16 research outputs found

    Spatial information of fuzzy clustering based mean best artificial bee colony algorithm for phantom brain image segmentation

    Get PDF
    Fuzzy c-means algorithm (FCM) is among the most commonly used in the medical image segmentation process. Nevertheless, the traditional FCM clustering approach has been several weaknesses such as noise sensitivity and stuck in local optimum, due to FCM hasn’t able to consider the information of contextual. To solve FCM problems, this paper presented spatial information of fuzzy clustering-based mean best artificial bee colony algorithm, which is called SFCM-MeanABC. This proposed approach is used contextual information in the spatial fuzzy clustering algorithm to reduce sensitivity to noise and its used MeanABC capability of balancing between exploration and exploitation that is explore the positive and negative directions in search space to find the best solutions, which leads to avoiding stuck in a local optimum. The experiments are carried out on two kinds of brain images the Phantom MRI brain image with a different level of noise and simulated image. The performance of the SFCM-MeanABC approach shows promising results compared with SFCM-ABC and other stats of the arts

    A Variable Service Broker Routing Policy for data center selection in cloud analyst

    Get PDF
    AbstractCloud computing depends on sharing distributed computing resources to handle different services such as servers, storage and applications. The applications and infrastructures are provided as pay per use services through data center to the end user. The data centers are located at different geographic locations. However, these data centers can get overloaded with the increase number of client applications being serviced at the same time and location; this will degrade the overall QoS of the distributed services. Since different user applications may require different configuration and requirements, measuring the user applications performance of various resources is challenging. The service provider cannot make decisions for the right level of resources. Therefore, we propose a Variable Service Broker Routing Policy – VSBRP, which is a heuristic-based technique that aims to achieve minimum response time through considering the communication channel bandwidth, latency and the size of the job. The proposed service broker policy will also reduce the overloading of the data centers by redirecting the user requests to the next data center that yields better response and processing time. The simulation shows promising results in terms of response and processing time compared to other known broker policies from the literature

    Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset

    No full text
    The Internet plays a crucial role in our daily routines. Ensuring cybersecurity to Internet users will provide a safe online environment. Automatic network intrusion detection (NID) using machine learning algorithms has recently received increased attention recently. The NID model is prone to bias towards the classes with more training samples due to highly imbalanced datasets across different types of attacks. The challenge in generating additional training data for minority classes is the generation of insufficient data. The study's purpose is to address this challenge, which extends the data generation ability by proposing a three-stage data generation algorithm using the synthetic minority over-sampling technique, a generative adversarial network (GAN), and a variational autoencoder. A convolutional neural network is employed to extract the representative features from the data, which were fed into a support vector machine with a customised kernel function. An ablation study evaluated the effectiveness of the three-stage data generation, feature extraction, and customised kernel. This was followed by a performance comparison between our study and existing studies. The findings revealed that the proposed NID model achieved an accuracy of 91.9%–96.2% in the four benchmark datasets. In addition, it outperformed existing methods such as GAN-based deep neural networks, conditional Wasserstein GAN-based stacked autoencoder, synthesised minority oversampling technique-based random forest, and variational autoencoder-based deep neural network, by 1.51%–28.4%

    Botnet detection used fast-flux technique, based on adaptive dynamic evolving spiking neural network algorithm

    Get PDF
    A botnet refers to a group of machines. These machines are controlled distantly by a specific attacker. It represents a threat facing the web and data security. Fast-flux service network (FFSN) has been engaged by bot herders for cover malicious botnet activities. It has been engaged by bot herders for increasing the lifetime of malicious servers through changing the IP addresses of the domain name quickly. In the present research, we aimed to propose a new system. This system is named fast flux botnet catcher system (FFBCS). This system can detect FF-domains in an online mode using an adaptive dynamic evolving spiking neural network algorithm. Comparing with two other related approaches the proposed system shows a high level of detection accuracy, low false positive and negative rates, respectively. It shows a high performance. The algorithm's proposed adaptation increased the accuracy of the detection. For instance, this accuracy reached (98.76%) approximately.N/

    Image cyberbullying detection and recognition using transfer deep machine learning

