The role of technology is vital and can be observed through the 5th industrial revolution. As a matter of fact, the impact is so severe, it can be felt almost everywhere. As technology advances, one of the most promis...
详细信息
This study examines the crucial but final decision about tooth extraction during orthodontic therapy. The oral health and general wellbeing of individuals are significantly impacted by this choice. In the past, orthod...
详细信息
Thisresearch work presents a web-based system designed to enhance organ donation by optimizing donor-recipient matching and raising public awareness. Motivated by the urgent need to improve transplant success rates am...
详细信息
Software-Defined Networking (SDN) is a type of network strategy that enables the separation of a network's control plane and data plane, thereby allowing centralized management and control of network traffic. Alth...
详细信息
Diabetes, a condition that lasts for a long time, or we say, is a lifetime problem where the body cannot produce enough or no insulin, does not use the body's insulin effectively, or can exhibit both. As a result ...
详细信息
The Internet of Vehicles (IoV), integrating vehicles with EV charging stations, faces significant vulnerabilities to cyber threats. Designing an efficient Intrusion Detection System (IDS) to detect sophisticated attac...
详细信息
This article reports the findings of a comprehensive investigation that found blockchain technology developed for machinelearning can improve clinical trial data security. This research was first submitted to Transac...
详细信息
One of the main challenges in cloud computing is resource management, the ability to schedule workloads and services over the infrastructure in the most automated way. By optimizing cloud assignment and resource usage...
详细信息
ISBN:
(纸本)9783031779404;9783031779411
One of the main challenges in cloud computing is resource management, the ability to schedule workloads and services over the infrastructure in the most automated way. By optimizing cloud assignment and resource usage, energy can be saved, production incident can be anticipated and services QoS improved. With the recent years emergence of light virtualisation, known as containerization, the resource allocation problem was brought back, notably to support containers elasticity, hence the dynamic allocation of ressource at runtime at a single service scale. In this paper we show that using an hybrid loop system, which combines unsupervised learning and optimization techniques, our algorithm provides and iteratively improves scheduling solutions to containers resource assignment, enabling capacity planning over dynamic resource loads. Within our benchmarks, these solutions outperform state of the art algorithms, by an average of 6.3%, while providing more expressivity and control over input parameters. We describe also the implementation of this method, through an open source Python library called HOTS, which allows hybrid optimization for time series based use cases.
Implementation of micro-services is among the most challenging and important tasks in the field of Computer Science. For implementing the microservice architecture, Docker has been used in the current scenario. Creati...
详细信息
ISBN:
(纸本)9783031281792;9783031281808
Implementation of micro-services is among the most challenging and important tasks in the field of Computer Science. For implementing the microservice architecture, Docker has been used in the current scenario. Creating a machinelearning model that works on one computer is not really difficult. But creating a model that can scale and run on all types of servers around the world, it's more challenging. This work proposed a way to deploy a certain type of trained model in microservice architecture using Docker to use anywhere. For practical implementation, two models for machinelearning has been used. One that addresses the handwritten digit recognition problem which has been an open problem in pattern classification since a long time, and another model resolves the issue of house pricing based on several attributes. The purpose of implementation of machinelearning model in microservice architecture using Docker is to enable a method from which anyone can use a machinelearning model without worrying for their machine configuration and dependencies of the machinelearning model.
The proceedings contain 21 papers. The special focus in this conference is on Mobile Internet Security. The topics include: computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile E...
ISBN:
(纸本)9789819744640
The proceedings contain 21 papers. The special focus in this conference is on Mobile Internet Security. The topics include: computing Resource Allocation Based on Multi-base Station and Multi-user Scenario in Mobile Edge computing;lattice-Based Multi-entity Identification Protocols;Hardware Implementation of SM4 Encryption Algorithm with Hybrid Stochastic computing;Privacy-Preserving Fair Outsourcing Polynomial Computation Without FHE and FPR;SFPDML: Securer and Faster Privacy-Preserving Distributed machinelearning Based on MKTFHE;existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping;a Heterogeneous computing Framework for Accelerating Fully Homomorphic Encryption;generic Construction of Forward-Secure Chameleon Hash Function;exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels;Revisiting an Extension of Kannan’s Embedding for Ring-LWE;revisiting the Algorithms for the Quaternion -Isogeny Path Problems;the Impact of Data Scaling Approaches on Deep learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks;integrating machinelearning Models into the Linux Kernel: Opportunities and Challenges;early Weather Warning System with Real-Time Monitoring by IoT Sensors Considering Scalability and Reliability;privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities;research Directions in Formal Verification of Network Configurations Toward Verification of Mobile Networks;Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis;intelligent Cooperative Routing for Services in computing Integration Networking;A Biometric-Based Data Protection Scheme for RSDs.
暂无评论