The architecture of integrating Software Defined Networking (SDN) with Network Function Virtualization (NFV) is excellent because the former virtualizes the control plane, and the latter virtualizes the data plane. As...
详细信息
This article proposes a proactive crowdsourced monitoring and sensing (PCMS) framework with the designed Smart iBeacon device to accurately recognize the activities of an equipped target, exclusively customize the rec...
详细信息
Handwriting is an important skill for children during their academic years. It is the coordination of perceptual-motor and cognitive abilities. Some children have difficulties in handwriting, which is an indication of...
详细信息
Robust fake speech detection systems are crucial in an era where audio recordings can be easily altered or developed due to advancements in technology. The potential impact of this technology could be devastating due ...
详细信息
- Distributed denial-of-service (DDoS) attacks are the major threat that disrupts the services in the computer system and networks using traffic and targeted sources. So, real-world attack detection techniques are con...
详细信息
Traffic encryption techniques facilitate cyberattackers to hide their presence and *** classification is an important method to prevent network ***,due to the tremendous traffic volume and limitations of computing,mos...
详细信息
Traffic encryption techniques facilitate cyberattackers to hide their presence and *** classification is an important method to prevent network ***,due to the tremendous traffic volume and limitations of computing,most existing traffic classification techniques are inapplicable to the high-speed network *** this paper,we propose a High-speed Encrypted Traffic Classification(HETC)method containing two ***,to efficiently detect whether traffic is encrypted,HETC focuses on randomly sampled short flows and extracts aggregation entropies with chi-square test features to measure the different patterns of the byte composition and distribution between encrypted and unencrypted ***,HETC introduces binary features upon the previous features and performs fine-grained traffic classification by combining these payload features with a Random Forest *** experimental results show that HETC can achieve a 94%F-measure in detecting encrypted flows and a 85%–93%F-measure in classifying fine-grained flows for a 1-KB flow-length dataset,outperforming the state-of-the-art comparison ***,HETC does not need to wait for the end of the flow and can extract mass computing *** average time for HETC to process each flow is only 2 or 16 ms,which is lower than the flow duration in most cases,making it a good candidate for high-speed traffic classification.
Load balancing and scheduling are essential components of cloud computing that aim to optimize resource allocation and utilization. In a cloud environment, multiple virtual machines and applications compete for shared...
详细信息
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various ***,the adoption of cloud storage poses significant risks to data secrecy and *** article presents an effec...
详细信息
Cloud computing has emerged as a viable alternative to traditional computing infrastructures,offering various ***,the adoption of cloud storage poses significant risks to data secrecy and *** article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology,smart contracts,and cryptographic *** proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced *** preserve data secrecy,symmetric encryption systems are employed to encrypt user data before outsourcing *** extensive performance analysis is conducted to illustrate the efficiency of the proposed ***,a rigorous assessment is conducted to ensure that the developed smart contract is free from vulnerabilities and to measure its associated running *** security analysis of the proposed system confirms that our approach can securely maintain the confidentiality and integrity of cloud storage,even in the presence of malicious *** proposed mechanism contributes to enhancing data security in cloud computing environments and can be used as a foundation for developing more secure cloud storage systems.
Skin cancer,a severe health threat,can spread rapidly if ***,early detection can lead to an advanced and efficient diagnosis,thus reducing *** classification techniques analyse extensive skin image datasets,identifyin...
详细信息
Skin cancer,a severe health threat,can spread rapidly if ***,early detection can lead to an advanced and efficient diagnosis,thus reducing *** classification techniques analyse extensive skin image datasets,identifying patterns and anomalies without prior labelling,facilitating early detection and effective diagnosis and potentially saving *** this study,the authors aim to explore the potential of unsupervised learning methods in classifying different types of skin lesions in dermatoscopic *** authors aim to bridge the gap in dermatological research by introducing innovative techniques that enhance image quality and improve feature *** achieve this,enhanced super-resolution generative adversarial networks(ESRGAN)was fine-tuned to strengthen the resolution of skin lesion images,making critical features more *** authors extracted histogram features to capture essential colour characteristics and used the Davies-Bouldin index and silhouette score to determine optimal ***-tuned k-means clustering with Euclidean distance in the histogram feature space achieved 87.77% and 90.5% test accuracies on the ISIC2019 and HAM10000 datasets,*** unsupervised approach effectively categorises skin lesions,indicating that unsupervised learning can significantly advance dermatology by enabling early detection and classification without extensive manual annotation.
Alzheimer’s Disease(AD)is a progressive neurological *** diagnosis of this illness using conventional methods is very *** Learning(DL)is one of the finest solutions for improving diagnostic procedures’performance an...
详细信息
Alzheimer’s Disease(AD)is a progressive neurological *** diagnosis of this illness using conventional methods is very *** Learning(DL)is one of the finest solutions for improving diagnostic procedures’performance and forecast *** disease’s widespread distribution and elevated mortality rate demonstrate its significance in the older-onset and younger-onset age *** light of research investigations,it is vital to consider age as one of the key criteria when choosing the *** younger subjects are more susceptible to the perishable side than the older *** proposed investigation concentrated on the younger *** research used deep learning models and neuroimages to diagnose and categorize the disease at its early stages *** proposed work is executed in three *** 3D input images must first undergo image pre-processing using Weiner filtering and Contrast Limited Adaptive Histogram Equalization(CLAHE)*** Transfer Learning(TL)models extract features,which are subsequently compressed using cascaded Auto Encoders(AE).The final phase entails using a Deep Neural Network(DNN)to classify the phases of *** model was trained and tested to classify the five stages of *** ensemble ResNet-18 and sparse autoencoder with DNN model achieved an accuracy of 98.54%.The method is compared to state-of-the-art approaches to validate its efficacy and performance.
暂无评论