55 results
Search Results
2. Comparative study of various hybrid path planning algorithms for a mobile platform.
- Author
-
Sulaiman, Shifa and Sudheer, A. P.
- Subjects
- *
MOBILE robots , *ALGORITHMS , *ROAD maps , *COMPARATIVE studies , *SERVICE industries - Abstract
Mobile robots are implemented in various fields for diverse applications. Mobile robots with wheeled, legged, and hybrid types are used in industrial and service sectors. Obstacle avoidance algorithms play an important role in mobile robot navigations. In this paper, comparative study of various hybrid path planning algorithms for avoiding static obstacles are carried out for determining the most efficient path planning algorithm for the given task. A modified Probablistic Road Map (PRM) approach is combined with variants of A star algorithm to create different hybrid path planning algorithms in this paper. The nodes and connections are created using PRM approach where as the optimum path is constructed with variants of A star algorithm. This paper compares the computational time, algorithm size, memory, path optimality, etc. The proposed hybrid algorithms are compared and evaluated by simulating the obstacle avoidance by the mobile robot in a structured environment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Data understanding and preparation in business domain: Importance of meta-features characterization.
- Author
-
Oreški, Dijana and Pihir, Igor
- Subjects
- *
MACHINE learning , *ALGORITHMS , *DEEP learning , *EXPERTISE - Abstract
Various machine learning algorithms are developed with an aim to create precise and trustworthy models and extract knowledge from data sources. Deep expertise in the field of machine learning is required for the challenging task of choosing the right algorithms for a specific dataset. There is no single algorithm that outperforms all others across all applications and different datasets. The difficulty of choosing an appropriate algorithm for a specific task in specific domain is related to the properties of the dataset. Properties of the dataset are measured through meta-features. Meta-features describe task and can provide explanation how one machine learning approach outperforms other algorithms on a given dataset. Learning about the effectiveness of learning algorithms, or meta-learning was developed to deal with this issue. Focus is required because previous research papers have not successfully identified meta-features in particular domains. In this research, we have evaluated various meta-feature characterization methodologies and have concentrated on basic meta-features. Business domain data is in the focus of this paper. We computed basic (general) meta-features and illustrated several use cases for their applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. A modified fuzzy K-nearest neighbor using sine cosine algorithm for two-classes and multi-classes datasets.
- Author
-
Zheng, Chengfeng, Kasihmuddin, Mohd Shareduwan Mohd, Mansor, Mohd. Asyraf, Jamaludin, Siti Zulaikha Mohd, and Zamri, Nur Ezlin
- Subjects
- *
K-nearest neighbor classification , *MACHINE learning , *ALGORITHMS , *COSINE function - Abstract
The sine and cosine algorithm has become a widely researched swarm optimization method in recent years due to its simplicity and effectiveness. Based on the advantages, the study in this paper delves deeper into the key parameters that influence the performance of the algorithm, and has implemented modifications such as integrating the reverse learning algorithm and adding elite opposition solution to create the modified Sine and Cosine Algorithm (the modified SCA). Furthermore, by combining the fuzzy k-nearest neighbor method with the modified SCA, the study simulates numeric datasets with two or multiple classes, and analyzes the results. The accuracy rate (ACC) achieved by the modified SCA FKNN in this paper is compared to other models, with data comparison results and tables presented for each. The modified SCA FKNN proposed in this paper has obvious advantages on accuracy rate(ACC). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Comparison of A* algorithm with hierarchical pathfinding A* algorithm in 3D maze runner game.
- Author
-
Anwar, Yusuf and Thamrin, Husni
- Subjects
- *
ALGORITHMS , *ARTIFICIAL intelligence , *MAZE tests , *MAZE puzzles , *PROGRAMMING languages - Abstract
Artificial Intelligence (AI) is an essential component in modern games. With AI, players can feel the challenges in the game and the game will feel more real. AI has several branches, one of which is path-finding. Pathfinding is a way of finding the shortest path between two points. The main problem in path-finding is how to perform a path-finding accurately and requires fewer computational resources (CPU and memory). This paper describes the results of research that tested the A* and Hierarchical Pathfinding A* algorithms using the Unity 3D platform and the C# programming language. The graph or space to be used is a graph with 8 branch nodes. While the benchmarks used are the path generated and the processing time of an algorithm. This paper results in a conclusion that the path generated by the A* algorithm is shorter than the Hierarchical Pathfinding A* algorithm. The number of paths processed for the A* algorithm is more than the Hierarchical Pathfinding A* algorithm. The total execution time of the A* Algorithm is smaller than that of the A* Hierarchical Pathfinding Algorithm. The Hierarchical Pathfinding A* algorithm experiences spikes in execution time more often than the A* algorithm. However, if the total spike time, the Hierarchical Algorithm is less than the A* Algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Comparative analysis of algorithms used for Twitter spam drift detection.
- Author
-
Thomas, Libina, Nirvinda, Mona, Mounika, Lalitha, and Hulipalled, Vishwanath
- Subjects
- *
SPAM email , *ALGORITHMS , *COMPARATIVE studies , *SOCIAL networks , *SOCIAL interaction , *MACHINE learning - Abstract
Twitter is known to be one of the familiar social networking platform these days, among many others, with a lot of user engagement. This microblogging site encourages social interactions, allowing users to stay up to date on the latest news and events and share them with others in real time. Tweets are limited to 280 characters and is allowed to include links to related websites and tools. With a platform having such wide reach, it is prone to be targeted negatively and spams are one way to do it. Spammers use this platform to display malicious content that is inappropriate and harmful to users worldwide. Machine Learning uses various approaches that can be used to detect spam and overcome it. However, with the advent of recent technologies it has been observed that the properties of tweets vary overtime making it difficult to detect spam leading to the "Twitter Spam Drift" problem. This paper reviews the papers published since 2018 that have focused on the spam drift problem and gives a comparative analysis of the different algorithms that are utilized on the various data sets to tackle such a problem. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. A secure and cost effective platform for employee management system using lightweight standalone framework over El Gamal encryption algorithm.
- Author
-
Kakaraparthi, Aditya and Karthick, V.
- Subjects
- *
ADVANCED Encryption Standard , *PERSONNEL management , *ALGORITHMS , *ENCRYPTION protocols - Abstract
Aim: Cloud computing has become one of the most popular storage and computing technologies. The aim of this paper is to provide a secure and cost effective platform for the employee management system. Materials and Methods: This study contains a total of 2 groups, the El Gamal encryption algorithm is analysed in the group 1 (434 samples), and the advanced encryption standard algorithm is analysed in the group 2 (434 samples). The accuracy and efficiency of each of the models are compared. Result: This paper is to improve the efficiency of the algorithm used in the employee management system. The proposed model appears to be efficient and fastest than the existing algorithm and the mean accuracy of detection is ±1SD with power value of 80%. Conclusion: The final outcome of the existing system, El Gamal encryption algorithm is compared with the outcome of the advanced encryption standard algorithm, and the proposed model proved to be significantly higher efficiency(1.3 times faster) than the existing model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Distribution system reliability enhancement with TLBO algorithm using demand response and electric vehicles.
