Results for 'system optimization'

907 found
Order:
  1.  78
    Optimization Algorithms for Load Balancing in Data-Intensive Systems with Multipath Routing.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):377-382.
    : In today's data-driven world, the efficient management of network resources is crucial for optimizing performance in data centers and large-scale networks. Load balancing is a critical process in ensuring the equitable distribution of data across multiple paths, thereby enhancing network throughput and minimizing latency. This paper presents a comprehensive approach to load balancing using advanced optimization techniques integrated with multipath routing protocols. The primary focus is on dynamically allocating network resources to manage the massive volume of data generated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. System availability optimization for production and embedding of bitumen bounded materials.Milan Mirkovic - 2016 - Dissertation, University of Belgrade
    Application of the reliability of repairable systems on solving problems from constructing production systems takes an important place in the process of finding the optimal solution among the suggested system choices. The basic hypothesis when using the reliability of the repairable systems is that every machine is representing a component, a fact that is debatable when talking about technical sciences. However, considering the second assumption of the stationary process, the function of the availability is introduced. It represents the measure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Global Optimization Studies on the 1-D Phase Problem.Jim Marsh, Martin Zwick & Byrne Lovell - 1996 - Int. J. Of General Systems 25 (1):47-59.
    The Genetic Algorithm (GA) and Simulated Annealing (SA), two techniques for global optimization, were applied to a reduced (simplified) form of the phase problem (RPP) in computational crystallography. Results were compared with those of "enhanced pair flipping" (EPF), a more elaborate problem-specific algorithm incorporating local and global searches. Not surprisingly, EPF did better than the GA or SA approaches, but the existence of GA and SA techniques more advanced than those used in this study suggest that these techniques still (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  4. e-AIMSS (Electronic Asset Inventory and Management System in School) for Resource Optimization and Organizational Productivity.Antonio C. Ahmad - 2023 - International Journal of Multidisciplinary Educational Research and Innovation 1 (3):109-120.
    This capstone is centered around the development of an efficient electronic property inventory system tailored for school assets, driven by the overarching objective of resource optimization to ensure equitable access to vital materials for all learners. The methodology follows the “ISSO” framework (Ignite, Strategize, Systematize, Operationalize), complemented by a Logical Framework. The project employs a homegrown digitalized system constructed through a waterfall model approach, which undergoes alpha and beta testing. The study’s analysis utilizes a t-Test to evaluate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Economic rationality and the optimization trap.Nikil Mukerji & Julian Nida-Rümelin - 2015 - St. Gallen Business Review 2015 (1):12-17.
    The theme of this issue of the St. Gallen Business Review is "Harmony". For this reason, we would like to discuss whether two aspects of our life- world are in harmony, namely economic optimization and morality. What is the relation between them? According to a widely shared view, which is one aspect of the doctrine of "mainstream economics", the functioning of an economic system does not require moral behaviour on the part of the individual economic agent. In what (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  16
    Streamlined Inventory Handling Using Optimized Robotic Pick and Place Systems.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):660-680.
    We propose a systematic workflow for automating the storage and retrieval process, starting from the identification of the stock to its precise placement and retrieval within the storage facility. The design also addresses potential challenges such as robot mobility, collision avoidance, and space optimization. Performance metrics, including accuracy, time efficiency, and system scalability, are measured using simulation-based experiments in a controlled environment. The results show significant improvements in operational efficiency compared to traditional stock management approaches. This integration paves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  44
    Smart Route Optimization for Emergency Vehicles: Enhancing Ambulance Efficiency through Advanced Algorithms.Vishal Parmar - 2024 - Technosaga 2024 1 (1):1-6.
    Emergency response times play a critical role in saving lives, especially in urban settings where traffic congestion and unpredictable events can delay ambulance arrivals. This paper explores a novel framework for smart route optimization for emergency vehicles, leveraging artificial intelligence (AI), Internet of Things (IoT) technologies, and dynamic traffic analytics. We propose a real-time adaptive routing system that integrates machine learning (ML) for predictive modeling and IoT-enabled communication with traffic infrastructure. The system is evaluated using simulated urban (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  45
    Smart Route Optimization for Emergency Vehicles: Enhancing Ambulance Efficiency through Advanced Algorithms.R. Indoria - 2024 - Technosaga 1 (1):1-6.
    Emergency response times play a critical role in saving lives, especially in urban settings where traffic congestion and unpredictable events can delay ambulance arrivals. This paper explores a novel framework for smart route optimization for emergency vehicles, leveraging artificial intelligence (AI), Internet of Things (IoT) technologies, and dynamic traffic analytics. We propose a real-time adaptive routing system that integrates machine learning (ML) for predictive modeling and IoT-enabled communication with traffic infrastructure. The system is evaluated using simulated urban (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  71
    Advanced Phishing Content Identification Using Dynamic Weighting Integrated with Genetic Algorithm Optimization.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):500-520.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time. The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  73
    Intelligent Cloud Storage System with Machine Learning-Driven Attribute-Based Access Control.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):435-445.
    Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We examine index compression, query processing improvement, and encryption optimization to decrease computational cost and preserve security. After a thorough investigation, the article shows how these methods may boost cloud storage system performance, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  74
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  79
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  53
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is used to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  52
    PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):471-485.
    Phishing attacks remain one of the most prevalent cybersecurity threats, affecting individuals and organizations globally. The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  66
    Intelligent Phishing Content Detection System Using Genetic Ranking and Dynamic Weighting Techniques.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):480-490.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time.
    Download  
     
