Load-balancing is critical in cloud-computing for optimizing workload distribution and making the most use of available resources, which in turn speeds up the system's total response time. There have been several ...
详细信息
Load-balancing is critical in cloud-computing for optimizing workload distribution and making the most use of available resources, which in turn speeds up the system's total response time. There have been several tactics and methodologies proposed to handle load balancing-related issues such as task scheduling, migration, resource use, and others. This study offered numerous solutions to the crucial problem of load-balancing in cloud-computing. The difficulties regarding Load-balancing been examined by contrasting the methods put forth by researchers during the last six years. Many techniques have been proposed, however some issues, such as VM migration and unsolved fault tolerance issues, continue in the cloud setting.
Cyber-physical systems (CPSs) gift a unique set of protection demanding situations because they rely on a huge and various set of digital additives. To protect CPSs from cyber-attacks, fault-tolerance techniques, incl...
详细信息
In this paper, we pursue the resilience of wireless communication systems in multipath fading and interference environments utilizing Delta- $\gamma$ modelling. Furthermore, fading phenomena such as Rayleigh/Rician/Na...
详细信息
ISBN:
(数字)9798350350067
ISBN:
(纸本)9798350350074
In this paper, we pursue the resilience of wireless communication systems in multipath fading and interference environments utilizing Delta- $\gamma$ modelling. Furthermore, fading phenomena such as Rayleigh/Rician/Nakagami channels can be simulated to examine the impact on important performance metrics like SNR, BER and throughput. Different types of interference scenarios, covering co-channel and adjacent channel interferences are also studied to understand impact on system capacity as well as reliability. This article investigates the use of adaptive modulation techniques, multiple-input multiple-output (MIMO) strategies and advanced interference management schemes by extensive *** results illustrate the importance of adaptive strategies in overcoming fading and interference which leads to an increase in system resilience as well as a robust communication link. Metrics for the outage probability and mean time to failure (MTTF) can inform how reliable systems are across operational scenarios. This work reconciles theory with practice to provide a systematic way of controlling the operational parameters in wireless networks under varying conditions. These lessons will be crucial in steering the design of forthcoming wireless systems that must more reliably satisfy a broader set of application requirements.
This study investigates feature selection using L1 and L2 regularization methods associated with logistic regression (LR) by leveraging its coefficient-based feature ranking. This research aims to optimize the feature...
详细信息
ISBN:
(数字)9798350373523
ISBN:
(纸本)9798350373530
This study investigates feature selection using L1 and L2 regularization methods associated with logistic regression (LR) by leveraging its coefficient-based feature ranking. This research aims to optimize the feature set, enhancing model explainability and performance. The CIC-IDS2018 dataset was selected for the experiment, partially due to its huge volume and the inclusion of problematic classes. The research undertakes a detailed analysis, initially excluding one of the problematic classes and subsequently including both. Feature ranking was performed first with L1 followed by L2 regularization; and thereafter comparing performance of LR with L1 (LR+L1) against LR with L2 (LR+L2) by varying the feature set sizes for each ranking. Through comparative analysis, the outcome reveals no significant discrepancy in accuracy upon finalizing the feature set. Adopting a synthesis approach, the research selects features common to both L1 and L2-derived sets, and this optimized set was tested on more complex models such as Decision Tree and Random Forest. Results indicate a marginal mean accuracy reduction, by 0.8% and 0.6% respectively, while significantly reducing the feature set by 72%, regardless of the incorporation of the problematic class. Additionally, the confusion matrix is reported to facilitate the calculation of standard metrics: accuracy, precision, recall, and F1-score.
The proposed system consists of an Artificial Intelligent software that is capable of counting the number of people from the user inputs such as images and video frames more accurately. The system uses the advanced Mo...
The proposed system consists of an Artificial Intelligent software that is capable of counting the number of people from the user inputs such as images and video frames more accurately. The system uses the advanced MobileNet Single Shot Detection algorithm to detect the human class in the given frame at the given moment. The count of individuals in the frame is dependent on the threshold set by the end-user. The primary goal of the application is to provide an easy-to-use and efficient tool for analyzing images and videos. The model used for object detection is trained on the mall dataset from Kaggle website and is capable of accurately detecting people in real-time, making it suitable for a wide range of applications. The people in the frame are tracked using centroid tracker algorithm, and the tracked classes are counted. The detection algorithm is built using the popular library keras for its versatile usage. This system uses Keras, a high-level deep learning library, and OpenCV, a computer vision library, to perform real-time people counting. The system utilizes object detection algorithms to detect and track individuals, and then increments a count each time a person crosses a designated line. The system is capable of handling multiple people simultaneously and accurately counting them in real-time.
