In this paper, a three stage hierarchical image retrieval scheme using a color, texture and shape visual contents (or descriptors) is proposed, since single visual content is not produce an adequate retrieval results effectively. This scheme has reduced the searching space during the image retrieval process at a certain extent due to the hierarchical mode. In Initial stage, the shape feature descriptor has been computed by simple fusion of histograms of gradients and invariant moments of segmented image planes. The shape based retrieval process has reduced the search space by discarding the non-relevant images from the universal dataset (or original dataset) effectively and kept the retrieved images into the intermediate dataset. In the second stage, the texture feature descriptors have been computed from the intermediate sub-image dataset by applying the adaptive tetrolet transform on image plane of preprocessed HSV color image. This transform provides the multi-resolution images with finer details by employing the tetrominoes and the proper arrangement of tetrominoes contributes the effective local geometry of image plane. The gray level co-occurrence matrix based texture feature descriptor is obtained by computing second order statistical parameters from each decomposed sub-image. At this stage, the most of the irrelevant images are discarded by retrieving the images from intermediate dataset but still some undesired images are left, those will be handled at the last stage. At this stage, fused color information is captured by applying the color autocorrelogram on both the non-uniform quantized color components of the preprocessed HSV color image. Finally, the color feature descriptor produces the desired retrieval results by discarding the irrelevant images from the texture based sub-image dataset. The proposed scheme has also low computational overhead due to the use of three descriptors at different stages separately. The retrieved results show the better accuracy as compared to the other related visual contents based image retrieval schemes.
The application of cloud computing has increased tremendously in both public and private organizations. However, attacks on cloud computing pose a serious threat to confidentiality and data integrity. Therefore, there is a need for a proper mechanism for detecting cloud intrusions. In this paper, we have proposed a cloud intrusion detection system (IDS) that is focused on boosting the classification accuracy by improving feature selection and weighing the ensemble model with the crow search algorithm (CSA). The feature selection is handled by combining both filter and automated models to obtain improved feature sets. The ensemble classifier is made up of machine and deep learning models such as long short-term memory (LSTM), support vector machine (SVM), XGBoost, and a fast learning network (FLN). The proposed ensemble model’s weights are generated with the CSA to obtain better prediction results. Experiments are executed on the NSL-KDD, Kyoto, and CSE-CIC-IDS-2018 datasets. The simulation shows that the suggested system attained more satisfactory results in terms of accuracy, recall, precision, and F-measure than conventional approaches. The detection rate and false alarm rate (FAR) of different attack types was more efficient for each dataset. The classifiers’ performances were also compared individually to the ensemble model in terms of the false positive rate (FPR) and false negative rate (FNR) to demonstrate the ensemble model’s robustness.
The most significant factor for software development is software security. In today's era security being the most crucial quality aspect as well as imperative demand for any software projects. To address security a number of approaches, techniques and design have been evolved to secure software applications. Security requirements are used during the software development life cycle in order to reduce vulnerabilities particularly during requirement elicitation by performing functions such as measuring adherence to secure requirement standards, identifying likely vulnerabilities that may exist, and tracing and inspecting security flaws that are sooner or later discovered. To achieve these objectives, the assessment of security using model is more appropriate and its validation signifies the valid impact of functional requirement of secure software. The model to quantify confidentiality is developed using multiple linear regression technique on requirement constructs. The statistical analysis on this study concludes its statistical significance that the calculated data is highly acceptable.
Purpose The paper aims to precise and fast categorization on to transaction evolves into indispensible. The effective capacity difficulty of all the IDS simulates today at below discovery amount of fewer regular barrage associations and therefore the next warning rate. Design/methodology/approach The reticulum perception is that the methods which examine and determine the scheme of contact on unearths toward number of dangerous and perchance fateful interchanges occurring toward the system. Within character of guaran-teeing the slumberous, opening and uprightness count of to socialize for professional. The precise and fast categorization on to transaction evolves into indispensible. The effective capacity difficulty of all the intrusion detection simulation (IDS) simulates today at below discovery amount of fewer regular barrage associations and therefore the next warning rate. The container with systems of connections are reproduction everything beacon subject to the series of actions to achieve results accepts exists a contemporary well-known method. At the indicated motivation a hybrid methodology supported pairing distinct ripple transformation and human intelligence artificial neural network (ANN) for IDS is projected. The lack of balance of the situation traversing the space beyond information range was eliminated through synthetic minority oversampling technique-based oversampling have low regular object and irregular below examine of the dominant object. We are binding with three layer ANN is being used for classification, and thus the experimental results on knowledge discovery databases are being used for the facts in occurrence of accuracy rate and disclosure estimation toward identical period. True and false made up accepted. Findings At the indicated motivation a hybrid methodology supported pairing distinct ripple transformation and human intelligence ANN for IDS is projected. The lack of balance of the situation traversing the space beyond information range was eliminated through synthetic minority oversampling technique-based oversampling have low regular object and irregular below examine of the dominant object. Originality/value Chain interruption discovery is the series of actions for the results knowing the familiarity opening and honor number associate order, the scientific categorization undertaking become necessary. The capacity issues of invasion discovery is the order to determine and examine. The arrangement of simulations at the occasion under discovery estimation for low regular aggression associations and above made up feeling sudden panic amount.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.