期刊文献+
共找到116篇文章
< 1 2 6 >
每页显示 20 50 100
Traffic Engineering and Quality of Service in Hybrid Software Defined Networks
1
作者 Samiullah Mehraban Rajesh Kumar Yadav 《China Communications》 SCIE CSCD 2024年第2期96-121,共26页
For Future networks, many research projects have proposed different architectures around the globe;Software Defined Network(SDN) architectures, through separating Data and Control Layers, offer a crucial structure for... For Future networks, many research projects have proposed different architectures around the globe;Software Defined Network(SDN) architectures, through separating Data and Control Layers, offer a crucial structure for it. With a worldwide view and centralized Control, the SDN network provides flexible and reliable network management that improves network throughput and increases link utilization. In addition, it supports an innovative flow scheduling system to help advance Traffic Engineering(TE). For Medium and large-scale networks migrating directly from a legacy network to an SDN Network seems more complicated & even impossible, as there are High potential challenges, including technical, financial, security, shortage of standards, and quality of service degradation challenges. These challenges cause the birth and pave the ground for Hybrid SDN networks, where SDN devices coexist with traditional network devices. This study explores a Hybrid SDN network’s Traffic Engineering and Quality of Services Issues. Quality of service is described by network characteristics such as latency, jitter, loss, bandwidth,and network link utilization, using industry standards and mechanisms in a Hybrid SDN Network. We have organized the related studies in a way that the Quality of Service may gain the most benefit from the concept of Hybrid SDN networks using different algorithms and mechanisms: Deep Reinforcement Learning(DRL), Heuristic algorithm, K path partition algorithm, Genetic algorithm, SOTE algorithm, ROAR method, and Routing Optimization with different optimization mechanisms that help to ensure high-quality performance in a Hybrid SDN Network. 展开更多
关键词 DRL hSDN QOE QoS SDN TE
下载PDF
Impediments of Cognitive System Engineering in Machine-Human Modeling
2
作者 Fayaz Ahmad Fayaz Arun Malik +5 位作者 Isha Batra Akber Abid Gardezi Syed Immamul Ansarullah Shafiq Ahmad Mejdal Alqahtani Muhammad Shafiq 《Computers, Materials & Continua》 SCIE EI 2023年第3期6689-6701,共13页
A comprehensive understanding of human intelligence is still an ongoing process,i.e.,human and information security are not yet perfectly matched.By understanding cognitive processes,designers can design humanized cog... A comprehensive understanding of human intelligence is still an ongoing process,i.e.,human and information security are not yet perfectly matched.By understanding cognitive processes,designers can design humanized cognitive information systems(CIS).The need for this research is justified because today’s business decision makers are faced with questions they cannot answer in a given amount of time without the use of cognitive information systems.The researchers aim to better strengthen cognitive information systems with more pronounced cognitive thresholds by demonstrating the resilience of cognitive resonant frequencies to reveal possible responses to improve the efficiency of human-computer interaction(HCI).Apractice-oriented research approach included research analysis and a review of existing articles to pursue a comparative research model;thereafter,amodel development paradigm was used to observe and monitor the progression of CIS during HCI.The scope of our research provides a broader perspective on how different disciplines affect HCI and how human cognitive models can be enhanced to enrich complements.We have identified a significant gap in the current literature on mental processing resulting from a wide range of theory and practice. 展开更多
关键词 Cognitive-IoT human-computer interaction decision making
下载PDF
Improvisation of Node Mobility Using Cluster Routing-based Group Adaptive in MANET
3
作者 J.Shanthini P.Punitha S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2619-2636,共18页
In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain.In... In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain.In tactical Mobile Ad-hoc Network(MANET),hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out,self-mending and self-administration.Clustering in the routing process is one of the key aspects to increase MANET performance by coordinat-ing the pathways using multiple criteria and analytics.We present a Group Adaptive Hybrid Routing Algorithm(GAHRA)for gathering portability,which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile situations.Based on this aspect,the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach,with the objectives of enhancing the out-put of MANET routing computation in each hub.Simulation analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications. 展开更多
