Fetal health care is one of the most crucial concerns in today's world. Evaluating fetal well-being has always been challenging. Proper development and monitoring of the fetus are indispensable for its growth and ...
详细信息
Metaphor detection is a challenging task for natural language processing (NLP) systems. Previous works failed to sufficiently utilize the internal and external semantic relationships between target words and their con...
详细信息
At present, wireless sensor networks are developing rapidly, but they will also face many challenges. For example, in the deployment problem, many problems such as cost, coverage, connectivity, energy, network life cy...
详细信息
In today’s world, Cloud Computing (CC) enables the users to accesscomputing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, l...
详细信息
In today’s world, Cloud Computing (CC) enables the users to accesscomputing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, located inremote locations, is integrated to perform operations like data collection, processing, data profiling and data storage. In this context, resource allocation and taskscheduling are important processes which must be managed based on the requirements of a user. In order to allocate the resources effectively, hybrid cloud isemployed since it is a capable solution to process large-scale consumer applications in a pay-by-use manner. Hence, the model is to be designed as a profit-driven framework to reduce cost and make span. With this motivation, the currentresearch work develops a Cost-Effective Optimal Task Scheduling Model(CEOTS). A novel algorithm called Target-based Cost Derivation (TCD) modelis used in the proposed work for hybrid clouds. Moreover, the algorithm workson the basis of multi-intentional task completion process with optimal resourceallocation. The model was successfully simulated to validate its effectivenessbased on factors such as processing time, make span and efficient utilization ofvirtual machines. The results infer that the proposed model outperformed theexisting works and can be relied in future for real-time applications.
Anomaly detection stands as a crucial facet within the domain of data quality assurance. Notably, significant strides have been made within the realm of existing anomaly detection algorithms, encompassing notable tech...
详细信息
At present, scams and malicious websites are one of the most widespread and dangerous problems on the website. It brings enormous economic suffering and irretrievable losses to companies and individuals. This approach...
详细信息
Wind speed forecasting is important for wind energy *** the modern era,the increase in energy demand can be managed effectively by fore-casting the wind speed *** main objective of this research is to improve the perf...
详细信息
Wind speed forecasting is important for wind energy *** the modern era,the increase in energy demand can be managed effectively by fore-casting the wind speed *** main objective of this research is to improve the performance of wind speed forecasting by handling uncertainty,the curse of dimensionality,overfitting and non-linearity *** curse of dimensionality and overfitting issues are handled by using Boruta feature *** uncertainty and the non-linearity issues are addressed by using the deep learning based Bi-directional Long Short Term Memory(Bi-LSTM).In this paper,Bi-LSTM with Boruta feature selection named BFS-Bi-LSTM is proposed to improve the performance of wind speed *** model identifies relevant features for wind speed forecasting from the meteorological features using Boruta wrapper feature selection(BFS).Followed by Bi-LSTM predicts the wind speed by considering the wind speed from the past and future time *** proposed BFS-Bi-LSTM model is compared against Multilayer perceptron(MLP),MLP with Boruta(BFS-MLP),Long Short Term Memory(LSTM),LSTM with Boruta(BFS-LSTM)and Bi-LSTM in terms of Root Mean Square Error(RMSE),Mean Absolute Error(MAE),Mean Square Error(MSE)and *** BFS-Bi-LSTM surpassed other models by producing RMSE of 0.784,MAE of 0.530,MSE of 0.615 and R2 of *** experimental result shows that the BFS-Bi-LSTM produced better forecasting results compared to others.
Microservices are a new approach to software architecture design that enables complex monolithic applications to be constructed as a set of independent and loosely coupled chunks of services. A critical step in migrat...
详细信息
This work proposes a new approach to convert the data from sign language to spoken language without exposing the data to a gloss layer. Whenever gloss annotations are used which frequently are incomplete and act as an...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this...
详细信息
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption *** TLSA underlines the need for the protection of sensitive *** proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and ***,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized ***-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and *** RBAC,each user is allowed a specific role and *** implies that permitted users can access some data stored in the *** layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the *** 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion *** proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection *** method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and *** extensive performance test was carried out to confirm the efficiency of the proposed three-tier security *** have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption *** proposed
暂无评论