Cloud computing is an internet-based pool of heterogeneous resources. the development of Cloud is scalable and reliable to make availability of resources when required to online users. Resources are provided as a serv...
详细信息
ISBN:
(纸本)9781509030385
Cloud computing is an internet-based pool of heterogeneous resources. the development of Cloud is scalable and reliable to make availability of resources when required to online users. Resources are provided as a service on demand with payment done on use basis. Nowadays, for less cost and maximize resource utilization, mainly computing is done on Cloud. Cloud simulator is a collection of java classes that provides simulation of concepts of cloud computing. Cloudlet scheduling is one of the most important task in cloud computing. this paper presents fundamental study on the functions of CloudSim simulator and provides tabulated view of various scheduling algorithms used in cloud environment withtheir parameters and results.
Named data networking (NDN) had been considered as a most recognizable Information Centric networking (ICN) infrastructure. the deployment of NDN in the internet architecture requires the confidentiality and integrity...
详细信息
Named data networking (NDN) had been considered as a most recognizable Information Centric networking (ICN) infrastructure. the deployment of NDN in the internet architecture requires the confidentiality and integrity of the contents. In this context, Elliptic Curve Digital Signature Algorithm (ECDSA) is a more promising algorithm. this research applied Montgomery Reduction on the existing asymmetrical security algorithm to shorter the processing period, lower the memory consumption and reduce the complexity over large computational requests. An experiment had been implemented in NDNv2 over ndnSIM environment. the results showed that modified ECDSA has reduced the processing period of 1% - 3% in private key generation and 50% in public key signing based on exponential analysis on modified ECDSA over existing ECDSA in key generation. the total time required to establish the connection among the nodes in NDN also has reduced of 12% by using modified ECDSA over ndnSIM.
A distributed data warehouse system is one of the actual issues in the field of astroparticle physics. Famous experiments, such as TAIGA, KASCADE-Grande, produce tens of terabytes of data measured by their instruments...
详细信息
Contemporary tendency of use the cloud architectures is quite common. Many tests show that the price for using a commercial cloud is feasible for most of applications including High Energy Physics. At the same time, m...
详细信息
University ITMO (***) is developing the cloud of geographically distributed data centers under OpenStack. the article describes the deployment cycle for the developed multi-agent system on physical and virtual machine...
详细信息
Identification of ovarian status and follicle monitoring becomes the most important part in the evaluation of an infertile woman. Ultrasound or sonography has helped in diagnosis and treatment of infertile patients. U...
详细信息
ISBN:
(纸本)9781509030385
Identification of ovarian status and follicle monitoring becomes the most important part in the evaluation of an infertile woman. Ultrasound or sonography has helped in diagnosis and treatment of infertile patients. Ultrasound imaging of the follicles in the ovary gives very important information about the ovary such as type of cyst, number of follicles and size of follicles response to hormonal imbalance. Image Segmentation gives more information in the region of interest in an image and clearly differentiate the object and the background from the image. But it is very hard to perform segmentation on ultrasound images due to presence of noise so by using image preprocessing with morphological operations, detection of follicles becomes easy and effective. Classification of Ovarian cyst is done using fuzzy logic.
theoretical and experimental investigations of water vapor interaction with porous materials are very needful for various fields of science and technology. Mathematical modelling plays an important role in these inves...
详细信息
this paper presents a deep random walk technique for drusen segmentation from fundus images. It is formulated as a deep learning architecture which learns deep representations from fundus images and specify an optimal...
详细信息
ISBN:
(纸本)9783030009342;9783030009335
this paper presents a deep random walk technique for drusen segmentation from fundus images. It is formulated as a deep learning architecture which learns deep representations from fundus images and specify an optimal pixel-pixel affinity. Specifically, the proposed architecture is mainly composed of three parts: a deep feature extraction module to learn both semantic-level and low-level representation of image, an affinity learning module to get pixel-pixel affinities for formulating the transition matrix of random walk and a random walk module which propagates manual labels. the power of our technique comes from the fact that the learning procedures for deep image representations and pixel-pixel affinities are driven by the random walk process. the accuracy of our proposed algorithm surpasses state-of-the-art drusen segmentation techniques as validated on the public STARE and DRIVE databases.
Withthe evolution of computing from using personal computers to use of online Internet of things (IoT) services and applications, security risks have also evolved as a major concern. the use of Fog computing enhances...
详细信息
ISBN:
(纸本)9781509030385
Withthe evolution of computing from using personal computers to use of online Internet of things (IoT) services and applications, security risks have also evolved as a major concern. the use of Fog computing enhances reliability and availability of the online services due to enhanced heterogeneity and increased number of computing servers. However, security remains an open challenge. Various trust models have been proposed to measure the security strength of available service providers. We utilize the quantized security of Datacenters and propose a new security-based service broker policy(SbSBP) for Fog computing environment to allocate the optimal Datacenter(s) to serve users' requests based on users' requirements of cost, time and security. Further, considering the dynamic nature of Fog computing, the concept of dynamic reconfiguration has been added. Comparative analysis of simulation results shows the effectiveness of proposed policy to incorporate users' requirements in the decision-making process.
暂无评论