Election plays a foremost part in distributedsystems. The reason behind the Election process in distributed system is to optimize in terms of load and improving the efficiency of the system there by improving the pro...
详细信息
ISBN:
(纸本)9781538678084
Election plays a foremost part in distributedsystems. The reason behind the Election process in distributed system is to optimize in terms of load and improving the efficiency of the system there by improving the process of group communication. Choosing a node to be a leader in a distributed environment is intricate. Over years, there are so much of exploitations in the existing techniques such as ring and bully but these algorithms could not able to provide an appropriate solution in terms of message complexity. In this paper, we proposed a novel method known as "3-Phase Leader Election Algorithm" that consists of three phases. Firstly, it identifies and filters the nodes for election. Secondly, the filtered nodes are been validated for determination of prime node via which the group communication takes place. Finally, the Prime node will be identified and accepted in the acceptance phase. Our approach is based on understanding the complexity involved behind a message and improving the efficiency of the system via following performance metrics such as Time and Communication complexity.
The proceedings contain 12 papers. The special focus in this conference is on HPC User Support Tools. The topics include: Interactive Supercomputing for Experimental Data-Driven Workflows;Portals for Interactive Steer...
ISBN:
(纸本)9783030447274
The proceedings contain 12 papers. The special focus in this conference is on HPC User Support Tools. The topics include: Interactive Supercomputing for Experimental Data-Driven Workflows;Portals for Interactive Steering of HPC Workflows;The Pangeo Ecosystem: Interactive computing Tools for the Geosciences: Benchmarking on HPC;using Malleable Task Scheduling to Accelerate Package Manager Installations;Enabling Continuous Testing of HPC systems.Using ReFrame;Tools for Monitoring CPU Usage and Affinity in Multicore Supercomputers;a Study of Hydrodynamics Based Community Codes in Astrophysics;Lightweight Software Process Improvement Using Productivity and Sustainability Improvement Planning (PSIP);Role-Oriented Code Generation in an Engine for Solving Hyperbolic PDE systems.FQL: An Extensible Feature Query Language and Toolkit on Searching Software Characteristics for HPC Applications.
In today39;s digital era, archival and transmission of document images are generally carried out in a compressed form in order to avoid wastage of storage space and bandwidth. In the case of CCITT Group 3 and Group ...
详细信息
ISBN:
(纸本)9789813290884;9789813290877
In today's digital era, archival and transmission of document images are generally carried out in a compressed form in order to avoid wastage of storage space and bandwidth. In the case of CCITT Group 3 and Group 4, the compressed representation is a stream of white and black pixel intensity values called runs, correspondingly indicating background and foreground regions of the document image. In this research paper, we propose a novel entropy-driven incremental learning technique that directly works on the compressed stream of runs, and subsequently facilitates text-line segmentation in handwritten document images using entropy and connected component analysis. Spatial Entropy Quantifier (SEQ) is extracted from the stream of runs based on a suitable window. Further, incremental entropy and connected component analysis are carried out thus separating text and non-text regions leading to automatic text-line segmentation. The proposed method is validated with the compressed dataset of handwritten document images and performance is reported.
Regenerative farming offers a sustainable approach to agriculture by promoting ecosystem restoration, soil health, and biodiversity conservation. However, the adoption of regenerative practices faces significant techn...
详细信息
The proceedings contain 10 papers. The special focus in this conference is on Engineering Dependable and Secure Machine Learning systems. The topics include: Can Attention Masks Improve Adversarial Robustness?;learner...
ISBN:
(纸本)9783030621438
The proceedings contain 10 papers. The special focus in this conference is on Engineering Dependable and Secure Machine Learning systems. The topics include: Can Attention Masks Improve Adversarial Robustness?;learner-Independent Targeted Data Omission Attacks;Extraction of Complex DNN Models: Real Threat or Boogeyman?;principal Component Properties of Adversarial Samples;FreaAI: Automated Extraction of Data Slices to Test Machine Learning Models;density Estimation in Representation Space to Predict Model Uncertainty;automated Detection of Drift in Deep Learning Based Classifiers Performance Using Network Embeddings;Quality of Syntactic Implication of RL-Based Sentence Summarization.
The proceedings contain 16 papers. The special focus in this conference is on Security of Industrial Control systems.and Cyber-Physical systems. The topics include: Integrated Analysis of Safety and Security Hazards i...
ISBN:
(纸本)9783030643294
The proceedings contain 16 papers. The special focus in this conference is on Security of Industrial Control systems.and Cyber-Physical systems. The topics include: Integrated Analysis of Safety and Security Hazards in Automotive systems.GDPR Compliance: Proposed Guidelines for Cloud-Based Health Organizations;aligning the Concepts of Risk, Security and Privacy Towards the Design of Secure Intelligent Transport systems.identifying Implicit Vulnerabilities Through Personas as Goal Models;Cooperative Speed Estimation of an RF Jammer in Wireless Vehicular Networks;extended Abstract: Towards Physical-Layer Authentication for Backscatter Devices;p2Onto: Making Privacy Policies Transparent;extended Abstract - Transformers: Intrusion Detection Data in Disguise;attack Path Analysis for Cyber Physical systems.identifying and Analyzing Implicit Interactions in a Wastewater Dechlorination System;a Survey of Cryptography-Based Authentication for Smart Grid Communication;cybersecurity Awareness Platform with Virtual Coach and Automated Challenge Assessment;ioT Vulnerability Scanning: A State of the Art;learning from Vulnerabilities - Categorising, Understanding and Detecting Weaknesses in Industrial Control systems.self Adaptive Privacy in Cloud computing Environments: Identifying the Major Socio-Technical Concepts;definition and Verification of Security Configurations of Cyber-Physical systems.
Synthetic Aperture Radar (SAR) images are speckle corrupted right at the initial stage of their acquisition due to repeated backscattering signals from the uniformly distributed target sites. Addition of speckle noise...
详细信息
ISBN:
(纸本)9789811510847;9789811510830
Synthetic Aperture Radar (SAR) images are speckle corrupted right at the initial stage of their acquisition due to repeated backscattering signals from the uniformly distributed target sites. Addition of speckle noise in the images causes poor visualization, image analysis and image translation. For this reason, despeckling of the image data is important to not only remove the speckle but also preserve the finer details without losing them. In this paper, a method of despeckling using local statistics-based adaptive filtering has been proposed which can be used in all kinds of speckle environment especially in higher speckle levels. The filter is adaptive in nature as the size of the filtering window which is being used in this method can be varied to despeckle those regions with fully developed speckle and protect minute details. The filtering competency of the proposed filter is then scrutinized and compared using various metrics like Peak Signal-to-Noise Ratio (PSNR) and Speckle Suppression Index (SSI) on different speckle variances.
The aim of studies presented in this article is to determine energy efficiency of distributed generation (DG) plants in railroads power supply systems.(RPSS). The study was carried out using Fazonord software applicat...
详细信息
The increase in Malaysia’s energy demand has resulted in the rise of electricity generation. Specific policies and measures are therefore put in place to reduce the dependence on fossil fuels. The reduction is possib...
详细信息
Currently there are several platforms that offer teaching services and new knowledge to people who require it. However, there is a need to provide tools that support the appropriation of knowledge in a simpler way and...
详细信息
暂无评论