- Author
-
Prakash, M. Sai, Varma, P. Srinivasa, and Sudha, D.
- Subjects
- *
ELECTRIC vehicle industry , *RELIABILITY in engineering , *POWER supply quality , *ALGORITHMS , *AIR quality , *BALLAST water - Abstract
In the world of modern era we find many techniques for enhancement of reliability in distribution networks and meeting the consumer demand by provision of quality and incessant power supply. Amidst the various techniques, in this study, we opt for demand response (DR) and charging/discharging of electrical vehicles (EV's) are evaluated to ameliorating reliability for radially distributed power system by adopting teaching learning based optimization (TLBO) algorithm. This analysis is considered due to the contribution of technologies like are DR and EV's for reducing the usage of conventional sources and enhancing the air quality. Here in this paper we are adopting reliability evaluation by considering energy expected not supplied (EENS) and loss of load expected (LOLE)where the characteristics of distribution network contains load and voltage profile. This paper provides a new optimization approach for finding the optimal solution. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Which algorithm is better? An implementation of normalization to predict student performance.
- Author
-
Priyambudi, Zulfikar Setyo and Nugroho, Yusuf Sulistyo
- Subjects
- *
RANDOM forest algorithms , *CLASSIFICATION algorithms , *VOCATIONAL high schools , *ALGORITHMS , *DECISION trees , *DATA mining - Abstract
This paper focuses on finding the best classification algorithm model in the case study of student performance prediction and comparing the algorithm performance before and after using the normalization method. To achieve this goal, this study uses data mining classification techniques to analyse student performance at Vocational High School in 2020-2021. The steps of the research carried out include: data collection, data pre-processing, build algorithm models without using normalization and with using normalization, and final step are comparing algorithm performance before and after using normalization. The algorithms that will be used include: Random Forest, Decision Tree, Logistic Regression, SVM, Naive Bayes, and KNN. While the normalization methods used are Standard Scaler, Min-Max Scaler, and Robust Scaler. The result of this research is that the normalization method is able to significantly increase the accuracy of the model. Based on the tests and evaluations carried out, the normalization method using the Min-Max Scaler has the biggest impact in improving the overall model performance and the algorithm with the best performance is Random Forest. This paper reviews the effect of the normalization method to improve algorithm performance in predicting student performance, where based on previous research no one has used the normalization method to gain accuracy of the model which actually has a considerable impact on gaining accuracy of the model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Algorithms and tools for analysing and planning experiments in the agro-industrial complex.
- Author
-
Ainakulov, Zharas, Kurmankulova, Gulzhan, Schüle, Heinrich, and Ainakulova, Zhadra
- Subjects
- *
AGRICULTURAL industries , *PROBLEM solving , *ALGORITHMS , *EXPERIMENTAL design - Abstract
The paper examines the application of systematic and risk-based approaches to problem solving in the agro-industrial complex, which generally prompted research in the field of various model-based methodologies. Of particular interest to this study is the Quality by Design initiative in the agro-industrial complex. Motivated by their need, this paper reports some of the contributions to analysing the existence and availability of the experimental plan. The analysis of the feasibility and adaptation of the nested sampling algorithm for the probabilistic characteristics of the design space is considered. There is described an initial adaptation of the nested sampling algorithm, common for large Bayesian calculations, for the probabilistic characterization of spatial design, which is a key work for practitioners in the agro-industrial complex. The choice-based approach has been found to be effective with the optimization approach, allowing practitioners to take advantage of the choice-based approach with other methods. A step-by-step technology is given for complex and one-time implementations of the original nested sample for spatial design, which further reduces the computational load, thereby allowing solutions of more complex problems. Design-centring methodology is shown as an alternative coding method for methodological choice, providing the practitioner with a convenient format for communicating with process operators. A particular attention is paid to several pronounced problems that arise in the special design of experiments when there are various levels of model uncertainty, which are often encountered in the early stages of model development. The paper presents the results of the study obtained by developing optimal experimental queries in the presence of restrictions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Selection of CPU architecture for the control unit implementation in assembler.
- Author
-
Saramud, Mikhail, Losev, Vasiliy, and Karaseva, Margarita
- Subjects
- *
RELIABILITY in engineering , *COMPUTER software development , *C++ , *REDUCED instruction set computers , *ALGORITHMS - Abstract
The paper describes selection of the processor architecture for the external control block implementation in assembler. This block is used to control the operation of the main control system and improve the reliability of the system as a whole. A scheme for the considered method implementation with an external control unit on CPU instead of FPGA is proposed. The development of software for it is realized in assembler. Analysis of the architectures' peculiarities that are currently available on the market is carried out. They are x86 and x86-64 for CISC. ARM v8, ARM64, RISC-V, SPARC, and LEON are for RISC. The paper performs translation of decision-making algorithms in multiversion environments from the C++ language into the assembler of the necessary architectures. The size of the resulting code is analyzed. The authors made conclusions on the basis of the obtained results. It is preferable to select a CISC architecture, since it simplifies and speeds up a software development process in the case when it is required to develop a code in assembler. As for the scheme selection for the control system implementation with an external control unit, the authors prove that it is quite acceptable to apply a CPU for the external unit instead of the initially proposed FPGA. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. Optimizing chromatic dispersion compensation using the adaptive maximum likelihood algorithm for FBMC-OQAM fiber optic systems.
- Author
-
Al-Mashkoor, Muntadher T., Jamel, Thamer M., and Al-Tamimi, Haydar M.
- Subjects
- *
DATA transmission systems , *QUADRATURE amplitude modulation , *PHASE noise , *FILTER banks , *OPTICAL fibers , *ALGORITHMS , *OPTICAL dispersion , *ADAPTIVE optics - Abstract
Chromatic Dispersion (CD) compensation in optical fiber Offset Quadrature Amplitude Modulation based Filter Bank Multicarrier (FBMC-OQAM) systems is the most used today, especially on terrestrial Long-haul optical fiber type. As any other related system, FBMC-OQAM have a lot of strength and weakness points that should take in account, therefore, focus on studying data transmission over optical cables with FBMC-OQAM modulation for long distance and improve data access by reducing the noise on phase and have less dispersion on the transmitted light. To get a high spectral efficiency keep the subcarriers number sufficiently high, so will work on 256 subcarriers with cable length up to 3000 km. To get less complexity on an algorithm chose to use, and therefore compensate some of the dispersion at the receiver, must not set the subcarriers number at too high level. In parallel, know that the fiber dispersion or the propagation distance increases or the number of subcarriers decreases, the CD tolerance of single-tap equalization is reduced, so in this paper, propose to use the frequency sampling multi-tap equalizer for improving the CD compensation. Furthermore, will derive a new simple phase noise (PN) estimation algorithm which can be seen as an adaptive maximum likelihood (AML) algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Crow search freeman chain code (CS-FCC) extraction algorithm for handwritten character recognition.
