Mutual exclusion is one of the fundamental problems in distributedcomputing but existing mutual exclusion algorithms are unadapted to the dynamics and lack of membership knowledge of current distributed systems (e.g....
详细信息
ISBN:
(纸本)9781450360944
Mutual exclusion is one of the fundamental problems in distributedcomputing but existing mutual exclusion algorithms are unadapted to the dynamics and lack of membership knowledge of current distributed systems (e.g., mobile ad-hoc networks, peer-to-peer systems, etc.). Additionally, in order to circumvent the impossibility of solving mutual exclusion in asynchronous message passing systems where processes can crash, some solutions include the use of (T+Sigma(l)) [3], which is the weakest failure detector to solve mutual exclusion in known static distributed systems. In this paper, we define a new failure detector T Sigma(lr) which is equivalent to (T+Sigma(l)) in known static systems, and prove that T Sigma(lr) is the weakest failure detector to solve mutual exclusion in unknown dynamic systems with partial memory losses. We consider that crashed processes may recover.
Bangla is one of the 8th major spoken languages around the world and like other widely spoken languages, it is a very morphologically rich language. It has two styles, one is standard literary style, known as Sadhu Bh...
详细信息
ISBN:
(数字)9781728168517
ISBN:
(纸本)9781728168524
Bangla is one of the 8th major spoken languages around the world and like other widely spoken languages, it is a very morphologically rich language. It has two styles, one is standard literary style, known as Sadhu Bhasha and the other one is a standard colloquial style which is known as Cholito Bhasha. Mixing boththe styles in a written document is considered as a grammatical error in Bangla language known as Guruchondali Dosh. this research aims to develop an algorithm to identify the style of a Bangla paragraph i.e. whether it is in Sadhu Bhasha or Cholito Bhasha from a given Bangla paragraph input. It's a contribution towards finding the Goruchondali Dosh which is a common grammatical mistake in written Bangla language as it was observed that a number of research work for identifying Bangla grammar mistakes is not so notable whereas it is a common trend in other language researchers.
the misuse of technologies increases withthe increase in technology development. Due to the recent progress that has met the face of social media, tools for editing videos and audios, and Generative Adversarial Netwo...
详细信息
ISBN:
(数字)9781728168517
ISBN:
(纸本)9781728168524
the misuse of technologies increases withthe increase in technology development. Due to the recent progress that has met the face of social media, tools for editing videos and audios, and Generative Adversarial Networks, manipulated videos has been going around on social media networks and the like, in a rapid manner. Most of these intentionally manipulated videos, created for deliberate misinformation and the like have initiated blockbusting fiascos in communities around the whole world. In fact, there are cases where people body parts are switched from one person to another, using neural networks to form DeepFake videos, as it is called. Some of these editing tools are freely accessible, and that is a threat, a technical one! To deal withthis, it is required to develop a platform where such DeepFake contents can be automatically filtered.
Nowadays, Sentiment Analysis is one of the advanced matters of natural language processing. Sentiment analysis determines a particular pole of a paragraph. Our purpose is to find the sentiment from the Bengali paragra...
详细信息
ISBN:
(数字)9781728168517
ISBN:
(纸本)9781728168524
Nowadays, Sentiment Analysis is one of the advanced matters of natural language processing. Sentiment analysis determines a particular pole of a paragraph. Our purpose is to find the sentiment from the Bengali paragraph which is happy or sad using various types of machine learning classification analysis algorithms. For doing this we are collecting data from various social network sites, Bengali blogs, etc. To get a compatible result, we passed through many difficulties. Bengali text preprocessing is one of the complex parts of all. After preprocessing the data, we tokenized the data by using Countvectorizer. After that, we applied six different algorithms to predict almost high accuracy. Among them, the Multinomial Naive Bayes provide us the maximum accuracy which is 86.67%.
We numerically demonstrate an improved photonic crystal fiber using octagonal structure due to its achievement in ultra-high negative dispersion value and large nonlinearity simultaneously. For analysis and inspection...
