Multimedia data encompasses various modalities, including audio, visual, and text, necessitating the development of robust retrieval methods capable of harnessing these modalities to extract and retrieve semantic info...
详细信息
One of the pressing concerns for emerging nations is maintenance of roads, including identification and repair of pavement distress. Previous research has focused on pothole detection and lane identification, with the...
详细信息
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data ***,the maj...
详细信息
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data ***,the majority of the fog nodes in this environment are geographically scattered with resources that are limited in terms of capabilities compared to cloud nodes,thus making the application placement problem more complex than that in cloud *** approach for cost-efficient application placement in fog-cloud computing environments that combines the benefits of both fog and cloud computing to optimize the placement of applications and services while minimizing *** approach is particularly relevant in scenarios where latency,resource constraints,and cost considerations are crucial factors for the deployment of *** this study,we propose a hybrid approach that combines a genetic algorithm(GA)with the Flamingo Search Algorithm(FSA)to place application modules while minimizing *** consider four cost-types for application deployment:Computation,communication,energy consumption,and *** proposed hybrid approach is called GA-FSA and is designed to place the application modules considering the deadline of the application and deploy them appropriately to fog or cloud nodes to curtail the overall cost of the *** extensive simulation is conducted to assess the performance of the proposed approach compared to other state-of-the-art *** results demonstrate that GA-FSA approach is superior to the other approaches with respect to task guarantee ratio(TGR)and total cost.
Agile methodology does not formally define the role of a project manager, and the Scrum methodology distributes this role among team members. However, the success of software development projects often depends heavily...
详细信息
The patient health prediction system is the most critical study in medical research. Several prediction models exist to predict the patient's health condition. However, a relevant result was not attained because o...
详细信息
In recent decades, there has been a notable surge in interest surrounding visible light communication (VLC), which utilizes visible light as a means of transmission. LEDs have emerged as the preferred light source for...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication channels, semi-trusted RoadSide Unit (RSU), and collusion between vehicles and the RSU may lead to leakage of model parameters. Moreover, when aggregating data, since different vehicles usually have different computing resources, vehicles with relatively insufficient computing resources will affect the data aggregation efficiency. Therefore, in order to solve the privacy leakage problem and improve the data aggregation efficiency, this paper proposes a privacy-preserving data aggregation protocol for IoV with FL. Firstly, the protocol is designed based on methods such as shamir secret sharing scheme, pallier homomorphic encryption scheme and blinding factor protection, which can guarantee the privacy of model parameters. Secondly, the protocol improves the data aggregation efficiency by setting dynamic training time windows. Thirdly, the protocol reduces the frequent participations of Trusted Authority (TA) by optimizing the fault-tolerance mechanism. Finally, the security analysis proves that the proposed protocol is secure, and the performance analysis results also show that the proposed protocol has high computation and communication efficiency. IEEE
Before a heart attack happens, treating cardiac patients effectively depends on precise heart disease prediction. A heart disease prediction system for the determination of whether the patient has a heart disease cond...
详细信息
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul...
详细信息
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network *** saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor *** of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to *** increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor *** Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster *** data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the ***,the MCH overhead *** the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods.
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business req...
详细信息
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business requirements with distinctive ***,such benefits lead to a more adverse environment entailing network breakdown,systems paralysis,and online banking fraudulence and *** one of the most common and dangerous threats in SDN,probe attack occurs when the attacker scans SDN devices to collect the necessary knowledge on system susceptibilities,which is thenmanipulated to undermine the entire ***,high performance,and real-time systems prove pivotal in successful goal attainment through feature selection to minimize computation time,optimize prediction performance,and provide a holistic understanding of machine learning *** the extension of astute machine learning algorithms into an Intrusion Detection System(IDS)through SDN has garnered much scholarly attention within the past decade,this study recommended an effective IDS under the Grey-wolf optimizer(GWO)and Light Gradient Boosting Machine(Light-GBM)classifier for probe attack *** InSDN dataset was employed to train and test the proposed IDS,which is deemed to be a novel benchmarking dataset in *** proposed IDS assessment demonstrated an optimized performance against that of peer IDSs in probe attack detection within *** results revealed that the proposed IDS outperforms the state-of-the-art IDSs,as it achieved 99.8%accuracy,99.7%recall,99.99%precision,and 99.8%F-measure.
暂无评论