Conventional communication methods such as mobile phones, satellite communication, and Wi-Fi face significant challenges in remote or underserved areas. Mobile phones often fail due to low signals or lack of towers, s...
详细信息
This paper explores essential parameters in Large-Scale and Small-Scale fading in wireless mobile communication. Small-Scale fading, represented by the Nakagami-m model, and Large-Scale fading, involving Log-Normal Sh...
详细信息
The Internet of Things (IoT) has revolutionized the way data is handled and collected, allowing for large amounts of information to be revolutionized quickly and efficiently. This has paved the way for Machine Learnin...
详细信息
The rapid development and quality of services (QoS) for any business is possible through cloud computing. This study has proposed a dynamic model for customer feedback system based on the existing system and cloud com...
详细信息
In this paper, the location estimation of sensor nodes in wireless sensor networks is improved using optimization. The algorithms from the domain of evolutionary computing (EC) are used for reducing the error that occ...
详细信息
This thesis studies the trust evaluation method of relay nodes in wireless communication networks. The relay nodes of wireless communication network play a key role in the process of data transmission, so it is very i...
详细信息
Nowadays, data transfer has been vast online and on social media. Hence data security in the various cloud environments has been enabled to send and receive data. While transferring the data, some issues in the cloud ...
详细信息
ISBN:
(纸本)9798350391558;9798350379990
Nowadays, data transfer has been vast online and on social media. Hence data security in the various cloud environments has been enabled to send and receive data. While transferring the data, some issues in the cloud environment are the lack of connectivity, control, and the insecurity of the password and the data. To handle this problem, data security and the internet connection have to be enabled for the cloud environments. The method of homomorphic encryption and the transport layer security protocol have been enabled for the analysis. The homomorphic encryption method converts the data to the ciphertext for making the text in the original format. Then the transport layer security protocol is used to authenticate the data, and the data integrity of the communication can be executed. The proposed system performs better than current protocols like Dynamic Level Based Integrity Checking Protocol, TLS protocol, and Lightweight Cryptosystem, making it a potential option for jobs involving safe and effective cloud information processing. Overall, the proposed Two-tier Homomorphic Encryption system exhibits improved execution time, security strength, resource utilization, communication overhead, and user satisfaction. It addresses issues such as connectivity gaps, control deficiencies, and password and data insecurity, making it an effective method for boosting cloud security in quantum cloud computing environments.
This paper investigates joint power and channel allocation under fading communication channels using Deep Reinforcement Learning (DRL). To this end, we design a DRL to allocate dynamic resources with different network...
详细信息
In the past decade, mobile computing has spurred the development of diverse user-centric applications, enhancing the capabilities of service providers and government entities. Recognizing the security flaws of passwor...
详细信息
Underwater Wireless communicationsystems deployed by the military helps build a strong marine defense security of a nation state. An Underwater Acoustic Modem (UAM) is the heart of the Underwater Wireless Sensor Netw...
详细信息
暂无评论