关键词 Diplomatic mobile Ad-hoc network grouping mobility interior stable hybrid routing scheme adaptive switch structure clustering communication
下载PDF
Fusion of Region Extraction and Cross-Entropy SVM Models for Wheat Rust Diseases Classification
4
作者 Deepak Kumar Vinay Kukreja +2 位作者 Ayush Dogra Bhawna Goyal Talal Taha Ali 《Computers, Materials & Continua》 SCIE EI 2023年第11期2097-2121,共25页
Wheat rust diseases are one of the major types of fungal diseases that cause substantial yield quality losses of 15%–20%every year.The wheat rust diseases are identified either through experienced evaluators or compu... Wheat rust diseases are one of the major types of fungal diseases that cause substantial yield quality losses of 15%–20%every year.The wheat rust diseases are identified either through experienced evaluators or computerassisted techniques.The experienced evaluators take time to identify the disease which is highly laborious and too costly.If wheat rust diseases are predicted at the development stages,then fungicides are sprayed earlier which helps to increase wheat yield quality.To solve the experienced evaluator issues,a combined region extraction and cross-entropy support vector machine(CE-SVM)model is proposed for wheat rust disease identification.In the proposed system,a total of 2300 secondary source images were augmented through flipping,cropping,and rotation techniques.The augmented images are preprocessed by histogram equalization.As a result,preprocessed images have been applied to region extraction convolutional neural networks(RCNN);Fast-RCNN,Faster-RCNN,and Mask-RCNN models for wheat plant patch extraction.Different layers of region extraction models construct a feature vector that is later passed to the CE-SVM model.As a result,the Gaussian kernel function in CE-SVM achieves high F1-score(88.43%)and accuracy(93.60%)for wheat stripe rust disease classification. 展开更多
关键词 Wheat rust diseases AGRICULTURAL region extraction models INTERCROPPING image processing feature extraction precision agriculture
下载PDF
Human-Computer Interaction Using Deep Fusion Model-Based Facial Expression Recognition System
5
作者 Saiyed Umer Ranjeet Kumar Rout +3 位作者 Shailendra Tiwari Ahmad Ali AlZubi Jazem Mutared Alanazi Kulakov Yurii 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第5期1165-1185,共21页
A deep fusion model is proposed for facial expression-based human-computer Interaction system.Initially,image preprocessing,i.e.,the extraction of the facial region from the input image is utilized.Thereafter,the extr... A deep fusion model is proposed for facial expression-based human-computer Interaction system.Initially,image preprocessing,i.e.,the extraction of the facial region from the input image is utilized.Thereafter,the extraction of more discriminative and distinctive deep learning features is achieved using extracted facial regions.To prevent overfitting,in-depth features of facial images are extracted and assigned to the proposed convolutional neural network(CNN)models.Various CNN models are then trained.Finally,the performance of each CNN model is fused to obtain the final decision for the seven basic classes of facial expressions,i.e.,fear,disgust,anger,surprise,sadness,happiness,neutral.For experimental purposes,three benchmark datasets,i.e.,SFEW,CK+,and KDEF are utilized.The performance of the proposed systemis compared with some state-of-the-artmethods concerning each dataset.Extensive performance analysis reveals that the proposed system outperforms the competitive methods in terms of various performance metrics.Finally,the proposed deep fusion model is being utilized to control a music player using the recognized emotions of the users. 展开更多
关键词 Deep learning facial expression emotions RECOGNITION CNN
下载PDF
Blockchain Based Consensus Algorithm and Trustworthy Evaluation of Authenticated Subgraph Queries
6
作者 G.Sharmila M.K.Kavitha Devi 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1743-1758,共16页
Over the past era,subgraph mining from a large collection of graph database is a crucial problem.In addition,scalability is another big problem due to insufficient storage.There are several security challenges associa... Over the past era,subgraph mining from a large collection of graph database is a crucial problem.In addition,scalability is another big problem due to insufficient storage.There are several security challenges associated with subgraph mining in today’s on-demand system.To address this downside,our proposed work introduces a Blockchain-based Consensus algorithm for Authenticated query search in the Large-Scale Dynamic Graphs(BCCA-LSDG).The two-fold process is handled in the proposed BCCA-LSDG:graph indexing and authenticated query search(query processing).A blockchain-based reputation system is meant to maintain the trust blockchain and cloud server of the proposed architecture.To resolve the issues and provide safe big data transmission,the proposed technique also combines blockchain with a consensus algorithm architecture.Security of the big data is ensured by