- Author
-
Mohamad, M. A., Ahmad, M. A., Mahmood, J., Daud, Kauthar Mohd, and Rahman, Azamuddin Ab
- Subjects
- *
PATTERN recognition systems , *FEATURE extraction , *ALGORITHMS , *SEARCH algorithms , *METAHEURISTIC algorithms , *PROBLEM solving - Abstract
In Handwritten Character Recognition (HCR), interest in feature extraction has been on the increase with the abundance of algorithms derived to increase the accuracy of classification. In this paper, a metaheuristic approach for feature extraction technique in HCR based on Crow Search Algorithm (CSA) was proposed. Freeman Chain Code (FCC) was used as data representation. The main problem in representing a character using FCC is that the results of the extractions depend on the starting points that affected the route length of chain code. To solve this problem, the metaheuristic approach via CSA was proposed to find the shortest route length and minimum computational time for HCR. The performance measurements of the proposed CS-FCC extraction algorithm are the route lengths and computation times. The experiments on the algorithms are performed based on the chain code representation derived from established previous works of Center of Excellence for Document Analysis and Recognition (CEDAR) dataset which consists of 126 upper-case letter characters. Based on the result, the proposed CS-FCC obtained 1880.28 in term of route length and only needs 1.10 second to solve the whole character images. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Biologically inspired algorithms applied in automatic tuning of parallel solver parameters for fast execution times.
- Author
-
Panoc, Tomáš, Meca, Onřej, Říha, Lubomír, Brzobohatý, Tomáš, and Kozubek, Tomáš
- Subjects
- *
OPTIMIZATION algorithms , *BIOLOGICALLY inspired computing , *TRANSIENT analysis , *ALGORITHMS , *WORK measurement , *ENGINEERING simulations , *PARALLEL algorithms - Abstract
In this paper, we present a way how to automatically find and set an optimal configuration for a linear system solver during a transient analysis in order to reduce computation time. Our approach is based on biologically inspired algorithms which are able to find a reasonable configuration in tens of trials, i.e., tens of timesteps in terminology of the transient analysis. This work shows a measurement within which we compared several optimization algorithms and explored their time overhead. We focus on parallel multiphysical solvers for engineering simulations developed for high-performance computing. Our experiment includes one such solver based on Finite Element Tearing and Interconnection and 4 test cases, but our solution is modular, thus, it can be connected to other similar solvers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Algorithm for ponding effect detection considering amount of precipitation.
- Author
-
Zbyněk, Zajac, Michal, Jedlička, Rostislav, Lang, and Ivan, Němec
- Subjects
- *
SEARCH algorithms , *ALGORITHMS , *STRENGTH of materials , *DEFORMATION of surfaces , *TENSILE strength - Abstract
This paper deals with an unfavorable phenomenon called the ponding effect. This phenomenon can cause an increase in local deformations on a tensile surface and therefore endanger the integrity of the structure in case of overcoming the tensile strength of the membrane material. A searching algorithm has been developed in order to analyze and prevent occurrence of this phenomenon. An improvement of the algorithm was made so that only an expected amount of precipitation would be considered during the calculation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. An anisotropic diffusion algorithm for image deblurring.
- Author
-
Fatone, Lorella and Funaro, Daniele
- Subjects
- *
PARABOLIC differential equations , *ALGORITHMS - Abstract
This paper deals with the problem of image deblurring. A suitable discretization scheme for a particular nonlinear time-dependent partial differential equation of parabolic type is experimented. The method is implemented by reversing the arrow of time in order to damp diffusion. Only one step is enough to reconstruct the edges of a corrupted picture affected by average blur. Thus, the procedure turns out to be extremely efficient. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Interface between ansys and matlab for solving elastic problems with non-conforming meshes.
- Author
-
Světlík, Tadeáš, Varga, Radek, Pospíšil, Lukáš, and Čermák, Martin
- Subjects
- *
PROBLEM solving , *STEEL analysis , *ALGORITHMS - Abstract
In our research, we are focusing on the development of iterative algorithms for solving contact problems emerging in the analysis of steel structures bolt connections. Despite the project is focusing mainly on the development of efficient numerical algorithms, several supplementary problems have to be solved. In our research, we decided to utilize widely-used popular commercial software Ansys to provide the data for our algorithms implemented in Matlab as well as for the comparison of results. This paper presents experiences with our newly developed data interface. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. On approximation gravity data by the singular functions.
- Author
-
Martyshko, Petr S., Byzov, Denis D., and Cherepanov, Alexey P.
- Subjects
- *
GRAVITY anomalies , *ALGORITHMS - Abstract
In the paper, the BFGS algorithm is applied to minimization of the functional in the problem of approximating the gravity anomalies by the fields of material segments and the fields of point sources. The selected fields were compared at different heights. Efficiency of the algorithm is demonstrated on model examples. Fields from the three-dimensional sources were selected as selected ones. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Single scale RETINEX algorithm for low light image enhancement.
- Author
-
Gopal, Maisagalla, Yedulapuram, Sharvani, and Kommabatla, Mahender
- Subjects
- *
IMAGE enhancement (Imaging systems) , *IMAGE intensifiers , *DIGITAL cameras , *ALGORITHMS , *GAUSSIAN function - Abstract
In this paper, we proposed the Low light image enhancement using a single scale retinex algorithm. The main aim is to improve the clarity of low light images. By considering the real scenes, the dynamic range of digital camera is small, hence contrast correction is required to reproduce the information of images in darker regions. The proposed method, by using single scale retinex algorithm RGB color components are extorted and modified by applying logarithm and converted into HSV. For enhancing this component, the gaussian surround function is convoluted to it and then scaled version of components and the convoluted one is added to the original image. Then contrast stretching is performed to increase quality of image. This is implemented with MATLAB. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Consensus algorithms of blockchain.
