8 research outputs found

    Encrypted Network Traffic Classification and Resource Allocation with Deep Learning in Software Defined Network

    Get PDF
    The climate has changed absolutely in every area in just a few years as digitized, making high-speed internet service a significant need in the future. Future Internet is supposed to face exponential growth in traffic, and highly complicated infrastructure, threatening to make conventional NTC approaches unreliable and even counterproductive. In recent days, AI Stimulated state-of-the-art breakthroughs with the ability to tackle extensive and multifarious challenges, and the network community is initiated by considering the NTC prototype from legacy rule-based towards a novel AI-based. Design and execution are applied to interdisciplinary become more essential. A smart home network supports various applications and smart devices within the proposed work, including e-health devices, regular computing devices, and home automation devices. Many devices accessible through the Internet by Home GateWay for Congestion (HGC) in a smart home. Throughout this paper, a Software-Defined Network Home GateWay for Congestion (SDNHGC) architecture for improved management of remote smart home networks and protection of the significant networks SDN controller. It enables effective network capacity regulation, focused on real-time traffic analysis and core network resource allocation. It cannot control the Network in dispersed smart homes. Our innovative SDNHGC expands power across the connectivity network, a smart home network enabling improved end-to-end monitoring of networks. The planned SDNHGC directly will gain centralized device identification by classifying traffic through a smart home network. Several of the current traffic classifications approach, checking deep packets, cannot have this real-time device knowledge for encrypted data to solve this issue

    Real-Time Automatic Investigation of Indian Roadway Animals by 3D Reconstruction Detection Using Deep Learning for R-3D-YOLOv3 Image Classification and Filtering

    No full text
    Statistical reports say that, from 2011 to 2021, more than 11,915 stray animals, such as cats, dogs, goats, cows, etc., and wild animals were wounded in road accidents. Most of the accidents occurred due to negligence and doziness of drivers. These issues can be handled brilliantly using stray and wild animals-vehicle interaction and the pedestrians’ awareness. This paper briefs a detailed forum on GPU-based embedded systems and ODT real-time applications. ML trains machines to recognize images more accurately than humans. This provides a unique and real-time solution using deep-learning real 3D motion-based YOLOv3 (DL-R-3D-YOLOv3) ODT of images on mobility. Besides, it discovers methods for multiple views of flexible objects using 3D reconstruction, especially for stray and wild animals. Computer vision-based IoT devices are also besieged by this DL-R-3D-YOLOv3 model. It seeks solutions by forecasting image filters to find object properties and semantics for object recognition methods leading to closed-loop ODT

    Real-Time Automatic Investigation of Indian Roadway Animals by 3D Reconstruction Detection Using Deep Learning for R-3D-YOLOv3 Image Classification and Filtering

    No full text
    Statistical reports say that, from 2011 to 2021, more than 11,915 stray animals, such as cats, dogs, goats, cows, etc., and wild animals were wounded in road accidents. Most of the accidents occurred due to negligence and doziness of drivers. These issues can be handled brilliantly using stray and wild animals-vehicle interaction and the pedestrians’ awareness. This paper briefs a detailed forum on GPU-based embedded systems and ODT real-time applications. ML trains machines to recognize images more accurately than humans. This provides a unique and real-time solution using deep-learning real 3D motion-based YOLOv3 (DL-R-3D-YOLOv3) ODT of images on mobility. Besides, it discovers methods for multiple views of flexible objects using 3D reconstruction, especially for stray and wild animals. Computer vision-based IoT devices are also besieged by this DL-R-3D-YOLOv3 model. It seeks solutions by forecasting image filters to find object properties and semantics for object recognition methods leading to closed-loop ODT

    Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption

    No full text
    Cloud computing environment (CCE) can empower an association to re-appropriate computing resources to increase monetary benefits. For both developers and the cloud users (CUs), CCE is transparent. Accordingly, it presents new difficulties when contrasted with precedent types of distributed computing. The precision of assessment results in CCE security risk assessment to take care of the issue of the multifaceted nature of the system and the classified fuzzy cloud method (CFCM) applied to CCE chance ID stage that captures the CCE risk factors through a complete investigation of CCE security area. Current CCE frameworks present a specific restriction on ensuring the client’s INFO privacy. We offer a homomorphic proxy re-encryption (HPRE) in this paper that enables various CU to share INFO that they redistributed HPRE encrypted utilizing their PubKs with the plausibility by a close procedure such as INFO remotely. The test of giving secrecy, uprightness, and access control (AC) of INFO facilitated on cloud stages is not provided for by conventional AC models. CFCM models were created through the duration of numerous decades to satisfy the association’s necessities, which accepted full authority over the physical structure of the assets. The hypothesis of the INFO proprietor, an INFO controller, and a supervisor is available in the equivalent trusted area. Besides, CCESR features like the essential unit, fuzzy set (FS) hypothesis, and EW strategy utilized to precisely measure the likelihood of CCE security risks (SR) and the subsequent damages of CCESR estimation. Eventually, the computation and authentication model specified, and the lack of CCE SECU threat evaluation examined

    Aquatic Peptide: The Potential Anti-Cancer and Anti-Microbial Activity of GE18 Derived from Pathogenic Fungus <i>Aphanomyces invadans</i>

    No full text
    Small molecules as well as peptide-based therapeutic approaches have attracted global interest due to their lower or no toxicity in nature, and their potential in addressing several health complications including immune diseases, cardiovascular diseases, metabolic disorders, osteoporosis and cancer. This study proposed a peptide, GE18 of subtilisin-like peptidase from the virulence factor of aquatic pathogenic fungus Aphanomyces invadans, which elicits anti-cancer and anti-microbial activities. To understand the potential GE18 peptide-induced biological effects, an in silico analysis, in vitro (L6 cells) and in vivo toxicity assays (using zebrafish embryo), in vitro anti-cancer assays and anti-microbial assays were performed. The outcomes of the in silico analyses demonstrated that the GE18 peptide has potent anti-cancer and anti-microbial activities. GE18 is non-toxic to in vitro non-cancerous cells and in vivo zebrafish larvae. However, the peptide showed significant anti-cancer properties against MCF-7 cells with an IC50 value of 35.34 µM, at 24 h. Besides the anti-proliferative effect on cancer cells, the peptide exposure does promote the ROS concentration, mitochondrial membrane potential and the subsequent upregulation of anti-cancer genes. On the other hand, GE18 elicits significant anti-microbial activity against P. aeruginosa, wherein GE18 significantly inhibits bacterial biofilm formation. Since the peptide has positively charged amino acid residues, it targets the cell membrane, as is evident in the FESEM analysis. Based on these outcomes, it is possible that the GE18 peptide is a significant anti-cancer and anti-microbial molecule

    The use of mosquito repellents at three sites in India with declining malaria transmission: surveys in the community and clinic

    Get PDF
    BACKGROUND: Repellents such as coils, vaporizers, mats and creams can be used to reduce the risk of malaria and other infectious diseases. Although evidence for their effectiveness is limited, they are advertised as providing an additional approach to mosquito control in combination with other strategies, e.g. insecticide-treated nets. We examined the use of repellents in India in an urban setting in Chennai (mainly Plasmodium vivax malaria), a peri-urban setting in Nadiad (both P. vivax and P. falciparum malaria), and a more rural setting in Raurkela (mainly P. falciparum malaria). METHODS: The use of repellents was examined at the household level during a census, and at the individual level in cross-sectional surveys and among patients visiting a clinic with fever or other symptoms. Factors associated with their use were examined in a multivariate analysis, and the association between malaria and the use of repellents was assessed among survey- and clinic participants. RESULTS: Characteristics of participants differed by region, with more people of higher education present in Chennai. Use of repellents varied between 56-77 % at the household level and between 32-78 % at the individual level. Vaporizers were the main repellents used in Chennai, whereas coils were more common in Nadiad and Raurkela. In Chennai and Nadiad, vaporizers were more likely to be used in households with young male children. Vaporizer use was associated with higher socio-economic status (SES) in households in Chennai and Nadiad, whereas use of coils was greater in the lower SES strata. In Raurkela, there was a higher use of coils among the higher SES strata. Education was associated with the use of a repellent among survey participants in Chennai and clinic study participants in Chennai and Nadiad. Repellent use was associated with less malaria in the clinic study in Chennai and Raurkela, but not in the surveys, with the exception of the use of coils in Nadiad. CONCLUSIONS: Repellents are widely used in India. Their use is influenced by the level of education and SES. Information on effectiveness and guidance on choices may improve rational use
    corecore