Browse Items (11858 total)
Sort by:
-
Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm
The cloud computing is interlinked with recent and out-dated technology. The cloud data storage industry is earning billion and millions of money through this technology. The cloud remote server storage is on-demand technology. The cloud users are expecting higher quality in minimal cost. The quality of service is playing a vital role in any latest technology. The cloud user always depends on thirty party service providers. This service provider is facing higher competition. The customer is choosing a service based on two parameters one is security and another one is cost. The reason behind this is all our personal data is stored on some third party server. The customer is expecting higher security level. The service provider is choosing many techniques for data security, best one is encryption mechanism. This encryption method is having many algorithms. Then again one problem is raised, that is which algorithm is best for encryption. The prediction of algorithm is one of major task. Each and every algorithm is having unique advantage. The algorithm performance is varying depends on file type. The proposed method of this article is to solve this encryption algorithm selection problem by using tabu search concept. The proposed method is to ensure best encryption method to reducing the average encode and decode time in multimedia data. The local search scheduling concept is to schedule the encryption algorithm and store that data in local memory table. The quality of service is improved by using proposed scheduling technique. 2021, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature. -
Cloud Enabled Smart Firefighting Drone Using Internet of Things
Internet of Things is fasted booming sector. This technology is evolved in various fields. The frequent updates in concerning the progress of Skyscraper fire or high-rise fire it is essential for us to ensure effective and safe firefighting. Since high-rise fire is typically inaccessible by ground vehicles due to some constraints or parameters. Due to less advancement in technology most skyscrapers are not furnished with proper fire monitoring and prevention system. To solve this issue this article is propose Unmanned Air Vehicles (UAVs) are making an appearance and making promises to prevent such kind of incidents. In this system, UAV can be launched from the Fire Control Unit (FCU). The proposed methodology is implemented with the help of Internet of Things (IoT). Sensors which are installed at the skyscraper detects the presence of fire and immediately send stress signals to the command and control unit from where further possible action can be taken. The pilot at the fire control unit continuously monitors the flight path and receives the video and fire scan information from the UAV. Upon detection of a stress signal or fire signal the Skyscraper position is determined with the help of Global Positioning System (GPS) and permission is requested from the applicable security agency to launch the extinguisher vehicle. The permission is granted, the coordinates of the location are filled in the system and the nearest station sends the UAV to the location. The fire suppressant are deployed it comes back to the nearest landing location and re-loaded with another fire suppressant to be carried to the fire location. The proposed methodology should improve the Quality of Service. 2019 IEEE. -
Cloud Intrusion Detection Using Hybrid Convolutional Neural Networks
Instead of storing data on a hard drive, cloud computing is seen as the best option. The Internet is used to deliver three different kinds of computing services to users all over the world. One advantage that cloud computing provides to its customers is greater access to resources and higher performance while at the same time increasing the risk of an attack. Intrusion detection systems that can handle a large volume of data packets, analyse them, and generate reports based on knowledge and behaviour analysis were developed as part of this research. As an added layer of protection, the Convolution Neural Network Algorithm is used to encrypt data during end-to-end transmission and to store it in the cloud. Intrusion detection increases the safety of data in the cloud. In this paper demonstrates the data is encrypted and decrypted using a model of an algorithm and explains how it is protected from attackers. It's important to take into account the amount of time and memory required to encrypt and decrypt large text files when evaluating the proposed system's performance. The security of the cloud has also been examined and compared to other existing encoding methods. 2024, Iquz Galaxy Publisher. All rights reserved. -
Cloud security based attack detection using transductive learning integrated with Hidden Markov Model