- Author
-
Jorika, Vedika and Medishetty, Nagaratna
- Subjects
- *
ALGORITHMS , *DATABASES , *BLOCKCHAINS , *BITCOIN , *CRYPTOCURRENCIES - Abstract
A Blockchain is a decentralized database that stores data that all network participants can access. The central authority is no longer in charge of maintaining this public database by running a cryptographic protocol with designated nodes. Bitcoin is presently the latest object within the Blockchain, and the Bitcoin node can confirm the transaction content and package deal it into the block. Through the underlying consensus agreement, the blockchain ensures the consistency of the information. These consensus algorithms are unique because the set of rules protection assumptions differs from the actual requirements. This paper provides information and compares various blockchain consensus algorithms, classifies advancement based entirely on blockchain consensus, and highlights the benefits. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Survey on evaluation environment selection for fog computing application placement problem.
- Author
-
Pakpahan, Michael Stephen Moses, Nugroho, Lukito Edi, Widyawan, Boernama, Ade Widyatama Dian, and Astagenta, Rangga Satria
- Subjects
- *
COMMUNICATION infrastructure , *RESEARCH personnel , *PYTHON programming language , *CLOUD computing , *FOG , *ALGORITHMS - Abstract
Cloud infrastructure is the "backbone" technology of the internet era. Ever-growing scale of cloud network concerns the sustainability of centralized cloud. Fog computing aims to decentralizes cloud computing distributing computational processes across network devices, offers a potential solution. If application are distributed effectively in available nodes, network resource usage can be reduce while reducing latency by existing closer to data sources and end points. However, the lack of standardization of fog networks, researcher must list its evaluation setups to contextualize placement algorithm's potential abilities. Thus, selecting an evaluation environment is crucial in researching fog application placement problem. There are several reviews about evaluation environment, but there is a lack of information regarding important aspect placement problem such as algorithm type, placement objective and performance metric available in each evaluation environment. In this paper we discuss the capabilities of several evaluation environments such as iFogSim, YAFS, MATLAB, Python, real world testbed, solver, and other evaluation environments. We surveyed usage trend per year, algorithm type usage, and performance metric that can be produced by each evaluation environment. This survey aims to help future researchers on fog application placement problems to identify evaluation environment based on selected algorithm type and objective metrics. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. An improved cloud detection method for high-resolution satellite imagery, using U-net algorithm.
- Author
-
Hestrio, Yohannes Fridolin, Brahmantara, Randy P., Ulfa, Kurnia, Candra, Danang S., Prabowo, Yudhi, Budiono, Marendra E., Novresiandi, Dandy A., Sulyantara, D. Heri Y., Rahayu, Mulia I., Sartika, Veronica, Kiki W., Tarmidzy, Azqy, and Suhendar, Haris
- Subjects
- *
SURFACE of the earth , *SOFTWARE as a service , *REMOTE-sensing images , *CLIENT/SERVER computing equipment , *PERSONAL computers , *ALGORITHMS , *IMAGE segmentation - Abstract
Widespread use of high-resolution satellite images may be found in many fields and applications. Its ability to record the earth's surface in more detail benefits regional spatial management, natural resources and disaster monitoring, and several other fields. The smaller coverage is unfortunate if areas are not visible due to cloud contamination. The presence of clouds can reduce or even eliminate the information in the image. Cloud detection on high-resolution images is a challenge because this image only has four channels: blue, green, red, and NIR. While the thermal channel, which is often used to detect the presence of clouds, is not owned by this image. This study proposes a method to identify clouds in high-resolution satellite imagery based on this limitation. The cloud detection software in this paper uses U-Net version 1.0. This software can be executed on a server or personal computer (PC). The model applied to the Dice coefficient and IoU to know how the segmentation model performs. The results of this cloud detection process are cloud detection raster data. This software generates the percentage of clouds in an image as a.txt file. The dice model is recommended for the cloud detection method based on the accuracy assessment. Users can utilize these results, especially in overcoming cloud constraints on high-resolution satellite imagery. This software is expected to fulfill the needs of remote-sensing data users. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Performance analysis of ensemble learning algorithms in intrusion detection systems: A survey.
- Author
-
Anitha and Gandhi, Rajiv
- Subjects
- *
MACHINE learning , *INTRUSION detection systems (Computer security) , *COMPUTER systems , *INTERNET security , *ALGORITHMS - Abstract
The quick development of technology not only makes life easier but also raises several security concerns, so cyber security has become very important and vital research area, rather an inevitable part of computer system. Still, various research being done on the development of effective intrusion detection system (IDS). An IDS is one of the suspicious network activities. An IDS is used to identify many types of malicious actions that can undermine a computer system's protection and confidence. Recently, ensemble algorithms are applied in IDS in order to identify and classify the security threats. In this paper author intends to do a brief review of various Ensemble learning Algorithms in ML, which are most frequently used in IDS for several applications; with specific interest in dataset and metric. This work provides broad study and investigation on current literature, the gap for improving and creating efficient IDS can be determined. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Techniques for developing QRS enhancement and detection algorithms in electrocardiography (ECG): A review.
- Author
-
Khairuddin, Adam Mohd, Azir, Ku Nurul Fazira Ku, and Beson, Mohd Rashidi Che
- Subjects
- *
ELECTROCARDIOGRAPHY , *ALGORITHMS - Abstract
Algorithms are increasingly being used and recognized for their ability to improve the performance of diagnostic tools such as contemporary electrocardiogram (ECG). For instance, evidence from previous studies reveals that QRS enhancement and detection algorithms have enabled the ECG device to measure and classify heartbeat more accurately. Based on the review of the previous works on QRS detection in ECG, this paper examines the key components of the ECG, QRS detection features, the different techniques used for developing QRS enhancement and detection algorithms as well as the criteria for evaluating their performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. An efficient algorithm for covert contacting in IoT.
- Author
-
Abdulkadhim, Ekhlas Ghaleb, Al-Shemarry, Meeras Salman, and Alsaadi, Elham Mohammed Thabit A.
- Subjects
- *
INTERNET of things , *SMART cities , *INFORMATION technology security , *INFRASTRUCTURE (Economics) , *ALGORITHMS - Abstract
As the Internet of Things (IoT) becomes more widely used, the danger of information leakage, the danger of information leakage, data leakage and theft of the internet of things is continuous increasing, as the communication channel for data transfer is open to the public. A considerable portion of this data includes sensitive and personal information for the user and the company as well. Because of the openness, distributed nature, and lack of control over the entire IoT environment, the number of attack vectors for bad users is significant. End-users must trust the system for the IoT to become a viable service platform. Consequently, in critical infrastructures like smart home, smart city, smart healthcare, and smart industry, information security and privacy are the major concern in the Internet of Things. In this paper, we present an information concealment strategy using steganography to protect communication in critical IoT infrastructure. RGB photographs are employed as the information carrier. Deep layers of low-distortion image channels in the least significant bit (LSB) are used to hide the data to be used as a data marker. Both mathematically and experimentally, we evaluate our method. We display mathematically that the striker's analysis cannot expect the current information. The proposed strategy outperformed previous strategies in terms of imperceptibility and capacity, as well as resilience to steganalysis attacks like histogram analysis, as demonstrated experimentally. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Comparison of fully anonymous novel HMAC encryption algorithm with IDEA encryption algorithm for secured data retrieval with reduced time.
