Fog computing aims to mitigate data communication delay by deploying fog nodes to provide servers in the proximity of users and offload resource-hungry tasks that would otherwise be sent to distant cloud servers. In t...
详细信息
In recent years, with the rapid development of deep learning, natural language processing has achieved great progress in many aspects. In the field of text generation, classical Chinese poetry, as an important part of...
详细信息
A visible light communication (VLC) provides potential and effective communication paradigm due to the demand of high data-rate applications. VLC networks, consisting of multiple light emitting diodes (LEDs) and it pr...
详细信息
The Internet Of Things (IoT) is a network of heterogeneous nodes that exchange data and critical information amongst themselves with minimum human intervention. The utility of this technology is large, thus it is used...
详细信息
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism wit...
详细信息
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism with learning approaches provides a better solution more broadly by saluting multi-objective *** bots’patterns or features over the network have to be analyzed in both linear and non-linear *** linear and non-linear features are composed of high-level and low-level *** collected features are maintained over the Bag of Features(BoF)where the most influencing features are collected and provided into the classifier ***,the linearity and non-linearity of the threat are evaluated with Support Vector Machine(SVM).Next,with the collected BoF,the redundant features are eliminated as it triggers overhead towards the predictor ***,a novel Incoming data Redundancy Elimination-based learning model(RedE-L)is built to classify the network features to provide robustness towards BotNets *** simulation is carried out in MATLAB environment,and the evaluation of proposed RedE-L model is performed with various online accessible network traffic dataset(benchmark dataset).The proposed model intends to show better tradeoff compared to the existing approaches like conventional SVM,C4.5,RepTree and so ***,various metrics like Accuracy,detection rate,Mathews Correlation Coefficient(MCC),and some other statistical analysis are performed to show the proposed RedE-L model's *** F1-measure is 99.98%,precision is 99.93%,Accuracy is 99.84%,TPR is 99.92%,TNR is 99.94%,FNR is 0.06 and FPR is 0.06 respectively.
Today's world is fully dependent on data. Data are individual packets or units of information which on process leads to a useful information which intend helps in decision making. So these data are to be shared am...
详细信息
Presently, when the Internet of Things (IoT) makes virtually everything smart by improving every aspect of our life, continuous development in this area is imperative. As IoT deals with the Low-Power Lossy Networks (L...
详细信息
This paper presents a novel approach known as Neutrosophic Fuzzy Power Management (NFPM) aimed at addressing the critical challenge of uncertain energy availability in Energy Harvesting Sensor Networks (EHWSNs). The m...
详细信息
The fast pace of modern life caused people to experience more pressure from their surrounding environments. As a result, depression has emerged as one of the most common diseases. To detect depression, psychiatrists n...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
暂无评论