In the contemporary landscape, autonomous vehicles (AVs) have emerged as a prominent technological advancement globally. Despite their widespread adoption, significant hurdles remain, with security standing out as a c...
详细信息
Spam emails are sent to recipients for advertisement and phishing purposes. In either case, it disturbs recipients and reduces communication quality. Addressing this issue requires classifying emails on servers as eit...
详细信息
Real-time systems experience many safety and performance issues at run time due to different uncertainties in the environment. Systems are now becoming highly interactive and must be able to execute in a changing envi...
详细信息
Real-time systems experience many safety and performance issues at run time due to different uncertainties in the environment. Systems are now becoming highly interactive and must be able to execute in a changing environment without experiencing any failure. A real-time system can have multiple modes of operation such as safety and performance. The system can satisfy its safety and performance requirements by switching between the modes at run time. It is essential for the designers to ensure that a multi-mode real-time system operates in the expected mode at run time. In this paper, we present a verification model that identifies the expected mode at run time and checks whether the multi-mode real-time system is operating in the correct mode or not. To determine the expected mode, we present a monitoring module that checks the environment of the system, identifies different real-world occurrences as events, determines their properties and creates an event-driven dataset for failure analysis. The dataset consumes less memory in comparison to the raw input data obtained from the monitored environment. The event-driven dataset also facilitates onboard decision-making because the dataset allows the system to perform a safety analysis by determining the probability of failure in each environmental situations. We use the probability of failure of the system to determine the safety mode in different environmental situations. To demonstrate the applicability of our proposed scheme, we design and implement a real-time traffic monitoring system that has two modes: safety, and performance. The experimental analysis of our work shows that the verification model can identify the expected operating mode at run time based on the safety (probability of failure) and performance (usage) requirements of the system as well as allows the system to operate in performance mode (in 3295 out of 3421 time intervals) and safety mode (in 126 out of 3421 time intervals). The experimental resul
Cloud computing is one of the newest computing paradigms that emerged after worldwide development of Internet infrastructure. It is a technology that saves both large companies and small and medium scale companies as ...
详细信息
In the emergence of greener transportation, electric vehicles (EVs) play an important role, where the accurate prediction of the driving range is pivotal for alleviating driver range anxiety, serving as a foundation f...
详细信息
The use of Amazon Web Services is growing rapidly as more users are adopting the *** has various functionalities that can be used by large corporates and individuals as *** analysis is used to build an intelligent sys...
详细信息
The use of Amazon Web Services is growing rapidly as more users are adopting the *** has various functionalities that can be used by large corporates and individuals as *** analysis is used to build an intelligent system that can study the opinions of the people and help to classify those related *** this research work,sentiment analysis is performed on the AWS Elastic Compute Cloud(EC2)through Twitter *** data is managed to the EC2 by using elastic load *** collected data is subjected to preprocessing approaches to clean the data,and then machine learning-based logistic regression is employed to categorize the sentiments into positive and negative *** accuracy of 94.17%is obtained through the proposed machine learning model which is higher than the other models that are developed using the existing algorithms.
Reconfigurable intelligent surfaces (RISs) have recently been employed to facilitate communication and improve performance by reflecting signals through configuring phase shifts toward the intended destination. This a...
详细信息
Metaheuristic algorithms are recommended and frequently used methods for solving optimization problems. Today, it has been adapted to many challenging problems and its successes have been identified. The grey wolf opt...
详细信息
Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network *** setup of programmable software-defined networking(SDN)control and elastic...
详细信息
Edge intelligence brings the deployment of applied deep learning(DL)models in edge computing systems to alleviate the core backbone network *** setup of programmable software-defined networking(SDN)control and elastic virtual computing resources within network functions virtualization(NFV)are cooperative for enhancing the applicability of intelligent edge *** offer advancement for multi-dimensional model task offloading in edge networks with SDN/NFV-based control softwarization,this study proposes a DL mechanism to recommend the optimal edge node selection with primary features of congestion windows,link delays,and allocatable bandwidth *** partial task offloading policy considered the DL-based recommendation to modify efficient virtual resource placement for minimizing the completion time and termination drop *** optimization problem of resource placement is tackled by a deep reinforcement learning(DRL)-based policy following the Markov decision process(MDP).The agent observes the state spaces and applies value-maximized action of available computation resources and adjustable resource allocation *** reward formulation primarily considers taskrequired computing resources and action-applied allocation *** defined policies of resource determination,the orchestration procedure is configured within each virtual network function(VNF)descriptor using topology and orchestration specification for cloud applications(TOSCA)by specifying the allocated *** simulation for the control rule installation is conducted using Mininet and Ryu SDN *** delay and task delivery/drop ratios are used as the key performance metrics.
Issues regarding safety, circuit breaker reclosing, power quality, and regulatory compliance are identified when islanding is to be detected in a microgrid. In this paper, a novel communication-based, passive islandin...
详细信息
暂无评论