- Author
-
Kumaran, G. Jitvan and Logu, K.
- Subjects
- *
INFORMATION retrieval , *DATABASE management , *DATA recovery , *ALGORITHMS , *CLOUD storage , *TIME management - Abstract
This paper provides a comprehensive analysis of safe data from novel HMAC cloud administration with respect to low time consumption in Database Management. In order to foresee the information in time consumption of the Database Management in cloud administration, we tested the HMAC encryption Algorithm with a test size of =20 and the IDEA encryption calculation (IEA) with a test size of =20. HMAC encryption was used to reduce the time needed to recover data from more secure distributed storage. When comparing HMAC and IDEA encryption calculations, HMAC has a higher utilisation rate (66.80 percent) (62.97 percent). In general, HMAC encryption calculation outperforms IDEA encryption calculation (p 0.05, 2-tailed). In data set administration frameworks, a novel HMAC encryption computation helps reduce the possibility of data recovery. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. A multi-parameter algorithm for retagging lost animal rfid tags for PLF platform.
- Author
-
Babadjanov, Elmurad and Toliev, Khurshid
- Subjects
- *
ANIMAL tagging , *ANIMAL health , *ALGORITHMS , *LIVESTOCK - Abstract
The loss of RFID tags in cattle is a multi-faceted problem involving economic, logistical and animal health factors. This challenge requires innovative solutions that combine technology, data analytics and practicality. This paper proposes an extended algorithmic approach to investigate a method to reset lost RFID tags in cows and thus improve the efficiency of livestock management systems. The intricacies of RFID technology, the importance of livestock management in modern agriculture, and various factors that cause tag loss are studied. However, the focus of our discussion is on presenting an algorithmic solution that not only detects missing tags, but also simplifies the tag reset process and uses resources efficiently. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. A review on kidney tumor segmentation and detection using different artificial intelligence algorithms.
- Author
-
Patel, Vinitkumar Vasantbhai and Yadav, Arvind R.
- Subjects
- *
ARTIFICIAL intelligence , *KIDNEY tumors , *ALGORITHMS , *DEEP learning , *DATA warehousing , *MACHINE learning - Abstract
Kidney is one of the significant organs in the human body which performs filtering out blood, balances fluid, removes the waste, maintains the level of electrolytes and hormone levels. So, any disorder or dysfunction in kidney needs to be detected on time in order to preserve life. Segmentation on kidney tumor in medical field is a critical task and many conventional methods have been employed for early prediction of kidney abnormalities but with limitations such as high cost, extended time for computation and analysis with huge amount of data. Due to all such problems, the prediction rate and accuracy has reduced considerably. In order to overcome the challenges, Artificial Intelligence (AI) technology has penetrated into the field of medicine particularly in the renal department. The evolution of AI in kidney therapies improve the process of diagnosis through several Machine Learning (ML) and Deep Learning (DL) algorithms. It has the capability of improving and influencing on the status with its capacity of learning from the massive data and apply them accordingly to differentiate on the circumstances. The storage of larger data and segmentation with AI assistance are highly helpful for the analysis of occurrence of the disease. AI algorithms have predicted the severity of tumor stages with effective accuracies. Hence, this paper provides a critical review of different AI based algorithms being used in the kidney tumor prognostication. Its numerous benefits in field of segmentation have been researched from the existing works and provides an insight on the contribution of AI in the kidney disease prediction. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Diagnosing diabetes mellitus using k-means clustering method with robust centroids initialization based swarm intelligence algorithm.
- Author
-
Anam, Syaiful, Fitriah, Zuraidah, Hidayat, Noor, and Assidiq, Mochamad Hakim Akbar
- Subjects
- *
CENTROID , *SWARM intelligence , *K-means clustering , *PARTICLE swarm optimization , *DIABETES , *ALGORITHMS - Abstract
Blood sugar levels rise as a result of impaired glucose homeostasis, which is a feature of Diabetes Mellitus (DM). Coronary artery disease, nerve damage, diabetic retinal disease, kidney failure, and sex disorders are just a few of the consequences that can result from DM. DM has to be diagnosed early to minimize its effects and those of its consequences. One technique for automatically detecting DM based on the prior data is the clustering algorithm. However, the K-mean Clustering method is easy to be implemented, has fast computational time and adapted easily. However, the centroids of K-means are initialized randomly that causes to be stuck in local optima. For this reason, the robust centroids initialization on the K-means clustering method are necessary to handle this problem. This paper uses swarm intelligence algorithm for this goal since it is able to obtain solution near the global optima, is robust and easy to be implemented. As a result, this study proposes an improved K-means clustering-based technique for diagnosing DM. The K-means is improved by using robust centroid initialization-based swarm intelligence algorithm. The swarm intelligence algorithm which is used is Particle Swarm Optimization. By using experiments, the proposed method is confirmed better than the original K-means clustering in diagnosing DM. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Studying a fuzzy computing resource management system in a coevolutionary algorithm.
- Author
-
Korableva, A. A., Kazakovtsev, L. A., Lipinskiy, L. V., and Khudonogova, J. A.
- Subjects
- *
COEVOLUTION , *FUZZY integrals , *RESOURCE management , *FUZZY systems , *ALGORITHMS - Abstract
This paper describes an approach to improving the process of resource redistribution in a coevolutionary algorithm using a fuzzy logic system. Two bases of fuzzy rules are proposed for setting the size of the fine and the social card for the losing coevolution algorithms. The effectiveness of the developed fuzzy system was studied in comparison with the usual co-evolutionary algorithm without integration of fuzzy control procedures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Algorithm for determining heat release of polymer radiator of tractor MTZ-82.
