Digitalisation of the manufacturing industries due to the implementation of the ‘industrial internet of things (IIOT)’ is a key enabler for improved productivity and reliability at a reduced labour cost. The industr...
详细信息
Dear Editor,This letter is concerned with visual perception closely related to heterogeneous *** the huge challenge brought by different image modalities,we propose a visual perception framework based on heterogeneous...
详细信息
Dear Editor,This letter is concerned with visual perception closely related to heterogeneous *** the huge challenge brought by different image modalities,we propose a visual perception framework based on heterogeneous image knowledge,i.e.,the domain knowledge associated with specific vision tasks,to better address the corresponding visual perception problems.
Wearable technology is one such area of IoT that has shown rapid expansion in recent years. Devices that can collect and deliver data in real time, such as smartwatches, fitness trackers, smart glasses, and other wear...
详细信息
Blockchain technology has garnered significant attention in academic and industrial domains due to its ability to establish a secure and trustworthy environment. As blockchain techniques continue to advance, there is ...
详细信息
ISBN:
(纸本)9798400706387
Blockchain technology has garnered significant attention in academic and industrial domains due to its ability to establish a secure and trustworthy environment. As blockchain techniques continue to advance, there is a growing demand for computing resources in dimensions like storage, data processing, and network bandwidth. To meet this demand, leveraging cloud computing as an off-chain resource for scalable on-chain services has emerged as a viable solution. However, allocating cloud resources in heterogeneous cloud computing environments presents challenges due to their inherent complexity. Native cloud environments encompass diverse cloud service providers with varying capabilities, pricing models, and performance characteristics. Given the cloud's capacity to scale resources based on demand, this paper introduces a novel approach called the Cloud-enabled Scalable Blockchain (CLEAN) outsourcing model. The CLEAN model aims to develop a scalable blockchain system that minimizes costs and enhances performance. We propose a dynamic programming algorithm considering influential factors such as cloud service costs, availability, and execution time. The algorithm aims to minimize expenses while ensuring efficient resource allocation. Experimental evaluations involving rigorous analysis have been conducted to assess the effectiveness of the proposed approach. The results indicate that CLEAN outperforms the Greedy Algorithm and Genetic Algorithm (GA) by maintaining relatively low latency across all the CLEAN settings. Additionally, CLEAN demonstrates lower energy consumption compared to the Greedy Algorithm and GA, with up to a 50% and 30% reduction, respectively, as the number of transactions increases. Furthermore, the experiments determine the optimal number of orderers for the three settings to balance the trade-off between time cost and performance. Moreover, the findings also reveal that simply increasing the number of orderers in the cloud does not guarantee improv
Gaze tracking is the process of estimating where a person is looking on the screen using only information from eye movement without additional input from the user, it contributes greatly in understanding and improving...
详细信息
This paper explores the application of the Internet of Things (IoT) technology in oilseed production. With the growing demand for vegetable oil and biodiesel, there is a need to improve the efficiency and productivity...
详细信息
The Cloud system shows its growing functionalities in various industrial *** safety towards data transfer seems to be a threat where Network Intrusion Detection System(NIDS)is measured as an essential element to fulfi...
详细信息
The Cloud system shows its growing functionalities in various industrial *** safety towards data transfer seems to be a threat where Network Intrusion Detection System(NIDS)is measured as an essential element to fulfill ***,Machine Learning(ML)approaches have been used for the construction of intellectual *** IDS are based on ML techniques either as unsupervised or *** supervised learning,NIDS is based on labeled data where it reduces the efficiency of the reduced model to identify attack ***,the unsupervised model fails to provide a satisfactory ***,to boost the functionality of unsupervised learning,an effectual auto-encoder is applied for feature selection to select good ***,the Naïve Bayes classifier is used for classification *** approach exposes the finest generalization ability to train the *** unlabelled data is also used for adoption towards data ***,redundant and noisy samples over the dataset are *** validate the robustness and efficiency of NIDS,the anticipated model is tested over the NSL-KDD *** experimental outcomes demonstrate that the anticipated approach attains superior accuracy with 93%,which is higher compared to J48,AB tree,Random Forest(RF),Regression Tree(RT),Multi-Layer Perceptrons(MLP),Support Vector Machine(SVM),and ***,False Alarm Rate(FAR)and True Positive Rate(TPR)of Naive Bayes(NB)is 0.3 and 0.99,*** compared to prevailing techniques,the anticipated approach also delivers promising outcomes.
Tree traversal is a technique which involves visiting, verifying, and updating each node in a tree just once. This paper gives insight on the various approaches for the same. The tree can be visited in two ways recurs...
详细信息
The review article, 'Speech Emotion Recognition: A Comprehensive Study,' starts off by summarizing the significance of speech emotion recognition and highlighting all of the different ways it may be used in fi...
详细信息
Most data structures use hash tables. A key method in computerscience for effectively storing, accessing, and searching for data is hashing. It involves converting a key into a hash value and using this value to acce...
详细信息
暂无评论