Cyber-Physical systems (CPS) combine physical and computational elements to produce intelligent systems communicating with their surroundings. By integrating digital and physical processes, CPS provides increased func...
详细信息
The exchange of knowledge is widely recognized as a crucial aspect of effective knowledge management. When it comes to sharing knowledge within Prison settings, things get complicated due to various challenges such as...
详细信息
Cloud computing has taken over the high-performance distributed computing area,and it currently provides on-demand services and resource polling over the *** a result of constantly changing user service demand,the tas...
详细信息
Cloud computing has taken over the high-performance distributed computing area,and it currently provides on-demand services and resource polling over the *** a result of constantly changing user service demand,the task scheduling problem has emerged as a critical analytical topic in cloud *** primary goal of scheduling tasks is to distribute tasks to available processors to construct the shortest possible schedule without breaching precedence *** and schedules of tasks substantially influence system operation in a heterogeneous multiprocessor *** diverse processes inside the heuristic-based task scheduling method will result in varying makespan in the heterogeneous computing *** a result,an intelligent scheduling algorithm should efficiently determine the priority of every subtask based on the resources necessary to lower the *** research introduced a novel efficient scheduling task method in cloud computing systems based on the cooperation search algorithm to tackle an essential task and schedule a heterogeneous cloud computing *** basic idea of thismethod is to use the advantages of meta-heuristic algorithms to get the optimal *** assess our algorithm’s performance by running it through three scenarios with varying numbers of *** findings demonstrate that the suggested technique beats existingmethods NewGenetic Algorithm(NGA),Genetic Algorithm(GA),Whale Optimization Algorithm(WOA),Gravitational Search Algorithm(GSA),and Hybrid Heuristic and Genetic(HHG)by 7.9%,2.1%,8.8%,7.7%,3.4%respectively according to makespan.
Sensors are the foundation to facilitate smart cities, smart grids, and smart transportation, and distance sensors are especially important for sensing the environment and gathering information. Researchers have devel...
详细信息
Potatoes are essential for food production and consumption, but pests and illnesses can cause major economic losses. To quickly identify potato leaf diseases, image processing, computer vision, and deep learning can b...
详细信息
Extracting large amounts of information and knowledge from a large database is a trivial task. Existing bulk item mining algorithms for an extensive database are systematic and mathematically expensive and cannot be u...
详细信息
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj...
详细信息
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteri...
详细信息
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric authentication, leveraging unique biological and behavioral characteristics, offers unparalleled precision in individual identification. However, the integrity and confidentiality of biometric data remain paramount concerns, given its susceptibility to compromise. This research delineates the development and implementation of an innovative framework for cancellable biometrics, focusing on facial and fingerprint recognition. This study introduces a novel cancellable biometrics framework that integrates graph theory encryption with three-dimensional chaotic logistic mapping. The methodology encompasses a multifaceted approach: initially employing graph theory for the secure and efficient encryption of biometric data, subsequently enhanced by the complexity and unpredictability of three-dimensional chaotic logistic mapping. This dual-layered strategy ensures the robustness of the encryption, thereby significantly elevating the security of biometric data against unauthorized access and potential compromise. Thus, the resulting cancellable biometrics, characterized by the ability to transform biometric data into an adjustable representation, addresses critical challenges in biometric security. It allows for the revocation and reissuance of biometric credentials, thereby safeguarding the original biometric characteristics of individuals. This feature not only enhances user privacy and data security but also introduces a dynamic aspect to biometric authentication, facilitating adaptability across diverse systems and applications. Preliminary evaluations of the proposed framework demonstrate a marked improvement in the security of face and fingerprint recognition systems. Through the application of graph theory encryption, coupled with three-dimensional chaotic logistic mapping, our framework mitigates the risks associated with t
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t...
详细信息
This paper presents a new and efficient tree data structure for sorting and collision detection of disks in 2D based on a new tree-based data structure, called hexatree, which is introduced for the first time in this ...
详细信息
暂无评论