Older adults are often underserved and marginalized in technology engagement due to their reluctance and the barriers they face in adopting and engaging with mainstream technology. However, Pinxiaoquan, a social featu...
详细信息
With the advent of the information age, data storage has not only developed from paper information systems to electronic information system storage, but has also extended to cloud database storage methods. To date, we...
详细信息
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm(DJS).Emphasizing on-demand resource sharing,typical to Cloud Service Pr...
详细信息
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm(DJS).Emphasizing on-demand resource sharing,typical to Cloud Service Providers(CSPs),the research focuses on minimizing job completion delays through efficient task *** Johnson’s rule from operations research,the study addresses the challenge of resource availability post-task *** advocates for queuing models with multiple servers and finite capacity to improve job scheduling models,subsequently reducing wait times and queue *** Dynamic Johnson Sequencing Algorithm and the M/M/c/K queuing model are applied to optimize task sequences,showcasing their efficacy through comparative *** research evaluates the impact of makespan calculation on data file transfer times and assesses vital performance indicators,ultimately positioning the proposed technique as superior to existing approaches,offering a robust framework for enhanced task scheduling and resource allocation in cloud computing.
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran...
详细信息
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the transmission may be aborted due to insufficient funds(also called balance) or a low transmission rate. To increase the success rate and reduce transmission delay across all transactions, this work proposes a transaction transmission model for blockchain channels based on non-cooperative game *** balance, channel states, and transmission probability are fully considered. This work then presents an optimized channel transaction transmission algorithm. First, channel balances are analyzed and suitable channels are selected if their balance is sufficient. Second, a Nash equilibrium point is found by using an iterative sub-gradient method and its related channels are then used to transmit transactions. The proposed method is compared with two state-of-the-art approaches: Silent Whispers and Speedy Murmurs. Experimental results show that the proposed method improves transmission success rate, reduces transmission delay,and effectively decreases transmission overhead in comparison with its two competitive peers.
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this *** several data mining methods,privacy has beco...
详细信息
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this *** several data mining methods,privacy has become highly *** a result,various privacy-preserving data analysis technologies have ***,we use the randomization process to reconstruct composite data attributes ***,we use privacy measures to estimate how much deception is required to guarantee *** are several viable privacy protections;however,determining which one is the best is still a work in *** paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data ***-more,this paper investigates the use of arbitrary nature with perturbations in privacy *** to the research,arbitrary objects(most notably random matrices)have"predicted"frequency *** shows how to recover crucial information from a sample damaged by a random number using an arbi-trary lattice spectral selection *** system's conceptual frame-work posits,and extensive practicalfindings indicate that sparse data distortions preserve relatively modest privacy protection in various *** a result,the research framework is efficient and effective in maintaining data privacy and security.
Smart home automation is protective and preventive measures that are taken to monitor elderly people in a non-intrusive manner using simple and pervasive sensors termed Ambient Assistive Living. The smart home produce...
详细信息
Nowadays,review systems have been developed with social media Recommendation systems(RS).Although research on RS social media is increas-ing year by year,the comprehensive literature review and classification of this R...
详细信息
Nowadays,review systems have been developed with social media Recommendation systems(RS).Although research on RS social media is increas-ing year by year,the comprehensive literature review and classification of this RS research is limited and needs to be *** previous method did notfind any user reviews within a time,so it gets poor accuracy and doesn’tfilter the irre-levant comments effi*** Recursive Neural Network-based Trust Recom-mender System(RNN-TRS)is proposed to overcome this method’s *** it is efficient to analyse the trust comment and remove the irrelevant sentence ***first step is to collect the data based on the transactional reviews of social *** second step is pre-processing using Imbalanced Col-laborative Filtering(ICF)to remove the null values from the *** the features from the pre-processing step using the Maximum Support Grade Scale(MSGS)to extract the maximum number of scaling features in the dataset and grade the weights(length,count,etc.).In the Extracting features for Training and testing method before that in the feature weights evaluating the softmax acti-vation function for calculating the average weights of the ***,In the classification method,the Recursive Neural Network-based Trust Recommender System(RNN-TRS)for User reviews based on the Positive and negative scores is analysed by the *** simulation results improve the predicting accuracy and reduce time complexity better than previous methods.
The software development projects’ testing part is usually expensive and complex, but it is essential to gauge the effectiveness of the developed software. Software Fault Prediction (SFP) primarily serves to detect f...
详细信息
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio...
详细信息
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial *** there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains *** this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start *** proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread *** core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear *** experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and ***,we find that our method maintains robustness irrespective of the number of sources and the average degree of *** with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2.
We introduce and study reconfiguration problems for (internally) vertex-disjoint shortest paths: Given two tuples of internally vertex-disjoint shortest paths for fixed terminal pairs in an unweighted graph, we are as...
详细信息
暂无评论