In recent years, organizations and enterprises put huge attention on their network security. The attackers were able to influence vulnerabilities for the configuration of the network through the network. Zero-day (0-day) is defined as vulnerable software or application that is either defined by the vendor or not patched by any vendor of organization. When zero-day attack is identified within the network there is no proper mechanism when observed. To mitigate challenges related to the zero-day attack, this paper presented HMM_TDL, a deep learning model for detection and prevention of attack in the cloud platform. The presented model is carried out in three phases like at first, Hidden Markov Model (HMM) is incorporated for the detection of attacks. With the derived HMM model, hyper alerts are transmitted to the database for attack prevention. In the second stage, a transductive deep learning model with k-medoids clustering is adopted for attack identification. With k-medoids clustering, soft labels are assigned for attack and data and update to the database. In the last phase, with computed HMM_TDL database is updated with computed trust value for attack prevention within the cloud. 2022 -
Cloud service negotiation framework for real-time E-commerce application using game theory decision system
A major demanding issue is developing a Service Level Agreement (SLA) based negotiation framework in the cloud. To provide personalized service access to consumers, a novel Automated Dynamic SLA Negotiation Framework (ADSLANF) is proposed using a dynamic SLA concept to negotiate on service terms and conditions. The existing frameworks exploit a direct negotiation mechanism where the provider and consumer can directly talk to each other, which may not be applicable in the future due to increasing demand on broker-based models. The proposed ADSLANF will take very less total negotiation time due to complicated negotiation mechanisms using a third-party broker agent. Also, a novel game theory decision system will suggest an optimal solution to the negotiating agent at the time of generating a proposal or counter proposal. This optimal suggestion will make the negotiating party aware of the optimal acceptance range of the proposal and avoid the negotiation break off by quickly reaching an agreement. 2021 - IOS Press. All rights reserved. -
Cloud Virtualization with Data Security: Challenges and Opportunities
In recent years, Cloud Computing is emerging as a torrid research area for both academicians and industrialists. It provides effective ways to handle and store the data in advanced system processing applications. Furthermore, it also leverages a radical change in the way the users access and use the available resources. Despite the hype, it also has the challenge of slow data transition from present physical storage to the cloud based platform. This is mainly due to the security challenges associated with the Cloud Computing applications. Hence, data protection has become very critical and always requires an efficient and effective security protocol into the existence. So, the security and reliability of the cloud platform would definitely attract more researchers to this platform. This article discusses an overview of Cloud paradigm and the different virtualization techniques adopted to overcome the security issues associated with the cloud computing platform. Springer Nature Switzerland AG 2020. -
Cloud-Based Cataract Recognition System Using Hybrid Classifier Model
One of the key challenges of ophthalmologists is to diagnose the various ranges of ophthalmological illnesses such as diabetic retinopathy, cataract, and glaucoma. Here, cataract disease is identified as the one of the leading and most common ophthalmological problems that occurs due to aging. A computer-assisted cataract detection and diagnosis support system is required by the ophthalmologists to overcome the error that occurs during manual screening process. So, a cloud-based cataract recognition system is proposed using the convolutional neural network with support vector machine classifier model to improve the prediction accuracy, sensitivity, specificity, precision, recall, F1-score, and Mathews correlation coefficient. Moreover, the four-layer convolutional neural network is finetuned with a rich set of features and trained with various network models such as Inception V3, MobileNet, VGG-16, VGG-19, and ResNet-101. Therefore, the proposed hybrid combination of ResNet-101 with support vector machine classifier makes better cataract detection and outperforms the existing classifier models in terms of above-mentioned performance evaluation metrics. Moreover, the proposed hybrid approach provides the better telemedical solution to remote people by providing accurate disease prediction and severity grading such as normal, mild, premature, and severe cataract. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Cloud-Based Diabetic Retinopathy Severity Recognition System Using Ensemble Deep Convolutional Neural Network Classifier Model