    Export citation  
     
    Bookmark  
  18.  78
    ENHANCED SLA-DRIVEN LOAD BALANCING ALGORITHMS FOR DATA CENTER OPTIMIZATION USING ADVANCED OPTIMIZATION TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):369-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  13
    Optimizing Robotic Systems for Stock Management in Pick and Place Operations.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):670-680.
    The design also addresses potential challenges such as robot mobility, collision avoidance, and space optimization. Performance metrics, including accuracy, time efficiency, and system scalability, are measured using simulation-based experiments in a controlled environment. The results show significant improvements in operational efficiency compared to traditional stock management approaches. This integration paves the way for future advancements in fully automated warehouses, reducing the need for human labor and increasing reliability. Finally, we discuss potential enhancements, including AI-based decision-making algorithms, multi-robot collaboration, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  61
    Automated Phishing Classification Model Utilizing Genetic Optimization and Dynamic Weighting Algorithms.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):520-530.
    The classification system was evaluated using benchmark phishing datasets, and the results demonstrated a significant improvement in detection accuracy and reduced false positives. The proposed model outperformed traditional machine learning algorithms, showing promise for real-world deployment in phishing detection systems. We conclude with suggestions for future improvements, such as incorporating more behavioral data and deploying the system in realtime monitoring applications.
    Download  
     
