The integration of machine learning (ML) approaches in sensor-based applications in the field of pervasive computing is becoming increasingly prominent due to the increasing number of sensor-based applications in gene...
详细信息
ISBN:
(纸本)9781665416436
The integration of machine learning (ML) approaches in sensor-based applications in the field of pervasive computing is becoming increasingly prominent due to the increasing number of sensor-based applications in general and the continuous adaption of ML approaches to new domains. Several ML models are used within a processing pipeline that operates on the same sensor data. Still, the cloud computing approach is a straightforward solution where all sensor data is sent to the cloud before processing, which is inefficient according to resource utilization. Appropriate management of the different processing tasks for ML models enhances resource utilization. This paper proposes an architecture for resource-aware classification empowered by an ML model management (MLMM) framework and a distributed data stream management system (DDSMS). First, the classification pipeline is decomposed and implemented as data stream operators. Second, ML models are retrieved from an MLMM framework considering preprocessing, segmentation, and feature alignment to enable an effective redundancy elimination. Finally, the classification pipeline is deployed using resource-aware operator placement optimization. The evaluation results on a real-world scenario of a sensor-based activity classification pipeline for dairy cows show that our approach can reduce network utilization up to 98.9%.
Cloud service providers (CSP) offer shared environments to meet customers' fluctuating requirements. The challenge is to use mechanisms capable of optimizing the use of resources and ensuring that the performance ...
详细信息
This study presents a specialised Java-based network sniffer designed for department-level monitoring of commercial computer systems on university networks. The sniffer is a powerful, platform-independent tool for rea...
详细信息
In the ever-evolving networking landscape, the demand for efficient and adaptable Virtual Private Network (VPN) solutions is growing. Software-Defined Networks (SDNs), particularly Peer-to-Peer (P2P) overlay VPNs, off...
详细信息
ISBN:
(纸本)9798350369588;9798350369595
In the ever-evolving networking landscape, the demand for efficient and adaptable Virtual Private Network (VPN) solutions is growing. Software-Defined Networks (SDNs), particularly Peer-to-Peer (P2P) overlay VPNs, offer a practical approach for networks spanning various edge and cloud providers. However, existing decentralized VPNs, while resilient and scalable, typically utilize a single tunnel type and overlook data plan costs and link performance in their selection processes. This oversight can lead to cost and performance inefficiencies, especially in edge-to-cloud networks where diverse nodes have unique needs that generic solutions fail to meet effectively. Although SDN facilitates the integration of multiple link types in overlay VPNs, existing systems lack efficient policies for selecting favorable tunnels. To bridge this gap, we introduce PolyNet, a Multi-Criteria approach designed to make cost- and performance-aware policy decisions in hybrid-link overlay networks. PolyNet employs a dynamic link selection policy during runtime that evaluates latency using Vivaldi network coordinates and considers cost, and integrates with SDN-based P2P overlays to enhance link management capabilities and support multiple link types. This paper presents the design of PolyNet and evaluates its performance through simulations and prototype testing. Results demonstrate that PolyNet achieves up to a 19.1% cost reduction and a 14.1% latency improvement over traditional methods in Symphony P2P topologies. Additionally, tests with a software prototype confirm the advantages of hybrid links, showing that kernel-layer GENEVE tunnels can increase throughput by up to 8.9 times compared to user-layer Nebula and WebRTC tunnels in edge clusters.
This project presents an inventive Animal Intrusion Detection System using Yolo v8 object detection algorithm. Addressing the problem of wildlife intrusions in agriculture as its main goal, the presented work focuses ...
详细信息
Multimodal emotion recognition through the fusion of facial and neurophysiological features plays an important role in various applications, such as advertising, the automotive industry, wearable devices, and human-co...
详细信息
ISBN:
(纸本)9798331530143
Multimodal emotion recognition through the fusion of facial and neurophysiological features plays an important role in various applications, such as advertising, the automotive industry, wearable devices, and human-computer interactions. Fusing human facial expressions and neurophysiological signals traditionally requires domain-specific knowledge and complex preprocessing steps. However, with the advent of deep learning, we can fully leverage the end-to-end capabilities of these techniques for the intermediate integration of facial and neurophysiological signals in emotion recognition systems. As a result, we introduce a novel end-to-end deep network that leverages transformers to learn rich feature representations of neurophysiological signals, integrated with a transformer-inspired technique for facial expression recognition and emotion classification. By integrating transformers and deep neural networks, our approach successfully captures complex temporal and spatial patterns in the data. This combination allows for more robust analysis, enhancing the system's overall performance in recognizing and classifying emotions accurately. We validated our approach through experiments on the well-known DEAP dataset, achieving performance comparable to the state-of-the-art, with accuracy rates of 97.64% for valence and 97.78% for arousal.
Unmanned aerial vehicle (UAV) swarm can be widely used in cooperative detection and strike across wide geographic areas. To support the collaboration of multiple UAVs, a connected network topology is essential. Thus, ...
详细信息
With the wide application of distributedsystems, complex transaction processing involving multiple nodes has become an important challenge. The difficulty lies in how to ensure the data consistency of each node and h...
详细信息
Legal judgment is a decision formally issued by a court as a conclusion to legal proceedings, analyzing the court's findings, reasoning, and rulings on the matters brought before it. This study explores the analys...
详细信息
The security and access control of data kept in the cloud are becoming increasingly important to the popularity of cloud computing services. In cloud computing, the access control can limit the data stored for further...
详细信息
暂无评论