- Author
-
Pulyaev, Nikolay, Asadov, Jabir, Bolshakov, Nikolai, Guzalov, Artyombek, and Gusev, Ilya
- Subjects
- *
RADIATORS , *AGRICULTURAL technology , *COOLING systems , *FARM tractors , *ALGORITHMS , *TRACTORS , *POLYMERS - Abstract
The paper presents an analysis and review of sources considering temperature-dynamic characteristics as performance indicators of agricultural automotive and tractor equipment, the impact of energy efficiency of automotive equipment on the temperature and dynamic characteristics of cooling systems, an analysis of the impact of performance indicators of automotive equipment on the efficiency of a block cooling system. An improved scheme of a block-modular cooling system and a method for determining its main indicators during operation for functional units of automotive equipment using innovative materials are proposed. A complex method was used, including an analysis of the state of the issue, theoretical studies of the operating parameters of the polymer radiator of the cooling system with the inclusion of thermal, aerodynamic and hydrodynamic calculations, both in steady and unsteady modes of operation of the MTZ-82 tractor engine. At the same time, analytical and numerical methods, a set of mathematical models and graphic visualization of solutions using the Excel, KOMPAS-3D, Statistica software packages were used. An improved theory of temperature-dynamic characteristics of automotive equipment is used in the cooling system of the MTZ-82 tractor equipped with a polymer radiator, while combined options for using both liquid and oil-liquid engine cooling are possible. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Precise logic controllers with steptime fuzzification algorithm of input parameters.
- Author
-
Muravyova, Elena and Podlesskiy, Dmitry
- Subjects
- *
INTELLIGENT control systems , *ALGORITHMS , *LOGIC , *PHYSICAL constants , *UNITS of time - Abstract
In this paper, logical controllers, their scope of application as a type of intelligent control and classification were considered. Precise logic controllers with a step-time algorithm for fuzzification of input parameters were also considered as an attempt to eliminate the main disadvantages of logic controllers with an anytime-algorithm. A logical scheme was given that implements the step-time algorithm for fuzzification of a continuous physical quantity and an analysis of expressions was carried out to increase the speed of the fuzzifier and controller with the step-time algorithm, respectively, due to the development of a system of production rules to a rule whose antecedent at the current time is equal to a logical unit, from which it is concluded that the speed of precise logical controllers with step-time algorithm has increased due to the lack of a search procedure in the system of production rules, rules with an antecedent, equal at a given time to a logical unit. Although in case of an unsuccessful arrangement of the rules in the fuzzifier production system (the rule with the highest response frequency is located at the end of the production system), the increase in the speed of the controller may be insignificant. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. A sine cosine algorithm for optimal reactive power dispatch problem.
- Author
-
Anbarasan, P., Clement, J. Christobher, and Kiruba, B. Gladys Gnana
- Subjects
- *
REACTIVE power , *OPTIMIZATION algorithms , *ELECTRIC lines , *ALGORITHMS - Abstract
This paper solves the optimal reactive power dispatch (ORPD) problem applying sine-cosine optimization algorithm. The main intention of the ORPD problem is to reduce the real power loss in the transmission lines and maintain voltage magnitude at an acceptable level in the system network while satisfying the set of specified operational constraints. The sine-cosine algorithm is a powerful population formed algorithm for solving the optimization problems. The sine-cosine algorithm generates a number of initial candidate solutions, and progresses towards the optimal solution. The proposed method is applied to standard IEEE-14 and 30 bus systems. The simulation results compare favorably with other reported results in the literature. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Salp swarm algorithm for solving green vehicle routing problem.
- Author
-
Garside, Annisa Kesy, Utama, Dana Marsetiya, and Yunnia, Astrid Hilda
- Subjects
- *
VEHICLE routing problem , *SUSTAINABLE transportation , *ENVIRONMENTAL economics , *ENERGY consumption , *ALGORITHMS , *TRANSPORTATION costs - Abstract
Given the importance of transportation in logistics operations, the vehicle routing problem (VRP) is critical to logistics practice. The Green Vehicle Routing Problem (GVRP) is a variation of the VRP that focuses on issues related to sustainable transportation. GVRP's goal is to balance the economy and environmental costs by developing effective solutions to environmental and financial concerns. The purpose of this paper is to propose a Salp Swarm Algorithm (SSA) to solve the GVRP. Using the benchmark test instance E-n23-k3, a numerical experiment is carried out to test the proposed algorithm. The results show that the SSA outperforms the Route Splitting Tabu Search (RS-TS). On average, the total cost is reduced by 1.41%. Furthermore, we show that the use of various modes of transportation affects fuel consumption, emission costs, and vehicle usage costs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Human activity recognition using ensemble machine learning classifiers.
- Author
-
Henna, Shagufta, Aboga, David, Bilal, Muhammad, and Azeez, Stephen
- Subjects
- *
HUMAN activity recognition , *MACHINE learning , *SPHERICAL coordinates , *MANUFACTURING processes , *ALGORITHMS - Abstract
Activity recognition offers a wide range of applications in various industrial processes and healthcare. This work proposes an approach to collect data from a spherical coordinate system using smartphones, then extract the highly efficient features using advanced preprocessing. The paper also proposes an algorithm to recognize activity using various ensemble machine-learning approaches based on extracted features. These approaches are evaluated under various combinations of features to analyze the accuracy, sensitivity, specificity, and training time. Experimental results reveal that weighted KNN performs best among all models by achieving 96.2% accuracy with 12 features. On the other hand, Bagged tree ensemble classifiers perform better than subspace KNN ensemble classifiers with an accuracy of 95.3% using 12 features. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Mechatronic system parameters for automatic assembly of products from tape materials: Choice substantiation.
- Author
-
Zamuragin, Yu. M., Salamandra, K. B., and Salamandra, B. L.
- Subjects
- *
COMPUTER simulation , *ALGORITHMS , *AUTOMATIC speech recognition - Abstract
The paper analyzes the influence of the adaptive mechatronic system parameters on the process of stabilizing the step of moving materials during automatic assembly. Dependences of variances and mathematical expectations of the displacement step are obtained depending on the parameters of the system under a random external action. Numerical simulation of the operation of the algorithms used is carried out, recommendations are given for the optimal choice of system parameters. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Algorithms for constructing a finite element mesh of compound domains.
- Author
-
Polatov, Askhad, Gaynazarov, Sultan, Ikramov, Akhmat, and Jumaniyozov, Sardor
- Subjects
- *
FINITE element method , *ALGORITHMS , *NUMBER systems - Abstract
In the present paper algorithms for constructing a finite element mesh of compound domains and minimizing the ribbon width of the system of resolving equations by the finite element method (FEM) are considered. A technology for constructing a finite element mesh by connecting elementary subdomains, a semi-automatic method for partitioning a two-dimensional multiply connected domain with a curvilinear boundary, and ordering the node numbers of a finite element mesh is described. In this case, the algorithms allow, by ordering the numbering of nodes, to determine such a sequence in which the ribbon width of non-zero coefficients of the system of resolving equations by the FEM will be locally minimal. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Modeling and algorithm for calculation the mixing and propagation of co-current flows in channels.
