Multimedia Tools and Applications - Prostate cancer (PCa) has become the second most dreadful cancer in men after lung cancer. Traditional approaches used for treatment of PCa were manual, time... 相似文献
Engineering with Computers - A novel hybrid many-objective evolutionary algorithm called Reference Vector Guided Evolutionary Algorithm based on hypervolume indicator (H-RVEA) is proposed in this... 相似文献
Software-defined networking (SDN) is an advanced networking paradigm that decouples forwarding control logic from the data plane. Therefore, it provides a loosely-coupled architecture between the control and data plane. This separation provides flexibility in the SDN environment for addressing any transformations. Further, it delivers a centralized way of managing networks due to control logic embedded in the SDN controller. However, this advanced networking paradigm has been facing several security issues, such as topology spoofing, exhausting bandwidth, flow table updating, and distributed denial of service (DDoS) attacks. A DDoS attack is one of the most powerful menaces to the SDN environment. Further, the central data controller of SDN becomes the primary target of DDoS attacks. In this article, we propose a Kafka-based distributed DDoS attacks detection approach for protecting the SDN environment named K-DDoS-SDN. The K-DDoS-SDN consists of two modules: (i) Network traffic classification (NTClassification) module and (ii) Network traffic storage (NTStorage) module. The NTClassification module is the detection approach designed using scalable H2O ML techniques in a distributed manner and deployed an efficient model on the two-nodes Kafka Streams cluster to classify incoming network traces in real-time. The NTStorage module collects raw packets, network flows, and 21 essential attributes and then systematically stores them in the HDFS to re-train existing models. The proposed K-DDoS-SDN designed and evaluated using the recent and publically available CICDDoS2019 dataset. The average classification accuracy of the proposed distributed K-DDoS-SDN for classifying network traces into legitimate and one of the most popular attacks, such as DDoS_UDP is 99.22%. Further, the outcomes demonstrate that proposed distributed K-DDoS-SDN classifies traffic traces into five categories with at least 81% classification accuracy. 相似文献
This study introduces a comprehensive framework designed for detecting and mitigating fake and potentially threatening user communities within 5G social networks. Leveraging geo-location data, community trust dynamics, and AI-driven community detection algorithms, this framework aims to pinpoint users posing potential harm. Including an artificial control model facilitates the selection of suitable community detection algorithms, coupled with a trust-based strategy to effectively identify and filter potential attackers. A distinctive feature of this framework lies in its ability to consider attributes that prove challenging for malicious users to emulate, such as the established trust within the community, geographical location, and adaptability to diverse attack scenarios. To validate its efficacy, we illustrate the framework using synthetic social network data, demonstrating its ability to distinguish potential malicious users from trustworthy ones. 相似文献
The promising potential of cloud computing and its convergence with technologies such as mobile computing, wireless networks, sensor technologies allows for creation and delivery of newer type of cloud services. In this paper, we advocate the use of cloud computing for the creation and management of cloud based health care services. As a representative case study, we design a Cloud Based Intelligent Health Care Service (CBIHCS) that performs real time monitoring of user health data for diagnosis of chronic illness such as diabetes. Advance body sensor components are utilized to gather user specific health data and store in cloud based storage repositories for subsequent analysis and classification. In addition, infrastructure level mechanisms are proposed to provide dynamic resource elasticity for CBIHCS. Experimental results demonstrate that classification accuracy of 92.59% is achieved with our prototype system and the predicted patterns of CPU usage offer better opportunities for adaptive resource elasticity. 相似文献
Empirical validation of software metrics used to predict software quality attributes is important to ensure their
practical relevance in software organizations. The aim of this work is to find the relation of object-oriented (OO) metrics
with fault proneness at different severity levels of faults. For this purpose, different prediction models have been developed
using regression and machine learning methods. We evaluate and compare the performance of these methods to find which method
performs better at different severity levels of faults and empirically validate OO metrics given by Chidamber and Kemerer.
The results of the empirical study are based on public domain NASA data set. The performance of the predicted models was evaluated
using Receiver Operating Characteristic (ROC) analysis. The results show that the area under the curve (measured from the
ROC analysis) of models predicted using high severity faults is low as compared with the area under the curve of the model
predicted with respect to medium and low severity faults. However, the number of faults in the classes correctly classified
by predicted models with respect to high severity faults is not low. This study also shows that the performance of machine
learning methods is better than logistic regression method with respect to all the severities of faults. Based on the results,
it is reasonable to claim that models targeted at different severity levels of faults could help for planning and executing
testing by focusing resources on fault-prone parts of the design and code that are likely to cause serious failures. 相似文献
Microsystem Technologies - Fifth generation (5G) communication system enables the pathway for a higher data transfer rate. The frequency bands used for 5G communication system are distributed from... 相似文献
This paper proposes a novel hybrid multi-objective optimization algorithm named HMOSHSSA by synthesizing the strengths of Multi-objective Spotted Hyena Optimizer (MOSHO) and Salp Swarm Algorithm (SSA). HMOSHSSA utilizes the exploration capability of MOSHO to explore the search space effectively and leader and follower selection mechanism of SSA to achieve global best solution with faster convergence. The proposed algorithm is evaluated on 24 benchmark test functions, and its performance is compared with seven well-known multi-objective optimization algorithms. The experimental results demonstrate that HMOSHSSA acquires very competitive results and outperforms other algorithms in terms of convergence speed, search-ability and accuracy. Additionally, HMOSHSSA is also applied on seven well-known engineering problems to further verify its efficacy. The results reveal the effectiveness of proposed algorithm toward solving real-life multi-objective optimization problems.
Cloud computing is the delivery of on‐demand computing resources. Cloud computing has numerous applications in fields of education, social networking, and medicine. But the benefit of cloud for medical purposes is seamless, particularly because of the enormous data generated by the health care industry. This colossal data can be managed through big data analytics, and hidden patterns can be extracted using machine learning procedures. In particular, the latest issue in the medical domain is the prediction of heart diseases, which can be resolved through culmination of machine learning and cloud computing. Hence, an attempt has been made to propose an intelligent decision support model that can aid medical experts in predicting heart disease based on the historical data of patients. Various machine learning algorithms have been implemented on the heart disease dataset to predict accuracy for heart disease. Naïve Bayes has been selected as an effective model because it provides the highest accuracy of 86.42% followed by AdaBoost and boosted tree. Further, these 3 models are being ensembled, which has increased the overall accuracy to 87.91%. The experimental results have also been evaluated using 10,082 instances that clearly validate the maximum accuracy through ensembling and minimum execution time in cloud environment. 相似文献