    Export citation  
     
    Bookmark  
  21. Global Regulatory System of Human Resources Development.Sergii Sardak - 2014 - Dissertation, Київський Національний Економічний Університет Імені Вадима Гетьмана
    ANNOTATION Sardak S.E. Global Regulatory System of Human Resources Development. – Manuscript. Thesis for the Doctor of Economic Science academic degree with major in 08.00.02 – World Economy and international economic relations. – SHEE «Kyiv National Economic University named after Vadym Hetman», Kyiv, 2014. The preconditions and factors of the global economic system with the identified relevant subjects areas and mechanisms of regulation instruments have been investigated. The crucial role of humans in the global economic system as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  87
    Machine Learning-Based Cyberbullying Detection System with Enhanced Accuracy and Speed.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-429.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Remarks on the Geometry of Complex Systems and Self-Organization.Luciano Boi - 2012 - In Vincenzo Fano, Enrico Giannetto, Giulia Giannini & Pierluigi Graziani (eds.), Complessità e Riduzionismo. ISONOMIA - Epistemologica Series Editor. pp. 28-43.
    Let us start by some general definitions of the concept of complexity. We take a complex system to be one composed by a large number of parts, and whose properties are not fully explained by an understanding of its components parts. Studies of complex systems recognized the importance of “wholeness”, defined as problems of organization (and of regulation), phenomena non resolvable into local events, dynamics interactions in the difference of behaviour of parts when isolated or in higher configuration, etc., (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  90
    Achieving Coherence: Modeling Complexity in Dynamic Systems.Benjamin James - 2024 - Amazon: KDP.
    Achieving Coherence introduces a transformative framework for understanding and managing the complexities of dynamic systems. In a world where uncertainty and interconnected challenges define the landscape, the SPARC framework (Spectrum of Possibility and Recursive Choice) offers a unified model to address these issues, bridging the gap between theory and application across disciplines. This work explores the principles of coherence, constraint satisfaction, and recursive feedback, shedding light on how systems maintain stability and adapt in the face of evolving constraints and environmental (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Concepts, strategies and mechanisms of economic systems management in the context of modern world challenges.Grigorii Vazov (ed.) - 2021 - VUZF Publishing House “St. Grigorii Bogoslov”.
    The results of the authors’ research in a scientific monograph are devoted to solving the problems of forming and improving new concepts and strategies for managing economic systems, and mechanisms for their implementation in the context of modern world challenges to society on the basis of models of managing economic entities. An important component of the scientific monograph is the formation of modern strategies for increasing the competitiveness of economic systems, improving corporate structures, innovative restructuring of enterprises, ensuring environmental safety, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  24
    Deep Neural Networks for Real-Time Plant Disease Diagnosis and Productivity Optimization.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):645-652.
    The health of plants plays a crucial role in ensuring agricultural productivity and food security. Early detection of plant diseases can significantly reduce crop losses, leading to improved yields. This paper presents a novel approach for plant disease recognition using deep learning techniques. The proposed system automates the process of disease detection by analyzing leaf images, which are widely recognized as reliable indicators of plant health. By leveraging convolutional neural networks (CNNs), the model identifies various plant diseases with high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  54
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and confidentiality (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  15
    Optimizing Inventory Management with Advanced Robotic Pick and Place Technology.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):690-700.
    The results show significant improvements in operational efficiency compared to traditional stock management approaches. This integration paves the way for future advancements in fully automated warehouses, reducing the need for human labor and increasing reliability. Finally, we discuss potential enhancements, including AI-based decision-making algorithms, multi-robot collaboration, and integration with Internet of Things (IoT) for real-time data analysis and continuous system improvement. Key words: Robotic aut.
    Download  
     
    Export citation  
     
    Bookmark  
  29.  13
    Smart Robotic Solutions for Efficient Stock Management in Pick and Place Tasks.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):680-690.
    The integration of robotics and stock management systems has revolutionized warehouse operations, offering greater efficiency, accuracy, and flexibility. This paper presents an optimal design for integrating robotic systems with stock management for pick-and-place operations in warehousing environments. The primary objective of this research is to enhance the precision and speed of stock handling while minimizing human intervention and error. Our design incorporates state-of-the-art sensors, real-time tracking systems, and autonomous robots programmed with advanced algorithms for object identification, gripping, and movement.
    Download  
     