dividing the BC network into distinct networks,each with a restricted number of allowed entities,data kept in the cloud gate server,and data analysis in the blockchain.The consensus algorithm is crucial for maintaining the speed,performance and security of the blockchain.Then Dual Similarity based MapReduce helps in mapping and reducing the relevant subgraphs with the use of optimal feature sets.Finally,the graph index refinement process is undertaken to improve the query results.Concerning query error,fuzzy logic is used to refine the index of the graph dynamically.The proposed technique outperforms advanced methodologies in both blockchain and non-blockchain systems,and the combination of blockchain and subgraph provides a secure communication platform,according to the findings. 展开更多
关键词 Big data blockchain consensus algorithm trust management graph index
下载PDF
Development of Algorithm for Person Re-Identification Using Extended Openface Method
7
作者 S.Michael Dinesh A.R.Kavitha 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期545-561,共17页
Deep learning has risen in popularity as a face recognition technology in recent years.Facenet,a deep convolutional neural network(DCNN)developed by Google,recognizes faces with 128 bytes per face.It also claims to ha... Deep learning has risen in popularity as a face recognition technology in recent years.Facenet,a deep convolutional neural network(DCNN)developed by Google,recognizes faces with 128 bytes per face.It also claims to have achieved 99.96%on the reputed Labelled Faces in the Wild(LFW)dataset.How-ever,the accuracy and validation rate of Facenet drops down eventually,there is a gradual decrease in the resolution of the images.This research paper aims at developing a new facial recognition system that can produce a higher accuracy rate and validation rate on low-resolution face images.The proposed system Extended Openface performs facial recognition by using three different features i)facial landmark ii)head pose iii)eye gaze.It extracts facial landmark detection using Scattered Gated Expert Network Constrained Local Model(SGEN-CLM).It also detects the head pose and eye gaze using Enhanced Constrained Local Neur-alfield(ECLNF).Extended openface employs a simple Support Vector Machine(SVM)for training and testing the face images.The system’s performance is assessed on low-resolution datasets like LFW,Indian Movie Face Database(IMFDB).The results demonstrated that Extended Openface has a better accuracy rate(12%)and validation rate(22%)than Facenet on low-resolution images. 展开更多
关键词 Constrained local model enhanced constrained local neuralfield enhanced hog scattered gated expert network support vector machine
下载PDF
Binary Oriented Feature Selection for Valid Product Derivation in Software Product Line
8
作者 Muhammad Fezan Afzal Imran Khan +2 位作者 Javed Rashid Mubbashar Saddique Heba G.Mohamed 《Computers, Materials & Continua》 SCIE EI 2023年第9期3653-3670,共18页
Software Product Line(SPL)is a group of software-intensive systems that share common and variable resources for developing a particular system.The feature model is a tree-type structure used to manage SPL’s common an... Software Product Line(SPL)is a group of software-intensive systems that share common and variable resources for developing a particular system.The feature model is a tree-type structure used to manage SPL’s common and variable features with their different relations and problem of Crosstree Constraints(CTC).CTC problems exist in groups of common and variable features among the sub-tree of feature models more diverse in Internet of Things(IoT)devices because different Internet devices and protocols are communicated.Therefore,managing the CTC problem to achieve valid product configuration in IoT-based SPL is more complex,time-consuming,and hard.However,the CTC problem needs to be considered in previously proposed approaches such as Commonality VariabilityModeling of Features(COVAMOF)andGenarch+tool;therefore,invalid products are generated.This research has proposed a novel approach Binary Oriented Feature Selection Crosstree Constraints(BOFS-CTC),to find all possible valid products by selecting the features according to cardinality constraints and cross-tree constraint problems in the featuremodel of SPL.BOFS-CTC removes the invalid products at the early stage of feature selection for the product configuration.Furthermore,this research developed the BOFS-CTC algorithm and applied it to,IoT-based feature models.The findings of this research are that no relationship constraints and CTC violations occur and drive the valid feature product configurations for the application development by removing the invalid product configurations.The accuracy of BOFS-CTC is measured by the integration sampling technique,where different valid product configurations are compared with the product configurations derived by BOFS-CTC and found 100%correct.Using BOFS-CTC eliminates the testing cost and development effort of invalid SPL products. 展开更多