One of the key reasons for visual impairments is due to the ignorance of diabetic retinopathy disease. This research study focuses on the early recognition of diabetic retinopathy disease from the fundus images and identifies its severity stages to make successful treatments against blindness risk. Some traditional approaches explored the decision tree, kernel-based support vector machine, and Nae Bayes classifier models to extract the features from fundus images. Most of the researchers applied the modern approach of convolutional neural network model through transfer learning mechanism to extract relevant features from the fundus images. It helps in the diagnosis of diabetic retinopathy that may delay the prediction process and create inconsistency among the doctors. So, a deep learning-based approach is proposed in this research study to provide stage-wise prediction of diabetic retinopathy disease with a multi-task learning mechanism. As a result, the proposed deep convolutional neural network classifier with an ensemble model outperforms the existing classifier with EfficientNet-B4, EfficientNet-B5, SE-ResNeXt50 (380?380), and SE-ResNeXt50 (512?512) networking methods in the context of prediction correctness, sensitivity, specificity, macro F1, and quadratic weighted kappa (QWK) score metrics. Exploiting hyperparameter optimizations on the deep learning classifier model and multi-task regression learning approaches make significant improvements over the performance evaluation metrics. Finally, the proposed approaches make the effective recognition of diabetic retinopathy disease stages based on the human fundus image. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Cloud-enabled Diabetic Retinopathy Prediction System using optimized deep Belief Network Classifier
Diabetic retinopathy disease is one of the notorious metabolic disorders happens due to increase of blood sugar level in human body. In computer vision, images are recognized as the indispensable tool for precise prediction and diagnosis of diabetic retinopathy. Therefore, the proposed research study considers the fundus images of various patients containing the diabetic disease. Basic idea behind this research is to introduce a stochastic neighbor embedding (SNE) feature extraction approach for the sake of dimensional reduction and unnecessary noise removal from the fundus images. After feature extraction, the proposed optimized deep belief network (O-DBN) classifier model is capable of measuring the image features into various classes that gives the severity levels of diabetic retinopathy disease. Moreover, the proposed cloud-enabled diabetic retinopathy prediction system using the SNE feature extraction and O-DBN classification model could outperform the existing online prediction systems in terms of sensitivity, specificity, F1-score, prediction time and accuracy. 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature. -
CloudML: Privacy-Assured Healthcare Machine Learning Model for Cloud Network
Cloud computing is the need of the twenty-first century with an exponential increase in the volume of data. Compared to any other technologies, the cloud has seen fastest adoption in the industry. The popularity of cloud is closely linked to the benefits it offers which ranges from a group of stakeholders to huge number of entrepreneurs. This enables some prominent features such as elasticity, scalability, high availability, and accessibility. So, the increase in popularity of the cloud is linked to the influx of data that involves big data with some specialized techniques and tools. Many data analysis applications use clustering techniques incorporated with machine learning to derive useful information by grouping similar data, especially in healthcare and medical department for predicting symptoms of diseases. However, the security of healthcare data with a machine learning model for classifying patients information and genetic data is a major concern. So, to solve such problems, this paper proposes a Cloud-Machine Learning (CloudML) Model for encrypted heart disease datasets by employing a privacy preservation scheme in it. This model is designed in such a way that it does not vary in accuracy while clustering the datasets. The performance analysis of the model shows that the proposed approach yields significant results in terms of Communication Overhead, Storage Overhead, Runtime, Scalability, and Encryption Cost. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Cloudsim exploration: A knowledge framework for cloud computing researchers
This paper aims to help find solutions for questions an early researcher may have to set up experiments in their development environment. Simultaneously, while identifying the steps required for experimenting, the authors narrowed on an experimenting toolkit for Cloud Computing as an area of their study. Because of such simulators, the cloud computing environment itself is available easily at the comfort of ones desktop resources instead of visiting an actual physical data center to collect trace and log files as data sets for real workloads. This paper acts as an experience sharing to naive researchers who are interested in how to go about to start cloud computing setups. A new framework called Cloud Computing Simulation Environment (CCSE) is presented with inspiration from Procure Apply Consider and Transform (PACT) model to ease the learning process. The literature survey in this paper shares the path taken by researchers for understanding the architecture, technology, and tools required to set up a resilient test environment. This path also depicts the introduced framework CCSE. The parameters found out of the experiments were Virtual Machines (VMs), Cloudlets, Host, and Cores. The appropriate combination of the values of the parameters would be horizontal scaling of VMs. Increasing VMs does not influence the average execution time after a specific limit on the number of VMs allocated. Nevertheless, in vertical scaling, appropriate combinations of the cores and hosts yield better execution times. Thereby maintaining the optimal number of hosts is an ultimate saving of resources in case of VM allocations. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021. -
