Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and...
详细信息
Cloud computing has taken over the high-performance distributed computing area,and it currently provides on-demand services and resource polling over the *** a result of constantly changing user service demand,the tas...
详细信息
Cloud computing has taken over the high-performance distributed computing area,and it currently provides on-demand services and resource polling over the *** a result of constantly changing user service demand,the task scheduling problem has emerged as a critical analytical topic in cloud *** primary goal of scheduling tasks is to distribute tasks to available processors to construct the shortest possible schedule without breaching precedence *** and schedules of tasks substantially influence system operation in a heterogeneous multiprocessor *** diverse processes inside the heuristic-based task scheduling method will result in varying makespan in the heterogeneous computing *** a result,an intelligent scheduling algorithm should efficiently determine the priority of every subtask based on the resources necessary to lower the *** research introduced a novel efficient scheduling task method in cloud computing systems based on the cooperation search algorithm to tackle an essential task and schedule a heterogeneous cloud computing *** basic idea of thismethod is to use the advantages of meta-heuristic algorithms to get the optimal *** assess our algorithm’s performance by running it through three scenarios with varying numbers of *** findings demonstrate that the suggested technique beats existingmethods NewGenetic Algorithm(NGA),Genetic Algorithm(GA),Whale Optimization Algorithm(WOA),Gravitational Search Algorithm(GSA),and Hybrid Heuristic and Genetic(HHG)by 7.9%,2.1%,8.8%,7.7%,3.4%respectively according to makespan.
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina...
详细信息
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemination of information fromvehicles and their one-hop neighbor nodes,Road Side Units(RSUs),and VANET infrastructures can lead to performance degradation of VANETs in the existing hostcentric IP-based ***,Information Centric Networks(ICN)are being explored as an alternative architecture for vehicular communication to achieve robust content distribution in highly mobile,dynamic,and errorprone *** ICN-based Vehicular-IoT networks,consumer mobility is implicitly supported,but producer mobility may result in redundant data transmission and caching inefficiency at intermediate vehicular *** paper proposes an efficient redundant transmission control algorithm based on network coding to reduce data redundancy and accelerate the efficiency of information *** proposed protocol,called Network Cording Multiple Solutions Scheduling(NCMSS),is receiver-driven collaborative scheduling between requesters and information sources that uses a global parameter expectation deadline to effectively manage the transmission of encoded data packets and control the selection of information *** results for the proposed NCMSS protocol is demonstrated to analyze the performance of ICN-vehicular-IoT networks in terms of caching,data retrieval delay,and end-to-end application *** end-to-end throughput in proposed NCMSS is 22%higher(for 1024 byte data)than existing solutions whereas delay in NCMSS is reduced by 5%in comparison with existing solutions.
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P...
详细信息
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of PC,portable networks,spine of internet,networks engaged with advanced mechanics,power generation interconnection,bio-informatics and substance intensify *** number that can be entirely calculated by a graph is called graph *** mathematical graph invariants have been portrayed and utilized for connection investigation during the latest twenty ***,no trustworthy evaluation has been embraced to pick,how much these invariants are associated with a network graph or subatomic *** this paper,it will discuss three unmistakable varieties of bridge networks with an incredible capacity of assumption in the field of computerscience,chemistry,physics,drug industry,informatics and arithmetic in setting with physical and manufactured developments and networks,since Contraharmonic-quadratic invariants(CQIs)are recently presented and have different figure qualities for different varieties of bridge graphs or *** study settled the geography of bridge graphs/networks of three novel sorts with two kinds of CQI and Quadratic-Contraharmonic Indices(QCIs).The deduced results can be used for the modeling of the above-mentioned networks.
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber *** the myriad of potential attacks,D...
详细信息
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber *** the myriad of potential attacks,Denial of Service(DoS)attacks and Distributed Denial of Service(DDoS)attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of *** IoT devices often lack the inherent security measures found in more mature computing platforms,the need for robust DoS/DDoS detection systems tailored to IoT is paramount for the sustainable development of every domain that IoT *** this study,we investigate the effectiveness of three machine learning(ML)algorithms:extreme gradient boosting(XGB),multilayer perceptron(MLP)and random forest(RF),for the detection of IoTtargeted DoS/DDoS attacks and three feature engineering methods that have not been used in the existing stateof-the-art,and then employed the best performing algorithm to design a prototype of a novel real-time system towards detection of such DoS/DDoS *** CICIoT2023 dataset was derived from the latest real-world IoT traffic,incorporates both benign and malicious network traffic patterns and after data preprocessing and feature engineering,the data was fed into our models for both training and validation,where findings suggest that while all threemodels exhibit commendable accuracy in detectingDoS/DDoS attacks,the use of particle swarmoptimization(PSO)for feature selection has made great improvements in the performance(accuracy,precsion recall and F1-score of 99.93%for XGB)of the ML models and their execution time(491.023 sceonds for XGB)compared to recursive feature elimination(RFE)and randomforest feature importance(RFI)*** proposed real-time system for DoS/DDoS attack detection entails the implementation of an platform capable of effectively processing and analyzing network traffic in *** inv
This paper explores the global spread of the COVID-19 virus since 2019, impacting 219 countries worldwide. Despite the absence of a definitive cure, the utilization of artificial intelligence (AI) methods for disease ...
详细信息
This paper explores the global spread of the COVID-19 virus since 2019, impacting 219 countries worldwide. Despite the absence of a definitive cure, the utilization of artificial intelligence (AI) methods for disease diagnosis has demonstrated commendable effectiveness in promptly diagnosing patients and curbing infection transmission. The study introduces a deep learning-based model tailored for COVID-19 detection, leveraging three prevalent medical imaging modalities: computed tomography (CT), chest X-ray (CXR), and Ultrasound. Various deep Transfer Learning Convolutional Neural Network-based (CNN) models have undergone assessment for each imaging modality. For each imaging modality, this study has selected the two most accurate models based on evaluation metrics such as accuracy and loss. Additionally, efforts have been made to prune unnecessary weights from these models to obtain more efficient and sparse models. By fusing these pruned models, enhanced performance has been achieved. The models have undergone rigorous training and testing using publicly available real-world medical datasets, focusing on classifying these datasets into three distinct categories: Normal, COVID-19 Pneumonia, and non-COVID-19 Pneumonia. The primary objective is to develop an optimized and swift model through strategies like Transfer Learning, Ensemble Learning, and reducing network complexity, making it easier for storage and transfer. The results of the trained network on test data exhibit promising outcomes. The accuracy of these models on the CT scan, X-ray, and ultrasound datasets stands at 99.4%, 98.9%, and 99.3%, respectively. Moreover, these models’ sizes have been substantially reduced and optimized by 51.93%, 38.00%, and 69.07%, respectively. This study proposes a computer-aided-coronavirus-detection system based on three standard medical imaging techniques. The intention is to assist radiologists in accurately and swiftly diagnosing the disease, especially during the screen
Context-awareness is a pivotal trend within the Internet of Things research area, facilitating the near real-time processing and interpretation of relevant sensor data to enhance data processing efficiency. Context Ma...
详细信息
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat...
详细信息
The paper proposes a cryptographic protocol two-factor authentication with the zero-knowledge over the extended field GF(2m) on elliptic curves using biometric data and private key of the user. The implementation of a...
详细信息
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ...
详细信息
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped *** paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT *** has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device *** IoT network gathers information of interest from multiple cluster members selected by the proposed *** addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT *** analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance *** enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec.
暂无评论