Cloud computing has become one of the leading technologies in the world *** benefits of cloud computing affect end users *** are several cloud computing frameworks,and each has ways of monitoring and providing *** com...
详细信息
Cloud computing has become one of the leading technologies in the world *** benefits of cloud computing affect end users *** are several cloud computing frameworks,and each has ways of monitoring and providing *** computing eliminates customer requirements such as expensive system configuration and massive infrastructure while improving dependability and *** the user’s perspective,cloud computing makes it easy to upload multiagents and operate on different web *** this paper,the authors used a restful web service and an agent system to discuss,deployments,and analysis of load performance parameters like memory use,cen-tral processing unit(CPU)utilization,network latency,etc.,both on localhost and an Amazon Web Service Elastic Cloud Computing(AWS-EC2)*** Java Agent Development Environment(JADE)tool has been used to propose an archi-tecture and conduct a comparative study on both local and remote *** is an open-source tool for maintaining applications on AWS *** focus of the study should be to reduce the complexity and time of load perfor-mance parameters by using an agent system on a cloud server instead of establish-ing a massive infrastructure on a local system,even for a small application.
Artificial intelligence (AI) systems are evolving from static, task-specific models to dynamic, agent-based systems that perform well in a variety of scenarios. We present an Interactive Agent Foundation Model using a...
详细信息
Longer training times pose a significant challenge in artificial neural networks (ANNs) as it may leads to increasing the computational costs and decreasing the effectiveness of the model. Therefore, it is imperative ...
详细信息
A decade ago we started this technical journey to open a forum focused on the reliability of so-called Intelligent Environments. Now we organized an Anniversary Issue to celebrate the achievement of our community cont...
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly ...
详细信息
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly employed to prevent *** systems detect incoming attacks and instantly notify users to allow for the implementation of appropriate *** have been made in the past to detect new attacks using machine learning and deep learning techniques,however,these efforts have been *** this paper,we propose two deep learning models to automatically detect various types of intrusion attacks in IoT ***,we experimentally evaluate the use of two Convolutional Neural Networks(CNN)to detect nine distinct types of attacks listed in the NF-UNSW-NB15-v2 *** accomplish this goal,the network stream data were initially converted to twodimensional images,which were then used to train the neural network *** also propose two baseline models to demonstrate the performance of the proposed ***,both models achieve high accuracy in detecting the majority of these nine attacks.
With the advances in microfluidics, electrowetting-on-dielectric (EWOD) chips have widely been applied to various biological and chemical laboratory protocols. Glass-based EWOD chips with nonregular electrodes are pro...
详细信息
The Hand Gestures Recognition(HGR)System can be employed to facilitate communication between humans and computers instead of using special input and output *** devices may complicate communication with computers espec...
详细信息
The Hand Gestures Recognition(HGR)System can be employed to facilitate communication between humans and computers instead of using special input and output *** devices may complicate communication with computers especially for people with *** gestures can be defined as a natural human-to-human communication method,which also can be used in human-computer *** researchers developed various techniques and methods that aimed to understand and recognize specific hand gestures by employing one or two machine learning algorithms with a reasonable *** aims to develop a powerful hand gesture recognition model with a 100%recognition *** proposed an ensemble classification model that combines the most powerful machine learning classifiers to obtain diversity and improve *** majority voting method was used to aggregate accuracies produced by each classifier and get the final classification *** model was trained using a self-constructed dataset containing 1600 images of ten different hand *** employing of canny’s edge detector and histogram of oriented gradient method was a great combination with the ensemble classifier and the recognition *** experimental results had shown the robustness of our proposed *** Regression and Support Vector Machine have achieved 100%*** developed model was validated using two public datasets,and the findings have proved that our model outperformed other compared studies.
The Smart Compost Monitoring system helps to monitor and check the compost made by the amateur or low knowledgeable farmers and enthusiasts and an ideal ratio achievement is the subject of the current invention, The i...
详细信息
The proliferation of deepfake videos on social media has raised huge issues about disinformation, identity manipulation, and fraud. Advanced AI techniques now enable the creation of pretty convincing fake films, posin...
详细信息
This paper introduces an AC stochastic optimal power flow(SOPF)for the flexibility management of electric vehicle(EV)charging pools in distribution networks under *** AC SOPF considers discrete utility functions from ...
详细信息
This paper introduces an AC stochastic optimal power flow(SOPF)for the flexibility management of electric vehicle(EV)charging pools in distribution networks under *** AC SOPF considers discrete utility functions from charging pools as a compensation mechanism for eventual energy not served to their charging *** application of the AC SOPF is described where a distribution system operator(DSO)requires flexibility to each charging pool in a day-ahead time frame,minimizing the cost for flexibility while guaranteeing technical *** areas are defined for each charging pool and calculated as a function of a risk parameter involving the uncertainty of the *** show that all players can benefit from this approach,i.e.,the DSO obtains a riskaware solution,while charging pools/tasks perceive a reduction in the total energy payment due to flexibility services.
暂无评论