Recently, image inpainting has been proposed as a solution for restoring the polluted image in the field of computer vision. Further, face inpainting is a subfield of image inpainting, which refers to a set of image e...
详细信息
Due to recent expansion of wireless communications, it has become impossible to cope with the allotment of the precious spectrum while resources for wireless communication are bounded and finite. Hence, the cognitive ...
详细信息
Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex *** Architecture is one of the recent technique...
详细信息
Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex *** Architecture is one of the recent techniques in which Enterprise Systems can be developed as fine-grained smaller components and deployed *** methodology brings numerous benefits like scalability,resilience,flexibility in development,faster time to market,*** the advantages;Microservices bring some challenges *** microservices need to be invoked one by one as a *** most applications,more than one chain of microservices runs in parallel to complete a particular requirement To complete a user’s *** results in competition for resources and the need for more inter-service communication among the services,which increases the overall latency of the application.A new approach has been proposed in this paper to handle a complex chain of microservices and reduce the latency of user requests.A machine learning technique is followed to predict the weighting time of different types of *** communication time among services distributed among different physical machines are estimated based on that and obtained insights are applied to an algorithm to calculate their priorities dynamically and select suitable service instances to minimize the latency based on the shortest queue waiting *** were done for both interactive as well as non interactive workloads to test the effectiveness of the *** approach has been proved to be very effective in reducing latency in the case of long service chains.
Potatoes are one of the world's most popular and economically important crops. For many uses in agriculture, breeding, and trading, accurate recognition of potato breeds is important. In recent years, deep learnin...
详细信息
In a cloud environment,graphics processing units(GPUs)are the primary devices used for high-performance *** exploit flexible resource utilization,a key advantage of cloud *** users share GPUs,which serve as coprocesso...
详细信息
In a cloud environment,graphics processing units(GPUs)are the primary devices used for high-performance *** exploit flexible resource utilization,a key advantage of cloud *** users share GPUs,which serve as coprocessors of central processing units(CPUs)and are activated only if tasks demand GPU *** a container environment,where resources can be shared among multiple users,GPU utilization can be increased by minimizing idle time because the tasks of many users run on a single ***,unlike CPUs and memory,GPUs cannot logically multiplex their ***,GPU memory does not support over-utilization:when it runs out,tasks will ***,it is necessary to regulate the order of execution of concurrently running GPU tasks to avoid such task failures and to ensure equitable GPU sharing among *** this paper,we propose a GPU task execution order management technique that controls GPU usage via time-based *** technique seeks to ensure equal GPU time among users in a container environment to prevent task *** the meantime,we use a deferred processing method to prevent GPU memory shortages when GPU tasks are executed simultaneously and to determine the execution order based on the GPU usage *** the order of GPU tasks cannot be externally adjusted arbitrarily once the task commences,the GPU task is indirectly paused by pausing the *** addition,as container pause/unpause status is based on the information about the available GPU memory capacity,overuse of GPU memory can be prevented at the *** a result,the strategy can prevent task failure and the GPU tasks can be experimentally processed in appropriate order.
Wireless Sensor Network(WSNs)is an infrastructure-less wireless net-work deployed in an increasing number of wireless sensors in an ad-hoc *** the sensor nodes could be powered using batteries,the development of WSN e...
详细信息
Wireless Sensor Network(WSNs)is an infrastructure-less wireless net-work deployed in an increasing number of wireless sensors in an ad-hoc *** the sensor nodes could be powered using batteries,the development of WSN energy constraints is considered to be a key *** wireless sensor networks(WSNs),wireless mobile chargers(MCs)conquer such issues mainly,energy *** proposed work is to produce an energy-efficient recharge method for Wireless Rechargeable Sensor Network(WRSN),which results in a longer lifespan of the network by reducing charging delay and maintaining the residual energy of the *** this algorithm,each node gets sorted using the K-means technique,in which the data gets distributed into various *** mobile charges execute a Short Hamiltonian cycle opposite direction to reach each cluster’s anchor *** position of the anchor points is calculated based on the energy distribution using the base *** this case,the network will act as a spare MC,so that one of the two MCs will run out of energy before reaching the *** the current tours of the two MCs terminate,regression analysis for energy prediction initiates,enabling the updating of anchor points in the upcoming *** on thefindings of the regression-based energy prediction model,the recommended algorithm could effectively refill network energy.
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information ...
详细信息
Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information implicit in AEFS changes. In this paper, a Fuzzy C-Means(FCM) clustering method is used for the first time to develop an innovative approach to characterize the weather attributes carried by AEFS. First, a time series dataset is created in the time domain using AEFS attributes. The AEFS-based weather is evaluated according to the time-series Membership Degree(MD) changes obtained by inputting this dataset into the FCM. Second, thunderstorm intensities are reflected by the change in distance from a thunderstorm cloud point charge to an AEF apparatus. Thus, a matching relationship is established between the normalized distance and the thunderstorm dominant MD in the space domain. Finally, the rationality and reliability of the proposed method are verified by combining radar charts and expert experience. The results confirm that this method accurately characterizes the weather attributes and changes in the AEFS, and a negative distance-MD correlation is obtained for the first time. The detection of thunderstorm activity by AEF from the perspective of fuzzy set technology provides a meaningful guidance for interpretable thunderstorms.
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must...
详细信息
This paper presents a framework for producing robotic fabrics using square lattice formations of interlinked Kilobot modules. The framework supports: (i) fabrics of arbitrary size and shape;(ii) different types of def...
详细信息
暂无评论