关键词 Software product line feature model internet of things crosstree constraints variability management
下载PDF
An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images
9
作者 R.Bala Krishnan D.Yuvaraj +4 位作者 P.Suthanthira Devi Varghese S.Chooralil N.Rajesh Kumar B.Karthikeyan G.Manikandan 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1563-1576,共14页
With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate.Traditional ... With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission rate.Traditional steganography and cryptography concepts are used to achieve the goal of concealing secret Content on a media and encrypting it before transmission.Both of the techniques mentioned above aid in the confidentiality of feature content.The proposed approach concerns secret content embodiment in selected pixels on digital image layers such as Red,Green,and Blue.The private Content originated from a medical client and was forwarded to a medical practitioner on the server end through the internet.The K-Means clustering principle uses the contouring approach to frame the pixel clusters on the image layers.The content embodiment procedure is performed on the selected pixel groups of all layers of the image using the Least Significant Bit(LSB)substitution technique to build the secret Content embedded image known as the stego image,which is subsequently transmitted across the internet medium to the server end.The experimental results are computed using the inputs from“Open-Access Medical Image Repositories(aylward.org)”and demonstrate the scheme’s impudence as the Content concealing procedure progresses. 展开更多
关键词 CONTOURING secret content embodiment least significant bit embedding medical data preservation secret content congregation pixel clustering
下载PDF
Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm
10
作者 Ayman Khallel Al-Ani Shams Ul Arfeen Laghari +2 位作者 Hariprasath Manoharan Shitharth Selvarajan Mueen Uddin 《Computers, Materials & Continua》 SCIE EI 2023年第8期2261-2279,共19页
In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads tha... In this paper,the application of transportation systems in realtime traffic conditions is evaluated with data handling representations.The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system.Compared to the existing approach,the design model in the proposed method is made by dividing the computing areas into several cluster regions,thereby reducing the complex monitoring system where control errors are minimized.Furthermore,a route management technique is combined with Artificial Intelligence(AI)algorithm to transmit the data to appropriate central servers.Therefore,the combined objective case studies are examined as minimization and maximization criteria,thus increasing the efficiency of the proposed method.Finally,four scenarios are chosen to investigate the projected design’s effectiveness.In all simulated metrics,the proposed approach provides better operational outcomes for an average percentage of 97,thereby reducing the amount of traffic in real-time conditions. 展开更多
关键词 TRANSPORTATION Artificial Intelligence(AI) DATA-DRIVEN Internet of Things(IoT)
下载PDF
SRC:Superior Robustness of COVID-19 Detection from Noisy Cough Data Using GFCC
11
作者 Basanta Kumar Swain Mohammad Zubair Khan +1 位作者 Chiranji Lal Chowdhary Abdullah Alsaeedi 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2337-2349,共13页
This research is focused on a highly effective and untapped feature called gammatone frequency cepstral coefficients(GFCC)for the detection of COVID-19 by using the nature-inspired meta-heuristic algorithm of deer hun... This research is focused on a highly effective and untapped feature called gammatone frequency cepstral coefficients(GFCC)for the detection of COVID-19 by using the nature-inspired meta-heuristic algorithm of deer hunting optimization and artificial neural network(DHO-ANN).The noisy crowdsourced cough datasets were collected from the public domain.This research work claimed that the GFCC yielded better results in terms of COVID-19 detection as compared to the widely used Mel-frequency cepstral coefficient in noisy crowdsourced speech corpora.The proposed algorithm's performance for detecting COVID-19 disease is rigorously validated using statistical measures,F1 score,confusion matrix,specificity,and sensitivity parameters.Besides,it is found that the proposed algorithm using GFCC performs well in terms of detecting the COVID-19 disease from the noisy crowdsourced cough dataset,COUGHVID.Moreover,the proposed algorithm and undertaken feature parameters have improved the detection of COVID-19 by 5%compared to the existing methods. 展开更多
关键词 COVID-19 GFCC DHO-ANN cough data
下载PDF
Hybridization of Metaheuristics Based Energy Efficient Scheduling Algorithm for Multi-Core Systems
12
作者 J.Jean Justus U.Sakthi +4 位作者 K.Priyadarshini B.Thiyaneswaran Masoud Alajmi Marwa Obayya Manar Ahmed Hamza 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期205-219,共15页
