The usage of machine learning and deep learning algorithms have necessitated Artificial Intelligence'. AI is aimed at automating things by limiting human interference. It is widely used in IT, healthcare, finance,...
详细信息
This paper presents the application of advanced speech recognition technologies to transcribe and analyze customer interactions, enhancing both business efficiency and customer experience. Motivated by the need for hu...
详细信息
Modernization and intense industrialization have led to a substantial improvement in people’s quality of life. However, the aspiration for achieving an improved quality of life results in environmental contamination....
详细信息
The need for adopting Hydroculture systems (viz. hydroponics, aeroponics, aquaponics) is increasing subsequently with the increase in demand for Sustainable farming solutions for populous countries like India. Industr...
详细信息
computer Aided Design (CAD) and dental industry are going hand-in-hand due to the increasing requirements for digitalizing the process of dental diagnosis and treatment. The crucial step in dental treatment is the ide...
详细信息
作者:
Dhanraj, MenahaGnanaprakasam, Arul JosephDepartment of Mathematics
College of Engineering and Technology Faculty of Engineering and Technology SRM Institute of Science and Technology SRM Nagar Kanchipuram Tamil Nadu Kattankulathur603203 India Department of Mathematics
College of Engineering and Technology Faculty of Engineering and Technology SRM Institute of Science and Technology SRM Nagar Kanchipuram Tamil Nadu Kattankulathur603203 India
In this article, we are motivated by various fixed point theorems for different types of orthogonal (, F) contractions in orthogonal Branciari (rectangular) b-metric spaces. We present examples that improve upon many ...
详细信息
Galaxies in astrophysics are one of its fundamental, their morphological classification remains an essential key to unlock countless doors about the structure, formation and history of our Universe. For nearly a centu...
详细信息
This work introduces a novel Custom Question Answering (CQA) model leveraging Adam optimized Bidirectional Encoder Representations from Transformers (BERT-AO). This model tackles the challenge of combining textual and...
详细信息
The Industrial Internet of Things (IIoT) has revolutionized industrial operations by enhancing connectivity and automation. However, this interconnectivity also introduces significant vulnerabilities, particularly to ...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli...
详细信息
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadline, and popularity. However, the methods are inappropriate forachieving higher scheduling performance. Regarding data security, existingmethods use various encryption schemes but introduce significant serviceinterruption. This article sketches a practical Real-time Application CentricTRS (Throughput-Resource utilization–Success) Scheduling with Data Security(RATRSDS) model by considering all these issues in task scheduling anddata security. The method identifies the required resource and their claim timeby receiving the service requests. Further, for the list of resources as services,the method computes throughput support (Thrs) according to the number ofstatements executed and the complete statements of the service. Similarly, themethod computes Resource utilization support (Ruts) according to the idletime on any duty cycle and total servicing time. Also, the method computesthe value of Success support (Sus) according to the number of completions forthe number of allocations. The method estimates the TRS score (ThroughputResource utilization Success) for different resources using all these supportmeasures. According to the value of the TRS score, the services are rankedand scheduled. On the other side, based on the requirement of service requests,the method computes Requirement Support (RS). The selection of service isperformed and allocated. Similarly, choosing the route according to the RouteSupport Measure (RSM) enforced route security. Finally, data security hasgets implemented with a service-based encryption technique. The RATRSDSscheme has claimed higher performance in data security and scheduling.
暂无评论