Routing is considered the most significant part of any wireless system, and vehicular network depends on Adhoc On-demand Distance Vector (AODV) routing mostly for routing purposes. To adapt to the dynamic topology of ...
Routing is considered the most significant part of any wireless system, and vehicular network depends on Adhoc On-demand Distance Vector (AODV) routing mostly for routing purposes. To adapt to the dynamic topology of the vehicular network, different variations of AODV routing are adopted, and there have some event-driven limitations considering different performance metrics. In this paper, we propose a variant of AODV routing hop restricted-AODV (HR-AODV) that limit searching for receiver up to a maximum of four hops and completes data transmission. We simulate the protocol on two channels; LOS-driven two-ray ground and Non-LOS multipath fading channel Rayleigh channel. We found that different performance metrics like packet delivery ratio (PDR), delay, overhead, and throughput follows the trend regarding AODV performances mentioned by Hota et al. [18]. the results indicate that; our proposed protocol is suitable for routing in vehicular networks.
Fault detection is a fundamental element for management, replication, load balancing, and other services of large-scale distributed systems. But the fault detection services in such systems scale badly in the number o...
详细信息
Microservices-based software architecture promotes scalability and flexibility by breaking down a software application into smaller modules and making it more independent and loosely coupled services compared to monol...
Microservices-based software architecture promotes scalability and flexibility by breaking down a software application into smaller modules and making it more independent and loosely coupled services compared to monolithsystems. However, securing microservices in a distributed nature has become one of the challenges. Authentication is one of the most critical components that should be focused in the microservices security measures. It helps to identify that only authenticated personnel and services can access sensitive information and secure the trust between microservices. this discussion paper aims to provide an overview analysis and extensive understanding on the authentication mechanism in microservices-based software architecture. In this study, we explore different authentication mechanisms including Mutual Transport Layer Security (mTLS), Token based authentication and API Gateway authentication. this study examines the strengths and limitations of different authentication mechanisms in microservices-based software architecture. It also emphasizes the importance of authentication and the need for having a well-designed authentication mechanism to ensure the integrity and security of microservices-based software architecture is crucial.
With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. In this research, a Crow Search Algorithm (CSA)-based meta...
With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. In this research, a Crow Search Algorithm (CSA)-based metaheuristic strategy for feature extraction in HCR was developed. the data representation method employed was Freeman Chain Code (FCC). the fundamental issue with using FCC to represent a character is that the outcomes of the extractions depend on the starting points that changed the chain code's route length. the shortest route length and least amount of computational time for HCR were found using the metaheuristic technique via CSA, which was suggested as a solution to this issue. the suggested CS-FCC extraction algorithm's computation durations and route lengths serve as performance indicators. the algorithm experiments are carried out using the chain code representation created from previous research of the Centre of Excellence for Document Analysis and Recognition (CEDAR) dataset, which consists of 126 upper-case letter characters. According to the results, the proposed CS-FCC has a route length of 1880.28 and only takes 1.10 seconds to solve the entire set of character images.
作者:
Sussman, Gerald JayMIT
Dep of Electrical Engineering & Computer Science Cambridge MA USA MIT Dep of Electrical Engineering & Computer Science Cambridge MA USA
softwareengineering needs appropriate tools to support each of the phases of the engineering process. there must be tools to aid with specification and modelling, with synthesis and analysis, with rapid-prototyping a...
详细信息
ISBN:
(纸本)0818606207
softwareengineering needs appropriate tools to support each of the phases of the engineering process. there must be tools to aid with specification and modelling, with synthesis and analysis, with rapid-prototyping and debugging, with documentation, verification, and testing, and with maintenance of finished products. In addition there must be environmental tools to support the engineering process in the large. Artificial intelligence research often uses programs as theoretical constructs, akin to equations and schematic diagrams, but withthe added feature that programs that embody parts of a theory of the design of programs can be used as tools in the process of theory construction (or software development). Most AI experiments are formulated in Lisp. Lisp has developed into a uniquely powerful and flexible family of software development tools, providing wrap-around support for the rapid-prototyping of softwaresystems.
Multipath TCP (MPTCP) offers better performance, throughput, and resilience in connection failure cases by dividing the flow into multiple subflows and submitting them over many paths. Generally, MPTCP has a perfect i...
详细信息
A system to insert visual objects into real image sequences in real time is presented. the system consists of off-the-shelf hardware and software. the system uses a region tracking algorithm based on a normalized affi...
详细信息
A system to insert visual objects into real image sequences in real time is presented. the system consists of off-the-shelf hardware and software. the system uses a region tracking algorithm based on a normalized affine warp that accounts for the motion of smooth planar patches and compensates for changes in illumination.
DASOM (computer aided SDL-oriented methodology) is a system development tool which provides computer support to specification and design, and also provides support for implementation, production, and maintenance of so...
详细信息
ISBN:
(纸本)0818606207
DASOM (computer aided SDL-oriented methodology) is a system development tool which provides computer support to specification and design, and also provides support for implementation, production, and maintenance of softwaresystems in the communication and process control areas. the tool is based on a softwareengineering methodology called SOM (SDL-oriented methodology). this includes the internationally standardized Specification and Description Language (SDL) defined by CCITT. the use of DASOM increases productivity and quality significantly. the estimated productivity increase is 20-70%. Higher quality is achieved because a formalized methodology is used in combination with syntax and consistency checks provided by the tool.
Due to the high quality demands in the manufacturing industry, there is a need for strict and reliable quality inspection processes and/or systems. In Honduras there is a large need for robot implementations, some of ...
详细信息
ISBN:
(纸本)9798350345650
Due to the high quality demands in the manufacturing industry, there is a need for strict and reliable quality inspection processes and/or systems. In Honduras there is a large need for robot implementations, some of the main reasons for a lack of high use levels are insufficient financial and training resources. the main objective of this study is to offer a robotic end effector capable of detecting and calculation the dimension of objects in a 2D plane using a lidar sensor and by way of the development of a measurement algorithm using computer vision. Withthe tools and guidelines obtained using the hierarchical method t was possible to develop a 2D measurement system for implementation in robots used for industrial parts verification. the system counts withthe capability to auto adjust and take into account the distance at which the camera is located when detecting and thus measuring object. it is able to measure a number of object obtaining there height and width. the values for precision of the system are 88% obtaining the height and 85% calculating the width. Confirming that the development is capable of detection and measuring object in a 2D plane.
this article discusses the development of a system for facilitating the registration of student attendance in lectures, exercises, and laboratory sessions - CountMe, which has been tested in the 'Java Programming&...
详细信息
暂无评论