排序方式: 共有4条查询结果,搜索用时 109 毫秒
1
1.
Maksymyuk Taras Šlapak Eugen Bugár Gabriel Horváth Denis Gazda Juraj 《Wireless Networks》2020,26(1):759-774
Wireless Networks - The evolution of 5G networks over the last few years has introduced a variety of technologies for more efficient radio access networks (RANs), which end up in ultra-dense... 相似文献
2.
Filling techniques are often used in the restoration of images. Yet the existing filling technique approaches either have high computational costs or present problems such as filling holes redundantly. This paper proposes a novel algorithm for filling holes and regions of the images. The proposed algorithm combines the advantages of both the parity-check filling approach and the region-growing inpainting technique. Pairing points of the region’s boundary are used to search and to fill the region. The scanning range of the filling method is within the target regions. The proposed method does not require additional working memory or assistant colors, and it can correctly fill any complex contours. Experimental results show that, compared to other approaches, the proposed algorithm fills regions faster and with lower computational cost. 相似文献
3.
Nazarii Lutsiv Taras Maksymyuk Mykola Beshley Orest Lavriv Volodymyr Andrushchak Anatoliy Sachenko Liberios Vokorokos Juraj Gazda 《计算机、材料和连续体(英文)》2022,70(1):413-431
The extensive proliferation of modern information services and ubiquitous digitization of society have raised cybersecurity challenges to new levels. With the massive number of connected devices, opportunities for potential network attacks are nearly unlimited. An additional problem is that many low-cost devices are not equipped with effective security protection so that they are easily hacked and applied within a network of bots (botnet) to perform distributed denial of service (DDoS) attacks. In this paper, we propose a novel intrusion detection system (IDS) based on deep learning that aims to identify suspicious behavior in modern heterogeneous information systems. The proposed approach is based on a deep recurrent autoencoder that learns time series of normal network behavior and detects notable network anomalies. An additional feature of the proposed IDS is that it is trained with an optimized dataset, where the number of features is reduced by 94% without classification accuracy loss. Thus, the proposed IDS remains stable in response to slight system perturbations, which do not represent network anomalies. The proposed approach is evaluated under different simulation scenarios and provides a 99% detection accuracy over known datasets while reducing the training time by an order of magnitude. 相似文献
4.
Berihun Fekade Taras Maksymyuk Minho Jo 《Wireless Communications and Mobile Computing》2016,16(18):3455-3465
Resource virtualization has become one of the key super‐power mobile computing architecture technologies. As mobile devices and multimedia traffic have increased dramatically, the load on mobile cloud computing systems has become heavier. Under such conditions, mobile cloud system reliability becomes a challenging task. In this paper, we propose a new model using a naive Bayes classifier for hypervisor failure prediction and prevention in mobile cloud computing. We exploit real‐time monitoring data in combination with historical maintenance data, which achieves higher accuracy in failure prediction and early failure‐risk detection. After detecting hypervisors at risk, we perform live migration of virtual servers within a cluster, which decreases the load and prevents failures in the cloud. We performed a simulation for verification. According to the experimental results, our proposed model shows good accuracy in failure prediction and the possibility of decreasing downtime in a hypervisor service. Copyright © 2017 John Wiley & Sons, Ltd. 相似文献
1