In recent times,internet of things(IoT)applications on the cloud might not be the effective solution for every IoT scenario,particularly for time sensitive applications.A significant alternative to use is edge computi...
详细信息
In recent times,internet of things(IoT)applications on the cloud might not be the effective solution for every IoT scenario,particularly for time sensitive applications.A significant alternative to use is edge computing that resolves the problem of requiring high bandwidth by end *** computing is considered a method of forwarding the processing and communication resources in the cloud towards the *** of the considerations of the edge computing environment is resource management that involves resource scheduling,load balancing,task scheduling,and quality of service(QoS)to accomplish improved *** this motivation,this paper presents new soft computing based metaheuristic algorithms for resource scheduling(RS)in the edge computing *** SCBMARS model involves the hybridization of the Group Teaching Optimization Algorithm(GTOA)with rat swarm optimizer(RSO)algorithm for optimal resource *** goal of the SCBMA-RS model is to identify and allocate resources to every incoming user request in such a way,that the client’s necessities are satisfied with the minimum number of possible resources and optimal energy *** problem is formulated based on the availability of VMs,task characteristics,and queue *** integration of GTOA and RSO algorithms assist to improve the allocation of resources among VMs in the data *** experimental validation,a comprehensive set of simulations were performed using the CloudSim *** experimental results showcased the superior performance of the SCBMA-RS model interms of different measures.
Internet of Things, edge computing devices, the widespread use of artificial intelligence and machine learning applications, and the extensive adoption of cloud computing pose significant challenges to maintaining fau...
Internet of Things, edge computing devices, the widespread use of artificial intelligence and machine learning applications, and the extensive adoption of cloud computing pose significant challenges to maintaining fault tolerance in distributed systems. As the volume and complexity of systems continue to grow, the probability of system failures also grows, leading to downtime and poor performance. Fault tolerance is pivotal in modern computing systems by preventing downtime and service disruptions, even during failures. However, adopting fault tolerance comes with additional resource consumption, such as memory, CPU, disk, and network bandwidth usage, impacting system performance. Balancing fault tolerance with system performance is crucial to optimize resource utilization while minimizing the costs associated with detecting and recovering from faults. This paper introduces a node-to-node fault tolerance coordination mechanism for distributed systems to facilitate the tradeoff between fault tolerance and the cost of performance penalties and resource consumption. The proposed mechanism is preliminarily implemented on HDFS cluster. Our proposal enables opportunities to minimize the cost of the fault tolerance impact on performance and resource usage compared to the existing fault tolerance coordination mechanism.
The significant improvement in deepfake generation algorithms has made possible the manipulation of visual data. The advancement of GAN technology and tools has made it relatively simple to use source and target photo...
详细信息
ISBN:
(数字)9798331533038
ISBN:
(纸本)9798331533045
The significant improvement in deepfake generation algorithms has made possible the manipulation of visual data. The advancement of GAN technology and tools has made it relatively simple to use source and target photos and build realistic deepfakes. The challenges associated with deepfakes include political defamation, impersonation, misinformation, and cyberstalking. The generation of deepfakes through faceswap approach hinders the detection oftentimes as it spans numerous artifacts – illumination, facial skin tones, and other conditions. Existing techniques do not employ robust mechanisms to detect such deepfakes either due to computational inefficiency or focusing on a few parameters for decision-making. To counteract these dangers, a robust deepfake detection model must be developed and implemented. This paper proposes Efficient-Fused Net (EF-Net) - a transfer learning approach to two EfficientNet-B5 models with partial freezing between its layers that can differentiate between real and fake images generated from faceswap implementation. We evaluated our model’s performance using the challenging deepfake subset of the extensive and varied FaceForensics++ and DFDC-Preview datasets. The proposed method outperforms state of the art methods in the detection of faceswap deepfakes, surpassing the performance by $89.19 \%$ accuracy on DFDC-Preview and $\mathbf{9 7 . 7 0 \%}$ of Deepfakes subset of FaceForensics++.
This study explores the impact of the Synthetic Minority Oversampling Technique (SMOTE) on predictive accuracy in student performance prediction using both linear (Logistic Regression, LR) and ensemble (Random Forest,...
详细信息
ISBN:
(数字)9798331519094
ISBN:
(纸本)9798331519100
This study explores the impact of the Synthetic Minority Oversampling Technique (SMOTE) on predictive accuracy in student performance prediction using both linear (Logistic Regression, LR) and ensemble (Random Forest, RF) models. We compare the performance of these models, using a real-time dataset from Universiti Teknologi Malaysia (UTM). While previous studies have examined these models separately, this research uniquely investigates the simultaneous application of SMOTE to both. Our results show that LR’s accuracy improves from 91% to 95% with SMOTE, while RF maintains a consistent 98% accuracy. These findings demonstrate that SMOTE significantly enhances the performance of linear models in handling imbalanced data, providing useful insights for curriculum development in higher education. This research contributes to the literature by guiding higher education institutions in selecting the most effective predictive models.
The numbers of multimedia applications and their users increase with each passing *** multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future ge...
详细信息
The numbers of multimedia applications and their users increase with each passing *** multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future generation of network *** this article,a fuzzy logic empowered adaptive backpropagation neural network(FLeABPNN)algorithm is proposed for joint channel and multi-user detection(CMD).FLeABPNN has two *** first stage estimates the channel parameters,and the second performsmulti-user *** proposed approach capitalizes on a neuro-fuzzy hybrid systemthat combines the competencies of both fuzzy logic and neural *** study analyzes the results of using FLeABPNN based on a multiple-input andmultiple-output(MIMO)receiver with conventional partial oppositemutant particle swarmoptimization(POMPSO),total-OMPSO(TOMPSO),fuzzy logic empowered POMPSO(FL-POMPSO),and FL-TOMPSO-based MIMO *** FLeABPNN-based receiver renders better results than other techniques in terms of minimum mean square error,minimum mean channel error,and bit error rate.
An intrusion Detection System (IDS) is a system that resides inside the network and monitors all incoming and outgoing traffic. It prevents unethical activities from happening over the network. With the use of IoT dev...
详细信息
Stakeholder identification (SI) illustrates a critical part of the requirements elicitation activity. It helps software analysts gather accurate system requirements to ensure high quality and avoid system failure. Sta...
详细信息
The Covid-19 pandemic has accelerated the shift in organizations' strategies toward innovative online services. Customer reviews on platforms for online ordering and delivery are a vital source of information abou...
详细信息
Differently-abled people are significant minority groups, have many limitations to live everyday life, are starved of services, and are mostly ignored by society due to many types of disabilities. This problem may lea...
详细信息
In a large-scale distributed machine learning system, coded computing has attracted wide-spread attention since it can effectively alleviate the impact of stragglers. However, several emerging problems greatly limit t...
详细信息
暂无评论