The developments of multi-core systems(MCS)have considerably improved the existing technologies in thefield of computer architecture.The MCS comprises several processors that are heterogeneous for resource capacities,... The developments of multi-core systems(MCS)have considerably improved the existing technologies in thefield of computer architecture.The MCS comprises several processors that are heterogeneous for resource capacities,working environments,topologies,and so on.The existing multi-core technology unlocks additional research opportunities for energy minimization by the use of effective task scheduling.At the same time,the task scheduling process is yet to be explored in the multi-core systems.This paper presents a new hybrid genetic algorithm(GA)with a krill herd(KH)based energy-efficient scheduling techni-que for multi-core systems(GAKH-SMCS).The goal of the GAKH-SMCS tech-nique is to derive scheduling tasks in such a way to achieve faster completion time and minimum energy dissipation.The GAKH-SMCS model involves a multi-objectivefitness function using four parameters such as makespan,processor utilization,speedup,and energy consumption to schedule tasks proficiently.The performance of the GAKH-SMCS model has been validated against two datasets namely random dataset and benchmark dataset.The experimental outcome ensured the effectiveness of the GAKH-SMCS model interms of makespan,pro-cessor utilization,speedup,and energy consumption.The overall simulation results depicted that the presented GAKH-SMCS model achieves energy effi-ciency by optimal task scheduling process in MCS. 展开更多
关键词 Task scheduling energy efficiency multi-core systems fitness function MAKESPAN
下载PDF
Japanese Sign Language Recognition by Combining Joint Skeleton-Based Handcrafted and Pixel-Based Deep Learning Features with Machine Learning Classification
13
作者 Jungpil Shin Md.Al Mehedi Hasan +2 位作者 Abu Saleh Musa Miah Kota Suzuki Koki Hirooka 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期2605-2625,共21页
Sign language recognition is vital for enhancing communication accessibility among the Deaf and hard-of-hearing communities.In Japan,approximately 360,000 individualswith hearing and speech disabilities rely on Japane... Sign language recognition is vital for enhancing communication accessibility among the Deaf and hard-of-hearing communities.In Japan,approximately 360,000 individualswith hearing and speech disabilities rely on Japanese Sign Language(JSL)for communication.However,existing JSL recognition systems have faced significant performance limitations due to inherent complexities.In response to these challenges,we present a novel JSL recognition system that employs a strategic fusion approach,combining joint skeleton-based handcrafted features and pixel-based deep learning features.Our system incorporates two distinct streams:the first stream extracts crucial handcrafted features,emphasizing the capture of hand and body movements within JSL gestures.Simultaneously,a deep learning-based transfer learning stream captures hierarchical representations of JSL gestures in the second stream.Then,we concatenated the critical information of the first stream and the hierarchy of the second stream features to produce the multiple levels of the fusion features,aiming to create a comprehensive representation of the JSL gestures.After reducing the dimensionality of the feature,a feature selection approach and a kernel-based support vector machine(SVM)were used for the classification.To assess the effectiveness of our approach,we conducted extensive experiments on our Lab JSL dataset and a publicly available Arabic sign language(ArSL)dataset.Our results unequivocally demonstrate that our fusion approach significantly enhances JSL recognition accuracy and robustness compared to individual feature sets or traditional recognition methods. 展开更多
关键词 Japanese Sign Language(JSL) hand gesture recognition geometric feature distance feature angle feature GoogleNet
下载PDF
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
14
作者 Arslan Akram Imran Khan +4 位作者 Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni 《Computers, Materials & Continua》 SCIE EI 2024年第1期1311-1328,共18页
Algorithms for steganography are methods of hiding data transfers in media files.Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial i... Algorithms for steganography are methods of hiding data transfers in media files.Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image analysis.Images with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for classification.To address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of images.Support Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or cover.The Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the proposedmethod.Using WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods. 展开更多
关键词 CURVELETS fast fourier transformation support vector machine high pass filters STEGANOGRAPHY
下载PDF
Selective and Adaptive Incremental Transfer Learning with Multiple Datasets for Machine Fault Diagnosis