    Export citation  
     
    Bookmark  
  30.  71
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Towards an Ontology of Problems.Martin Zwick - 1995 - Advances in Systems Science and Applications 1:37-42.
    Systems theory offers a language in which one might formulate a metaphysics (or more specifically an ontology) of problems. This proposal is based upon a conception of systems theory shared by vonBertalanffy, Wiener, Boulding, Rapoport, Ashby, Klir, and others,and expressed succinctly by Bunge, who considered game theory, information theory, feedback control theory, and the like to be attempts to construct an "exact and scientific metaphysics." Our prevailing conceptions of "problems" are concretized yet also fragmented, and in fact dissolved, by the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Intelligent Encryption and Attribute-Based Data Retrieval for Secure Cloud Storage Using Machine Learning.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):415-425.
    Cloud storage's scalability, accessibility, and affordability have made it essential in the digital age. Data security and privacy remain a major issue due to the large volume of sensitive data kept on cloud services. Traditional encryption is safe but slows data recovery, especially for keyword searches. Secure, fine-grained access control and quick keyword searches over encrypted data are possible using attribute-based keyword search (ABKS). This study examines how ABKS might optimize search efficiency and data security in cloud storage systems. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  97
    OPTIMIZED SECURE CLOUD STORAGE USING ATTRIBUTE-BASED KEYWORD SEARCH.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):338-349.
    In the modern digital era, cloud storage has become an indispensable service due to its scalability, accessibility, and cost-effectiveness. However, with the vast amount of sensitive information stored on cloud platforms, ensuring data security and privacy remains a critical challenge. Traditional encryption techniques, while secure, often hinder efficient data retrieval, especially when using keyword searches. To address this, attribute-based keyword search (ABKS) offers a promising solution by allowing secure, fine-grained access control and efficient keyword searches over encrypted data. This paper (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Automated Cyberbullying Detection Framework Using NLP and Supervised Machine Learning Models.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-432.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  70
    Low-Power IoT Sensors for Real-Time Outdoor Environmental Pollution Measurement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):430-440.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Trade-offs in exploiting body morphology for control: From simple bodies and model-based control to complex ones with model-free distributed control schemes.Matej Hoffmann & Vincent C. Müller - 2014 - In Helmut Hauser, Rudolf M. Füchslin & Rolf Pfeifer (eds.), Opinions and Outlooks on Morphological Computation. E-Book. pp. 185-194.
    Tailoring the design of robot bodies for control purposes is implicitly performed by engineers, however, a methodology or set of tools is largely absent and optimization of morphology (shape, material properties of robot bodies, etc.) is lag- ging behind the development of controllers. This has become even more prominent with the advent of compliant, deformable or "soft" bodies. These carry substantial potential regarding their exploitation for control – sometimes referred to as "mor- phological computation" in the sense of offloading (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  72
    Efficient Data Center Management: Advanced SLA-Driven Load Balancing Solutions.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):368-376.
    In modern data centers, managing the distribution of workloads efficiently is crucial for ensuring optimal performance and meeting Service Level Agreements (SLAs). Load balancing algorithms play a vital role in this process by distributing workloads across computing resources to avoid overloading any single resource. However, the effectiveness of these algorithms can be significantly enhanced through the integration of advanced optimization techniques. This paper proposes an SLA-driven load balancing algorithm optimized using methods such as genetic algorithms, particle swarm optimization, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  99
    OPTIMIZED DRIVER DROWSINESS DETECTION USING MACHINE LEARNING TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):395-400.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  91
    OPTIMIZED CYBERBULLYING DETECTION IN SOCIAL MEDIA USING SUPERVISED MACHINE LEARNING AND NLP TECHNIQUES.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):421-435.
    The rise of social media has created a new platform for communication and interaction, but it has also facilitated the spread of harmful behaviors such as cyberbullying. Detecting and mitigating cyberbullying on social media platforms is a critical challenge that requires advanced technological solutions. This paper presents a novel approach to cyberbullying detection using a combination of supervised machine learning (ML) and natural language processing (NLP) techniques, enhanced by optimization algorithms. The proposed system is designed to identify and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  86
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Mindspongeconomics.Quy Khuc - manuscript
    Economics has evolved over time, and it helps to explain and shape the actors’ economic activities. Although economics is useful to humans’ lives, it is either failed or insufficient to justify many real-world cases, ranging from humans’ rapid and/or unpredictable progress in the information age to decision making-selecting mechanisms, optimization, gross domestic product (GDP) matter, and so on, raising concerns about contemporary economics’ significant limitations, inspiring us to rethink, redefine and reform it in new contexts. Fortunately, the mindsponge theory (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. A Tri-Opti Compatibility Problem for Godlike Superintelligence.Walter Barta - manuscript
