Autonomous vehicles (AVs) increasingly rely on vehicle-to-everything (V2X) networks for communication. However, due to the devices' heterogeneity, they are more susceptible to attacks like distributed denial of se...
详细信息
The reliability of Component-Based Software systems (CBSS) is a critical factor in the success and longevity of software applications across various domains. This comprehensive review synthesizes methodologies and fin...
详细信息
A region's Wireless sensor networks consist of sensors distributed over a region that collect and send environmental data to a central station. It measures humidity and temperature. The formation is based on many ...
详细信息
A cashless society is becoming more and more of a reality because of the quick development of technology. This has made it easier for fraudsters to commit their crimes, to a certain extent. To solve this issue, fraud ...
详细信息
The reliability of software interfaces has become increasingly recognized as a crucial factor impacting the quality, manageability, and efficiency of various software systems. Traditional approaches to software reliab...
详细信息
Human recognition technology based on biometrics has become a fundamental requirement in all aspects of life due to increased concerns about security and privacy ***,biometric systems have emerged as a technology with...
详细信息
Human recognition technology based on biometrics has become a fundamental requirement in all aspects of life due to increased concerns about security and privacy ***,biometric systems have emerged as a technology with the capability to identify or authenticate individuals based on their physiological and behavioral *** different viable biometric modalities,the human ear structure can offer unique and valuable discriminative characteristics for human recognition *** recent years,most existing traditional ear recognition systems have been designed based on computer vision models and have achieved successful ***,such traditional models can be sensitive to several unconstrained environmental *** such,some traits may be difficult to extract automatically but can still be semantically perceived as soft *** research proposes a new group of semantic features to be used as soft ear biometrics,mainly inspired by conventional descriptive traits used naturally by humans when identifying or describing each ***,the research study is focused on the fusion of the soft ear biometric traits with traditional(hard)ear biometric features to investigate their validity and efficacy in augmenting human identification *** proposed framework has two subsystems:first,a computer vision-based subsystem,extracting traditional(hard)ear biometric traits using principal component analysis(PCA)and local binary patterns(LBP),and second,a crowdsourcing-based subsystem,deriving semantic(soft)ear biometric *** feature-level fusion experiments were conducted using the AMI database to evaluate the proposed algorithm’s *** obtained results for both identification and verification showed that the proposed soft ear biometric information significantly improved the recognition performance of traditional ear biometrics,reaching up to 12%for LBP and 5%for PCA descriptors;when fusing all three capa
Wireless Sensor Networks (WSNs) are essential for collecting and transmitting data in modern applications that rely on data, where effective network connectivity and coverage are crucial. The optimal placement of rout...
详细信息
Wireless Sensor Networks (WSNs) are essential for collecting and transmitting data in modern applications that rely on data, where effective network connectivity and coverage are crucial. The optimal placement of router nodes within WSNs is a fundamental challenge that significantly impacts network performance and reliability. Researchers have explored various approaches using metaheuristic algorithms to address these challenges and optimize WSN performance. This paper introduces a new hybrid algorithm, CFL-PSO, based on combining an enhanced Fick’s Law algorithm with comprehensive learning and Particle Swarm Optimization (PSO). CFL-PSO exploits the strengths of these techniques to strike a balance between network connectivity and coverage, ultimately enhancing the overall performance of WSNs. We evaluate the performance of CFL-PSO by benchmarking it against nine established algorithms, including the conventional Fick’s law algorithm (FLA), Sine Cosine Algorithm (SCA), Multi-Verse Optimizer (MVO), Salp Swarm Optimization (SSO), War Strategy Optimization (WSO), Harris Hawk Optimization (HHO), African Vultures Optimization Algorithm (AVOA), Capuchin Search Algorithm (CapSA), Tunicate Swarm Algorithm (TSA), and PSO. The algorithm’s performance is extensively evaluated using 23 benchmark functions to assess its effectiveness in handling various optimization scenarios. Additionally, its performance on WSN router node placement is compared against the other methods, demonstrating its competitiveness in achieving optimal solutions. These analyses reveal that CFL-PSO outperforms the other algorithms in terms of network connectivity, client coverage, and convergence speed. To further validate CFL-PSO’s effectiveness, experimental studies were conducted using different numbers of clients, routers, deployment areas, and transmission ranges. The findings affirm the effectiveness of CFL-PSO as it consistently delivers favorable optimization results when compared to existing meth
Cloud computing distributes task-parallel among the various *** with self-service supported and on-demand service have rapid *** these applications,cloud computing allocates the resources dynami-cally via the internet...
详细信息
Cloud computing distributes task-parallel among the various *** with self-service supported and on-demand service have rapid *** these applications,cloud computing allocates the resources dynami-cally via the internet according to user *** resource allocation is vital for fulfilling user *** contrast,improper resource allocations result to load imbalance,which leads to severe service *** cloud resources implement internet-connected devices using the protocols for storing,communi-cating,and *** extensive needs and lack of optimal resource allo-cating scheme make cloud computing more *** paper proposes an NMDS(Network Manager based Dynamic Scheduling)for achieving a prominent resource allocation scheme for the *** proposed system mainly focuses on dimensionality problems,where the conventional methods fail to address *** proposed system introduced three–threshold mode of task based on its size STT,MTT,LTT(small,medium,large task thresholding).Along with it,task mer-ging enables minimum energy consumption and response *** proposed NMDS is compared with the existing Energy-efficient Dynamic Scheduling scheme(EDS)and Decentralized Virtual Machine Migration(DVM).With a Network Manager-based Dynamic Scheduling,the proposed model achieves excellence in resource allocation compared to the other existing *** obtained results shows the proposed system effectively allocate the resources and achieves about 94%of energy efficient than the other *** evaluation metrics taken for comparison are energy consumption,mean response time,percentage of resource utilization,and migration.
The fast development of Large Language Models (LLMs) has made transformative applications in several fields attainable or possible. However, language models must often be more effective in specialized areas, especiall...
详细信息
Transfer learning is a common method to improve the performance of the model on a target task via pre-training the model on pretext tasks. Different from the methods using monolingual corpora for pre-training, in this...
详细信息
暂无评论