Cluster analysis for european neonatal jaundice
The objective of this paper is to propose and analyze clustering techniques for neonatal jaundice which will help in grouping the babies of similar symptoms. A variety of methods have been introduced in the literature for neonatal jaundice classification and feature selection. As far as we know, clustering techniques are not used for neonatal jaundice data set. This paper studies and proposes clustering techniques such as K-Means, Genetic K-Means and Bat K-Means for jaundice disease. To find the number of clusters elbow method is used. The clusters are validated using RMSE, SI and HI. The experimental results carried out in this paper shows bat k-means clustering performs better than K-means and genetic K-means. 2018, Springer International Publishing AG. -
Cluster institutional isomorphic pressures: A case of Tirupur knitwear cluster /
Journal Research Journal of Social Science & Management (RJSSM), Vol.2 Issue 4, pp.95-102, ISSN No. 2251-1571. -
Clustering Faculty Members fortheBetterment ofResearch Outcomes: A Fuzzy Multi-criteria Decision-Making Approach inTeam Formation
From a talent-pool of people, choosing an efficient team is tough. Faculty members of a higher education institution constitute the talent-pool. Teams have to be formed from them so that research output of each team is maximum. Amongst numerous research skills, thirteen are identified as most desirable skills. The level of these thirteen skills, viz., concept articulation, formatting according to templates/style sheets, identifying the relevant literature, initiative, logical reasoning, patience, problem formulation/problem finding, proof reading skills/identifying mistakes in written communication, searching/browsing skills/quick search techniques, sense of positive criticism, statistical knowledge, the ability to stay calm, and written communication skills, varies from person to person. Historical ranking of these skills and self-evaluation of the level of acquisition of these skills is used along with the years of experience, educational qualification, gender, marital status, etc., to rank individual faculty members. The fuzzy ranking of the faculty members thus obtained is used to cluster them into teams that are efficient in complementary skills. Each team thus formed is involved in collaborative research leading to research publication. The model is successfully implemented in a university department with 40 faculty members. 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Clustering of low-mass stars around Herbig Be star IL Cep - Evidence of 'Rocket Effect' using Gaia EDR3 ?
We study the formation and the kinematic evolution of the early-type Herbig Be star IL Cep and its environment. The young star is a member of the Cep OB3 association, at a distance of 798 9 pc, and has a 'cavity' associated with it. We found that the B0V star HD 216658, which is astrometrically associated with IL Cep, is at the centre of the cavity. From the evaluation of various pressure components created by HD 216658, it is established that the star is capable of creating the cavity. We identified 79 co-moving stars of IL Cep at 2-pc radius from the analysis of Gaia EDR3 astrometry. The transverse velocity analysis of the co-moving stars shows that they belong to two different populations associated with IL Cep and HD 216658, respectively. Further analysis confirms that all the stars in the IL Cep population are mostly coeval (?0.1 Myr). Infrared photometry revealed that there are 26 Class II objects among the co-moving stars. The stars without circumstellar disc (Class III) are 65 per cent of all the co-moving stars. There are nine intense H ? emission candidates identified among the co-moving stars using IPHAS H ? narrow-band photometry. The dendrogram analysis on the Hydrogen column density map identified 11 molecular clump structures on the expanding cavity around IL Cep, making it an active star-forming region. The formation of the IL Cep stellar group due to the 'rocket effect' by HD 216658 is discussed. 2021 The Author(s) Published by Oxford University Press on behalf of Royal Astronomical Society. -
Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting
