Empowerment of cluster and grid load balancing algorithms to support distributed exascale computing systems with high compatibility
The nature of the scientific applications that need to be distributed exascale systems is in a way that both traditional and distributed exascale systems programs are required. As a result, the load balancer not only supports traditional mechanisms of the ...
An improved method for k-means clustering based on internal validity indexes and inter-cluster variance
It is difficult to get the best cluster number of k-means clustering algorithm by using the traditional internal validity indexes. Therefore, a good clustering result cannot be obtained usually. To solve this problem, this paper proposes an improved ...
Human interactive behaviour recognition method based on multi-feature fusion
Recently, the selection of the overall and individual characteristics in interactive actions and the high-dimensional complexity of features are still important factors affecting the recognition accuracy. In this paper, we propose a human interactive ...
Optimised implementation of AVR system using particle swarm optimisation
Several techniques have been developed to improve the control quality and deliver optimised products in many industrial process domains. This work aims to propose an optimised automatic voltage regulator (AVR) system implementation by applying a nature-...
A secure hash function based on sponge construction and chaos-maps
This work introduces a new hash function based on the sponge structure and two chaotic maps. It aims to avoid the major problems of Merkle-Damgård construction and ad hoc structures such as multi-collision and length extension attacks. The proposed hash ...
A multi-objective computation offloading algorithm in MEC environments
Mobile edge computing (MEC) is able to provide cloud computing capabilities at network edges by offloading computation tasks to MEC servers deployed in proximity of edge nodes. Therefore, how to make offloading decision for mobile users has become a ...
An improved motion estimation criterion for temporal coding of video
The size of video data is growing exponentially worldwide and hence there is a need for better video coding standards. MPEG and H.26X have provided several standards for video coding. The latest and effective video coding standards are AVC, HEVC, and AV1. ...
Cyberbullying detection: an ensemble learning approach
Online social networking platforms have become a common choice for people to communicate with friends, relatives, or business partners. This allows sharing life achievement, success, and much more. In parallel, it also invited hidden issues such as web-...
T-PdM: a tripartite predictive maintenance framework using machine learning algorithms
The purpose of this paper is to propose new predictive maintenance (PdM) framework that has three aims: 1) estimating the remaining useful life (RUL) of a machine; 2) classifying machine health status (failure/non-failure); 3) discovering the relationship ...
Automated network intrusion detection using multimodal networks
Intrusion detection requires accurate and timely detection of any bad connection that intends to exploit network vulnerabilities. Previous approaches have focused on deriving statistical features based on domain knowledge, followed by primitive machine ...