In this study, we design a structure consisting of the radial arrangement of several vertically standing dielectric disks (resonators) so that such a ring cluster supports exotic toroidal dipole mode excitation. Subse...
详细信息
Cloud computing refers to the instant accessibility of shared computer resources over the internet on-demand, thereby revolutionizing the way organizations deploy and manage their IT infrastructure. Efficient load bal...
详细信息
ISBN:
(数字)9798331543624
ISBN:
(纸本)9798331543631
Cloud computing refers to the instant accessibility of shared computer resources over the internet on-demand, thereby revolutionizing the way organizations deploy and manage their IT infrastructure. Efficient load balancing in a cloud environment scales up, utilizing resources with optimized cost-effectiveness. This paper introduces a new Machine Learning-guided Improved Swarm Intelligence Algorithm for reliable load balancing in cloud computing. Methodology It spans on three main elements. The first is the data center controller for the management of tasks. VM allocation uses an Improved Beetle Swarm Optimization Algorithm and one-dimensional convolutional probabilistic neural network is used for host load prediction. To propose an approach that looks to optimize the key metrics such as make span, average cost of VM, resource utilization, and value response time through iterative optimization process. The results of the experiments reflect the success of the proposed algorithm, because an improved performance of load balancing is obtained in comparison with those achieved using PSO, Grey Wolf Optimization, and Genetic Algorithm. The convergence diagram displays the iterative optimization process achieved by the proposed algorithm in obtaining a balance among various performance metrics. Overall, the methodology proposed in this work will provide promising facilitation in the increased efficiency, scalability, and cost-effectiveness of environments based on cloud computing with a reliable load balancing.
The paper describes a fiber optic Fabry-Perot (FP) refractive index (RI) sensors that provide performances required in gas sensing applications. Presented high-resolution FabryPerot Interferometer (FPI) sensors are ba...
The paper describes a fiber optic Fabry-Perot (FP) refractive index (RI) sensors that provide performances required in gas sensing applications. Presented high-resolution FabryPerot Interferometer (FPI) sensors are based on open-path cells that can be integrated with the optical fiber in different ways. They can be fabricated as microcells on the fiber tip or along the optical fiber, or as external/extrinsic gas cells connected to the fiber. All presented configurations are based on low-finesse FPI as they allow for a simple and cost-efficient designs.
The paper presents the results obtained in modeling the creep phenomenon of unidirectional composites reinforced with fibers. Thus, several models that have proven their validity and results obtained with their help a...
详细信息
The pioneering research on message passing for Java (MPJ) which started after 1995 provided a crucially important framework and programming environment for parallel and distributed computing with Java. This framework ...
The pioneering research on message passing for Java (MPJ) which started after 1995 provided a crucially important framework and programming environment for parallel and distributed computing with Java. This framework resulted in an industry standard specification and a novel MPJ-based hierarchical development methodology for a new generation of large-scale distributed systems. The invention of a novel component-based model and methodology for rapid distributed software development and execution based on the MPJ work and achievements are the core contributions presented in this paper. Based on the high-performance Java component-based model, concepts and research results, grid, cloud, and extreme-scale computing represent a fundamental shift in the delivery of information technology services that has permanently changed the computing landscape.
The proposed models can design the airfoil by Cuckoo search with Levenberg-Marquardt. The Neural Network framework has impediments due to over-fitting. This paper proposed a modified cuckoo search. here the aerodynami...
The proposed models can design the airfoil by Cuckoo search with Levenberg-Marquardt. The Neural Network framework has impediments due to over-fitting. This paper proposed a modified cuckoo search. here the aerodynamic coefficient as an input to produce output the airfoil coordinates. The generated airfoil is compared to know its performance metrics. The Cuckoo search with the Feedforward Neural Network model yields the lowest prediction error.
As an indispensable key network service in blockchain systems, digital wallet service is crucial for promoting the widespread application of blockchain technology and the development of the digital economy. However, w...
As an indispensable key network service in blockchain systems, digital wallet service is crucial for promoting the widespread application of blockchain technology and the development of the digital economy. However, with the increasing popularity of blockchain technology, the scale of the Unspent Transaction Output (UTXO) dataset continues to increase. A significant number of low-value UTXOs occupied the main dataset space, leading to blockchain dataset expansion. This has affected the performance of digital wallet service and the overall system performance. To address this issue, this paper proposes a Space-Efficient Digital Wallet (SEDW) service in blockchain systems. This strategy employs a Multidimensional Space Simulated Annealing (MSA) algorithm to obtain transaction input UTXOs. MSA can be combined with the UTXO dynamic adjustment mechanism, achieving the rapid consumption of low-value UTXOs without increasing the transaction fees. Experimental results demonstrate that the proposed SEDW strategy effectively optimized the selection of UTXOs in blockchain systems. It alleviated the expansion issue of the UTXO dataset, and controlled the generation of transaction fees, thereby achieving performance enhancement of digital wallet service.