- Author
-
Khodjiev, Safar
- Subjects
- *
CHANNEL flow , *NAVIER-Stokes equations , *MATHEMATICAL transformations , *NUMERICAL integration , *ALGORITHMS - Abstract
This paper describes in detail the method and algorithm for calculating the numerical integration of non-stationary two-dimensional systems of Navier-Stokes equations for a compressible gas using high-order implicit (explicit) difference schemes, i.e., the Beam-Warming difference scheme. A number of mathematical transformations, such as non-dimensionalization of coordinates and physical parameters, transforming the shape of the channel into a square one, as well as thickening the integration steps with large gradients of unknowns, which make it possible to bring problems to a model one for solving similar problems. In addition to the study, as convergence in the number of calculated points, the dependence of the number of iterations on the Courant number and comparison of the results obtained by different proposed models for calculating the effective viscosity, as well as a number of numerical studies as co-occurrence, temperature inhomogeneities, non-design, the ratio of the sizes of the inlet slots of cocurrent flows and the length of the channel to the height of the main flow and the degree of expansion of the channel to the process of mixing and distribution of flows in the channel. It was revealed at what ratios of the initial parameters of the cocurrent flows and the linear dimensions of the channel a recirculation zone is formed. For a channel of constant cross section at large ratios of velocities (72, 46) and temperature (2, 33), as well as small ratios of the channel length to the height of the inlet slot of the main flow (5, 31), even at the same jet pressures in the initial section, the recirculation zone occupies more than 55% of the input section, and the length along the longitudinal coordinate reaches 20 cm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Filter-based relevance and instance selection.
- Author
-
Mourtji, Basma El, Ouaderhman, Tayeb, and Chamlal, Hasna
- Subjects
- *
FEATURE selection , *ALGORITHMS , *VOTING - Abstract
Feature selection is an important technique in building prediction systems. In various searches, the judgment of the relevancy of a feature is often calculated using all the instances of the considered sample. However, when the dataset size grows, some of the instances are not useful for weighting the features. In this paper, we rank features according to a fitness function that relies on the relevancy using all instances and on the relevancy using a maximum number of significant instances (which really contribute to the feature positive relevancy with the target variable). The relevancy is based on preordonnances theory where the instances are expressed in pairs. The proposed algorithm can be mainly divided into three steps, namely, (a) eliminating all features that are in disagree with the target feature, (b) Finding the best subset of instances, to each feature, that maximize the relevancy and which the cardinal tends to the cardinal of instances in the original dataset, and (c) Ranking features. The second step is defined by dividing the dataset (instances of each feature) into several consistent regions by fuzzy clustering. Then, performing GA-based instances selection independently within each cluster. Finally, aggregating of the partial results by the ensemble voting. Experimental results verify the effectiveness of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. Finite-time variable gains super-twisting control for lane-changing of autonomous vehicles.
- Author
-
Kali, Yassine, Saad, Maarouf, Landry, Mario, and Comtois-Rivet, Pier-Marc
- Subjects
- *
AUTONOMOUS vehicles , *ALGORITHMS - Abstract
Uncertainties, parameters variations and external disturbances may affect highly the task of lane-keeping, lane-changing and path-tacking autonomous vehicles. This paper presents a novel variable gains second-order sliding mode algorithm for en-hanced path tracking performance of autonomous vehicles subject to uncertainties and disturbances. The used algorithm is a modified super-twisting with both nonlinear and linear correction terms. Hence, the proposed method doesn't suffer from the chattering phenomenon, ensures high order precision and guarantees both the robustness against perturbations and the convergence in finite-time during the reaching phase. To evaluate the efficiency of the developed approach, a double lane-changing scenario is considered in simulation for an uncertain autonomous vehicle and the results are compared with the first-order sliding mode. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. HSCA: New hybrid encryption algorithm for WoT based on modified HIGHT-SIMON and novel chaotic system.
- Author
-
Kallaf, Othman H. and Hoomod, Haider K.
- Subjects
- *
IMAGE encryption , *WORLD Wide Web , *BLOCK ciphers , *ALGORITHMS - Abstract
The concept of web of things (WoT) is to connect anything in the physical world and then display them in the World Wide Web, that is the major objective, but that mean information storage or transfer that led to thinking how can protected this information from attacks, this can happen by protected information by encryption it. Cryptography and chaos inextricably linked because of many features. In this paper uses a novel model for the encryption of information via WoT, we suggest HIGHT and Simon as a block cipher algorithm using for lightweight encryption by make a new hybrid between them. Also use chaotic system to take key from it; moreover, we use other operations to arrive the best result. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Multi-objective path planning optimization with moving target based on bat algorithm.
- Author
-
Abed, Baraa M. and Jasim, Wesam M.
- Subjects
- *
ALGORITHMS , *MOBILE robots , *AUTONOMOUS robots , *DECISION making , *ROBOTICS - Abstract
Path planning algorithms is the most significant area in the robotics field. Path Planning (PP) can be defined as the process of determining the most appropriate navigation path before a mobile robot moves. The goal of optimization of PP is to find a path that is close to or optimal path. Multi-objective optimization (MOO) is concerned with finding the best solution values that satisfy multiple objectives, such as shortness, smoothness, and safety. MOO present the challenge of making decisions while balancing these contradictory issues through compromise (tradeoff). As a result, there is no single solution appropriate for all purposes in MOO, but rather a range of solutions. This paper the problem of PP is investigated with path length, security and smoothness objectives for autonomous mobile robots in dynamic environment with moving target. The proposed approach based on Bat algorithm (BA). The proposed solution is tested in a number of simulations with varying scenarios. The simulation results show that multi objective can be achieved efficiently in a dynamic environment which proves its effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Data placement algorithm in heterogeneous environment utilizing data locality.
- Author
-
Ambore, Anilkumar and Rani, Udaya
- Subjects
- *
ALGORITHMS , *DEFAULT (Finance) , *PANDEMICS , *SPEED , *STORAGE - Abstract
During pandemic circumstance world, the size of data is exploded like rocket speed. At the same time, there is a need to process it and investigate the enormous volumes of information. The company and research tool is Hadoop and is most broadly utilized in information serious applications. The Hadoop default processing nature is homogeneous. The limit of enormous measure of data in Hadoop is finished utilizing Hadoop Distributed File System. The performance is degraded when it applied to heterogeneous environment. Hadoop mainly uses 2 components viz HDFS used for storage purpose and MapReduce used for programming. In this paper we introduce Optimal Data Placement Algorithm (ODPA). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Categories of LB technique in cloud infrastructure.
