scholarly journals Recognition of Gurmukhi Handwritten City Names Using Deep Learning and Cloud Computing

2022 ◽  
Vol 2022 ◽  
pp. 1-16
Author(s):  
Sandhya Sharma ◽  
Sheifali Gupta ◽  
Deepali Gupta ◽  
Sapna Juneja ◽  
Gaurav Singal ◽  
...  

The challenges involved in the traditional cloud computing paradigms have prompted the development of architectures for the next generation cloud computing. The new cloud computing architectures can generate and handle huge amount of data, which was not possible to handle with the help of traditional architectures. Deep learning algorithms have the ability to process this huge amount of data and, thus, can now solve the problem of the next generation computing algorithms. Therefore, these days, deep learning has become the state-of-the-art approach for solving various tasks and most importantly in the field of recognition. In this work, recognition of city names is proposed. Recognition of handwritten city names is one of the potential research application areas in the field of postal automation For recognition using a segmentation-free approach (Holistic approach). This proposed work demystifies the role of convolutional neural network (CNN), which is one of the methods of deep learning technique. Proposed CNN model is trained, validated, and analyzed using Adam and stochastic gradient descent (SGD) optimizer with a batch size of 2, 4, and 8 and learning rate (LR) of 0.001, 0.01, and 0.1. The model is trained and validated on 10 different classes of the handwritten city names written in Gurmukhi script, where each class has 400 samples. Our analysis shows that the CNN model, using an Adam optimizer, batch size of 4, and a LR of 0.001, has achieved the best average validation accuracy of 99.13.

2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


2015 ◽  
pp. 566-579
Author(s):  
Keyun Ruan

Cloud computing is a major transition, and it comes at a unique historical and strategic time for applying foundational design thinking to secure the next-generation computing infrastructure and enable waves of business and technological innovation. In this chapter, the researcher summarizes six key research and development areas for designing a forensic-enabling cloud ecosystem, including architecture and matrix, standardization and strategy, evidence segregation, security and forensic integration, legal framework, and privacy.


2013 ◽  
pp. 331-344 ◽  
Author(s):  
Keyun Ruan

Cloud computing is a major transition, and it comes at a unique historical and strategic time for applying foundational design thinking to secure the next-generation computing infrastructure and enable waves of business and technological innovation. In this chapter, the researcher summarizes six key research and development areas for designing a forensic-enabling cloud ecosystem, including architecture and matrix, standardization and strategy, evidence segregation, security and forensic integration, legal framework, and privacy.


Author(s):  
Po Ting Lin ◽  
Yu-Cheng Chou

In the past few years, the Computer-Aided Technologies, also known as Computer-Aided X (CAX) have been evolving to the Cloud. Cloud computing provides remote services with data storage, software, platform and infrastructure. The next-generation computing applications rely on the collaborations using the technologies of Cloud-Aided Technologies, or Cloud-Aided X (CLAX). The engineers and designers at various locations in different time zones can collaboratively and simultaneously work on a computing design project using CLAX. Issues such as security, conflict, storage, and online computing are inevitable. This paper presents the challenging problems in cloud-based collaborations and some principles for CLAX.


2020 ◽  
Author(s):  
Tanweer Alam

<p>The fog computing is the emerging technology to compute, store, control and connecting smart devices with each other using cloud computing. The Internet of Things (IoT) is an architecture of uniquely identified interrelated physical things, these physical things are able to communicate with each other and can transmit and receive information. <a>This research presents a framework of the combination of the Internet of Things (IoT) and Fog computing. The blockchain is also the emerging technology that provides a hyper, distributed, public, authentic ledger to record the transactions. Blockchains technology is a secured technology that can be a boon for the next generation computing. The combination of fog, blockchains, and IoT creates a new opportunity in this area. In this research, the author presents a middleware framework based on the blockchain, fog, and IoT. The framework is implemented and tested. The results are found positive. </a></p>


2020 ◽  
Vol 6 (1) ◽  
Author(s):  
Rizky Maulana Hakim

We realize that in the community, it is still close to the night world which can plunge the nation's next generation, through drinking, gambling, and especially Narcotics. There are many rules related to this problem, it is still possible that the minimum knowledge of the community is what causes users to become victims of the rigors of using drugs.In discussing this paper, we will take and discuss the theme of "Legal Certainty and Role of Laws on Narcotics (Narcotics and Drugs / Hazardous Materials) by Users and Distributors." The purpose of accepting this paper is, first, to be agreed by the reader which can be understood about the dangers that need to be discussed regarding the subjectivity of the drug itself; secondly, asking the reader to get a clue about actually addressing the urgency about the distribution of drugs; round, which is about knowing what the rules of the law and also the awareness in the surrounding community.Keywords: Narcotics, Role of Laws, Problem, Minimum Knowledge, awareness


Author(s):  
Ramandeep Kaur

A lot of research has been done in the field of cloud computing in computing domain.  For its effective performance, variety of algorithms has been proposed. The role of virtualization is significant and its performance is dependent on VM Migration and allocation. More of the energy is absorbed in cloud; therefore, the utilization of numerous algorithms is required for saving energy and efficiency enhancement in the proposed work. In the proposed work, green algorithm has been considered with meta heuristic algorithms, ABC (Artificial Bee colony .Every server has to perform different or same functions. A cloud computing infrastructure can be modelled as Primary Machineas a set of physical Servers/host PM1, PM2, PM3… PMn. The resources of cloud infrastructure can be used by the virtualization technology, which allows one to create several VMs on a physical server or host and therefore, lessens the hardware amount and enhances the resource utilization. The computing resource/node in cloud is used through the virtual machine. To address this problem, data centre resources have to be managed in resource -effective manner for driving Green Cloud computing that has been proposed in this work using Virtual machine concept with ABC and Neural Network optimization algorithm. The simulations have been carried out in CLOUDSIM environment and the parameters like SLA violations, Energy consumption and VM migrations along with their comparison with existing techniques will be performed.


Sign in / Sign up

Export Citation Format

Share Document