In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams, leveraging in-memory processing within the Spark framework. The approa...
详细信息
Roads are an important part of transporting goods and products from one place to another. In developing countries, the main challenge is to maintain road conditions regularly. Roads can deteriorate from time to time. ...
详细信息
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution ...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c...
详细信息
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received considerable attention in transmitting data and ensuring data confidentiality among cloud servers and users. Various traditional image retrieval techniques regarding security have developed in recent years but they do not apply to large-scale environments. This paper introduces a new approach called Triple network-based adaptive grey wolf (TN-AGW) to address these challenges. The TN-AGW framework combines the adaptability of the Grey Wolf Optimization (GWO) algorithm with the resilience of Triple Network (TN) to enhance image retrieval in cloud servers while maintaining robust security measures. By using adaptive mechanisms, TN-AGW dynamically adjusts its parameters to improve the efficiency of image retrieval processes, reducing latency and utilization of resources. However, the image retrieval process is efficiently performed by a triple network and the parameters employed in the network are optimized by Adaptive Grey Wolf (AGW) optimization. Imputation of missing values, Min–Max normalization, and Z-score standardization processes are used to preprocess the images. The image extraction process is undertaken by a modified convolutional neural network (MCNN) approach. Moreover, input images are taken from datasets such as the Landsat 8 dataset and the Moderate Resolution Imaging Spectroradiometer (MODIS) dataset is employed for image retrieval. Further, the performance such as accuracy, precision, recall, specificity, F1-score, and false alarm rate (FAR) is evaluated, the value of accuracy reaches 98.1%, the precision of 97.2%, recall of 96.1%, and specificity of 917.2% respectively. Also, the convergence speed is enhanced in this TN-AGW approach. Therefore, the proposed TN-AGW approach achieves greater efficiency in image retrieving than other existing
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets ...
详细信息
The recent development of the Internet of Things(IoTs)resulted in the growth of IoT-based DDoS *** detection of Botnet in IoT systems implements advanced cybersecurity measures to detect and reduce malevolent botnets in interconnected *** detection models evaluate transmission patterns,network traffic,and device behaviour to detect deviations from usual *** learning(ML)techniques detect patterns signalling botnet activity,namely sudden traffic increase,unusual command and control patterns,or irregular device *** addition,intrusion detection systems(IDSs)and signature-based techniques are applied to recognize known malware signatures related to *** ML and deep learning(DL)techniques have been developed to detect botnet attacks in IoT *** overcome security issues in an IoT environment,this article designs a gorilla troops optimizer with DL-enabled botnet attack detection and classification(GTODL-BADC)*** GTODL-BADC technique follows feature selection(FS)with optimal DL-based classification for accomplishing security in an IoT *** data preprocessing,the min-max data normalization approach is primarily *** GTODL-BADC technique uses the GTO algorithm to select features and elect optimal feature ***,the multi-head attention-based long short-term memory(MHA-LSTM)technique was applied for botnet ***,the tree seed algorithm(TSA)was used to select the optimum hyperparameter for the MHA-LSTM *** experimental validation of the GTODL-BADC technique can be tested on a benchmark *** simulation results highlighted that the GTODL-BADC technique demonstrates promising performance in the botnet detection process.
Accurate significant wave height(SWH)prediction is essential for the development and utilization of wave *** learning methods such as recurrent and convolutional neural networks have achieved good results in SWH ***,t...
详细信息
Accurate significant wave height(SWH)prediction is essential for the development and utilization of wave *** learning methods such as recurrent and convolutional neural networks have achieved good results in SWH ***,these methods do not adapt well to dynamic seasonal variations in wave *** this study,we propose a novel method—the spatiotemporal dynamic graph(STDG)neural *** method predicts the SWH of multiple nodes based on dynamic graph modeling and multi-characteristic ***,considering the dynamic seasonal variations in the wave direction over time,the network models wave dynamic spatial dependencies from long-and short-term pattern ***,to correlate multiple characteristics with SWH,the network introduces a cross-characteristic transformer to effectively fuse multiple ***,we conducted experiments on two datasets from the South China Sea and East China Sea to validate the proposed method and compared it with five prediction methods in the three *** experimental results show that the proposed method achieves the best performance at all predictive scales and has greater advantages for extreme value ***,an analysis of the dynamic graph shows that the proposed method captures the seasonal variation mechanism of the waves.
In the rapidly evolving landscape of cyber threats, phishing continues to be a prominent vector for cyberattacks, posing significant risks to individuals, organizations and information systems. This letter delves into...
详细信息
The Internet of Things (IoT) has developed into a crucial component for meeting the connection needs of the current smart healthcare systems. The Internet of Medical Things (IoMT) consists of medical devices that are ...
详细信息
We utilize first-principles theory to investigate the role of electron-phonon interactions within a dataset of monolayer materials. Using density functional theory to describe excited-state transitions and the special...
详细信息
We utilize first-principles theory to investigate the role of electron-phonon interactions within a dataset of monolayer materials. Using density functional theory to describe excited-state transitions and the special displacement method to describe the role of phonons, we analyze the relationship between simple physical observables and electron-phonon coupling strength. For over 100 materials, we compute the band gap renormalization due to zero-point vibrational (ZPR) motion as a measure of electron-phonon interactions and train a machine learning model based on physical parameters. We demonstrate that the strength of electron-phonon interactions is highly dependent on the band gap, dielectric constant, and degree of ionicity, all of which can be physically justified. We then apply this model to 1302 2D materials, predicting the ZPR, which for five randomly selected materials tested agree well with the first-principles predictions. This work provides an approach for quantitatively predicting the ZPR as a measure of electron-phonon interactions in 2D materials.
The medical domain faces unique challenges in Information Retrieval (IR) due to the complexity of medical language and terminology discrepancies between user queries and documents. While traditional Keyword-Based Meth...
详细信息
暂无评论