In the business process of a payment system using web applications, it requires a container as a place to run a program or what is commonly referred to as a server with services such as a web server, database server, ...
In the business process of a payment system using web applications, it requires a container as a place to run a program or what is commonly referred to as a server with services such as a web server, database server, and security system. This research aims to be able to provide cloud computing infrastructure for payment systems. With the aim of creating efficient, stable and secure server services. This research uses Google Cloud and Amazon Web Service as Load Balance providers for cloud computing, as well as using NginX for web server needs and cloudflare as a domain distribution and security system. The results of this study are information for designing a server based on cloud computing and can provide or prepare infrastructure needs for payment system needs, servers built with load balance are efficient and stable because they have a low failure value, and can accommodate up to 10,000 users with a user per connection ratio of 33.3 % and 100% can divert attacks sending Internet Control Message Protocol packets that lead to the Internet Protocol Server to the Internet Protocol Content Delivery Network service provider cloudflare.
This research uses a new proposed multi-objective optimization algorithm that utilizes an untested combined chaotic map to integrate Customized Mutated PSO (CM-PSO) with a Modified Genetic Algorithm (MGA) to design an...
详细信息
The COVID - 19 disease is a extremely contagious viral infection with significant global health insinuations. COVID has a negative impact on the world economy. If positive patients are identified early, the proliferat...
详细信息
Due to the fact that network space is becoming more limited,the implementation of ultra-dense networks(UDNs)has the potential to enhance not only network coverage but also network *** Aerial Vehicle(UAV)communications...
详细信息
Due to the fact that network space is becoming more limited,the implementation of ultra-dense networks(UDNs)has the potential to enhance not only network coverage but also network *** Aerial Vehicle(UAV)communications have recently garnered a lot of attention due to the fact that they are extremely versatile and may be applied to a wide variety of contexts and purposes.A cognitive UAV is proposed as a solution for the Internet of Things ground terminal’s wireless nodes in this *** the IoT system,the UAV is utilised not only to determine how the resources should be distributed but also to provide power to the wireless *** quality of service(QoS)offered by the cognitive node was interpreted as a price-based utility function,which was demonstrated in the form of a non-cooperative game theory in order to maximise customers’net utility *** energyefficient non-cooperative game theory power allocation with pricing strategy abbreviated as(EE-NGPAP)is implemented in this study with two trajectories Spiral and Sigmoidal in order to facilitate effective power management in Internet of Things(IoT)wireless *** has also been demonstrated,theoretically and by the use of simulations,that the Nash equilibrium does exist and that it is one of a *** proposed energy harvesting approach was shown,through simulations,to significantly reduce the typical amount of power thatwas *** is taken into consideration to agree with the objective of 5G *** order to converge to Nash Equilibrium(NE),the method that is advised only needs roughly 4 iterations,which makes it easier to utilise in the real world,where things aren’t always the same.
Active learning(AL)trains a high-precision predictor model from small numbers of labeled data by iteratively annotating the most valuable data sample from an unlabeled data pool with a class label throughout the learn...
详细信息
Active learning(AL)trains a high-precision predictor model from small numbers of labeled data by iteratively annotating the most valuable data sample from an unlabeled data pool with a class label throughout the learning ***,most current AL methods start with the premise that the labels queried at AL rounds must be free of ambiguity,which may be unrealistic in some real-world applications where only a set of candidate labels can be obtained for selected ***,most of the existing AL algorithms only consider the case of centralized processing,which necessitates gathering together all the unlabeled data in one fusion center for *** that data are collected/stored at different nodes over a network in many real-world scenarios,distributed processing is chosen *** this paper,the issue of distributed classification of partially labeled(PL)data obtained by a fully decentralized AL method is focused on,and a distributed active partial label learning(dAPLL)algorithm is *** proposed algorithm is composed of a fully decentralized sample selection strategy and a distributed partial label learning(PLL)*** the sample selection process,both the uncertainty and representativeness of the data are measured based on the global cluster centers obtained by a distributed clustering method,and the valuable samples are chosen in ***,using the disambiguation-free strategy,a series of binary classification problems can be constructed,and the corresponding cost-sensitive classifiers can be cooperatively trained in a distributed *** experiment results conducted on several datasets demonstrate that the performance of the dAPLL algorithm is comparable to that of the corresponding centralized method and is superior to the existing active PLL(APLL)method in different parameter ***,our proposed algorithm outperforms several current PLL methods using the random selection strategy,especially when only s
This paper emphasizes the importance of interdisciplinary collaboration in exploring the concept of robot gender within Human-Robot Interaction (HRI). It draws on a case study of the authors' own collaboration, wh...
详细信息
Micro Air Vehicles (MAVs) can be used for a wide range of applications, such as drone-based light shows for cultural or marketing purposes, or as a replacement for fireworks. However, more widespread usage of this tec...
详细信息
The effectiveness of the Novel Random Forest (RF) Algorithm for predicting cryptocurrency prices was evaluated and compared to the K-Nearest Neighbor (KNN) Algorithm. Machine learning methods were used to develop the ...
详细信息
In this paper, we introduce a novel normative modeling approach that incorporates focal loss and adversarial autoencoders (FAAE) for Alzheimer’s Disease (AD) diagnosis and biomarker identification. Our method is an e...
详细信息
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks...
详细信息
ISBN:
(数字)9798350377569
ISBN:
(纸本)9798350377576
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple lockstep technique to the microarchitecture-level protection of the Hardisc RISC-V core. For a fair comparison, each system is based on the same core(s) and integrates protection against bit-flips in memory and transient faults in the bus. We propose a fault injection methodology, combining pre-synthesis simulation with synthesis data to analyse the vulnerability of a system to faults. The fault injection campaigns show that the Hardisc can withstand fault rates orders of magnitude higher than the dual-core lockstep system while preserving the same area and power consumption. It comes with a 5% frequency penalty. We have shown that system failures are more frequent once the fault rate reaches an application-specific threshold (one fault in 100 clock cycles).
暂无评论