the major purpose of this study is to incorporate the latest technologies such as Blockchain and AI withthe concept of omni channeling for better and improved healthcare services. the study also highlights how the tr...
详细信息
machinelearning can be used for anything in our daily lives using TinyML, with low power and memory constraints. this chapter shows a test of the capability of Arduino Nano 33 BLE Sense board to perform machine learn...
详细信息
Farmers and agro-industries must automate seed segregation because it is a time-consuming and labor-intensive task when performed manually. Deep learning (DL) and machinelearning (ML) based algorithms have exhibited ...
详细信息
the proceedings contain 22 papers. the topics discussed include: machinelearning for socially responsible portfolio optimization;leveraging deep learning approaches for deepfake detection: a review;predicting open pa...
ISBN:
(纸本)9781450399920
the proceedings contain 22 papers. the topics discussed include: machinelearning for socially responsible portfolio optimization;leveraging deep learning approaches for deepfake detection: a review;predicting open parking space using deep learning and support vector regression;habitat prediction and knowledge extraction for marine bivalves using machinelearning techniques;optimized computational diabetes prediction with feature selection algorithms;chaos gray wolf global optimization algorithm based on opposition-based learning;a learnheuristic approach to a constrained multi-objective portfolio optimization problem;analyzing the computing time to solve single row facility layout problems by simulated annealing in a Python framework;feature selection using gravitational search algorithm in customer churn prediction;and set-based particle swarm optimization for data clustering: comparison and analysis of control parameters.
We present MECBench, an extensible benchmarking framework for multi-access edge computing. MECBench is configurable, and can emulate networks with different capabilities and conditions, can scale the generated workloa...
详细信息
ISBN:
(纸本)9798350304831
We present MECBench, an extensible benchmarking framework for multi-access edge computing. MECBench is configurable, and can emulate networks with different capabilities and conditions, can scale the generated workloads to mimic a large number of clients, and can generate a range of workload patterns. MECBench is extensible;it can be extended to change the generated workload, use new datasets, and integrate new applications. MECBench's implementation includes machinelearning and synthetic edge applications. We demonstrate MECBench's capabilities through two scenarios: an object detection scheme for drone navigation and a natural language processing application. Our evaluation shows that MECBench can be used to answer complex what-if questions pertaining to design and deployment decisions of MEC platforms and applications. Our evaluation explores the impact of different combinations of applications, hardware, and network conditions, as well as the cost-benefit tradeoff of different designs and configurations.
Graphs representation learning is an emerging research topic. Graph representation learning generates vectors that capture immense graphs' structure and properties. the quality of graph representation vectors affe...
详细信息
Over the past few decades, Deep learning (DL), which is a subpart of machinelearning (ML), has gained recognition as the dominant technique in diverse domains such as Computer Vision, Natural Language Processing, and...
详细信息
Internet of things (IoT) devices are omnipresent due to their ease of use and level of connectivity. Because of wide deployment, IoT network traffic security is a large issue, especially as the devices become more com...
详细信息
ISBN:
(纸本)9798350304831
Internet of things (IoT) devices are omnipresent due to their ease of use and level of connectivity. Because of wide deployment, IoT network traffic security is a large issue, especially as the devices become more common at the edge of the connected ecosystem. In general, low-powered IoT devices themselves are not inherently secure, so tailored security mechanisms are needed to make the ecosystem secure. the incorporation of the cloud also adds new security issues withthe cloud service provider (CSP). In addition, several smart applications necessitate deploying edge-based infrastructure due to their real-time computation and communication requirements, while also having the ability to detect and mitigate different cyber attacks and remain light-weight. In this paper, we propose a machinelearning-based approach to detect and classify different edge IoT network traffic driven cyber attacks, and evaluate their strengths and weaknesses. Particularly, we will compare eleven machinelearning models to determine the best security agent trained for attack detection and classification on an edge IoT cyber security dataset with fourteen different attacks. We also provide experimental evaluation and analysis of our work, followed by our conclusion.
this study has proposed a novel technique for performing object detection and image classification with a Convolutional Neural Network (CNN) architecture. Nevertheless, employing a 2D CNN architecture to identify a lo...
详细信息
Internet of things (IoT) has a wide range of threats to businesses, according to security experts. Organizations need an intelligent system that can automatically detect suspicious IoT devices linked to their networks...
详细信息
暂无评论