In today’s digital era, the security of sensitive data such as Aadhaar data is of utmost importance. To ensure the privacy and integrity of this data, a conceptual framework is proposed that employs the Diffie-Hellma...
详细信息
Currently,edge Artificial Intelligence(AI)systems have significantly facilitated the functionalities of intelligent devices such as smartphones and smart cars,and supported diverse applications and *** fundamental sup...
详细信息
Currently,edge Artificial Intelligence(AI)systems have significantly facilitated the functionalities of intelligent devices such as smartphones and smart cars,and supported diverse applications and *** fundamental supports come from continuous data analysis and computation over these *** the resource constraints of terminal devices,multi-layer edge artificial intelligence systems improve the overall computing power of the system by scheduling computing tasks to edge and cloud servers for *** efforts tend to ignore the nature of strong pipelined characteristics of processing tasks in edge AI systems,such as the encryption,decryption and consensus algorithm supporting the implementation of Blockchain ***,this paper proposes a new pipelined task scheduling algorithm(referred to as PTS-RDQN),which utilizes the system representation ability of deep reinforcement learning and integrates multiple dimensional information to achieve global task ***,a co-optimization strategy based on Rainbow Deep Q-Learning(RainbowDQN)is proposed to allocate computation tasks for mobile devices,edge and cloud servers,which is able to comprehensively consider the balance of task turnaround time,link quality,and other factors,thus effectively improving system performance and user *** addition,a task scheduling strategy based on PTS-RDQN is proposed,which is capable of realizing dynamic task allocation according to device *** results based on many simulation experiments show that the proposed method can effectively improve the resource utilization,and provide an effective task scheduling strategy for the edge computing system with cloud-edge-end architecture.
Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. Lic...
详细信息
The existing cloud model unable to handle abundant amount of Internet of Things (IoT) services placed by the end users due to its far distant location from end user and centralized nature. The edge and fog computing a...
详细信息
Brain tumors are one of the deadliest diseases and require quick and accurate methods of detection. Finding the optimum image for research goals is the first step in optimizing MRI images for pre- and post-processing....
详细信息
This article proposes a multimodal sentiment analysis system for recognizing a person’s aggressiveness in pain. The implementation has been divided into five components. The first three steps are related to a text-ba...
详细信息
Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity...
详细信息
Some of the significant new technologies researched in recent studies include BlockChain(BC),Software Defined Networking(SDN),and Smart Industrial Internet of Things(IIoT).All three technologies provide data integrity,confidentiality,and integrity in their respective use cases(especially in industrial fields).Additionally,cloud computing has been in use for several years *** information is exchanged with cloud infrastructure to provide clients with access to distant resources,such as computing and storage activities in the *** are also significant security risks,concerns,and difficulties associated with cloud *** address these challenges,we propose merging BC and SDN into a cloud computing platform for the *** paper introduces“DistB-SDCloud”,an architecture for enhanced cloud security for smart IIoT *** proposed architecture uses a distributed BC method to provide security,secrecy,privacy,and integrity while remaining flexible and *** in the industrial sector benefit from the dispersed or decentralized,and efficient environment of ***,we described an SDN method to improve the durability,stability,and load balancing of cloud *** efficacy of our SDN and BC-based implementation was experimentally tested by using various parameters including throughput,packet analysis,response time,bandwidth,and latency analysis,as well as the monitoring of several attacks on the system itself.
In this paper we provided an insightful exploration into the critical role of feature matching in enhancing the efficacy of e-commerce recommendation systems. By meticulously analyzing user data and product characteri...
详细信息
The demand for cloud computing has increased manifold in the recent *** specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing ***...
详细信息
The demand for cloud computing has increased manifold in the recent *** specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing *** cloud service provider fulfills different user requirements using virtualization-where a single physical machine can host multiple *** virtualmachine potentially represents a different user environment such as operating system,programming environment,and ***,these cloud services use a large amount of electrical energy and produce greenhouse *** reduce the electricity cost and greenhouse gases,energy efficient algorithms must be *** specific area where energy efficient algorithms are required is virtual machine *** virtualmachine consolidation,the objective is to utilize the minimumpossible number of hosts to accommodate the required virtual machines,keeping in mind the service level agreement *** research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized *** online algorithm is analyzed using a competitive analysis *** addition,an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark *** proposed online algorithm consumed 25%less energy and performed 43%fewer migrations than the benchmark algorithms.
Blockchain and the Internet of Things (IoT), two of the most emerging technologies, are already reconfiguring our digital future, as described by the drastic change in the current network architecture. The incorporati...
详细信息
暂无评论