Users send their requests to cloud service providers, who then deliver the services over networked systems. With a high volume of requests, it is crucial to schedule cloudlets effectively to ensure that most meet thei...
详细信息
ISBN:
(数字)9798331517892
ISBN:
(纸本)9798331517908
Users send their requests to cloud service providers, who then deliver the services over networked systems. With a high volume of requests, it is crucial to schedule cloudlets effectively to ensure that most meet their specified deadlines for optimal performance. This paper focuses on calculating Both slack time and laxity time for cloudlets across all virtual machines and scheduling them accordingly. It also considers the rearrangement of cloudlets already assigned to virtual machines to accommodate new cloudlets. The CloudSim simulation environment is utilized to schedule cloudlets by evaluating their slack time and laxity time across various virtual machines. This approach helps in selecting the most suitable virtual machine for executing the cloudlets. By incorporating laxity time into the scheduling decisions, the system becomes more balanced, reduces makespan, and thus enhances overall performance. The proposed method has been shown to reduce task rejection by at least 10% and the makespan by an average of 17% when compared to the EFD algorithm.
Cloud computing enables on-demand computation on remote servers and computers. Thanks to the adaptability and scalability of the infrastructure for data storage, processing, and management. To solve the security probl...
Cloud computing enables on-demand computation on remote servers and computers. Thanks to the adaptability and scalability of the infrastructure for data storage, processing, and management. To solve the security problems arising in cloud identity management techniques such as, dependency on a third-party token provider, leakage of user’s details, single point of failure, etc., decentralized cloud identity management systems came into the picture. Blockchain is a decentralized database providing immutability and transparency to recorded transaction data. The current token-based decentralized cloud identity management systems have limitations, including the absence of data access management procedures and a lack of security features. This paper suggests a Blockchain based Secure Cloud Identity and Access Management (BSCIAM) model for secure identity and access management, utilizing encryption and key sharing techniques. The proposed model has been implemented using Ethereum smart contracts for token-based identity management.
Cassava, a staple crop for millions of people worldwide, is highly susceptible to various leaf diseases, which can significantly reduce crop yields. Detecting and classifying these diseases at an early stage is crucia...
详细信息
ISBN:
(数字)9798331518097
ISBN:
(纸本)9798331518103
Cassava, a staple crop for millions of people worldwide, is highly susceptible to various leaf diseases, which can significantly reduce crop yields. Detecting and classifying these diseases at an early stage is crucial for effective disease management and crop protection. In this paper, we propose a novel approach for cassava leaf disease classification by combining Convolutional Neural Networks (CNNs) and Graph Neural Networks (GNNs). While CNNs excel at extracting local features from images, they often fail to capture complex spatial relationships between different regions of the leaf. To address this limitation, we integrate GNNs, which are well-suited for learning from irregular, structured data, such as the vein patterns and disease spread structures found in cassava leaves. By modeling the relationship between different regions of the cassava leaf as a graph G (V, E), where V represents nodes corresponding to superpixel regions of the leaf, and E represents edges capturing spatial relationships, the hybrid CNN-GNN model offers a more comprehensive and accurate classification system. The model is trained and evaluated on a dataset of cassava leaf images covering multiple disease categories, demonstrating superior performance over traditional CNN-based image classification techniques. This approach provides a scalable solution for improving the detection and management of cassava leaf diseases.
In this paper, we propose a time-dependent multi-objective trip planning using ant colony optimization. Especially, the proposed method deals with time-dependent POI factors by utilizing past-trip records with time st...
In this paper, we propose a time-dependent multi-objective trip planning using ant colony optimization. Especially, the proposed method deals with time-dependent POI factors by utilizing past-trip records with time stamps and computes time-dependent travel time by utilizing route API. Moreover, we reduced the response time from the route API calls. Compared with two conventional methods, our proposed method provided routes with high time-dependent values. Meanwhile, the number of API calls is reduced by 98.8% on average by introducing the API call reduction.
A Metro air compressor turns power into potential energy by compressing and storing air in a tank. When the pressure reaches its limit, the compressor shuts down, storing the compressed air until it is needed for vari...
详细信息
A key challenge in visible-infrared person re-identification (V-I ReID) is training a backbone model capable of effectively addressing the significant discrepancies across modalities. State-of-the-art methods that gen...
详细信息
ISBN:
(数字)9798331510831
ISBN:
(纸本)9798331510848
A key challenge in visible-infrared person re-identification (V-I ReID) is training a backbone model capable of effectively addressing the significant discrepancies across modalities. State-of-the-art methods that generate a single intermediate bridging domain are often less effective, as this generated domain may not adequately capture sufficient common discriminant information. This paper introduces Bidirectional Multi-step Domain Generalization (BMDG), a novel approach for unifying feature representations across diverse modalities. BMDG creates multiple virtual intermediate domains by learning and aligning body part features extracted from both I and V modalities. In particular, our method aims to minimize the cross-modal gap in two steps. First, BMDG aligns modalities in the feature space by learning shared and modality-invariant body part prototypes from V and I images. Then, it generalizes the feature representation by applying bidirectional multi-step learning, which progressively refines feature representations in each step and incorporates more prototypes from both modalities. Based on these prototypes, multiple bridging steps enhance the feature representation. Experiments 1 1 Our code is available at: ***/BMDG conducted on V-I ReID datasets indicate that our BMDG approach can outperform state-of-the-art part-based and intermediate generation methods, and can be integrated into other part-based methods to enhance their V-I ReID performance.
Networked Music Performances (NMPs), where geographically displaced musicians play together over a data network, represent a challenging application for today’s wireless communications. This is due to the stringent c...
详细信息
ISBN:
(数字)9798350354232
ISBN:
(纸本)9798350354249
Networked Music Performances (NMPs), where geographically displaced musicians play together over a data network, represent a challenging application for today’s wireless communications. This is due to the stringent constraints on latency, throughput, and reliability that need to be obeyed in order to achieve a satisfactory quality of experience for the musicians. Slicing is a promising feature of 5G networks in the context of NMP applications, as it makes it possible to isolate the networking and computing resources allocated to NMP devices. However, the use of slicing has been scarcely investigated for the NMP context so far. Moreover, previous works focusing on NMPs over 5G involved up to 4 nodes. To bridge these gaps, we study 5G performance in support of NMPs involving an architecture with 10 nodes, both with and without slicing. Specifically, we focused on the assessment of the sole wireless link, as the measurements can be easily transferred to a realistic NMP architecture involving a wide area network. Our results show that, in the slicing condition, latency slightly increased due to the realistically different computing specifications of the MEC servers compared to those of the Core Network servers, whereas reliability slightly improved as expected.
This paper presents a novel autonomous navigation system for grapevine cultivation robots operating in overhead trellis vineyards, a challenging environment characterized by irregular grape cluster distribution and co...
详细信息
Millimeter waves (mmWaves) providing higher bandwidth is used by 5G network technology to achieve higher network capacity and faster data transfer. However, the process of beam sweeping across multiple antenna arrays ...
详细信息
This work in progress introduces a framework for developing a virtual tour of the central heating and chiller plant (the Plant) at a university in the US Midwest for teaching and learning Thermodynamics at the campus....
详细信息
暂无评论