Advanced Search
Displaying 21-30 on page 3 of 447. Per Page  

Articles / Online

  • 5G Data Offloading Using Fuzzification with Grasshopper Optimization Technique
  • Abstract Data offloading at the network with less time and reduced energy consumption are highly important for every technology. Smart applications process the data very quickly with less power consumption. As technology grows towards 5G communication architecture, identifying a solution for QoS in 5G through energy-efficient computing is important. In this proposed model, we perform data offloading at 5G using the fuzzification concept. Mobile IoT devices create tasks in the network and are offloaded in the cloud or mobile edge nodes based on energy consumption. Two base stations, small (SB) and macro (MB) stations, are initialized and the first tasks randomly…
  • More
  •   Views:127       Downloads:37        Download PDF
  • Adaptive Server Load Balancing in SDN Using PID Neural Network Controller
  • Abstract Web service applications are increasing tremendously in support of high-level businesses. There must be a need of better server load balancing mechanism for improving the performance of web services in business. Though many load balancing methods exist, there is still a need for sophisticated load balancing mechanism for not letting the clients to get frustrated. In this work, the server with minimum response time and the server having less traffic volume were selected for the aimed server to process the forthcoming requests. The Servers are probed with adaptive control of time with two thresholds L and U to indicate the…
  • More
  •   Views:55       Downloads:29        Download PDF
  • Machine Learning Technique to Detect Radiations in the Brain
  • Abstract The brain of humans and other organisms is affected in various ways through the electromagnetic field (EMF) radiations generated by mobile phones and cell phone towers. Morphological variations in the brain are caused by the neurological changes due to the revelation of EMF. Cellular level analysis is used to measure and detect the effect of mobile radiations, but its utilization seems very expensive, and it is a tedious process, where its analysis requires the preparation of cell suspension. In this regard, this research article proposes optimal broadcasting learning to detect changes in brain morphology due to the revelation of EMF.…
  • More
  •   Views:148       Downloads:54        Download PDF
  • Protecting Data Mobility in Cloud Networks Using Metadata Security
  • Abstract At present, health care applications, government services, and banking applications use big data with cloud storage to process and implement data. Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data. Sometimes, data may have highly sensitive information, leading users to consider using big data and cloud processing regardless of whether they are secured are not. Threats to sensitive data in cloud systems produce high risks, and existing security methods do not provide enough security to sensitive user data in cloud and big data environments. At present, several security solutions support cloud systems. Some of…
  • More
  •   Views:145       Downloads:28        Download PDF
  • Performance Enhancement of PV Based Boost Cascaded Fifteen Level Inverter for AC Loads
  • Abstract In this research work, single-stage fifteen levels cascaded DC-interface converter (CDDCLC) is proposed for sun arranged photovoltaic technology (PV) applications. The proposed geography is joined with help DC chopper and H-associate inverter to upgrade the power converter to accomplish the diminished harmonic profile. In assessment with the customary inverter structures, the proposed system is used with diminished voltage stress, decreased switch count and DC source tally. The proposed research work with cascaded DC link converter design requires three DC sources for combining fifteen-level AC output. This investigation structure switching technique is phase opposition and disposition pulse width modulation technique (POPD)…
  • More
  •   Views:49       Downloads:26        Download PDF
  • Vision Based Real Time Monitoring System for Elderly Fall Event Detection Using Deep Learning
  • Abstract Human fall detection plays a vital part in the design of sensor based alarming system, aid physical therapists not only to lessen after fall effect and also to save human life. Accurate and timely identification can offer quick medical services to the injured people and prevent from serious consequences. Several vision-based approaches have been developed by the placement of cameras in diverse everyday environments. At present times, deep learning (DL) models particularly convolutional neural networks (CNNs) have gained much importance in the fall detection tasks. With this motivation, this paper presents a new vision based elderly fall event detection using…
  • More
  •   Views:70       Downloads:41        Download PDF
  • Application of ANFIS Model for Thailand’s Electric Vehicle Consumption
  • Abstract Generally, road transport is a major energy-consuming sector. Fuel consumption of each vehicle is an important factor that affects the overall energy consumption, driving behavior and vehicle characteristic are the main factors affecting the change of vehicle fuel consumption. It is difficult to analyze the influence of fuel consumption with multiple and complex factors. The Adaptive Neuro-Fuzzy Inference System (ANFIS) approach was employed to develop a vehicle fuel consumption model based on multivariate input. The ANFIS network was constructed by various experiments based on the ANFIS Parameter setting. The performance of the ANFIS network was validated using Root Mean Square…
  • More
  •   Views:43       Downloads:28        Download PDF
  • Operation Optimal Control of Urban Rail Train Based on Multi-Objective Particle Swarm Optimization
  • Abstract The energy consumption of train operation occupies a large proportion of the total consumption of railway transportation. In order to improve the operating energy utilization rate of trains, a multi-objective particle swarm optimization (MPSO) algorithm with energy consumption, punctuality and parking accuracy as the objective and safety as the constraint is built. To accelerate its the convergence process, the train operation progression is divided into several modes according to the train speed-distance curve. A human-computer interactive particle swarm optimization algorithm is proposed, which presents the optimized results after a certain number of iterations to the decision maker, and the satisfactory…
  • More
  •   Views:46       Downloads:21        Download PDF
  • LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec
  • Abstract System logs record detailed information about system operation and are important for analyzing the system's operational status and performance. Rapid and accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more and more complex, and the number of system logs gradually increases, which brings challenges to analyze system logs. Some recent studies show that logs can be unstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a long time to train models. Therefore, to reduce the computational…
  • More
  •   Views:152       Downloads:123        Download PDF
  • Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain
  • Abstract With the rapidly developing of Internet of Things (IoT), the volume of data generated by IoT systems is increasing quickly. To release the pressure of data management and storage, more and more enterprises and individuals prefer to integrate cloud service with IoT systems, in which the IoT data can be outsourced to cloud server. Since cloud service provider (CSP) is not fully trusted, a variety of methods have been proposed to deal with the problem of data integrity checking. In traditional data integrity audition schemes, the task of data auditing is usually performed by Third Party Auditor (TPA) which is…
  • More
  •   Views:159       Downloads:121        Download PDF
Displaying 21-30 on page 3 of 447. Per Page