-
The importance of the clustering model to detect new types of intrusion in data traffic
Authors:
Noor Saud Abd,
Noor Walid Khalid,
Basim Hussein Ali
Abstract:
In the current digital age, the volume of data generated by various cyber activities has become enormous and is constantly increasing. The data may contain valuable insights that can be harnessed to improve cyber security measures. However, much of this data is unclassified and qualitative, which poses significant challenges to traditional analysis methods. Clustering facilitates the identificatio…
▽ More
In the current digital age, the volume of data generated by various cyber activities has become enormous and is constantly increasing. The data may contain valuable insights that can be harnessed to improve cyber security measures. However, much of this data is unclassified and qualitative, which poses significant challenges to traditional analysis methods. Clustering facilitates the identification of hidden patterns and structures in data through grouping similar data points, which makes it simpler to identify and address threats. Clustering can be defined as a data mining (DM) approach, which uses similarity calculations for dividing a data set into several categories. Hierarchical, density-based, along with partitioning clustering algorithms are typical. The presented work use K-means algorithm, which is a popular clustering technique. Utilizing K-means algorithm, we worked with two different types of data: first, we gathered data with the use of XG-boost algorithm following completing the aggregation with K-means algorithm. Data was gathered utilizing Kali Linux environment, cicflowmeter traffic, and Putty Software tools with the use of diverse and simple attacks. The concept could assist in identifying new attack types, which are distinct from the known attacks, and labeling them based on the characteristics they will exhibit, as the dynamic nature regarding cyber threats means that new attack types often emerge, for which labeled data might not yet exist. The model counted the attacks and assigned numbers to each one of them. Secondly, We tried the same work on the ready data inside the Kaggle repository called (Intrusion Detection in Internet of Things Network), and the clustering model worked well and detected the number of attacks correctly as shown in the results section.
△ Less
Submitted 26 March, 2025; v1 submitted 21 November, 2024;
originally announced November 2024.
-
Simulated Annealing in Early Layers Leads to Better Generalization
Authors:
Amirmohammad Sarfi,
Zahra Karimpour,
Muawiz Chaudhary,
Nasir M. Khalid,
Mirco Ravanelli,
Sudhir Mudur,
Eugene Belilovsky
Abstract:
Recently, a number of iterative learning methods have been introduced to improve generalization. These typically rely on training for longer periods of time in exchange for improved generalization. LLF (later-layer-forgetting) is a state-of-the-art method in this category. It strengthens learning in early layers by periodically re-initializing the last few layers of the network. Our principal inno…
▽ More
Recently, a number of iterative learning methods have been introduced to improve generalization. These typically rely on training for longer periods of time in exchange for improved generalization. LLF (later-layer-forgetting) is a state-of-the-art method in this category. It strengthens learning in early layers by periodically re-initializing the last few layers of the network. Our principal innovation in this work is to use Simulated annealing in EArly Layers (SEAL) of the network in place of re-initialization of later layers. Essentially, later layers go through the normal gradient descent process, while the early layers go through short stints of gradient ascent followed by gradient descent. Extensive experiments on the popular Tiny-ImageNet dataset benchmark and a series of transfer learning and few-shot learning tasks show that we outperform LLF by a significant margin. We further show that, compared to normal training, LLF features, although improving on the target task, degrade the transfer learning performance across all datasets we explored. In comparison, our method outperforms LLF across the same target datasets by a large margin. We also show that the prediction depth of our method is significantly lower than that of LLF and normal training, indicating on average better prediction performance.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
CLIP-Mesh: Generating textured meshes from text using pretrained image-text models
Authors:
Nasir Mohammad Khalid,
Tianhao Xie,
Eugene Belilovsky,
Tiberiu Popa
Abstract:
We present a technique for zero-shot generation of a 3D model using only a target text prompt. Without any 3D supervision our method deforms the control shape of a limit subdivided surface along with its texture map and normal map to obtain a 3D asset that corresponds to the input text prompt and can be easily deployed into games or modeling applications. We rely only on a pre-trained CLIP model t…
▽ More
We present a technique for zero-shot generation of a 3D model using only a target text prompt. Without any 3D supervision our method deforms the control shape of a limit subdivided surface along with its texture map and normal map to obtain a 3D asset that corresponds to the input text prompt and can be easily deployed into games or modeling applications. We rely only on a pre-trained CLIP model that compares the input text prompt with differentiably rendered images of our 3D model. While previous works have focused on stylization or required training of generative models we perform optimization on mesh parameters directly to generate shape, texture or both. To constrain the optimization to produce plausible meshes and textures we introduce a number of techniques using image augmentations and the use of a pretrained prior that generates CLIP image embeddings given a text embedding.
△ Less
Submitted 2 September, 2022; v1 submitted 24 March, 2022;
originally announced March 2022.
-
Persistent And Scalable JADE: A Cloud based InMemory Multi-agent Framework
Authors:
Nauman Khalid,
Ghalib Ahmed Tahir,
Peter Bloodsworth
Abstract:
Multi-agent systems are often limited in terms of persistenceand scalability. This issue is more prevalent for applications inwhich agent states changes frequently. This makes the existingmethods less usable as they increase the agent's complexityand are less scalable. This research study has presented anovel in-memory agent persistence framework. Two prototypeshave been implemented, one using the…
▽ More
Multi-agent systems are often limited in terms of persistenceand scalability. This issue is more prevalent for applications inwhich agent states changes frequently. This makes the existingmethods less usable as they increase the agent's complexityand are less scalable. This research study has presented anovel in-memory agent persistence framework. Two prototypeshave been implemented, one using the proposed solution andthe other using an established agent persistency environment.Experimental results confirm that the proposed framework ismore scalable than existing approaches whilst providing asimilar level of persistency. These findings will help futurereal-time multiagent systems to become scalable and persistentin a dynamic cloud environment.
△ Less
Submitted 16 September, 2020; v1 submitted 14 September, 2020;
originally announced September 2020.
-
Hardware-Accelerated Raycasting: Towards an Effective Brain MRI Visualization
Authors:
A. M. Adeshina,
R. Hashim,
N. E. A. Khalid,
Siti Z. Z. Abidin
Abstract:
The rapid development in information technology has immensely contributed to the use of modern approaches for visualizing volumetric data. Consequently, medical volume visualization is increasingly attracting attention towards achieving an effective visualization algorithm for medical diagnosis and pre-treatment planning. Previously, research has been addressing implementation of algorithm that ca…
▽ More
The rapid development in information technology has immensely contributed to the use of modern approaches for visualizing volumetric data. Consequently, medical volume visualization is increasingly attracting attention towards achieving an effective visualization algorithm for medical diagnosis and pre-treatment planning. Previously, research has been addressing implementation of algorithm that can visualize 2-D images into 3-D. Meanwhile, achieving such a rendering algorithm at an interactive speed and of good robustness to handle mass data still remains a challenging issue. However, in medical diagnosis, finding the exact location of brain tumor or diseases is an important step of surgery / disease management. This paper proposes a GPU-based raycasting algorithm for accurate allocation and localization of human brain abnormalities using magnetic resonance (MRI) images of normal and abnormal patients.
Keywords: Brain tumor, graphic processing units, magnetic resonance imaging, volume visualization
△ Less
Submitted 21 November, 2012;
originally announced November 2012.