The proceedings contain 35 papers. The special focus in this conference is on Advances in distributedcomputing and Machine Learning. The topics include: Computer-Aided Bundle Branch Block Detection Using Symbolic Fea...
ISBN:
(纸本)9789819718405
The proceedings contain 35 papers. The special focus in this conference is on Advances in distributedcomputing and Machine Learning. The topics include: Computer-Aided Bundle Branch Block Detection Using Symbolic Features of ECG Signal;block-Chain and Cloud-Based Tender Allocation System;reliability Assessment of IoT-Enabled systems Using Fault Trees and Bayesian Networks;resnet-50 Integrated with Attention Mechanism for Remote Sensing Classification;revolutionizing Data Annotation with Convergence of Deep Learning and Active Learning to Enhance Credibility on Twitter Datasets;statistical and Deep-Learning Approaches for Individual Carbon Footprint Calculation in India;intelligent Healthcare System Using Emerging Technologies: A Comprehensive Survey;Efficient Energy Management by Using SJF Scheduling in Wireless Sensor Network;cost Effective and Energy Efficient Drip Irrigation System for IoT Enabled Smart Agriculture;facial Detection and Recognition in Drone Imagery Using FaceNet;valluvan: Processing Name Board Images to Enhance Communication for Native Tamil Speakers;Optimized VM Migration for Energy and Cost Reduction Using TSO Algorithm in Cloud computing;A Study on the Mental Health Among Indian Population in the Post COVID-19 Pandemic Using Computational Intelligence;Cloud-Based Anomaly Detection for Broken Rail Track Using LSTM Autoencoders and Cross-modal Audio Analysis;Face Recognition Using CNN for Monitoring and Surveillance of Neurological Disorder Patients;a Novel Approach to Breast Cancer Histopathological Image Classification Using Cross-colour Space Feature Fusion and Quantum–Classical Stack Ensemble Method;comparative Analysis of Deep Learning-Based Hybrid Algorithms for Liver Disease Prediction;preface;performance Improvements of Covert Timing Channel Detection in the Era of Artificial Intelligence;sign Detection Using an N-Gram Language Model and MobileNet.
Spiking neural networks are a natural fit as controllers agents in control task. In this work, we investigate the use of competitive co-evolution to evolve two sets of agents (defenders and attackers) in a competitive...
详细信息
With the advancement of artificial intelligence (AI) technologies, novel and inventive approaches for addressing complex problems are coming to the forefront. Neuromorphic computing based on AI technologies stands as ...
详细信息
Thyroid illness is spreading more and more nowadays and it has become the most common disease that can lead to various health disorders. The main reason behind this disease is thyroid hormone disorder which can lead t...
详细信息
Cloud combined with Multi-Access Edge computing (MEC) empowers service creators and application developers with promising architectural design and communication performance improvements. In fifth generation (5G) and i...
详细信息
ISBN:
(纸本)9798331528690;9798331528706
Cloud combined with Multi-Access Edge computing (MEC) empowers service creators and application developers with promising architectural design and communication performance improvements. In fifth generation (5G) and in 6G cellular networks, MEC gains more importance as a service platform to enable new applications. However, as of today, the availability of MEC resources in public networks is still low, thus not much communication performance measurement data exists. In this work, we use our private, city-level 5G test bed, to evaluate the end-to-end communication performance to different edge and cloud endpoints through realistic outdoor field tests. Multiple topological locations of the edge service are evaluated, the network is operated in stand-alone (SA) and non-stand-alone (NSA) modes, and two-way as well as one-way latency measurements with multiple traffic patterns are performed. The measurements are executed in different environmental settings: fixed position and drive tests, including 5G cell hand-overs. The results not only demonstrate the performance benefits gained from MEC resources, but also show the impact of the communication system and user mobility to Quality of Service (QoS) parameters. Especially for different traffic patterns and for the performance during our drive tests, our results show the time overhead required for exchanging data, which may be challenging for service lookups or delay-constrained applications.
The current Quantum Key Distribution (QKD) key delivery API relies on HTTPS for secure communication. It is vulnerable to quantum computer threats due to its use of public key cryptography. To mitigate insider attacks...
详细信息
Decentralization is reshaping our digital landscape, promising improved control, security, and accessibility. This demo paper explores the potential of decentralization in Cloud computing, presenting PROOF, a platform...
详细信息
The necessity for Computer networks' use is expanding quickly, which raises problems with preserving network secrecy, availability, and integrity. Intrusion can be defined as an intentional breach of security rule...
详细信息
Industrial Control systems (ICS) are important to supporting US critical infrastructure and maintaining national security. ICS owners and operators continue to face threats from a variety of adversaries whose intentio...
详细信息
ISBN:
(纸本)9798350304534
Industrial Control systems (ICS) are important to supporting US critical infrastructure and maintaining national security. ICS owners and operators continue to face threats from a variety of adversaries whose intentions include gathering intelligence, stealing intellectual property, obtaining financial compensation through ransom, and disrupting national critical infrastructures. The ICS discussed do not just include control systems but often include electrical assets (microprocessorbased relays, trip units, etc.) which have been networked together using various communication protocols. Previous ieee PCIC papers have mentioned cybersecurity without providing details on howto secure an ICS. This paper describes the issues that ICS owners and operators face and introduces the international Society of Automation (ISA)/lnternational Electrotechnical Commission (IEC) 62443 [1-10] series of standards as the basis for an effective cybersecurity program. These standards have been developed by the ISA99 committee of the international Society of Automation and IEC Technical Committee 65 Working Group 10.
The increasing demand for cloud computing drives the expansion in scale of datacenters and their internal optical network, in a strive for increasing bandwidth, high reliability, and lower latency. Optical transceiver...
详细信息
ISBN:
(纸本)9798350301199
The increasing demand for cloud computing drives the expansion in scale of datacenters and their internal optical network, in a strive for increasing bandwidth, high reliability, and lower latency. Optical transceivers are essential elements of optical networks, whose reliability has not been well-studied compared to other hardware components. In this paper, we leverage high quantities of monitoring data from optical transceivers and OS-level metrics to provide statistical insights about the occurrence of optical transceiver failures. We estimate transceiver failure rates and normal operating ranges for monitored attributes, correlate early-observable patterns to known failure symptoms, and finally develop failure prediction models based on our analyses. Our results enable network administrators to deploy early-warning systems and enact predictive maintenance strategies, such as replacement or traffic re-routing, reducing the number of incidents and their associated costs.
暂无评论