Mesothelioma is an extremely severe cancer that can easily transform into lung cancer. Mesothelioma diagnosis takes several months and treatment, including surgery, is expensive. Given the risk, early detection of Mes...
Mesothelioma is an extremely severe cancer that can easily transform into lung cancer. Mesothelioma diagnosis takes several months and treatment, including surgery, is expensive. Given the risk, early detection of Mesothelioma is essential for patient health, as it is connected to asbestos exposure. Various machine learning algorithms has been used in this research paper to compare with accurate results for mesothelioma detection. Support Vector Machine (SVM), Random Forest (RF), Decision Tree (DT), k Nearest Neighbourhood (k-NN), and Linear Regression (LR) are some of the machine learning methods being used. For this research paper, dataset is available on UCI, called the University of California Irvine [1]. The test dataset contains 264 instances, 35 characteristics and 8 performance measures, which is used to evaluate the classifiers accuracy. The average accuracy of XGB, RF, DT, SGD, LR and Voting Classifier are 100% each. Combing all the classifiers, helps us to break through the Mesothelioma data and the creation of data driven insights to improve patient care.
The acquired images deteriorate in hazy or foggy circumstances, reducing the fidelity of the color, contrast, and visibility records. The atmospheric particles attenuate, scatter the source radiations are to be blame ...
详细信息
ISBN:
(数字)9798350381887
ISBN:
(纸本)9798350381894
The acquired images deteriorate in hazy or foggy circumstances, reducing the fidelity of the color, contrast, and visibility records. The atmospheric particles attenuate, scatter the source radiations are to be blame for this picture degradation. The corruption force relies upon assorted situations having a variable density of environmental particles, their frequency and distance from obtaining gadget. Existing picture dehazing strategies for apparent band pictures are either founded on earlier suspicion to reproduce the transmission map or utilized a learning system to straightforwardly gauge the dehazed picture. As of late, execution examination of existing well known picture dehazing techniques utilizing ghostly dim pictures are acted in which chose frequency groups from various for thickness levels are to be utilized for correlations. The correlation results are shown execution debasement of existing strategies with frequency groups determination and haze thickness levels. In this review, we plan a compelling ghastly and earlier based picture dehazing and upgrade network showing better execution when contrasted with existing strategies while utilizing phantom. Dim pictures from variable frequency groups and haze thickness levels. Our SPIDE-NET comprises of two organizations: 1) otherworldly Picture De-hazing Organization, which is prepared on multi-ghastly murky pictures between 450 nm and 720 nm, and exploits fluctuating constrictions in various frequency groups. 2) Multiscale Earlier based picture De-hazing Organization utilizes multi-scale dull channel and variety lessening priors on picture trios chose from a multiotherworldly foggy picture data set. The suggested approach is a CNN network in the encoder-decoder manner that combines data from both SID-Net and MPDNet by sharing a typical decoder stage. The SHIA dataset was used to create the suggested network, which was then assessed at various haze thickness levels. In comparison to well-known prior learning
In the ever-evolving landscape of cyber security, the prevalence of phishing attacks poses a formidable threat to information security systems worldwide, compromising data integrity and eroding user trust. This paper ...
详细信息
ISBN:
(数字)9798331510022
ISBN:
(纸本)9798331510039
In the ever-evolving landscape of cyber security, the prevalence of phishing attacks poses a formidable threat to information security systems worldwide, compromising data integrity and eroding user trust. This paper introduces an innovative solution harnessing artificial intelligence to identify and analyze phishing domains, particularly focusing on newly registered domains from public databases like WHOIS. This approach is crucial as traditional security measures often prove insufficient against the sophistication of phishing tactics. Our proposed AI-driven system employs an analysis strategy. It utilizes machine learning to conduct an in-depth backend code and content analysis. This involves comparing suspect and legitimate sites for structural and syntactical disparities, utilizing deep learning models trained on extensive datasets of known phishing and authentic domains. These methodologies offer a nuanced evaluation, crucial for distinguishing sophisticated phishing attempts from genuine domains. Additionally, the system excels at identifying malicious links within these domains, enhancing its overall protective capabilities. The efficiency of our solution lies in its capacity for real-time, accurate threat detection. We introduce a probabilistic scoring mechanism that assesses the likelihood of a domain being a phishing site, facilitating informed decision-making for cyber security personnel. Furthermore, our system is designed for seamless integration into existing cyber security frameworks, providing versatility and ease of use.
暂无评论