Production of insurance policies in all types of Insurance requires a thorough examination of the entity against which the Insurance is to be issued. In health insurance, it is the past medical data of the individuals. Vehicle insurance needs the examination of the vehicle and the owner's data. Likewise, in Title Insurance, it is the historical data of the property which needs scrutiny before the policy issuance. Underwriters perform the job of examining the property records. The scrutiny of the property records requires a high degree of the domain and legal expertise, and title insurance underwriters are often associated with legal professions. They do the final round of validation of the examination process. There are examination teams that take care of the initial set of regular examination tasks associated with each title insurance order. Some human experts assign the orders to the team associates. Not all the orders are of the same complexity in terms of examination. The allocation of the tasks happens based on the gut feeling of the supervisor, considering their experience with the team members. Our research creates clusters of the orders based on specific parameters associated with the orders. It builds a cost model of the past associates working on orders belonging to different clusters. Based on this cost matrix, we have built an optimal task allocation model that assigns the orders to the associates with the promise of optimal cost using a Linear programming solution used frequently in operations research. 2022 IEEE. -
Clustering-Based Recommendation System for Preliminary Disease Detection
The catastrophic outbreak COVID-19 has brought threat to the society and also placed severe stress on the healthcare systems worldwide. Different segments of society are contributing to their best effort to curb the spread of COVID-19. As a part of this contribution, in this research, a clustering-based recommender system is proposed for early detection of COVID-19 based on the symptoms of an individual. For this, the suspected patients symptoms are compared with the patient who has already contracted COVID-19 by computing similarity between symptoms. Based on this, the suspected person is classified into either of the three risk categories: high, medium, and low. This is not a confirmed test but only a mechanism to alert the suspected patient. The accuracy of the algorithm is more than 85%. 2022 IGI Global. All rights reserved. -
CMT-CNN: colposcopic multimodal temporal hybrid deep learning model to detect cervical intraepithelial neoplasia
Cervical cancer poses a significant threat to women's health in developing countries, necessitating effective early detection methods. In this study, we introduce the Colposcopic Multimodal Temporal Convolution Neural Network (CMT-CNN), a novel model designed for classifying cervical intraepithelial neoplasia by leveraging sequential colposcope images and integrating extracted features with clinical data. Our approach incorporates Mask R-CNN for precise cervix region segmentation and deploys the EfficientNet B7 architecture to extract features from saline, iodine, and acetic acid images. The fusion of clinical data at the decision level, coupled with Atrous Spatial Pyramid Pooling-based classification, yields remarkable results: an accuracy of 92.31%, precision of 90.19%, recall of 89.63%, and an F-1 score of 90.72. This achievement not only establishes the superiority of the CMT-CNN model over baselines but also paves the way for future research endeavours aiming to harness heterogeneous data types in the development of deep learning models for cervical cancer screening. The implications of this work are profound, offering a potent tool for early cervical cancer detection that combines multimodal data and clinical insights, potentially saving countless lives. 2024, Universitas Ahmad Dahlan. All rights reserved. -
CNN based Model for Severity Analysis of Diabetic Retinopathy to aid Medical Treatment with Ayurvedic Perspective
One among the major modern life-style diseases is Diabetes. Diabetic Retinopathy is a major cause for blindness even at an early age. Clinical assessments for eye disease are done using visual examinations and probing. Retinal vessel segmentation is an important technique which helps in detection of changes that happens in blood vessel as well as gives information regarding the location of vessels. The work presented in this paper tries to detect and analyze the changes occurred in the blood vessels of human retina caused by diabetic retinopathy. Using digital imaging techniques, the severity screening technique facilitates the diagnosis of diabetic retinopathy. The model works in such a way that it helps the Ayurvedic treatment methodology for Diabetic Retinopathy. Results are obtained to categorize the data elements according to the severity of the disease and different classifications. 2022 IEEE. -
CNN-based Indian medicinal leaf type identification and medical use recommendation
Medicinal leaves are playing a vital role in our everyday life. There are an enormous amount of species present in the world. Identification of each type would be a tedious task. Using image processing technology, we can overcome this problem by providing computer vision with the help of a convolution neural network (CNN). The objective of this research is to find out the best CNN model that helps in classifying the plant leaf species and identifying its category. In this research work, the proposed basic CNN model consisting of four convolution layers uses ten different medicinal leaf species each belonging to two categories providing an accuracy of 96.88%. The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024.
