Epileptic seizures are a significant agony for those who suffer from them. Epileptic studies primarily focus on understanding the abnormal behavior of brain signals. Detecting seizures in EEG signals manually is a ver...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in ...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in the information age. Based on the fact that malware heavily resorts to system application programming interfaces(APIs) to perform its malicious actions,there has been a variety of API-based detection *** of them do not consider the relationship between APIs. We contribute a new approach based on the enhanced API order for Android malware detection, named EAODroid, which learns the similarity of system APIs from a large number of API sequences and groups similar APIs into clusters. The extracted API clusters are further used to enhance the original API calls executed by an app to characterize behaviors and perform classification. We perform multi-dimensional experiments to evaluate EAODroid on three datasets with ground truth. We compare with many state-of-the-art works, showing that EAODroid achieves effective performance in Android malware detection.
Accurate air pollution prediction is vital for residents’ well-being. This research introduces a secure air quality monitoring system using neural networks and blockchain for robust analysis, precise predictions, and...
详细信息
Textual image classification is crucial in various applications, such as document digitization and automatic language identification. Although ensemble learning has been increasingly utilized to improve the accuracy o...
详细信息
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task ...
详细信息
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task offloading is often *** is frequently assumed that vehicles can be accurately modeled during actual motion ***,in vehicular dynamic environments,both the tasks generated by the vehicles and the vehicles’surroundings are constantly changing,making it difficult to achieve real-time modeling for actual dynamic vehicular network *** into account the actual dynamic vehicular scenarios,this paper considers the real-time non-uniform movement of vehicles and proposes a vehicular task dynamic offloading and scheduling algorithm for single-task multi-vehicle vehicular network scenarios,attempting to solve the dynamic decision-making problem in task offloading *** optimization objective is to minimize the average task completion time,which is formulated as a multi-constrained non-linear programming *** to the mobility of vehicles,a constraint model is applied in the decision-making process to dynamically determine whether the communication range is sufficient for task offloading and ***,the proposed vehicular task dynamic offloading and scheduling algorithm based on muti-agent deep deterministic policy gradient(MADDPG)is applied to solve the optimal solution of the optimization *** results show that the algorithm proposed in this paper is able to achieve lower latency task computation ***,the average task completion time of the proposed algorithm in this paper can be improved by 7.6%compared to the performance of the MADDPG scheme and 51.1%compared to the performance of deep deterministic policy gradient(DDPG).
This paper proposes a face recognition system based on steerable pyramid transform (SPT) and local directional pattern (LDP) for e-health secured login in cloud domain. In an e-health login, patients periodically forg...
详细信息
The efficient scheduling of tasks on virtual machines (VMs) is paramount in cloud computing environments. The complexity and dynamism of today's applications require a more insightful and adaptive approach to task...
详细信息
ISBN:
(纸本)9798331300579
The efficient scheduling of tasks on virtual machines (VMs) is paramount in cloud computing environments. The complexity and dynamism of today's applications require a more insightful and adaptive approach to task allocation to ensure optimal resource utilization and service delivery. Traditional scheduling approaches often fall short when it comes to considering the multi-dimensional attributes of tasks and VMs, such as makespan, deadline, memory, and bandwidth requirements. These methodologies lack the ability to dynamically adapt to the ever-evolving requirements of tasks and the capacities of VMs, leading to suboptimal performance and resource wastage. In this paper, we present a novel approach that fuses BiLSTM & BiGRU with Exponential Smoothing Recurrent Neural Network (ES-RNN) to create a more robust and adaptive task scheduling mechanism under real-time scenarios. This model holistically assesses task capacity based on its makespan, deadline, memory, and bandwidth requirements. Similarly, VM capacity is evaluated based on its RAM, MIPS, bandwidth, and the number of processing elements. The fusion of these advanced neural architectures provides a deeper understanding of the task-VM mapping, enabling a more intelligent and efficient scheduling decision. Our approach demonstrates a marked improvement over traditional techniques, with tangible benefits such as reduced makespan by 4.9% and improved VM computation efficiency by 3.5%. The practical implications of our methodology are profound. By integrating our model into real-world cloud environments, organizations can expect to see an enhanced deadline hit ratio by 1.5%, ensuring that critical tasks meet their time-sensitive objectives. Moreover, the decision-making process becomes significantly more agile, resulting in a decision delay reduction of 4.5%, thereby promoting more responsive and efficient cloud computing operations. This work paves the way for a new era of intelligent cloud resource management, opt
The prospective applications of facial expression-based emotion recognition have sparked a lot of interest in domains like camera technology, mental health analysis, and human-computer interaction. Using the ResNet152...
详细信息
Creating infrastructures, virtual servers, computing resources, along with devices is termed virtualisation. In this methodology, to augment resource usage along with to mitigate the total power consumption, mapping o...
详细信息
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness af...
详细信息
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness after using the software. The two elements will both affect the trustworthiness of software. When the software quality is evaluated comprehensively, it is necessary to consider the weight of component and user feedback. According to different construction of components, the different trustworthiness measurement models are established based on the weight of components and user feedback. Algorithms of these trustworthiness measurement models are designed in order to obtain the corresponding trustworthiness measurement value automatically. The feasibility of these trustworthiness measurement models is demonstrated by a train ticket purchase system.
暂无评论