10 research outputs found

    Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

    Get PDF
    Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud

    Optimizing olive disease classification through transfer learning with unmanned aerial vehicle imagery

    Get PDF
    Early detection of diseases in growing olive trees is essential for reducing costs and increasing productivity in this crucial economic activity. The quality and quantity of olive oil depend on the health of the fruit, making accurate and timely information on olive tree diseases critical to monitor growth and anticipate fruit output. The use of unmanned aerial vehicles (UAVs) and deep learning (DL) has made it possible to quickly monitor olive diseases over a large area indeed of limited sampling methods. Moreover, the limited number of research studies on olive disease detection has motivated us to enrich the literature with this work by introducing new disease classes and classification methods for this tree. In this study, we present a UAV system using convolutional neuronal network (CNN) and transfer learning (TL). We constructed an olive disease dataset of 14K images, processed and trained it with various CNN in addition to the proposed MobileNet-TL for improved classification and generalization. The simulation results confirm that this model allows for efficient diseases classification, with a precision accuracy achieving 99% in validation. In summary, TL has a positive impact on MobileNet architecture by improving its performance and reducing the training time for new tasks

    PERFORMANCE EVALUATION OF ENHANCED- GREEDY-TWO-PHASE DEPLOYMENT ALGORITHM

    No full text
    ABSTRAC

    A Secured Data Processing Technique for Effective Utilization of Cloud Computing

    No full text
    Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval. Regarding funding, tobuild a local data center will necessitate substantial investments. Fortunately, there is another optionthat will help researchers take advantage of these IT services to access, use and share informationeasily. Cloud services ideally offer on-demand software and resources over the Internet to read andanalyze ancient documents. More interestingly, billing system is completely flexible and based onresource usage and Quality of Service (QoS) level. In spite of its multiple advantages, outsourcingcomputations to an external provider arises several challenges. Specifically, security is the majorfactor hindering the widespread acceptance of this new concept. As a case study, we review the use ofcloud computing to process digital images safely. Recently, various solutions have been suggested tosecure data processing in cloud environement. Though, ensuring privacy and high performance needsmore improvements to protect the organization's most sensitive data. To this end, we propose aframework based on segmentation and watermarking techniques to ensure data privacy. In this respect,segementation algorithm is used to to protect client's data against untauhorized access, whilewatermarking method determines and maintains ownership. Consequentely, this framework willincrease the speed of development on ready-to-use digital humanities tools

    A novel approach based on segmentation for securing medical image processing over cloud

    No full text
    International audienceHealthcare professionals require advanced image processing software to enhance the quality of clinical decisions. However, any investment in sophisticated local applications would dramatically increase healthcare costs. To address this issue, medical providers are interested in adopting cloud technology. In spite of its multiple advantages, outsourcing computations to an external provider arises several challenges. In fact, security is the major factor hindering the widespread acceptance of this new concept. Recently, various solutions have been suggested to fulfill healthcare demands. Though, ensuring privacy and high performance needs more improvements to meet the healthcare sector requirements. To this end, we propose a framework based on segmentation approach to secure cloud-based medical image processing in the healthcare system

    Transfer Learning in Keratoconus Classification

    No full text
    Early detection of keratoconus will provide more treatment choices, avoid heavy treatments, and help stop the rapid progression of the disease. Unlike traditional methods of keratoconus classification, this study presents a machine learning-based keratoconus classification approach, using transfer learning, applied on corneal topographic images. Classification is performed considering the three corneal classes already cited : normal, suspicious and keratoconus. Keratoconus classification is carried out using six pretrained convolutional neural networks (CNN) VGG16, InceptionV3, MobileNet, DenseNet201, Xception and EfficientNetB0. Each of these different classifiers is trained individually on five different datasets, generated from an original dataset of 2924 corneal topographic images. Original corneal topographic images have been subjected to a special preprocessing before their use by different models in the learning phase. Images of corneal maps are separated in five different datasets while removing noise and textual annotation from images. Most of models used in the classification allow good discrimination between normal cornea, suspicious and keratoconus one. Obtained results reached classification accuracy of 99.31% and 98.51% by DenseNet201 and VGG16 respectively. Obtained results indicate that transfer learning technique could well improve performance of keratoconus classification systems

    Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

    No full text
    Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud

    Optimization techniques in deep convolutional neuronal networks applied to olive diseases classification

    No full text
    Plants diseases have a detrimental effect on the quality but also on the quantity of agricultural production. However, the prediction of these diseases is proving the effect on crop quality and on reducing the risk of production losses. Indeed, the detection of plant diseases -either with a naked eye or using traditional methods- is largely a cumbersome process in terms of time, availability and results with a high-risk error. The present work introduces a depth study of various CNN architectures with different optimization algorithms carried out for olive disease detection using classification techniques that recommend the best model for constructing an effective disease detector. This study presents a dataset of 5571 olive leaf images collected manually on real conditions from different regions of Morocco, that also includes healthy class to detect olive diseases. Further, one of the goals of this research was to study the correlation effects between CNN architectures and optimization algorithms evaluated by the accuracy and other performance metrics. The highest rate in trained models was 100 %, while the highest rate in experiments without data augmentation was 92,59 %. Another subject of this study is the influence of the optimization algorithms on neuronal network performance. As a result of the experiments carried out, the MobileNet architecture using Rmsprop algorithms outperformed the others combinations in terms of performance and efficiency of disease detector

    DLDiagnosis: A mobile and web application for diseases classification using Deep Learning

    No full text
    The detection and classification of several diseases is often carried out manually by specialists in several disciplines. Consequently, the diagnosis and the follow-up of the evolution of the diseases become more delicate and slower. The objective of this paper is to propose a system, in a web and mobile modes, allowing to detect and classify several diseases, such as brain cancer and diabetic retinopathy, according to different classes by a rigorous analysis and processing of images. Proposed software classify only image-based diseases and can assist, and not replace, specialists to propose the most appropriate therapeutic strategy to the patients according to their case, it makes it possible to follow patients over time by closely following the evolution of their diseases over diagnoses

    PLC channel characterization and modelling

    No full text
    This OMEGA deliverable presents a detailed study of the channel characterization and modelling for the Power Line Communications ({PLC}) channel. The Channel Transfer Function (CTF) is first thoroughly investigated. The channel time-frequency characteristics are studied from a measurement campaign covering a frequency band up to 100 MHz. Different approaches for the modelling of the CTF are proposed. Statistical channel generators are derived from both experimental observations and analytical representations, and an approach based on the transmission line theory is provided to study the effect of the network topology. Then, the impulsive noise generated by different electrical appliances is experimentally characterized at the source, and used to generate a model at the receiver. Stationary noise is finally investigated by both literature overview and experimental observations, and a simple model is provided. The models proposed in this deliverable will be used to support future studies on advanced signal processing techniques for {PLC} systems
    corecore