Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limite...
详细信息
ISBN:
(纸本)9783319120126;9783319120119
Cloud computing has been targeted as the future on demand architecture of IT enterprise. Cloud computing can be used with trustworthy mechanism to provide greater data resources in comparison to the traditional limited resource computing. But the security challenges can stop the feasibility in the use of IT enterprises. In this paper, our aim is to provide a trustworthy solution for the cloud computing. Our proposed methodology provides secure centralized control and alert system. We are applying the same token with distributed verification with the centralized data scheme. Our approach achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving clients and it can be control by the servers. It can support data updating, deletion and visualization on demand with the restrictive tokenization. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even colluding attacks.
The algorithm presented in this paper deals with use of soft computing technique of Fuzzy logic applied with dynamic graph theory to create graphs which can be efficient in resource allocation process in varied enviro...
详细信息
ISBN:
(数字)9789811031533
ISBN:
(纸本)9789811031533;9789811031526
The algorithm presented in this paper deals with use of soft computing technique of Fuzzy logic applied with dynamic graph theory to create graphs which can be efficient in resource allocation process in varied environments, i.e., software project management, operating systems, construction models, etc. The algorithm implies one unique factor of dynamicity which makes graph of resource allocation evolving even after primary design due to chaotic nature of the afore mentioned nature of environments. The use of Fuzzy imparts a logical inference mechanism which rules out non-monotonous reasoning perspective of this dynamicity. The algorithm is robust and adaptive to varied environments. The proposed algorithm will be beneficial for more accurate Engineering in terms of reducing the failures and being more specific in answering the allocation of the resources and how the work has to be undertaken using those resources. It will also emphasize on devising a model which can be adhered to with the proper follow ups such that it could be referred to at the time of chaos or failures. "The development of the Algorithm will be much more product centric and will stick to developer's view of development along with customer's view of required functionalities."
The 33rd International conference on Industrial, Engineering, and Other applications of Applied intelligent Systems was held in Kitakyushu, Japan on 22 to 25 September 2020. This report provides an overview and summar...
详细信息
The 33rd International conference on Industrial, Engineering, and Other applications of Applied intelligent Systems was held in Kitakyushu, Japan on 22 to 25 September 2020. This report provides an overview and summary of the conference.
Speech synthesizer is an artificial system to produce speech. But the generation of emotional speech is a difficult task. Though many researchers have been working on this area since a long period, still it is a chall...
详细信息
ISBN:
(纸本)9783319120126;9783319120119
Speech synthesizer is an artificial system to produce speech. But the generation of emotional speech is a difficult task. Though many researchers have been working on this area since a long period, still it is a challenging problem in terms of accuracy. The objective of our work is to design an intelligent model for emotional speech synthesis. An attempt is taken to compute such system using rule based fuzzy model. Initially the required parameters have been considered for the model and are extracted as features. The features are analyzed for each speech segment. At the synthesis level the model has been trained with these parameters properly. Next to it, it has been tested. The tested results show its performance.
In this paper, a monopole antenna is presented for triple band WLAN and WiMAX applications. The antenna consists of four L-slots on a radiating rectangular patch and a truncated ground plane. The multiband characteris...
详细信息
ISBN:
(纸本)9789811031564;9789811031557
In this paper, a monopole antenna is presented for triple band WLAN and WiMAX applications. The antenna consists of four L-slots on a radiating rectangular patch and a truncated ground plane. The multiband characteristic of the antenna is achieved by a rectangular patch with four L-slots and bandwidth of the antenna is improved by cutting slots on truncated ground plane. The entire volume of the antenna is 29 x 34 x 0.8 mm(3) which is very compact with operating bands of (2.276-2.58 GHz)/2.411 GHz, (3.585-3.623 GHz)/3.609 GHz and (5.5085.765)/5.56 GHz which covers operating bands for WLAN as per IEEE 802.11 a/b/g/n standards with 12 %, 1 % and 4.5 % impedance bandwidth respectively.
Information theory was founded by Shannon (A mathematical theory of communication. Bell Syst Tech J 379-423, 623-659 (1948) [11]) who introduced the concept of entropy in communication theory. Information theory is co...
