Clinical Electroencephalogram(EEG) devices are effective in hospitals, but for everyday monitoring, portable options are more accessible and convenient, albeit less accurate. In this research, the working of three por...
详细信息
The rapid growth of service-oriented and cloud computing has created large-scale data centres *** data centres’operating costs mostly come from back-end cloud infrastructure and energy *** cloud computing,extensive c...
详细信息
The rapid growth of service-oriented and cloud computing has created large-scale data centres *** data centres’operating costs mostly come from back-end cloud infrastructure and energy *** cloud computing,extensive communication resources are ***,cloud applications require more bandwidth to transfer large amounts of data to satisfy end-user *** is also essential that no communication source can cause congestion or bag loss owing to unnecessary switching *** paper proposes a novel Energy and Communication(EC)aware scheduling(EC-scheduler)algorithm for green cloud computing,which optimizes data centre energy consumption and traffic *** primary goal of the proposed EC-scheduler is to assign user applications to cloud data centre resources with minimal utilization of data *** first introduce a Multi-Objective Leader Salp Swarm(MLSS)algorithm for task sorting,which ensures traffic load balancing,and then an Emotional Artificial Neural Network(EANN)for efficient resource ***-scheduler schedules cloud user requirements to the cloud server by optimizing both energy and communication delay,which supports the lower emission of carbon dioxide by the cloud server system,enabling a green,unalloyed *** tested the proposed plan and existing cloud scheduling methods using the GreenCloud simulator to analyze the efficiency of optimizing data centre energy and other scheduler *** EC-scheduler parameters Power Usage Effectiveness(PUE),Data Centre Energy Productivity(DCEP),Throughput,Average Execution Time(AET),Energy Consumption,and Makespan showed up to 26.738%,37.59%,50%,4.34%,34.2%,and 33.54%higher efficiency,respectively,than existing state of the art schedulers concerning number of user applications and number of user requests.
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa...
详细信息
The smart world under Industry 4.0 is witnessing a notable spurt in sleep disorders and sleep-related issues in patients. Artificial intelligence and IoT are taking a giant leap in connecting sleep patients remotely w...
详细信息
Existing semi-supervisedmedical image segmentation algorithms use copy-paste data augmentation to correct the labeled-unlabeled data distribution ***,current copy-paste methods have three limitations:(1)training the m...
详细信息
Existing semi-supervisedmedical image segmentation algorithms use copy-paste data augmentation to correct the labeled-unlabeled data distribution ***,current copy-paste methods have three limitations:(1)training the model solely with copy-paste mixed pictures from labeled and unlabeled input loses a lot of labeled information;(2)low-quality pseudo-labels can cause confirmation bias in pseudo-supervised learning on unlabeled data;(3)the segmentation performance in low-contrast and local regions is less than *** design a Stochastic Augmentation-Based Dual-Teaching Auxiliary Training Strategy(SADT),which enhances feature diversity and learns high-quality features to overcome these *** be more precise,SADT trains the Student Network by using pseudo-label-based training from Teacher Network 1 and supervised learning with labeled data,which prevents the loss of rare labeled *** introduce a bi-directional copy-pastemask with progressive high-entropy filtering to reduce data distribution disparities and mitigate confirmation bias in *** the mixed images,Deep-Shallow Spatial Contrastive Learning(DSSCL)is proposed in the feature spaces of Teacher Network 2 and the Student Network to improve the segmentation capabilities in low-contrast and local *** this procedure,the features retrieved by the Student Network are subjected to a random feature perturbation *** two openly available datasets,extensive trials show that our proposed SADT performs much better than the state-ofthe-art semi-supervised medical segmentation *** only 10%of the labeled data for training,SADT was able to acquire a Dice score of 90.10%on the ACDC(Automatic Cardiac Diagnosis Challenge)dataset.
Tear film,the outermost layer of the eye,is a complex and dynamic structure responsible for tear *** tear film lipid layer is a vital component of the tear film that provides a smooth optical surface for the cornea an...
