Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicate...
Network optimization and continued availability depend on a number of capabilities that are part of network management. The Maintenance, operating and also offering a safeguarded interaction network is very complicated. It calls for the network operators to grapple with low-level vendor particular arrangements to execute the high degree network policies which are complicated. A method for monitoring networks with OpenFlow controller is presented in this paper in two separate functions for the same networks. Bandwidth utilization, Meter values, charts and statistics are provided by the method to extend controller monitoring capabilities. The method architecture and implementation will be introduced in order to present the feature set. Additionally, softswitches are used as a switch and Mininet to evaluate a virtualized network. This analysis shows whether Meters or ports value is better for network management.
This paper presents an application of a mixture of Hidden Markov Models (HMMs) as a tool for verification of IoT fuel sensors. The IoT fuel sensors report the level of fuel in tanks of a petrol station, and are a key ...
详细信息
“The cloud“ points out to servers, the databases and software that run on those servers. The Internet has always been constructed of infrastructure, servers and clients. Clients send their requests to servers, and s...
“The cloud“ points out to servers, the databases and software that run on those servers. The Internet has always been constructed of infrastructure, servers and clients. Clients send their requests to servers, and servers reply, but cloud computing is distinct in the form that cloud servers are not just replying to requests with on-demand processing but they are saving data and running programs instead of the client. Cloud computing is a technology that is crossing a great expansion today. In cloud computing you can dynamically expand resources without knowledge of a new infrastructure, without developing new software or preparing new staff and to access such great technology the only things that are asked for are an Internet connection and an Internet browser. The goal of this survey is to present the different cloud security threats and recognize the proper security mechanism used to reduce them.
In this paper we propose a consensus model using fractional calculus, which is an emerging topic in multi-agent modeling. Fractional models have infinite memory and can be understood as a relatively simple extension o...
In this paper we propose a consensus model using fractional calculus, which is an emerging topic in multi-agent modeling. Fractional models have infinite memory and can be understood as a relatively simple extension of traditional calculus. We propose a model structure motivating it by psychological research. For such model we also provide a stability analysis allowing results on possibilities of consensus arising in the modelled group of agents. To achieve this, we use fractional difference equations, which illustrate our considerations for agent groups of increasing complexity.
The paper presents a novel approach to investigating adversarial attacks on machine learning classification models operating on tabular data. The employed method involves using diagnostic parameters calculated on an a...
详细信息
The effectiveness of machine learning algorithms, including deep neural networks (DNN) for classifying image data, depends on proper preparation of the training dataset. Erroneously labeled images in the training data...
详细信息
ISBN:
(数字)9781665468589
ISBN:
(纸本)9781665468596
The effectiveness of machine learning algorithms, including deep neural networks (DNN) for classifying image data, depends on proper preparation of the training dataset. Erroneously labeled images in the training data will degrade algorithmic efficiency and cause unpredictable model behavior, thus reduce its safety. Verifying labels in the numerous available databases remains a complicated and laborious task. In this article, we present a MultiNET approach that allows for efficient verification of labeled image datasets. We adapt a state-of-the-art technique, namely Confidence Learning, extending its flexibility and improving the effectiveness by combining outcomes from various DNN architectures. Thanks to the proposed modification, it is possible to automatically detect incorrect labels while minimizing the number of false positives, thus making the verification process much less burdensome. The technique may be of use for researchers and software engineers dealing with externally supplied image datasets.
automatic interpretation of morphological metrics recently gained great interest in medical imaging applications. For ultrasound image analysis various artificial intelligence algorithms emerged with the aim to overco...
详细信息
ISBN:
(数字)9781665406734
ISBN:
(纸本)9781665406741
automatic interpretation of morphological metrics recently gained great interest in medical imaging applications. For ultrasound image analysis various artificial intelligence algorithms emerged with the aim to overcome drawbacks related to measurement variability and image quality. Advanced methods of automatic analysis can meet the need to centralize a large amount of information from these images, to accurately interpret the medical data, and to minimize the rate of human error. In the current paper, we propose a solution designed for automating the detection of early pregnancy from endovaginal ultrasound scans. A YOLOv3 convolutional neural network was configured to detect the gestational sac, the yolk sac, and the embryo given the potential to facilitate ultrasound diagnostic in obstetrics by automating the detection of these early pregnancy elements. The database created for this research included 349 images evaluating incipient pregnancies with gestational age ranging from 40 to 70 days. The results obtained support the use of YOLOv3 for the precise detection of ultrasound elements specific to an incipient pregnancy.
Cyber Physical Systems (CPS) represents an autonomous system which integrates sensing devices, actuators, hardware equipments and software applications, having also communication functionality. A CPS can realize data ...
详细信息
The paper proposes an interdisciplinary approach including methods from disciplines such as history of concepts, linguistics, natural language processing (NLP) and Semantic Web, to create a comparative framework for d...
详细信息
Euler Lagrange Skeletal Animation (ELSA) is the novel and fast model for skeletal animation, based on the Euler Lagrange equations of motion and configuration and phase space notion. Single joint’s animation is an in...
详细信息
暂无评论