Results 61 to 70 of about 13,830 (202)
With the rapid advancement of cloud technologies, cloud services have enormously contributed to the cloud community for application development life-cycle.
Jannatun Noor +5 more
doaj +1 more source
Machine learning‐enhanced NIDS, integrating diverse data sources and rigorous feature selection, achieves near‐perfect detection of sophisticated evasive cyber threats—including APTs, DDoS, zero‐day exploits, and MitM attacks—surpassing industry benchmarks in accuracy, precision, recall, and F1$$ {\mathrm{F}}_1 $$‐score. ABSTRACT Advanced cyber threats
Khandakar Md Shafin +2 more
wiley +1 more source
Studying collective animal behaviour with drones and computer vision
Abstract Drones are increasingly popular for collecting behaviour data of group‐living animals, offering inexpensive and minimally disruptive observation methods. Imagery collected by drones can be rapidly analysed using computer vision techniques to extract information, including behaviour classification, habitat analysis and identification of ...
Jenna Kline +9 more
wiley +1 more source
In this paper, we propose a novel end-to-end approach for scalable visual search infrastructure. We discuss the challenges we faced for a massive volatile inventory like at eBay and present our solution to overcome those.
Bubnov, Yury +6 more
core +1 more source
Semi‐Automated Detection of Right Whales (Eubalaena spp.) in Very High‐Resolution Satellite Imagery
ABSTRACT Space‐based detection of whales is proliferating because it shows promise as a monitoring tool, yet tests of its application across taxa and environments are rare. The objective of this study was to develop an end‐to‐end, semi‐automated procedure for detecting two right whale species ( Eubalaena glacialis and E.
Kimberley T. A. Davies +7 more
wiley +1 more source
Monitoring Keamanan Runtime pada Kubernetes Menggunakan Falco
Penggunaan Kubernetes sebagai platform manajemen kontainer telah semakin meluas dalam beberapa tahun terakhir. Seiring dengan pertumbuhan penggunaan Kubernetes, keamanan menjadi isu krusial yang perlu diperhatikan secara serius.
Ryan Fadhillah, Nur Rohman Rosyid
doaj +1 more source
Open‐source AI at scale: Establishing an enterprise AI strategy through modular frameworks
Abstract We present a comprehensive enterprise AI strategy developed within the AI Center of Excellence at Fidelity Investments, emphasizing the strategic integration of open‐source AI frameworks into scalable, modular, and reproducible enterprise‐grade solutions.
Serdar Kadıoğlu
wiley +1 more source
Container menjadi alternatif virtualisasi infrastruktur layanan internet berkat efisiensi penggunaan sumber daya. Infrastruktur IT dapat terdiri dari beragam container, dengan Kubernetes berperan sebagai Container Orchestration.
Bayu Agung Prakoso +1 more
doaj +1 more source
Abstract Machine‐learning (ML) models in flow cytometry have the potential to reduce error rates, increase reproducibility, and boost the efficiency of clinical labs. While numerous ML models for flow cytometry data have been proposed, few studies have described the clinical deployment of such models.
Lauren M. Zuromski +10 more
wiley +1 more source
ABSTRACT Background Modern microservice architectures demand not only modularity, scalability, and maintainability but also adaptation to dynamic requirements. For applications deployed on Kubernetes, sidecar proxies have been used to separate the operational features (such as security, networking, or monitoring) from the application business logic by ...
Andoni Salcedo‐Navarro +2 more
wiley +1 more source

