This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm(DJS).Emphasizing on-demand resource sharing,typical to Cloud Service Pr...
详细信息
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm(DJS).Emphasizing on-demand resource sharing,typical to Cloud Service Providers(CSPs),the research focuses on minimizing job completion delays through efficient task *** Johnson’s rule from operations research,the study addresses the challenge of resource availability post-task *** advocates for queuing models with multiple servers and finite capacity to improve job scheduling models,subsequently reducing wait times and queue *** Dynamic Johnson Sequencing Algorithm and the M/M/c/K queuing model are applied to optimize task sequences,showcasing their efficacy through comparative *** research evaluates the impact of makespan calculation on data file transfer times and assesses vital performance indicators,ultimately positioning the proposed technique as superior to existing approaches,offering a robust framework for enhanced task scheduling and resource allocation in cloud computing.
The science of digital forensics is crucial in detecting and pursuing criminals since criminal behaviour depends more and more on digital technology. A model for behaviour detection is provided in this paper based on ...
详细信息
Over the years, Cloud computing is becoming increasingly popular due to the continually changing technology. The primary goal of the cloud computing network is to offer consumers pay-per-use usage of on-demand process...
详细信息
The development of Connected and Automated Trucks (CATs) provides a new opportunity for freight industry to enhance fuel efficiency, increase traffic flow, and improve safety through platooning. Particularly at highwa...
详细信息
Time series clustering is a challenging problem due to the large-volume,high-dimensional,and warping characteristics of time series *** clustering methods often use a single criterion or distance measure,which may not...
详细信息
Time series clustering is a challenging problem due to the large-volume,high-dimensional,and warping characteristics of time series *** clustering methods often use a single criterion or distance measure,which may not capture all the features of the *** paper proposes a novel method for time series clustering based on evolutionary multi-tasking optimization,termed i-MFEA,which uses an improved multifactorial evolutionary algorithm to optimize multiple clustering tasks simultaneously,each with a different validity index or distance ***,i-MFEA can produce diverse and robust clustering solutions that satisfy various preferences of *** on two artificial datasets show that i-MFEA outperforms single-objective evolutionary algorithms and traditional clustering methods in terms of convergence speed and clustering *** paper also discusses how i-MFEA can address two long-standing issues in time series clustering:the choice of appropriate similarity measure and the number of clusters.
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a...
详细信息
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such as ensuring security,compatibility,standardization,performance,privacy,and increasing user *** significantly impacts network security,including better end-user privacy and security,challenges for network security professionals,increasing usage of encrypted malware communication,and difficulty adapting DNS-based security ***,it is important to understand the impact of DoH on network security and develop newprivacy-preserving techniques to allowthe analysis of DoH traffic without compromising user *** paper provides an in-depth analysis of the effects of DoH on *** discuss various techniques for detecting DoH tunneling and identify essential research challenges that need to be addressed in future security ***,this paper highlights the need for continued research and development to ensure the effectiveness of DoH as a tool for improving privacy and security.
In this modern digital era, the increasing volume of textual data and the widespread adoption of natural language processing (NLP) techniques have presented a critical challenge in safeguarding sensitive privacy infor...
详细信息
In this modern digital era, the increasing volume of textual data and the widespread adoption of natural language processing (NLP) techniques have presented a critical challenge in safeguarding sensitive privacy information. As a result, there is a pressing demand to design robust and accurate NLP-based techniques to perform efficient sensitive information detection in textual data. This research paper focuses on the detection and classification of sensitive privacy information in textual documents using NLP by proposing a novel algorithm named Privacy BERT-LSTM. The proposed Privacy BERT-LSTM algorithm employs BERT for obtaining contextual embeddings and LSTM for sequential information processing, facilitating efficient sensitive information detection in textual documents. The BERT with its bidirectional characteristics captures the nuances and meaning of the textual documents, while the LSTM derives the long-range dependencies in the textual data. Moreover, the proposed Privacy BERT-LSTM algorithm with its attention mechanism highlights the important regions of the textual documents, contributing to efficient sensitive information detection. The comprehensive performance evaluation is conducted by employing the SMS Spam Collection dataset in terms of standard performance metrics and comparing it with different state-of-the-art techniques, namely, CASSED, PRIVAFRAME, CNN-LSTM, Conv-FFD, GCSA, TSIIP, and, C-PIIM. The experimental outcomes clearly illustrate that the Privacy BERT-LSTM algorithm demonstrates superior performance in identifying various types of sensitive information by achieving an accuracy of 92.50%, F1-score of 85.02%, and Precision of 89.36%. The proposed algorithm outperforms existing baseline models, providing valuable advancements in sensitive information detection using NLP. Therefore, this research contributes to the advancement of privacy protection in NLP applications and opens avenues for future investigations in the domain of sensitive info
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication...
详细信息
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication *** transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear *** the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy.
The increasing complexity and power requirements of communication systems make them impractical for widespread usage. Theoretical systems have been superbly applied to the actual world by artificial intelligence (AI),...
详细信息
Melanoma is of the lethal and rare types of skin *** is curable at an initial stage and the patient can survive *** is very difficult to screen all skin lesion patients due to costly *** are requiring a correct method ...
详细信息
Melanoma is of the lethal and rare types of skin *** is curable at an initial stage and the patient can survive *** is very difficult to screen all skin lesion patients due to costly *** are requiring a correct method for the right treatment for dermoscopic clinical features such as lesion borders,pigment networks,and the color of *** challenges are required an automated system to classify the clinical features of melanoma and non-melanoma *** trained clinicians can overcome the issues such as low contrast,lesions varying in size,color,and the existence of several objects like hair,reflections,air bubbles,and oils on almost all *** contour is one of the suitable methods with some drawbacks for the segmentation of irre-gular *** entropy and morphology-based automated mask selection is pro-posed for the active contour *** proposed method can improve the overall segmentation along with the boundary of melanoma *** this study,features have been extracted to perform the classification on different texture scales like Gray level co-occurrence matrix(GLCM)and Local binary pattern(LBP).When four different moments pull out in six different color spaces like HSV,Lin RGB,YIQ,YCbCr,XYZ,and CIE L*a*b then global information from different colors channels have been ***,hybrid fused texture features;such as local,color feature as global,shape features,and Artificial neural network(ANN)as classifiers have been proposed for the categorization of the malignant and *** had been carried out on datasets Dermis,DermQuest,and *** results of our advanced method showed super-iority and contrast with the existing state-of-the-art techniques.
暂无评论