The world has become dependent on using the Internet of Things(IoT) owing to its unique features - sensing the environment, acting upon the results obtained by sensors, connecting a network of devices for communicatio...
The world has become dependent on using the Internet of Things(IoT) owing to its unique features - sensing the environment, acting upon the results obtained by sensors, connecting a network of devices for communication, and many more have made human lives simpler. Research done in the area of the Internet of Things(IoT) has revealed that these devices are vulnerable to physical and network attacks that can directly/indirectly result in the malfunctioning in the normal parameters of the devices, as well as cause important data loss or secret information being leaked which can become useful for the hackers to attack the device and tamper with the stored contents in the device. These problems pave the way for designing a robust, security mechanism for the Internet of Things(IoT). This paper shall present an overview of the security aspects of the Internet of Things(IoT) - starting with the attacks that can occur on this network, the survey done in this area, and towards the end, presenting some solutions for making the IoT secure and resilient to vulnerabilities.
This paper investigates the secrecy capacity optimization in RF/FSO systems with mixed Rayleigh and log-normal fading, while masking eavesdroppers channel state information () as well as suffering from atmospheric tur...
详细信息
ISBN:
(数字)9798350379525
ISBN:
(纸本)9798350379532
This paper investigates the secrecy capacity optimization in RF/FSO systems with mixed Rayleigh and log-normal fading, while masking eavesdroppers channel state information () as well as suffering from atmospheric turbulence. We explore the impact of several parameters including beamforming angles, modulation schemes and hybrid RF/FSO link configurations through a combination of simulations as well as analytical models. Secrecy capacity is enhanced for an improved SNR and vice versa under higher turbulence conditions and cooler influents eavesdropped scenarios. Performance of the hybrid RF/FSO systems dominates considerably over single-link solutions, especially at longer distances. All these mechanisms appreciably increase the secrecy capacity, while beamforming and advanced modulation techniques offer most of the improvement. The study also demonstrates the interdependencies of system parameters, providing guidelines for designing secure communication systems under different environmental and operational conditions.
The majority of human deaths and injuries are caused by traffic accidents. A million people worldwide die each year due to traffic accident injuries, consistent with the World Health Organization. Drivers who do not r...
详细信息
An examination is a useful tool for assessing students’ knowledge. Evaluation of exams is a difficult and time-consuming process. The automatic examination of answer scripts makes this task easier for teachers, reduc...
An examination is a useful tool for assessing students’ knowledge. Evaluation of exams is a difficult and time-consuming process. The automatic examination of answer scripts makes this task easier for teachers, reducing the amount of effort and time required. The existing literature has a number of methods that have been proposed for evaluating responses to objective questions using machine learning. However, more work needs to be done on evaluating answers to descriptive questions. This study suggests a way to evaluate students’ answers to questions of a descriptive kind without using traditional paper or pencil by teachers. Instead, a computer acts as a teacher and grades the students’ submissions. The primary objective is to communicate the outcomes of subjective responses using Bidirectional Encoder Representations from Transformers (BERT), cosine, and Jaccard distance. The proposed model achieved an accuracy of 91%, an error of 9.01, a precision of 83%, and a recall of 79%, respectively. The suggested model has provided the best results in comparison with state-of-the-art systems.
This research seeks to tackle the essential issue of fraud detection in view of the increasing challenges presented by the changing landscape of online transactions, particularly inside the Unified Payments Interface ...
详细信息
ISBN:
(数字)9798350388800
ISBN:
(纸本)9798350388817
This research seeks to tackle the essential issue of fraud detection in view of the increasing challenges presented by the changing landscape of online transactions, particularly inside the Unified Payments Interface (UPI). The research deviates from the usual methods used in this field and adopts a fresh approach by using Recurrent Neural Network (RNN) as an advanced instrument for detecting fraudulent financial transactions. This break with tradition shows that people have now come to terms with the fact that traditional methods have their limits and that CNN and RNN have something special to convey. By applying the algorithm in UPI transaction dataset, we segregate the fraud and legitimate transaction. To evaluate the proposed approach, we applied the test data on confusion matrix and got the True Positive Rate (TPR) is 87.5%, and the False Positive Rate (FPR) is 13.4%.
暂无评论