    No full text
    Cyberbullying detection on social media platforms is increasingly important, necessitating robust computational methods. Current approaches, while promising, have not fully leveraged the combined strengths of deep learning and traditional machine learning for enhanced performance. Moreover, online content complexity requires models that can capture nuanced contexts beyond text, which many current methods lack. This research proposes a novel hybrid approach using deep learning models as feature extractors and machine learning classifiers to improve cyberbullying detection. Extracting features using pre-trained deep learning models like InceptionV3, ResNet50, and VGG16, then feeding them into classifiers like Logistic Regression and Support Vector Machines, enhances understanding of the complex contexts where cyberbullying occurs. Experiments on an image dataset showed that combining deep learning and machine learning achieved higher accuracy than using either approach alone. This novel framework bridges the gap in existing literature and contributes to broader efforts to combat cyberbullying through more nuanced, context-aware detection methods. The hybrid technique demonstrates the potential of blending deep learning's representation learning strengths with machine learning's sample efficiency and interpretability

    Digital image watermarking using discrete cosine transformation based linear modulation

    No full text
    Abstract The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address the following challenges in protecting multimedia data: prevention of unauthorized disclosure of sensitive data, in addition to tracking down the leak's origin, making sure no alterations may be made without permission, and safeguarding intellectual property for digital assets. watermarking is a technique developed to combat this issue, which transfer secure data over the network. The main goal of invisible watermarking is a hidden exchange of data and a message from being discovered by a third party. The objective of this work is to develop a digital image watermarking using discrete cosine transformation based linear modulation. This paper proposed an invisible watermarking method for embedding information into the transformation domain for the grey scale images. This method used the embedding of a stego-text into the least significant bit (LSB) of the Discrete Cosine Transformation (DCT) coefficient by using a linear modulation algorithm. Also, a stego-text is embedded with different sizes ten times within images after embedding the stego-image immune to different kinds of attack, such as salt and pepper, rotation, cropping, and JPEG compression with different criteria. The proposed method is tested using four benchmark images. Also, to evaluate the embedding effect, PSNR, NC and BER are calculated. The outcomes show that the proposed approach is practical and robust, where the obtained results are promising and do not raise any suspicion. In addition, it has a large capacity, and its results are imperceptible, especially when 1bit/block is embedded

    Simulation of steam gasification of halophyte biomass for syngas production using Aspen Plus

    No full text
    Exploring the new non-edible source of biomass for green energy production becomes extremely important with the increase in global energy crises. The primary objective of this work is to evaluate the potential of halophyte (Phragmites australis), a salt-tolerant plant for syngas production, and provide it as a promising alternative biofuel for sustainable energy production. This study is based on the steady-state chemical equilibrium model simulation of steam gasification of halophyte biomass (Phragmites australis) with CO2 capture through sorbent (CaO) using ASPEN PLUS®. The simulation model works on the principle of Gibbs free energy minimization. The operating parameters such as temperature, steam to biomass ratio (STBR), and CaO/biomass ratio have been varied over a wide range. The effect of high heating value (HHV), low heating value (LHV), H2/CO, carbon conversion efficiency (CCE), and cold gas efficiency (CGE) has been investigated for syngas production. The results showed that with the increase of temperature from 600 to 700 °C, H2 concentration increased from 69.52 to 75.16 vol %, respectively. A reduction in CO2 concentration from 16.91 to 5.4 vol % is observed by increasing the CaO/biomass ratio from 0.1 to 0.9. It has been observed that the product gas hydrogen yield rises with increased temperature. At an optimum temperature of 700 °C with an STBR of 0.4 and CaO/biomass ratio of 1.42, the maximum hydrogen yield is 75.16 vol % with a minimum CO2 content of 5.4 vol %. At these optimum conditions, the values of HHV, LHV, CCE, and CGE are 13.32 MJ/Nm3, 15.20 MJ/Nm3, 42.91%, and 78.63%, respectively. In addition, the developed model is validated against published literature data, and the results show good agreement with the published data. The relative error for hydrogen and carbon monoxide is within limits, i.e., 3.02% and 0.67% at 700 °C, 5.30% and 3.61% at 600 °C, and 10.62% and 35.03% at 500 °C, respectively, which validates the proposed model. It can be concluded that the sorption-based biomass gasification process is a promising technique for greener syngas production.Scopu
    corecore