In this work, we compare the performance of six popular evolutionary algorithms to address the problem of allocating applications to devices in a fog infrastructure. the optimization of application placement is carrie...
详细信息
ISBN:
(纸本)9798400702341
In this work, we compare the performance of six popular evolutionary algorithms to address the problem of allocating applications to devices in a fog infrastructure. the optimization of application placement is carried out withthe objectives of minimizing the number of devices assigned to applications and reducing the network distance between applications and the users who request them. We evaluate the algorithms based on their proximity to the true Pareto front and the diversity of the solution space they provide. the experimental phase demonstrates that the non-dominated sorting genetic algorithm family (NSGA) of algorithms achieves Pareto fronts that closely approach the true Pareto front, as determined by ILP optimization.
the prosperity of the construction industry in Egypt at the expense of occupational safety and health of the worker there are several factors [1]. for the occurrence of these accidents, such as. Construction projects ...
详细信息
the proceedings contain 9 papers. the special focus in this conference is on theory and Practice of Natural computing. the topics include: Dynamic Heuristic Set Selection for Cross-Domain Selection Hyper-heuristics;on...
ISBN:
(纸本)9783030904241
the proceedings contain 9 papers. the special focus in this conference is on theory and Practice of Natural computing. the topics include: Dynamic Heuristic Set Selection for Cross-Domain Selection Hyper-heuristics;on the Transfer Learning of Genetic Programming Classification Algorithms;on Injecting Entropy-Like Features into Deep Neural Networks for Content Relevance Assessment;ABCD: Analogy-Based Controllable Data Augmentation;MOEA/D with Adaptative Number of Weight Vectors;parallel Asynchronous Memetic Optimization for Freeform Optical Design;ant-Based Generation Constructive Hyper-heuristics for the Movie Scene Scheduling Problem.
In order to improve the imaging quality of two-dimensional inverse synthetic aperture radar (ISAR) under the conditions of low signal-to-noise ratio (SNR) and sparsity rate (SR), in view of pattern-coupled sparse stru...
详细信息
At the present IC technologies, the accurately extraction of the interconnects parasitic parameters become more important. But for the time consuming, that computingthe parameters of interconnects with field solver d...
详细信息
In modern information warfare, radar must apply some anti-jamming technologies. Digital radio frequency memory (DRFM) and its technology can adapt to the complex threat signal environment and have an excellent jamming...
详细信息
Scientific Workflow Applications (SWFA) play a vital role for both service consumers and service providers in designing and implementing large and complex scientific processes. Previously, researchers used parallel an...
详细信息
the proceedings contain 38 papers. the special focus in this conference is on Innovations in Bio-Inspired computing and Applications. the topics include: Soft computing approach on minimisation of indirect losses in p...
ISBN:
(纸本)9783030493387
the proceedings contain 38 papers. the special focus in this conference is on Innovations in Bio-Inspired computing and Applications. the topics include: Soft computing approach on minimisation of indirect losses in power generation for efficiency enhancing;a machine learning prediction of automatic text based assessment for open and distance learning: A review;analysis of pre-processing techniques for odia character recognition;cluster-based under-sampling using farthest neighbour technique for imbalanced datasets;vehicle detection and classification: A review;methods for automatic gait recognition: A review;comparative performance exploration and prediction of fibrosis, malign lymph, metastases, normal lymphogram using machine learning method;decision forest classifier with flower search optimization algorithm for efficient detection of bhp flooding attacks in optical burst switching network;welcome message;towards the speed enhancement of association rule mining algorithm for intrusion detection system;review and implementation of 1-bit adder in cmos and hybrid structures;design and analysis of lol-p textile antenna;analytical study of scalability in coastal communication using hybridization of mobile ad-hoc network: An assessment to coastal bed of odisha;effect of environmental and occupational exposures on human telomere length and aging: A review;a review on vlsi implementation in biomedical application;comparative analysis of a dispersion compensating fiber optic link using fbg based on different grating length and extinction ratio for long haul communication;unsupervised learning method for mineral identification from hyperspectral data;short term load forecasting using empirical mode decomposition (emd), particle swarm optimization (pso) and adaptive network-based fuzzy interference systems (anfis).
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may m...
详细信息
ISBN:
(纸本)9780769546001
One of the essential but formidable tasks in cloud computing is to detect malicious attacks and their types. A cloud provider's constraints or inability in monitoring its employees, and lack of transparency, may make the detection process even harder. We found these insiders' activities form similar pattern in the monitoring systems as some other cyber attacks because these also uses huge computer resources. In this paper we first provide a brief overview on the importance of monitoring insiders' activities through a literature survey on cloud computing security. then, we observe some of the real life insiders' activities that can be detected from the performance data in a hypervisor and its guest operating systems. Rule based learning is successfully used for identification of these activities in this research. We further observe that some of these insiders' activities can on occasions turn into a malicious insider's attack, and thus, need constant monitoring in the cloud environment.
this contribution evaluates semi-automated annotation for generating high-quality data for multi-channel time series Human Activity recognition. For this purpose, time series data that consists of Optical Motion Captu...
详细信息
ISBN:
(纸本)9781665404242
this contribution evaluates semi-automated annotation for generating high-quality data for multi-channel time series Human Activity recognition. For this purpose, time series data that consists of Optical Motion Capturing and inertial measurements from on-body devices for industrial deployment is created, annotated, and revised by four individuals. the semi-automated annotation consists of predictions from a temporal convolutional neural-network, and manual revisions for generating high-quality and fine-grained annotations for Human Activity recognition. this annotation approach reduces the annotation effort keeping similar quality as compared to manual annotation.
暂无评论