JOURNAL OF ADVANCED APPLIED SCIENTIFIC RESEARCH
http://mail.joaasr.com/index.php/joaasr
<p>Journal of advanced applied scientific research (JOAASR) is an entrenched podium for scientific exchange among applied scientific research. The journal aims to publish papers dealing with novel experimental and theoretical aspects of applied scientific research. The focus is on fundamental and advance papers that understanding of applied scientific research. JOAASR incorporates innovations of the novel theoretical and experimental approaches on the quantitative, qualitative and modeling of advanced scientific concepts.</p>Jamal Mohamed College Publicationen-USJOURNAL OF ADVANCED APPLIED SCIENTIFIC RESEARCH2454-3225Optimizing Performance of Cloud Infrastructure Through Effective Resource Scheduling
http://mail.joaasr.com/index.php/joaasr/article/view/748
<p>Cloud computing has emerged as a very promising technology that has garnered significant interest from both industry professionals and academic researchers. Cloud computing service models refer to the various types of services that are provided, including hardware and software infrastructure, platforms for application development, testing, and deployment, as well as enterprise software that is readily available for usage through subscription. Public cloud computing involves the delegation of IT infrastructure, storage, or applications to an external service provider. The presence of a cloud infrastructure also signifies the existence of geographically distributed computing resources. The utilisation of resources in conjunction with cloud computing is not exclusive to large-scale organisations, as it may be employed by entities of any size. Numerous services are offered based on a fee-for-use model, rendering them cost-effective for organisations of various sizes. Cloud service providers are obligated to provide consumers with cloud services on demand, as there is a growing need for such services. This requirement stems from the necessity to decrease the size of large data volumes, which in turn leads to cost savings in maintaining extensive storage systems. The overall effectiveness of cloud computing environments is directly related to the operational performance of cloud infrastructure. This phenomenon holds substantial significance in the realm of optimization, since it enhances the overall efficiency of the underlying cloud architecture. The proposed technique exhibits a significant effectiveness in enhancing cloud performance, as it manifests improvements for both service providers and cloud customers.</p> <p><strong>Key Words: </strong>Cloud Computing, Task Scheduling, Cloud Infrastructure, Resource Scheduling, Performance Analysis and Infrastructure as Service.</p>M.AbdullahDr. M. Mohamed Surputheen
Copyright (c) 2024 JOURNAL OF ADVANCED APPLIED SCIENTIFIC RESEARCH
https://creativecommons.org/licenses/by-nc-nd/4.0
2024-02-262024-02-266110.46947/joaasr612024748A Multilayer Data Security Using Matrix Transformation and RSA For Public Cloud Storage
http://mail.joaasr.com/index.php/joaasr/article/view/776
<p>Cloud computing is an internet-based system that allows clients to access computers, software, infrastructure, devices, and other resources through a subscription model. Data security is a major concern for the cloud computing model. Data security is a research challenge in any cloud environment. When cloud users upload their confidential and secret data through the cloud, the security of this data must be ensured. In order to improve data security, a new method is presented in this paper. The approach uses ten random prime integers to compute the public and safe private keys after transforming user data into a matrix format. The encrypted content is then decrypted using the secured private key, improving total data security. The Hackman tool is used to analyse the encryption and decryption times as well as the security level. The OPNET tool measures the power of encryption and decryption. The findings indicate that all five potential file sizes for the proposed algorithm's parameters have the highest value. The cypher text was analysed using this suggested technique using brute force and dictionary attacks. This method is more effective, more secure, and impenetrable.</p>kamal
Copyright (c) 2024 JOURNAL OF ADVANCED APPLIED SCIENTIFIC RESEARCH
https://creativecommons.org/licenses/by-nc-nd/4.0
2024-03-222024-03-226110.46947/joaasr612024776Detection and Removal of Assymmetrical Skin Lesions Using DU-Net for Patch Extraction
http://mail.joaasr.com/index.php/joaasr/article/view/797
<p id="E253" class="x-scope qowt-word-para-2">This study presents DSeg-net, a novel method for accurately identifying and removing<br />pigmented skin lesions from dermoscopic images, crucial for timely diagnosis and management<br />of melanoma. DSeg-net combines deep convolutional neural networks, particularly YOLOv5, for<br />patch detection, asymmetrical patch contouring for edge preservation, and clustering techniques<br />for patch extraction. Additionally, it employs De Trop Noise Exclusion with in-painting to<br />eliminate hair from challenging dataset images. The method involves rigorous annotation of skin<br />images with lesions of varying sizes and shapes using rectangle bounding, followed by fine-<br />tuning YOLOv5 hyperparameters for high-confidence multiple lesion detection. Despite<br />complex textures and unclear boundaries, DSeg-net consistently detects and labels patches,<br />accurately segmenting areas of skin pathology. Evaluation on various datasets demonstrates that<br />the proposed segmentation techniques achieve an overall average accuracy of approximately<br />92% to 94%.</p>Gopikha SBalaMurugan M
Copyright (c) 2024 JOURNAL OF ADVANCED APPLIED SCIENTIFIC RESEARCH
https://creativecommons.org/licenses/by-nc-nd/4.0
2024-02-262024-02-266110.46947/joaasr612024797