    Various thinkers have been attempting to align artificial intelligence (AI) with ethics (Christian, 2020; Russell, 2021), the so-called problem of alignment, but some suspect that the problem may be intractable (Yampolskiy, 2023). In the following, we make an argument by analogy to analyze the possibility that the problem of alignment could be intractable. We show how the Tri-Omni properties in theology can direct us towards analogous properties for artificial superintelligence, Tri-Opti properties. However, just as the Tri-Omni properties are vulnerable to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. A New Media Optimizer Based on the Mean-Variance Model.Julio Michael Stern - 2007 - Pesquisa Operacional, 27 (3):427-456.
    In the financial markets, there is a well established portfolio optimization model called generalized mean-variance model (or generalized Markowitz model). This model considers that a typical investor, while expecting returns to be high, also expects returns to be as certain as possible. In this paper we introduce a new media optimization system based on the mean-variance model, a novel approach in media planning. After presenting the model in its full generality, we discuss possible advantages of the mean-variance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Simple or complex bodies? Trade-offs in exploiting body morphology for control.Matej Hoffmann & Vincent C. Müller - 2017 - In Gordana Dodig-Crnkovic & Raffaela Giovagnoli (eds.), Representation of Reality: Humans, Other Living Organism and Intelligent Machines. Heidelberg: Springer. pp. 335-345.
    Engineers fine-tune the design of robot bodies for control purposes, however, a methodology or set of tools is largely absent, and optimization of morphology (shape, material properties of robot bodies, etc.) is lagging behind the development of controllers. This has become even more prominent with the advent of compliant, deformable or ”soft” bodies. These carry substantial potential regarding their exploitation for control—sometimes referred to as ”morphological computation”. In this article, we briefly review different notions of computation by physical systems (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45.  70
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  60
    A Blueprint for Success: Transforming Legacy Databases with Snowflake Migration Strategies.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):575-585.
    The study outlines the technical challenges encountered during migration, including data compatibility issues, schema conversion, and security compliance, as well as strategies to mitigate these obstacles. Testing and validation techniques are applied throughout the migration, highlighting essential checkpoints to confirm data accuracy and optimal performance in the Snowflake environment. Postmigration performance metrics are evaluated to illustrate improvements in query execution, scalability, and overall system efficiency compared to the legacy system. The results underscore the advantages of Snowflake’s architecture in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Numerical infinities and infinitesimals: Methodology, applications, and repercussions on two Hilbert problems.Yaroslav Sergeyev - 2017 - EMS Surveys in Mathematical Sciences 4 (2):219–320.
    In this survey, a recent computational methodology paying a special attention to the separation of mathematical objects from numeral systems involved in their representation is described. It has been introduced with the intention to allow one to work with infinities and infinitesimals numerically in a unique computational framework in all the situations requiring these notions. The methodology does not contradict Cantor’s and non-standard analysis views and is based on the Euclid’s Common Notion no. 5 “The whole is greater than the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  48.  64
    Simple or Complex Bodies? Trade-offs in Exploiting Body Morphology for Control.Vincent Müller & Matej Hoffmann - 2017 - In Gordana Dodig-Crnkovic & Raffaela Giovagnoli (eds.), Representation of Reality: Humans, Other Living Organism and Intelligent Machines. Heidelberg: Springer. pp. 335-345.
    Engineers fine-tune the design of robot bodies for control purposes; however, a methodology or set of tools is largely absent, and optimization of morphology is lagging behind the development of controllers. This has become even more prominent with the advent of compliant, deformable or ‘soft’ bodies. These carry substantial potential regarding their exploitation for control—sometimes referred to as ‘morphological computation’. In this article, we briefly review different notions of computation by physical systems and propose the dynamical systems framework as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Managerial innovations in methodology of solving export-import activity problems and ensuring international corporations business excellence.Igor Kryvovyazyuk, I. Vakhovych, I. Kaminska & V. Dorosh - 2020 - Quality – Access to Success 21 (178):50-55.
    The purpose of the research is to develop a new methodological basis for identifying, analyzing and solving problems of international corporations export-import activities and to ground the directions for ensuring their business excellence. The approach originality provides introduction of a conceptual model that aims to eliminate the negative symptoms of international corporations export-import activities based on the results of comprehensive market research, effectiveness of export-import activities and calculation of the integrated indicator of business excellence. The leading corporations of Slovakia and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Synthetic Biology and Biofuels.Catherine Kendig - 2012 - In Paul B. Thompson & David M. Kaplan (eds.), Encyclopedia of Food and Agricultural Ethics. New York: Springer Verlag.
    Synthetic biology is a field of research that concentrates on the design, construction, and modification of new biomolecular parts and metabolic pathways using engineering techniques and computational models. By employing knowledge of operational pathways from engineering and mathematics such as circuits, oscillators, and digital logic gates, it uses these to understand, model, rewire, and reprogram biological networks and modules. Standard biological parts with known functions are catalogued in a number of registries (e.g. Massachusetts Institute of Technology Registry of Standard Biological (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 907