The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of *** accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be em...
详细信息
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of *** accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be employed,which encodes and decodes binary data to and from synthesized strands of *** quantization(VQ)is a commonly employed scheme for image compression and the optimal codebook generation is an effective process to reach maximum compression *** article introduces a newDNAComputingwithWater StriderAlgorithm based Vector Quantization(DNAC-WSAVQ)technique for Data Storage *** proposed DNAC-WSAVQ technique enables encoding data using DNA computing and then compresses it for effective data ***,the DNAC-WSAVQ model initially performsDNA encoding on the input images to generate a binary encoded *** addition,aWater Strider algorithm with Linde-Buzo-Gray(WSA-LBG)model is applied for the compression process and thereby storage area can be considerably *** order to generate optimal codebook for LBG,the WSA is applied to *** performance validation of the DNAC-WSAVQ model is carried out and the results are inspected under several *** comparative study highlighted the improved outcomes of the DNAC-WSAVQ model over the existing methods.
Systems for managing water supplies are intricate, requiring a range of models to manage water resources efficiently. These models can be designed and manipulated using a Model-Driven Architecture (MDA), which will in...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the...
详细信息
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the challenges of security risks and data analysis *** IIoT grows,cyber-attacks become more diverse and complex,making existing anomaly detection models less effective to *** this paper,an ensemble deep learning model that uses the benefits of the Long Short-Term Memory(LSTM)and the AutoEncoder(AE)architecture to identify out-of-norm activities for cyber threat hunting in IIoT is *** this model,the LSTM is applied to create a model on normal time series of data(past and present data)to learn normal data patterns and the important features of data are identified by AE to reduce data *** addition,the imbalanced nature of IIoT datasets has not been considered in most of the previous literature,affecting low accuracy and *** solve this problem,the proposed model extracts new balanced data from the imbalanced datasets,and these new balanced data are fed into the deep LSTM AE anomaly detection *** this paper,the proposed model is evaluated on two real IIoT datasets-Gas Pipeline(GP)and Secure Water Treatment(SWaT)that are imbalanced and consist of long-term and short-term dependency on *** results are compared with conventional machine learning classifiers,Random Forest(RF),Multi-Layer Perceptron(MLP),Decision Tree(DT),and Super Vector Machines(SVM),in which higher performance in terms of accuracy is obtained,99.3%and 99.7%based on GP and SWaT datasets,***,the proposed ensemble model is compared with advanced related models,including Stacked Auto-Encoders(SAE),Naive Bayes(NB),Projective Adaptive Resonance Theory(PART),Convolutional Auto-Encoder(C-AE),and Package Signatures(PS)based LSTM(PS-LSTM)model.
We created a customize DNS operator to address the shortcoming of CoreDNS in Kubernetes. While Kubernetes is gaining popularity in orchestrating containers, many organizations with Virtual Machine (VM) based legacy ap...
详细信息
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and...
详细信息
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and massive data is exchanged between the aerial vehicles and the ground control *** on the mission of these aerial vehicles,some of the collected and transmitted data is sensitive and ***,many security protocols have been presented to offer privacy and security ***,majority of these schemes fail to consider attack vectors such as side-channeling,de-synchronization and known secret session temporary information *** last attack can be launched upon adversarial physical capture of these *** addition,some of these protocols deploy computationally intensive asymmetric cryptographic primitives that result in high *** this paper,an authentication protocol based on lightweight quadratic residues and hash functions is *** formal security analysis is executed using the widely deployed random oracle *** addition,informal security analysis is carried out to show its robustness under the Dolev–Yao(DY)and Canetti–Krawczyk(CK)threat *** terms of operational efficiency,it is shown to have relatively lower execution time,communication costs,and incurs the least storage costs among other related ***,the proposed protocol provides a 25%improvement in supported security and privacy features and a 6.52%reduction in storage *** overall,the proposed methodology offers strong security and privacy protection at lower execution time,storage and communication overheads.
Go is a popular strategy game today, but due to its large search space and task complexity, ensuring stable AI implementation is challenging. Specifically, Go AI training requires setting a fixed optimal learning rate...
详细信息
Recent advancements in deep learning have signif-icantly enhanced the rapid and precise classification of medical images. Vision transformers, an advanced model, have started replacing CNN s in several medical image t...
详细信息
Nowadays, with the increasing number of metaheuristic, different strategies for solving engineering problems have been introduced. In this study, the Crayfish Optimizer Algorithm (COA), Spider Wasp Optimizer (SWO) and...
详细信息
作者:
Ain, Qurat UlRana, TauseefAamana
Department of Computer Science Islamabad Pakistan NUST
Military College of Signals Department of Computer Software Engineering Islamabad Pakistan
Department of Software Engineering Rawalpindi Pakistan
To assess the quality, acceptability and user experience of interactive applications, usability is one of the most integral quality attributes. However, significant number of usability bugs are being experienced by th...
详细信息
暂无评论