详细信息
ISBN:
(数字)9781728168517
ISBN:
(纸本)9781728168524
We numerically demonstrate an improved photonic crystal fiber using octagonal structure due to its achievement in ultra-high negative dispersion value and large nonlinearity simultaneously. For analysis and inspection, the guiding properties of PCF, Finite Element Method (FEM) with perfectly matched layer is used. It is reported that the designed structure exhibits a large dispersion of -2012 *** -1 . km -1 at 1550nm wavelength. Due to structural simplicity and improved dispersion properties, the designed PCF can be easily fabricated. In addition, the proposed structure makes itself suitable for sensing, dispersion compensation and super continuum generation.
Video game piracy is the illegal downloading and sharing of video game content, a type of copyright infringement. It is a major problem faced by video game publishers when selling their games, owing to the ease of dow...
详细信息
ISBN:
(数字)9781728168517
ISBN:
(纸本)9781728168524
Video game piracy is the illegal downloading and sharing of video game content, a type of copyright infringement. It is a major problem faced by video game publishers when selling their games, owing to the ease of downloading games through torrents or DDL websites. Digital Rights Management (DRM) tools are used to hinder piracy. And yet DRM remains a false barrier as crackers invariably break the DRM and release the video game on P2P file sharing platforms and torrent websites within few days of the launch of the video game. this research paper investigates the existing DRM or copy protection methods used in video games and presents new solutions that could be implemented with DRM thereby making the video games harder to crack.
Developing an event-driven applications for network management systems(NMS) requires data-wrangling operations to be performed in a data pipeline with low latency and high throughput. Data stream processing engines(SP...
详细信息
ISBN:
(数字)9781728168517
ISBN:
(纸本)9781728168524
Developing an event-driven applications for network management systems(NMS) requires data-wrangling operations to be performed in a data pipeline with low latency and high throughput. Data stream processing engines(SPEs) enables the pipeline to feature extract complex data in near real time. We present a low latency and high throughput data pipeline that performs operations such as data cleansing, filtering, aggregations and join of streams on pipeline stages for event-driven machine learning applications. When the data stream has imbalance in arrival of records, a standalone system handle it ineffectively that reduces the performance of data pipeline. In this work, the system powered by SPEs handle the imbalance by scaling out resources and degree of parallelism such that performance is not degraded.
Geospatial data analysis is an emerging area of research today due to the potential to enable varied location-aware services. the existing centralized cloud-based analysis becomes time and computing-intensive for huge...
详细信息
ISBN:
(纸本)9781728152868
Geospatial data analysis is an emerging area of research today due to the potential to enable varied location-aware services. the existing centralized cloud-based analysis becomes time and computing-intensive for huge amount of geospatial data processing. this paper addresses the challenge of time and power-efficiency in QoS-aware geospatial query resolution. We propose a cloudlet based hierarchical paradigm, namely Geo-Cloudlet, where the cloudlets contain the geospatial data of the districts. the state and national level geospatial data are stored inside the state cloud and country cloud respectively. the query resolution is performed by either the cloudlet or by the state cloud or country cloud depending upon the geographical region related to the query. the experimental analysis illustrates that the proposed architecture Geo-Cloudlet reduces the latency up to 61.3% and power consumption up to 61.1% over the use of only remote cloud servers for geospatial query resolution.
Social media data or social data is the data generated by users of a social media platform. this significant amount of data produced by users shows their behavior on a particular platform, for example, Twitter, Facebo...
详细信息
ISBN:
(数字)9781728168517
ISBN:
(纸本)9781728168524
Social media data or social data is the data generated by users of a social media platform. this significant amount of data produced by users shows their behavior on a particular platform, for example, Twitter, Facebook, and Instagram. Data mining techniques are prevalent in extracting knowledge from social data, but there is much scope in looking at the data from the process mining point of view. We have used a novel process mining technique called Object-Centric Behavioral Constraint modeling for analyzing live social data. Also, deviations from the actual model are analyzed using conformance checking. To bring both process mining and data mining together, we have also done lexicon-based sentiment analysis on the live data.
暂无评论