Assuring high performance is one of the most important factors when building computerized systems. In distributed component-based systems different configurations and workloads are common. Over the years, many approaches were proposed to analyse, predict, measure and evaluate the performance of component-based distributed systems in an attempt to improve its performance. Higher performance results in better utilization of system resources, high throughput and quick response time of user requests. In this paper, we extend the work of the E-Avala approach to improve the overall performance of the proposed approach by adding power processing capabilities. The proposed approach has been implemented and compared with previous approach using Arena simulation with varying configuration parameters. Comparative results show that the proposed approach has given better performance with different levels of processing powers.
In this article, a high-sensitive approach for detecting tampering attacks on transmitted Arabic-text over the Internet (HFDATAI) is proposed by integrating digital watermarking and hidden Markov model as a strategy for soft computing. The HFDATAI solution technically integrates and senses the watermark without modifying the original text. The alphanumeric mechanism order in the first stage focused on the Markov model key secret is incorporated into an automated, null-watermarking approach to enhance the proposed approach's efficiency, accuracy, and intensity. The first-level order and alphanumeric Markov model technique have been used as a strategy for soft computing to analyze the text of the Arabic language. In addition, the features of the interrelationship among text contexts and characteristics of watermark information extraction that is used later validated for detecting any tampering of the Arabic-text attacked. The HFDATAI strategy was introduced based on PHP with included IDE of VS code. Experiments of four separate duration datasets in random sites illustrate the fragility, efficacy, and applicability of HFDATAI by using the three common tampering attacks i.e., insertion, reorder, and deletion. The HFDATAI was found to be effective, applicable, and very sensitive for detecting any possible tampering on Arabic text.
In recent years, there has been an increasing demand to improve cellular communication services in several aspects. The aspect that received the most attention is improving the quality of coverage through using smart antennas which consist of array antennas. this paper investigates the main characteristics and design of the three types of array antennas of the base station for better coverage through simulation (MATLAB) which provides field and strength patterns measured in polar and rectangular coordinates for a variety of conditions including broadsides, ordinary End-fire, and increasing directivity End-fire which is typically used in smart antennas. The method of analysis was applied to twenty experiments of process design to each antenna type separately, so sixty results were obtained from the radiation pattern indicating the parameters for each radiation pattern. Moreover, nineteen design experiments were described in this section. It is hoped that the results obtained from this study will help engineers solve coverage problems as well as improve the quality of cellular communication networks.
Content authentication, integrity verification, and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology. In this paper, a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking (SFASCDW) is proposed for content authentication and tampering detection of English text. A first-level order of alphanumeric mechanism, based on hidden Markov model, is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach. The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text. Moreover, he extracts the features of the interrelationship among the contexts of the text, utilizes the extracted features as watermark information, and validates it later with the studied English text to detect any tampering. SFASCDW has been implemented using PHP with VS code IDE. The robustness, effectiveness, and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks, namely insertion, reorder, and deletion. The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.