详细信息
Tear film,the outermost layer of the eye,is a complex and dynamic structure responsible for tear *** tear film lipid layer is a vital component of the tear film that provides a smooth optical surface for the cornea and wetting the ocular *** eye syndrome(DES)is a symptomatic disease caused by reduced tear production,poor tear quality,or excessive *** diagnosis is a difficult task due to its multifactorial *** of several clinical tests available,the evaluation of the interference patterns of the tear film lipid layer forms a potential tool for DES *** instrument known as Tearscope Plus allows the rapid assessment of the lipid layer.A grading scale composed of five categories is used to classify lipid layer *** reported work proposes the design of an automatic system employing light weight convolutional neural networks(CNN)and nature inspired optimization techniques to assess the tear film lipid layer patterns by interpreting the images acquired with the Tearscope *** designed framework achieves promising results compared with the existing state-of-the-art techniques.
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi...
详细信息
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a significant *** development of secure communication methods that keep recipient-only data transmissions secret has always been an area of ***,several approaches,including steganography,have been developed by researchers over time to enable safe data *** this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,*** have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)*** this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this *** encoding the data and embedding it into a carry image,this review verifies that it has been ***,embedded text in photos conveys crucial signals about the *** review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data *** the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms.
In a non-static information exchange network,routing is an overly com-plex task to perform,which has to satisfy all the needs of the *** Defined Network(SDN)is the latest and widely used technology in the future commun...
详细信息
In a non-static information exchange network,routing is an overly com-plex task to perform,which has to satisfy all the needs of the *** Defined Network(SDN)is the latest and widely used technology in the future communication networks,which would provide smart routing that is visible *** various features of routing are supported by the information centric network,which minimizes the congestion in the dataflow in a network and pro-vides the content awareness through its mined *** to the advantages of the information centric network,the concepts of the information-centric net-work has been used in the paper to enable an optimal routing in the software-defined *** there are many advantages in the information-centric network,there are some disadvantages due to the non-static communication prop-erties,which affects the routing in *** this regard,artificial intelligence meth-odology has been used in the proposed approach to solve these difficulties.A detailed analysis has been conducted to map the content awareness with deep learning and deep reinforcement learning with *** novel aligned internet investigation technique has been proposed to process the deep reinforcement *** performance evaluation of the proposed systems has been con-ducted among various existing approaches and results in optimal load balancing,usage of the bandwidth,and maximization in the throughput of the network.
The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence *** solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance(PBFT)in IoT s...
详细信息
The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence *** solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance(PBFT)in IoT scenarios,a hierarchical consensus protocol called DCBFT is *** all,we propose an improved k-sums algorithm to build a two-level consensus cluster,achieving an hierarchical management for IoT ***,A scalable two-level consensus protocol is proposed,which uses a multi-primary node mechanism to solve the single-point-of-failure *** addition,a data synchronization process is introduced to ensure the consistency of block data after view ***,A dynamic reputation evaluation model is introduced to update the nodes’reputation values and complete the rotation of consensus nodes at the end of each consensus *** experimental results show that DCBFT has a more robust dynamic and higher consensus ***,After running for some time,the performance of DCBFT shows some improvement.
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its **...
详细信息
In Weighted Model Counting(WMC),we assign weights to literals and compute the sum of the weights of the models of a given propositional formula where the weight of an assignment is the product of the weights of its *** current WMC solvers work on Conjunctive Normal Form(CNF)***,CNF is not a natural representation for human-being in many *** by the stronger expressive power of Pseudo-Boolean(PB)formulas than CNF,we propose to perform WMC on PB *** on a recent dynamic programming algorithm framework called ADDMC for WMC,we implement a weighted PB counting tool *** compare PBCounter with the state-of-the-art weighted model counters SharpSAT-TD,ExactMC,D4,and ADDMC,where the latter tools work on CNF with encoding methods that convert PB constraints into a CNF *** experiments on three domains of benchmarks show that PBCounter is superior to the model counters on CNF formulas.
暂无评论