals,malls,railway stations,etc.A major chal-lenge in video surveillance is the identification of anomalies that exist in it such as crimes,thefts,and so ***,the anomaly detection in pedestrian walkways has gained significant attention among the computer vision communities to enhance pedestrian *** recent advances of Deep Learning(DL)models have received considerable attention in different processes such as object detec-tion,image classification,*** this aspect,this article designs a new Panoptic Feature Pyramid Network based Anomaly Detection and Tracking(PFPN-ADT)model for pedestrian *** proposed model majorly aims to the recognition and classification of different anomalies present in the pedestrian walkway like vehicles,skaters,*** proposed model involves panoptic seg-mentation model,called Panoptic Feature Pyramid Network(PFPN)is employed for the object recognition *** object classification,Compact Bat Algo-rithm(CBA)with Stacked Auto Encoder(SAE)is applied for the classification of recognized *** ensuring the enhanced results better anomaly detection performance of the PFPN-ADT technique,a comparison study is made using Uni-versity of California San Diego(UCSD)Anomaly data and other benchmark data-sets(such as Cityscapes,ADE20K,COCO),and the outcomes are compared with the Mask Recurrent Convolutional Neural Network(RCNN)and Faster Convolu-tional Neural Network(CNN)*** simulation outcome demonstrated the enhanced performance of the PFPN-ADT technique over the other methods.
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by pati...
详细信息
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by patient *** third technique translates ECG impulses into Q waves,R waves and S waves(QRS)features using richer *** ECG signals vary naturally between humans and activities,we will combine the three feature selection methods to improve classification accuracy and *** using all three approaches have not been examined till *** researchers found that Machine Learning(ML)techniques can improve ECG *** study will compare popular machine learning techniques to evaluate ECG *** algorithms—Support Vector Machine(SVM),Decision Tree,Naive Bayes,and Neural Network—compare categorization *** plus prior knowledge has the highest accuracy(99%)of the four ML *** characteristics failed to identify signals without chaos *** 99.8%classification accuracy,the Decision Tree technique outperformed all previous experiments.
The application of noninvasive methods to enhance healthcare systems has been facilitated by the development of new technology. Among the four major cardiovascular diseases, stroke is one of the deadliest and potentia...
详细信息
In recent times, the system's mathematical expression and operation have gained greater reach in engineering and mathematics. It is vital to solving more complex expressions and equations in a short time. The most...
详细信息
Nomadic Vehicular Cloud(NVC)is envisaged in this *** predo-minant aspects of NVC is,it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road ...
详细信息
Nomadic Vehicular Cloud(NVC)is envisaged in this *** predo-minant aspects of NVC is,it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road without relying on any of the static infrastructure and NVC decides the initiation time of container migration using cell transmission model(CTM).Containers are used in the place of Virtual Machines(VM),as containers’features are very apt to NVC’s dynamic *** specifications of 5G NR V2X PC5 interface are applied to NVC,for the feature of not relying on the network ***-days,the peak traffic on the road and the bottlenecks due to it are inevitable,which are seen here as the benefits for VC in terms of resource availability and residual in-network *** speed range of high-end vehicles poses the issue of dis-connectivity among VC participants,that results the container migration *** the entire VC participants are on the move,to maintain proximity of the containers hosted by them,estimating their movements plays a vital *** infer the vehicle movements on the road stretch and initiate the container migration prior enough to avoid the migration failure due to vehicles dynamicity,this paper proposes to apply the CTM to the container based and 5G NR V2X enabled *** simulation results show that there is a significant increase in the success rate of vehicular cloud in terms of successful container migrations.
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets ...
详细信息
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected *** detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual *** learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device *** addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to *** ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT *** overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)*** GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT *** data preprocessing,the min-max data normalization approach is primarily *** GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature ***,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet ***,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM *** experimental validation of the GTODL-BADC technique can be tested on a benchmark *** simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process.
In cloud data centers,the consolidation of workload is one of the phases during which the available hosts are allocated *** phenomenon ensures that the least possible number of hosts is used without compromise in meet...
详细信息
In cloud data centers,the consolidation of workload is one of the phases during which the available hosts are allocated *** phenomenon ensures that the least possible number of hosts is used without compromise in meeting the Service Level Agreement(SLA).To consolidate the workloads,the hosts are segregated into three categories:normal hosts,under-loaded hosts,and over-loaded hosts based on their *** is to be noted that the identification of an extensively used host or underloaded host is challenging to ***-old values were proposed in the literature to detect this *** current study aims to improve the existing methods that choose the underloaded hosts,get rid of Virtual Machines(VMs)from them,andfinally place them in some other *** researcher proposes a Host Resource Utilization Aware(HRUAA)Algorithm to detect those underloaded and place its virtual machines on different hosts in a vibrant Cloud *** mechanism presented in this study is contrasted with existing mechanisms *** results attained from the study estab-lish that numerous hosts can be shut down,while at the same time,the user's workload requirement can also be *** proposed method is energy-efficient in workload consolidation,saves cost and time,and leverages active hosts.
This paper suggests a new mechanism from deep learning concept for personalised therapy in Clinical Decision Support Systems (CDSS). Basically, the texts used for the observation are acquired from the standard data so...
详细信息
暂无评论