15
作者 Kwok Tai Chui Brij B.Gupta +1 位作者 Varsha Arya Miguel Torres-Ruiz 《Computers, Materials & Continua》 SCIE EI 2024年第1期1363-1379,共17页
The visions of Industry 4.0 and 5.0 have reinforced the industrial environment.They have also made artificial intelligence incorporated as a major facilitator.Diagnosing machine faults has become a solid foundation fo... The visions of Industry 4.0 and 5.0 have reinforced the industrial environment.They have also made artificial intelligence incorporated as a major facilitator.Diagnosing machine faults has become a solid foundation for automatically recognizing machine failure,and thus timely maintenance can ensure safe operations.Transfer learning is a promising solution that can enhance the machine fault diagnosis model by borrowing pre-trained knowledge from the source model and applying it to the target model,which typically involves two datasets.In response to the availability of multiple datasets,this paper proposes using selective and adaptive incremental transfer learning(SA-ITL),which fuses three algorithms,namely,the hybrid selective algorithm,the transferability enhancement algorithm,and the incremental transfer learning algorithm.It is a selective algorithm that enables selecting and ordering appropriate datasets for transfer learning and selecting useful knowledge to avoid negative transfer.The algorithm also adaptively adjusts the portion of training data to balance the learning rate and training time.The proposed algorithm is evaluated and analyzed using ten benchmark datasets.Compared with other algorithms from existing works,SA-ITL improves the accuracy of all datasets.Ablation studies present the accuracy enhancements of the SA-ITL,including the hybrid selective algorithm(1.22%-3.82%),transferability enhancement algorithm(1.91%-4.15%),and incremental transfer learning algorithm(0.605%-2.68%).These also show the benefits of enhancing the target model with heterogeneous image datasets that widen the range of domain selection between source and target domains. 展开更多
关键词 Deep learning incremental learning machine fault diagnosis negative transfer transfer learning
下载PDF
Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications 被引量:4
16
作者 V.Gopinath R.S.Bhuvaneswaran 《Computers, Materials & Continua》 SCIE EI 2018年第11期341-352,共12页
Cloud computing is the highly demanded technology nowadays.Due to the service oriented architecture,seamless accessibility and other advantages of this advent technology,many transaction rich applications are making u... Cloud computing is the highly demanded technology nowadays.Due to the service oriented architecture,seamless accessibility and other advantages of this advent technology,many transaction rich applications are making use of it.At the same time,it is vulnerable to hacks and threats.Hence securing this environment is of at most important and many research works are being reported focusing on it.This paper proposes a safe storage mechanism using Elliptic curve cryptography(ECC)for the Transaction Rich Applications(TRA).With ECC based security scheme,the security level of the protected system will be increased and it is more suitable to secure the delivered data in the portable devices.The proposed scheme shields the aligning of different kind of data elements to each provider using an ECC algorithm.Analysis,comparison and simulation prove that the proposed system is more effective and secure for the Transaction rich applications in Cloud. 展开更多
关键词 ECC SSL VPN cloud computing BANKING security transaction rich applications
下载PDF
SOFTWARE DEFINED NETWORKING
17
作者 Richard Yang 毕军 Guofei Gu 《China Communications》 SCIE CSCD 2014年第2期I0001-I0002,共2页
Amajor recent development in computer networking is the emergence of Software Defined Networking(SDN),whose goal is to provide a centralized,programmable control plane that is decoupled from the distributed data plane... Amajor recent development in computer networking is the emergence of Software Defined Networking(SDN),whose goal is to provide a centralized,programmable control plane that is decoupled from the distributed data planes on individual network devices.In particular,the development of OpenFlow has demonstrated many potential benefits of SDN,and multiple vendors have started to offer commercial switches supporting the OpenFlow standard.Researchers have also made progress on SDN components including SDN controllers, 展开更多
关键词 计算机网络 软件定义 SDN 数据平面 网络设备 研究人员 编程接口 交换机
下载PDF
Dielectric or plasmonic Mie object at air–liquid interface: The transferred and the traveling momenta of photon
18
作者 M R C Mahdy Hamim Mahmud Rivy +6 位作者 Ziaur Rahman Jony Nabila Binte Alam Nabila Masud Golam Dastegir Al Quaderi Ibraheem Muhammad Moosa Chowdhury Mofizur Rahman M Sohel Rahman 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第1期311-323,共13页