- Author
-
Ajil and Kumar, Saravana
- Subjects
- *
COMMUNICATION infrastructure , *REMOTE computing , *LOAD balancing (Computer networks) , *CLOUD computing , *ALGORITHMS , *REACTION time - Abstract
The real world has been changed into a virtual one as a result of the pandemic scenario. Cloud computing plays a major role for storing and computing the data using remote computing infrastructure for solving the day to day activities. The LB Techniques are used in the cloud computing process. LB techniques distributing the system's load among its various nodes in order to maximise resource efficiency and job response time. The major issues in load balancing are Geographical Distributed system, Single point of failure (SPoF), live Migration of instance, Heterogeneous device, Storage device Management, Scale-out/scale-in and Complexity of Algorithm. Load balancing ensures that each node in the network shortens reaction times, reduces expenses, and boosts performance. This paper address the various cloud computing balancing algorithm survey. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Comparison of various algorithms used for clustering sensors at device level in an IoT network.
- Author
-
Sowmya, K. V. and Sastry, J. K. R.
- Subjects
- *
WIRELESS sensor networks , *INTERNET of things , *ALGORITHMS , *DETECTORS , *INTERNET access , *FAULT tolerance (Engineering) - Abstract
Today's modern world is being driven towards automation and as well gathering any type of information from every nook and corner of the world which is possible through one of the technology named Internet of Things(IoT). IoT is not just a single technology but it is a combination of various technologies like embedded systems, wireless sensor networks, cloud computing etc. Basic IoT network consists of various layers; one among them is the device layer which is the base layer responsible for gathering the data from physical world through the sensors. Various sensors can be deployed into an area depending upon the type of application it is used for. Various homogenous sensors can be made into clusters due to which it would be beneficiary in terms of bandwidth and power consumption, number of internet connections required, fault tolerance, longevity of devices etc. This paper presents a comparison between various algorithms used to cluster the sensors at device level. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Artifact removal in thoracic electrical bioimpedance signals using robust diffusion least power algorithm.
- Author
-
Mirza, Shafi Shahsavar, Mantravadi, Nagesh, Lakshmi, M. L. M., Surekha, Sala, and Rahman, Md. Zia Ur
- Subjects
- *
SIGNAL-to-noise ratio , *ALGORITHMS , *RESPIRATORY muscles , *STROKE , *ERROR rates - Abstract
By using thoracic electrical bioimpedance (TEB) analysis stroke volume calculated for sudden cardiac arrests. In this paper proposed robust normalized diffusion least power algorithm (RNDLPA) is proposed to get high resolution components. In clinical scenarios, TEB components are contaminated with various artifact components, which interrupts the identification of several features in stroke intensity. The number of multiplications is also one of the key elements for monitoring in health care applications. Hence by proposed RNDLPA algorithm it reduces computational complexity, stability is improved and also steady state error rate is reduced. To eliminate noise components various adaptive cancelers are presented and they are compared with proposed algorithm. Further to show performance improvement signal to noise ratio (SNR) improvement is taken into consideration it gets better values 14.3594 dB and 12.3551 dB for respiratory noise and muscle noise respectively when compared to existed techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Implementation of Xilinx system generator based image processing algorithms through FPGA.
- Author
-
Krishna, B. Murali, Chowdary, G. Rakesh, Santhosh, Chella, Kalam, S.K. Abdul, and Naidu, K. P. Kishore Lakshman
- Subjects
- *
COMPUTER hardware description languages , *EDGE detection (Image processing) , *FIELD programmable gate arrays , *IMAGE processing , *ALGORITHMS - Abstract
Xilinx System Generator (XSG) integrates with MATLAB Simulink to build a complex system through Xilinx and Simulink blocks. This paper presents a hardware implementation of various image processing techniques to modify and extract the pixel information from various input images in run time. Complex coding strategies are eradicated with integrated system. The intricacy in structural design is reduced to a huge extent using Xilinx System generator. The reconfigurable attribute of Field Programmable Gate Array (FPGA) bags the massive advantages in image processing like co simulating with selective pixel and verified on FPGA. Image processing algorithms explored in methodical manner by performing diverse operations like edge detection, and color enhancement, complement, contrast stretching etc. The proposed image processing techniques (IPT) intended for various applications. Dissimilar image processing techniques are processed by FPGA and displayed on Video Graphics Array (VGA). Image processing system is designed in XSG, hardware description language (HDL) like VHDL & Verilog code is generated by processing system by system generator token. Design is implemented on Artix-7 and targeted on Basys3 reconfigurable hardware (XC7A35T-1-CPG236C). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Cryptography encryption algorithm for augmented security.
- Author
-
Verma, Raksha, Nagar, Tavishi, Sharma, Manoj Kumar, and Kumar, Mukesh
- Subjects
- *
INTERNET fraud , *CRYPTOGRAPHY , *ELECTRONIC funds transfers , *DATA transmission systems , *ALGORITHMS , *EMAIL security , *BLOCK ciphers - Abstract
We live in times where technology is advancing at an unprecedent rate. From online communication, shopping, data sharing, cashless payments to transmitting sensitive information through internet, everything is being done online. These online methods of data transfer are always vulnerable to online phishing and frauds. Therefore, it becomes very imperative to devise ways for safe and secure transmission of data. To keep up this, new and secure cryptographic schemes are the need of the modern age. In this paper, the author presents a new improvised encryption technique which makes modifications in the traditional approach of the Caesar cipher by combining it with extended Hill cipher. Additionally, it makes use of the Linear congruential method to generate the randomized secret key. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. Development of the algorithm for optimizing the testing process of a software product at the development stages.
- Author
-
Smolentseva, T. E. and Akatev, I. A.
- Subjects
- *
COMPUTER software development , *NEW product development , *ALGORITHMS , *SOFTWARE architecture , *COMPUTER software testing , *COMMERCIAL product testing - Abstract
The paper considers the main methods of testing a software product at the development stage. The methods are compared with typical architectures of software products. The optimization problem of the testing process is solved on the basis of the algorithm development that presents the process under consideration at a more detailed level. The optimization of the algorithm is presented on business processes by BPMN 2.0 notation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Implementation of a bioinspired algorithm for the formation of multiversion software systems.
- Author
-
Kovalev, I. V., Kovalev, D. I., Voroshilova, A. A., Borovinsky, D. V., and Podoplelova, V. A.
- Subjects
- *
SYSTEMS software , *ANT algorithms , *APPLICATION software , *INTEGRATED software , *BIOLOGICALLY inspired computing , *ALGORITHMS - Abstract
The article presents the software implementation of the bioinspired ant colony algorithm, which is used to form the composition of the multiversion software modules. It is shown that the reliability of programs and performance indicators of multiversion software significantly depend on the results of the design stage, at which a decision is made on the formation of the structure of the program complex and the choice of the composition of multiversion software modules. The solution of these problems is supported by the developed software application. The application is focused on the user, who sets all the parameters of the multiversions. Within the framework of the bioinspired approach, the paper presents the main functions implemented in a software package using ant colony algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.