scholarly journals Exploiting Machine Learning to Efficiently Predict Multidimensional Optical Spectra in Complex Environments

2020 ◽  
Vol 11 (18) ◽  
pp. 7559-7568 ◽  
Author(s):  
Michael S. Chen ◽  
Tim J. Zuehlsdorff ◽  
Tobias Morawietz ◽  
Christine M. Isborn ◽  
Thomas E. Markland
Author(s):  
Fabiano Locatelli ◽  
Konstantinos Christodoulopoulos ◽  
Josep M. Fabrega ◽  
Michela Svaluto Moreolo ◽  
Laia Nadal ◽  
...  

2019 ◽  
Vol 31 (24) ◽  
pp. 1929-1932 ◽  
Author(s):  
Fabiano Locatelli ◽  
Konstantinos Christodoulopoulos ◽  
Michela Svaluto Moreolo ◽  
Josep M. Fabrega ◽  
Salvatore Spadaro

2022 ◽  
Author(s):  
Zhiheng Zhong ◽  
Minxian Xu ◽  
Maria Alejandra Rodriguez ◽  
Chengzhong Xu ◽  
Rajkumar Buyya

Containerization is a lightweight application virtualization technology, providing high environmental consistency, operating system distribution portability, and resource isolation. Existing mainstream cloud service providers have prevalently adopted container technologies in their distributed system infrastructures for automated application management. To handle the automation of deployment, maintenance, autoscaling, and networking of containerized applications, container orchestration is proposed as an essential research problem. However, the highly dynamic and diverse feature of cloud workloads and environments considerably raises the complexity of orchestration mechanisms. Machine learning algorithms are accordingly employed by container orchestration systems for behavior modelling and prediction of multi-dimensional performance metrics. Such insights could further improve the quality of resource provisioning decisions in response to the changing workloads under complex environments. In this paper, we present a comprehensive literature review of existing machine learning-based container orchestration approaches. Detailed taxonomies are proposed to classify the current researches by their common features. Moreover, the evolution of machine learning-based container orchestration technologies from the year 2016 to 2021 has been designed based on objectives and metrics. A comparative analysis of the reviewed techniques is conducted according to the proposed taxonomies, with emphasis on their key characteristics. Finally, various open research challenges and potential future directions are highlighted.


2021 ◽  
Author(s):  
Yijie Liu ◽  
Tao He ◽  
Shixiong Zhang ◽  
Zhijun Yan ◽  
Deming Liu ◽  
...  

Author(s):  
Lorenzo Barberis Canonico ◽  
Nathan J. McNeese ◽  
Marissa L. Shuffler

Hospitals are plagued with a multitude of logistical challenges amplified by a time-sensitive and high intensity environment. These conditions have resulted in burnout among both doctors and nurses as they work tirelessly to provide critical care to patients in need. We propose a new machine-learning-powered matching mechanism that manages the surgeon-nurse-patient assignment process in an efficient way that saves time and energy for hospitals, enabling them to focus almost entirely on delivering effective care. Through this design, we show how incorporating artificial intelligence into management systems enables teams of all sizes to meaningfully coordinate in highly chaotic and complex environments.


2020 ◽  
Vol 247 ◽  
pp. 108598
Author(s):  
Grant Hamilton ◽  
Evangeline Corcoran ◽  
Simon Denman ◽  
Molly Ellis Hennekam ◽  
Lian Pin Koh

2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Jean Caminha ◽  
Angelo Perkusich ◽  
Mirko Perkusich

Internet of Things (IoT) resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introduce a smart trust management method, based on machine learning and an elastic slide window technique that automatically assesses the IoT resource trust, evaluating service provider attributes. In simulated and real-world data, this method was able to identify On-Off attackers and fault nodes with a precision up to 96% and low time consumption.


Sign in / Sign up

Export Citation Format

Share Document