Considering the inhomogeneous or heterogeneous background, we have demonstrated that if the background and the half-immersed object are both non-absorbing, the transferred photon momentum to the pulled object can be c... Considering the inhomogeneous or heterogeneous background, we have demonstrated that if the background and the half-immersed object are both non-absorbing, the transferred photon momentum to the pulled object can be considered as the one of Minkowski exactly at the interface. In contrast, the presence of loss inside matter, either in the half-immersed object or in the background, causes optical pushing of the object. Our analysis suggests that for half-immersed plasmonic or lossy dielectric, the transferred momentum of photon can mathematically be modeled as the type of Minkowski and also of Abraham. However, according to a final critical analysis, the idea of Abraham momentum transfer has been rejected. Hence,an obvious question arises: whence the Abraham momentum? It is demonstrated that though the transferred momentum to a half-immersed Mie object(lossy or lossless) can better be considered as the Minkowski momentum, Lorentz force analysis suggests that the momentum of a photon traveling through the continuous background, however, can be modeled as the type of Abraham. Finally, as an interesting sidewalk, a machine learning based system has been developed to predict the time-averaged force within a very short time avoiding time-consuming full wave simulation. 展开更多
关键词 Abraham–Minkowski controversy dielectric interface machine learning optical force laws optical pulling force optical tractor beams
下载PDF
Empirical Assessment of Bacillus Calmette-Guérin Vaccine to Combat COVID-19
19
作者 Nikita Jain Vedika Gupta +4 位作者 Chinmay Chakraborty Agam Madan Deepali Virmani Lorenzo Salas-Morera Laura Garcia-Hernandez 《Computers, Materials & Continua》 SCIE EI 2022年第1期213-231,共19页
COVID-19 has become one of the critical health issues globally,which surfaced first in latter part of the year 2019.It is the topmost concern for many nations’governments as the contagious virus started mushrooming o... COVID-19 has become one of the critical health issues globally,which surfaced first in latter part of the year 2019.It is the topmost concern for many nations’governments as the contagious virus started mushrooming over adjacent regions of infected areas.In 1980,a vaccine called Bacillus Calmette-Guérin(BCG)was introduced for preventing tuberculosis and lung cancer.Countries that have made the BCG vaccine mandatory have witnessed a lesser COVID-19 fatality rate than the countries that have not made it compulsory.This paper’s initial research shows that the countries with a longtermcompulsory BCGvaccination system are less affected by COVID-19 than those without a BCG vaccination system.This paper discusses analytical data patterns for medical applications regarding COVID-19 impact on countries with mandatory BCG status on fatality rates.The paper has tackled numerous analytical challenges to realize the full potential of heterogeneous data.An analogy is drawn to demonstrate how other factors can affect fatality and infection rates other than BCG vaccination only,such as age groups affected,other diseases,and stringency index.The data of Spain,Portugal,and Germany have been taken for a case study of BCG impact analysis. 展开更多
关键词 Bacillus Calmette-Guérin COVID-19 fatality rate lockdown gross domestic product VACCINE
下载PDF
Packet Optimization of Software Defined Network Using Lion Optimization
20
作者 Jagmeet Kaur Shakeel Ahmed +3 位作者 Yogesh Kumar A.Alaboudi N.Z.Jhanjhi Muhammad Fazal Ijaz 《Computers, Materials & Continua》 SCIE EI 2021年第11期2617-2633,共17页
There has been an explosion of cloud services as organizations take advantage of their continuity,predictability,as well as quality of service and it raises the concern about latency,energy-efficiency,and security.Thi... There has been an explosion of cloud services as organizations take advantage of their continuity,predictability,as well as quality of service and it raises the concern about latency,energy-efficiency,and security.This increase in demand requires new configurations of networks,products,and service operators.For this purpose,the software-defined network is an efficient technology that enables to support the future network functions along with the intelligent applications and packet optimization.This work analyzes the offline cloud scenario in which machines are efficiently deployed and scheduled for user processing requests.Performance is evaluated in terms of reducing bandwidth,task execution times and latencies,and increasing throughput.A minimum execution time algorithm is used to compute the completion time of all the available resources which are allocated to the virtual machine and lion optimization algorithm is applied to packets in a cloud environment.The proposed work is shown to improve the throughput and latency rate. 展开更多
关键词 Software-defined network cloud computing packet optimization energy efficiency lion optimization minimum execution time
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部