Advanced Search
Displaying 21-30 on page 3 of 11942. Per Page  

Articles / Online

  • Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing
  • Abstract Cloud computing is a high network infrastructure where users, owners, third users, authorized users, and customers can access and store their information quickly. The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently. This cloud is nowadays highly affected by internal threats of the user. Sensitive applications such as banking, hospital, and business are more likely affected by real user threats. An intruder is presented as a user and set as a member of the network. After becoming an insider in the network, they will…
  • More
  •   Views:69       Downloads:16        Download PDF
  • FACT: An Air-Ground Communication Framework for Seeding Quality Control of Aircraft
  • Abstract A new type of air-ground communication application framework named FACT (framework for air-ground communication technology with weather-modification aircraft) is presented to track and command weather-modification aircraft to perform ideal cloud seeding. FACT provides a set of solutions from three perspectives, namely, onboard, onground and air-to-ground, with the core purpose of solving the problems of the rapid exchange of information, contract analysis and identifying potential seeding areas when flight plans and meteorological conditions change. On board, the observed data are processed centrally and transmitted downward through air-to-ground communication. The real-time application and sharing of aircraft detection data are strengthened on the…
  • More
  •   Views:19       Downloads:9        Download PDF
  • Optimal Data Placement and Replication Approach for SIoT with Edge
  • Abstract Social networks (SNs) are sources with extreme number of users around the world who are all sharing data like images, audio, and video to their friends using IoT devices. This concept is the so-called Social Internet of Things (SIot). The evolving nature of edge-cloud computing has enabled storage of a large volume of data from various sources, and this task demands an efficient storage procedure. For this kind of large volume of data storage, the usage of data replication using edge with geo-distributed cloud service area is suited to fulfill the user’s expectations with low latency. The major issue is…
  • More
  •   Views:25       Downloads:11        Download PDF
  • Semantic Based Greedy Levy Gradient Boosting Algorithm for Phishing Detection
  • Abstract The detection of phishing and legitimate websites is considered a great challenge for web service providers because the users of such websites are indistinguishable. Phishing websites also create traffic in the entire network. Another phishing issue is the broadening malware of the entire network, thus highlighting the demand for their detection while massive datasets (i.e., big data) are processed. Despite the application of boosting mechanisms in phishing detection, these methods are prone to significant errors in their output, specifically due to the combination of all website features in the training state. The upcoming big data system requires MapReduce, a popular…
  • More
  •   Views:28       Downloads:6        Download PDF
  • Exploring and Modelling IoT Offloading Policies in Edge Cloud Environments
  • Abstract The Internet of Things (IoT) has recently become a popular technology that can play increasingly important roles in every aspect of our daily life. For collaboration between IoT devices and edge cloud servers, edge server nodes provide the computation and storage capabilities for IoT devices through the task offloading process for accelerating tasks with large resource requests. However, the quantitative impact of different offloading architectures and policies on IoT applications’ performance remains far from clear, especially with a dynamic and unpredictable range of connected physical and virtual devices. To this end, this work models the performance impact by exploiting a…
  • More
  •   Views:18       Downloads:11        Download PDF
  • Relative Time Quantum-based Enhancements in Round Robin Scheduling
  • Abstract Modern human life is heavily dependent on computing systems and one of the core components affecting the performance of these systems is underlying operating system. Operating systems need to be upgraded to match the needs of modern-day systems relying on Internet of Things, Fog computing and Mobile based applications. The scheduling algorithm of the operating system dictates that how the resources will be allocated to the processes and the Round Robin algorithm (RR) has been widely used for it. The intent of this study is to ameliorate RR scheduling algorithm to optimize task scheduling. We have carried out an experimental…
  • More
  •   Views:35       Downloads:10        Download PDF
  • Early Detection of Pancreatic Cancer Using Jaundiced Eye Images
  • Abstract Pancreatic cancer is one of the deadliest cancers, with less than 9% survival rates. Pancreatic Ductal Adeno Carcinoma (PDAC) is common with the general public affecting most people older than 45. Early detection of PDAC is often challenging because cancer symptoms will progress only at later stages (advanced stage). One of the earlier symptoms of PDAC is Jaundice. Patients with diabetes, obesity, and alcohol consumption are also at higher risk of having pancreatic cancer. A decision support system is developed to detect pancreatic cancer at an earlier stage to address this challenge. Features such as Mean Hue, Mean Saturation, Mean…
  • More
  •   Views:22       Downloads:11        Download PDF
  • Measuring Mental Workload Using ERPs Based on FIR, ICA, and MARA
  • Abstract Mental workload is considered to be strongly linked to human performance, and the ability to measure it accurately is key for balancing human health and work. In this study, brain signals were elicited by mental arithmetic tasks of varying difficulty to stimulate different levels of mental workload. In addition, a finite impulse response (FIR) filter, independent component analysis (ICA), and multiple artifact rejection algorithms (MARAs) were used to filter event-related potentials (ERPs). Then, the data consisting of ERPs, subjective ratings of mental workload, and task performance, were analyzed through the use of variance and Spearman’s correlation during a simulated computer…
  • More
  •   Views:24       Downloads:8        Download PDF
  • Short term protective effect of digitoxin in sepsis-induced acute lung injury
  • Abstract Purpose: Digitoxin is a cardiac glycoside used in the treatment of heart failure. Inspired by its known anti-inflammatory effect, this study aims to investigate the effect of digoxin in a sepsis model and to bring to light its effect and underlying mechanism in acute lung injury (ALI). Method: 28 wistar albino rats were divided into 4 groups. Sepsis model is performed by the feces intraperitoneal-injection procedure (FIP). Results: TNF-a, CRP, IL-6, IL 1-Beta, lactic acid, and MDA values were significantly decreased in the FIP+digitoxin group compared to the FIP+Saline group. When the same groups were examined, histological improvements such as…
  • More
  •   Views:137       Downloads:167        Download PDF
  • Potential genomic biomarkers of obesity and its comorbidities for phthalates and bisphenol A mixture: In silico toxicogenomic approach
  • Abstract This in silico toxicogenomic study aims to explore the relationship between phthalates and bisphenol A (BPA) co-exposure and obesity, as well as its comorbid conditions, in order to construct a possible set of genomic biomarkers. The Comparative Toxicogenomics Database (CTD; http://ctd.mdibl.org) was used as the main data mining tool, along with GeneMania (https://genemania.org), ToppGene Suite (https://toppgene.cchmc.org) and DisGeNET (http://www.disgenet.org). Among the phthalates, bis(2-ethylhexyl) phthalate (DEHP) and dibutyl phthalate (DBP) were chosen as the most frequently curated phthalates in CTD, which also share similar mechanisms of toxicity. DEHP, DBP and BPA interacted with 84, 90 and 194 obesity-related genes/proteins, involved in…
  • More
  •   Views:171       Downloads:141        Download PDF
Displaying 21-30 on page 3 of 11942. Per Page