Implementing Resource-Aware Scheduling Algorithm for Improving Cost Optimization in Cloud Computing
Source Title: 2025 4th International Conference on Sentiment Analysis and Deep Learning (ICSADL), DOI Link
						View abstract ⏷
					
An uncountable number of computational resources are shared for various applications using a transformative technology called Cloud Computing. It is an emerging technology that can offer scalable and on-demand resources. However, cost optimization and resource allocation are critical issues due to the increasing number of cloud user and their request. It can be solved by optimising resource allocation by reducing the task/user queue. It is possible only if the requested resource is free; otherwise, it must schedule the same or relevant resource. This paper demonstrates a Resource-Aware Scheduling (RAS) algorithm to increase the speed of resource allocation by mapping the user request with the resource availability. The proposed algorithm examines the log information of the resources, workload behaviour, resource availability, price, task efficiency, and reduced wastage and allocates the resources dynamically. To do that, it maps user information with resource information and schedules based on availability and priority. The simulation-based experiment is carried out in a private cloud space and demonstrates the resource allocation, utilization, response time, and cost. It is also compared with the traditional scheduling algorithm to evaluate the performance of the RAS. The evaluation found that the RAS model is more suitable for cloud resource allocation.
An alignment-free secure fingerprint authentication integrated with elliptic curve signcryption scheme
Dr Dilip Kumar Vallabhadas, Jignesh Kukadiya., Mulagala Sandhya., I Hhntv Prasad., Rithvik Mooda
Source Title: Journal of Information Security and Applications, Quartile: Q1, DOI Link
						View abstract ⏷
					
Fingerprint authentication is a widely used method to verify someones identity by analysing unique fingerprint features, such as ridges and specific points called minutiae. However, there are concerns about its vulnerability to fake fingerprints and privacy issues. Cancellable biometrics is a promising solution to tackle these concerns. It transforms fingerprint features into secure forms that cannot be reversed back to the original, even if someone gets hold of them. This paper proposes an alignment-free secure fingerprint authentication method that integrates minutiae point descriptors and Scale Invariant Feature Transform (SIFT) keypoint descriptors, enhanced with Elliptic Curve signcryption, aiming to fortify security without compromising authentication accuracy. Experimental evaluations were conducted using the Fingerprint Verification Competition (FVC) 2002 dataset, showcasing the efficacy of the proposed approach. Experimental results demonstrate a significant reduction in security risks while upholding authentication accuracy, thus affirming the effectiveness of our methodology in enhancing fingerprint authentication security.
Cancelable scheme for bimodal biometric authentication
Source Title: Journal of Electronic Imaging, Quartile: Q3, DOI Link
						View abstract ⏷
					
The use of a biometric authentication system (BAS) for reliable automatic human recognition has increased exponentially over traditional authentication systems in recent years. Multimodal BAS was introduced to solve unimodal BAS's difficulties and improve security. Privacy and security are two significant concerns to be addressed in BAS, as biometric traits are irrevocable. Researchers employed cancelable biometrics in the past few years to propose several privacy-preserving BAS. We propose a privacy-preserving bimodal cancelable BAS (PPBCBAS) to overcome these problems. The traits used in our method are iris and fingerprint. Features are extracted from both the traits, and feature level fusion is done by concatenating the feature vectors of iris and fingerprint. PPBCBAS uses a quotient filter to generate the cancelable template, and the comparison is made on these transformed templates using the modified Hamming distance. PPBCBAS has been tested on three publicly available databases to analyze its efficiency. PPBCBAS satisfies the diversity, irreversibility, and revocability properties and achieves decent performance.
Leukocyte Subtyping Using Convolutional Neural Networks for Enhanced Disease Prediction
Source Title: Lecture Notes in Electrical Engineering, Quartile: Q4, DOI Link
						View abstract ⏷
					
Deep learning shown its potential in a variety of medical applications and proved as a count on by people as a step ahead approach compared to traditional machine learning models. Moreover, the other implementations of these models such as the convolutional neural networks (CNNs) provide extensive applications in the field of medicine, which usually involves processing and analysis of a large dataset. This paper aims to create a CNN model which can solve the problem of white blood cell subtyping which is a daunting one in clinical processing of blood. The manual classification of white blood cells in laboratory is a time-consuming process which gives rise to the need for an automated process to perform the task. A CNN-based machine learning model is developed to classify the leukocytes into their proper subtypes by performing tests on a dataset of around twelve thousand images of leukocytes and their types, and a wide range of parameters is evaluated. This model can automatically classify the white blood cells to save manual labor, time and improve efficiency. Further, pretrained models like Inception-v3, VGGNet and AlexNet are used for the classification, and their performance is compared and analyzed.