In this paper, we have used a hybrid deep-learning architecture to detect cloud intrusion. The cloud plays an important role in modern data management, accessibility, and storage. It enables organizations to store vas...
详细信息
ISBN:
(数字)9798350357509
ISBN:
(纸本)9798350357516
In this paper, we have used a hybrid deep-learning architecture to detect cloud intrusion. The cloud plays an important role in modern data management, accessibility, and storage. It enables organizations to store vast amounts of data remotely. Due to frequent data sharing between platforms and remote access, the cloud environment is more vulnerable to cyber threats. An intruder can access confidential data due to vulnerabilities including inadequate encryption, absence of authentication, poor access control, and so on. We can efficiently use deep learning approaches to enhance cloud security. In this research, we have developed a hybrid dense neural network (DNN) and gated recurrent unit (GRU)-based architecture to detect cloud intrusion. We have also developed individual DNN and GRU-based architectures. In our proposed model, the DNN layers can capture the nonlinear complex pattern, while GRU can identify the temporal dependencies of network traffic data. In this research work, we have utilized the network portion of the ToN-IoT dataset. For multiclass classification, the hybrid DNN-GRU model has achieved the highest performance, obtaining an accuracy of 98.66%, precision of 98.70%, recall of 98.66%, f1 score of 98.67%, and AUC of 99.98%. Moreover, the performance for detecting nine different attacks has also been evaluated. This case shows the hybrid DNN-GRU model performs well, identifying backdoor and ransomware attacks with 100% accuracy. Thus, this hybrid architecture works more robustly and efficiently to detect cloud intrusion by combining the strengths of both DNN and GRU, thereby strengthening cloud security.
Online customer reviews have developed into a significant source of information about a business's performance. Due to shifting consumer expectations and growing internet penetration, the Middle East, especially J...
详细信息
Partial discharge localization in power transformers is of utmost importance, requiring an effective evaluation method to identify the location of such events precisely. Antenna placement poses challenges within power...
详细信息
Power and water networks are massive critical infrastructure systems that are strongly coupled through the power transmitted from the power network to the water network, yet they are commonly operated independently. T...
详细信息
Cyberbullying is the act of a person by employing technology to shame or harass other people. Because bullying on online platforms spreads quickly to larger viewers, it can sometimes get more awful and studies reveal ...
详细信息
ISBN:
(数字)9798350357509
ISBN:
(纸本)9798350357516
Cyberbullying is the act of a person by employing technology to shame or harass other people. Because bullying on online platforms spreads quickly to larger viewers, it can sometimes get more awful and studies reveal that this kind of activity happens a lot on social media platforms like Facebook and Twitter. Furthermore, generating an improved result is tough because of the unique nature of the Bengali language, a shortage of reliable records, and limited preliminary processing techniques. This study presents a deep learning-based hybrid method with an attention mechanism to identify bully expression in Bangla text by employing a multi-class dataset containing four classes such as political, religious, sexual, and non-bullying feelings. The proposed framework architecture combines Convolutional Neural Network(CNN) and bidirectional LSTM layers, resulting in a remarkable testing performance on the multi-class dataset. The research attempts to maximize performance and compare the suggested model with the initial approaches. Our recommended CNN-BiLSTM with additive attention framework improves cyberbullying identification with 0.86 F1 scores and 85.18% accuracy on a labeled dataset of 42,036 Facebook comments. This study enhances our comprehension of bully expression in the Bangla language, facilitating the development of more sophisticated natural language processing applications in languages with limited resources.
This study provides a thorough evaluation of data deluges and how they will play a significant role in the development of future knowledge architectures. The suggested methodology is adaptable and interdisciplinary si...
详细信息
In the contemporary world, safeguarding data has assumed paramount importance, prompting numerous industrial sectors to fortify their defenses against potential hackers. In this landscape, blockchain has emerged as a ...
详细信息
Lithium-ion batteries have revolutionized the energy storage landscape since their commercialization in the early 1990s. The continuous advancements in lithium-ion technology are driven by the pressing need for sustai...
详细信息
ISBN:
(数字)9798350357509
ISBN:
(纸本)9798350357516
Lithium-ion batteries have revolutionized the energy storage landscape since their commercialization in the early 1990s. The continuous advancements in lithium-ion technology are driven by the pressing need for sustainable energy solutions and the growing demand for high-performance batteries. This paper explores the electrical characteristics of lithium-ion batteries, including current, voltage, capacity, energy density, voltage loss, and internal resistance, through simulations conducted using COMSOL Multiphysics software. The study highlights how these characteristics change under different discharge rates, providing insights into the ideal time frame for the effective use of a designed battery cell. Furthermore, the paper identifies potential pathways for enhancing battery performance by benchmarking against advancements in alternative battery technologies.
Climatic information such as temperature, humidity, and precipitation are useful for agriculturists, businesses, researchers, and the government. Estimating precipitation is a major factor that affects the environment...
详细信息
Deep learning inference demands high computational efficiency and scalability, which traditional architectures struggle to provide. To address this, we propose an FPGA-accelerated scalable convolutional neural network...
详细信息
ISBN:
(数字)9798350357509
ISBN:
(纸本)9798350357516
Deep learning inference demands high computational efficiency and scalability, which traditional architectures struggle to provide. To address this, we propose an FPGA-accelerated scalable convolutional neural network (CNN) architecture optimized for inference. The design leverages FPGA’s parallelism and reconfigurability, integrating convolution, activation, and reshaping operations. It sequentially processes input data, synchronizing layers via control signals. The convolutional layer extracts spatial features, reshapes the feature map, and passes it to fully connected layers, with the output layer generating class probabilities. Our FPGA implementation achieves a remarkable 63000x speedup over CPU-based inference and a 6000x improvement compared to GPU-based inference with significantly reduced resource (except IO) requirements.
暂无评论