The foundation of the applicant selection process is the candidate eligibility criteria. All applications must go through some evaluation process to get selected for a job. Without the use of a machine learning algori...
详细信息
Reports show that the number of phishing web sites is exponentially increasing and it is estimated that between 80% to 93 % of the data breaches are involving phishing attacks. With both probability of occurrence as w...
详细信息
Parallel Disassembly Sequence Planning (DSP) deals with obtaining the order of disassembling the product with multiple parts disassembling simultaneously. Existing studies derive the product’s disassembly order based...
详细信息
Android applications are becoming increasingly powerful in recent years. While their functionality is still of paramount importance to users, the energy efficiency of these applications is also gaining more and more a...
详细信息
Android applications are becoming increasingly powerful in recent years. While their functionality is still of paramount importance to users, the energy efficiency of these applications is also gaining more and more attention. Researchers have discovered various types of energy defects in Android applications, which could quickly drain the battery power of mobile devices. Such defects not only cause inconvenience to users, but also frustrate Android developers as diagnosing the energy inefficiency of a software product is a non-trivial task. In this work, we perform a literature review to understand the state of the art of energy inefficiency diagnosis for Android applications. We identified 55 research papers published in recent years and classified existing studies from four different perspectives, including power estimation method, hardware component, types of energy defects, and program analysis approach. We also did a cross-perspective analysis to summarize and compare our studied techniques. We hope that our review can help structure and unify the literature and shed light on future research, as well as drawing developers' attention to build energy-efficient Android applications.
Leaf diseases may harm plants in different ways, often causing reduced productivity and, at times, lethal consequences. Detecting such diseases in a timely manner can help plant owners take effective remedial measures...
详细信息
The demand for cloud computing has increased manifold in the recent *** specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing ***...
详细信息
The demand for cloud computing has increased manifold in the recent *** specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing *** cloud service provider fulfills different user requirements using virtualization-where a single physical machine can host multiple *** virtualmachine potentially represents a different user environment such as operating system,programming environment,and ***,these cloud services use a large amount of electrical energy and produce greenhouse *** reduce the electricity cost and greenhouse gases,energy efficient algorithms must be *** specific area where energy efficient algorithms are required is virtual machine *** virtualmachine consolidation,the objective is to utilize the minimumpossible number of hosts to accommodate the required virtual machines,keeping in mind the service level agreement *** research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized *** online algorithm is analyzed using a competitive analysis *** addition,an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark *** proposed online algorithm consumed 25%less energy and performed 43%fewer migrations than the benchmark algorithms.
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec...
详细信息
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Recognition(HAR)***,the significant computational demands and memory requirements hinder the practical deployment of deep networks in resource-constrained *** paper introduces a novel network pruning method based on the energy spectral density of data in the frequency domain,which reduces the model’s depth and accelerates activity *** traditional pruning methods that focus on the spatial domain and the importance of filters,this method converts sensor data,such as HAR data,to the frequency domain for *** emphasizes the low-frequency components by calculating their energy spectral density ***,filters that meet the predefined thresholds are retained,and redundant filters are removed,leading to a significant reduction in model size without compromising performance or incurring additional computational ***,the proposed algorithm’s effectiveness is empirically validated on a standard five-layer CNNs backbone *** computational feasibility and data sensitivity of the proposed scheme are thoroughly ***,the classification accuracy on three benchmark HAR datasets UCI-HAR,WISDM,and PAMAP2 reaches 96.20%,98.40%,and 92.38%,***,our strategy achieves a reduction in Floating Point Operations(FLOPs)by 90.73%,93.70%,and 90.74%,respectively,along with a corresponding decrease in memory consumption by 90.53%,93.43%,and 90.05%.
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary t...
详细信息
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary to find encryption algorithms that consume little time whilepreserving the security of the data. In this paper, more than one algorithmwas combined to obtain high security with a short implementation time. Achaotic system, DNA computing, and Salsa20 were combined. A proposed5D chaos system was used to generate more robust keys in a Salsa algorithmand DNA computing. Also, the confusion is performed using a new *** proposed chaos system achieves three positive Lyapunov *** results demonstrate of the proposed scheme has a sufficient peak signalto-noise ratio, a low correlation, and a large key space. These factors makeit more efficient than its classical counterpart and can resist statistical anddifferential attacks. The number of changing pixel rates (NPCR) and theunified averaged changed intensity (UACI) values were 0.99710 and UACI33.68. The entropy oscillates from 7.9965 to 7.9982 for the tested encryptedimages. The suggested approach is resistant to heavy attacks and takes lesstime to execute than previously discussed methods, making it an efficient,lightweight image encryption scheme. The method provides lower correlationcoefficients than other methods, another indicator of an efficient imageencryption system. Even though the proposed scheme has useful applicationsin image transmission, it still requires profound improvement in implementingthe high-intelligence scheme and verifying its feasibility on devices with theInternet of Things (IoT) enabled.
Unmanned aerial vehicles deployed in remote locations rely on self-governed key management for their protection. However, conventional key management depends on a centralized ground-based station or single vehicle. Su...
详细信息
In the traditional form of instruction, the teacher and pupil converse face to face. The discussion is started by the instructor, who generally discusses the material from the required textbooks. Many students might n...
详细信息
暂无评论