详细信息
ISBN:
(纸本)9789811307614;9789811307607
Information theory was founded by Shannon (A mathematical theory of communication. Bell Syst Tech J 379-423, 623-659 (1948) [11]) who introduced the concept of entropy in communication theory. Information theory is concerned with communication systems and has applications in statistics, information processing, and computing. The theory of fuzzy sets which was introduced by Zadeh (Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets Syst 3-28 (1978) [13]) gave fuzzy entropy a measure of fuzzy information which was dependent on Shannon's entropy. A large amount of work is being done on characterization of various fuzzy entropies. In this paper, a generalized measure of fuzzy information with multiple parameters has been proposed and applications of fuzzy information measure in decision-making have been discussed.
Ubiquitous computing environment mingles mobile computing and smart spaces, invisibility, localized scalability and uneven conditioning. In Ubiquitous network, service stations that are registered under respective ser...
详细信息
ISBN:
(纸本)9783319119328
Ubiquitous computing environment mingles mobile computing and smart spaces, invisibility, localized scalability and uneven conditioning. In Ubiquitous network, service stations that are registered under respective service providers, invisibly available in real space to the user for providing user's desired services. In ubiquitous network, service discovery by user for getting their desired service can be disrupted by identity spoofing attacker. Identity spoofing attacker can spoof the identity (IP address, ID) of a service station under a service provider and can falsify that service provider with its spoofed identity. At this point, ubiquitous network requires some level of trust to be established between service provider and service stations. In this paper, we have provided a Trusted Service Discovery against Identity Spoofing (TSD-IS) with its computational and architectural model in service discovery of ubiquitous network.
Cloud computing is a technology that being widely adopted by many organizations like Google, Microsoft etc in order to make the resources available to multiple users at a time over the internet. Many issues are identi...
详细信息
ISBN:
(纸本)9783319120126;9783319120119
Cloud computing is a technology that being widely adopted by many organizations like Google, Microsoft etc in order to make the resources available to multiple users at a time over the internet. Many issues are identified due to which cloud computing is not adopted by all users till now. The aim of this paper is to analyze the performance of the encryption algorithms in order to improve the data integrity in SaaS cloud. The proposed modified algorithm encrypts the data from different users using cryptographic algorithms namely: RSA, Bcrypt and AES. The algorithm is selected by user based on the level of security needed to be applied to the user's data. Performance analysis of the given framework and algorithm is done using CloudSim. From our obtained results this could be easily found that the time taken for encryption of data using the discussed framework and proposed algorithms is much less in comparison to various other techniques.
With the rapid development of new technologies such as high-speed Internet, cloud computing, edge computing, etc., the application scenarios of digital human continue to expand, which puts forward higher requirements ...
详细信息
ISBN:
(纸本)9789819756773;9789819756780
With the rapid development of new technologies such as high-speed Internet, cloud computing, edge computing, etc., the application scenarios of digital human continue to expand, which puts forward higher requirements for the intelligent interaction capability of digital human. This paper presents a study on the large language model (LLM) based intelligent interaction method for digital human and its web applications. Based on the digital human model built in Unity, the intelligent interaction capability is achieved by embedding BaiduAI speech synthesis and LLM ERNIE bot. To verify the proposed intelligent interaction method, an official college website is established, in which the proposed digital human is embedded to act as the intelligent online consultant. From the validation, the proposed digital human could present intelligent and natural answers by both voice and text, effectively realizing the intelligent interaction based on LLM and guaranteeing good experience in web application scenario.
The World Soft computing (WSC) conference is an annual international online conference on applied and theoretical soft computing technology. The topics covered by the conference range from applied to theoretical aspec...
ISBN:
(数字)9783540896197
ISBN:
(纸本)9783540896180
The World Soft computing (WSC) conference is an annual international online conference on applied and theoretical soft computing technology. The topics covered by the conference range from applied to theoretical aspects of fuzzy, neuro-fuzzy and rough sets over to neural networks to single and multi-objective optimisation. Contributions about particle swarm optimisation, gene expression programming, clustering, classi cation, support vector machines, quantum evolution and agent systems have also been received. One whole session was devoted to soft computing techniques in computer graphics, imaging, vision and signal processing.
暂无评论