Clone node attack in IoT sensor devices remains a grave security concern as it paves the way for sinkhole, wormhole, and selective forwarding attacks. In this paper, a two-level authentication scheme named Fingerprint...
详细信息
Clone node attack in IoT sensor devices remains a grave security concern as it paves the way for sinkhole, wormhole, and selective forwarding attacks. In this paper, a two-level authentication scheme named Fingerprint-based Zero-Knowledge Authentication (FZKA) algorithm is proposed to improve the detection rate of clone node among the sensor devices. In the fingerprint generation phase, the base station calculates a distinct fingerprint value for each and every node in the network by gathering neighborhood information, represented in the form of superimposed s-disjunct code matrix. The calculated fingerprint is considered as a secret value and distributed to each cluster nodes for the process of authentication. The FZKA algorithm improves the cloned node detection accuracy with minimal detection time. The simulation results highlight the cloned node detection rate of the proposed scheme by a margin of 92.5% against the existing Exponential Smoothing algorithm (ETS), Position Verification Method, and Message Verification and Passing algorithms.
This paper presents a new intuitionistic fuzzy cmeans (IFCM) clustering algorithm by adapting a new method to calculate the hesitation degree of data point in cluster. From the definition of fuzzy entropy, if a cluste...
详细信息
ISBN:
(纸本)9781479925650
This paper presents a new intuitionistic fuzzy cmeans (IFCM) clustering algorithm by adapting a new method to calculate the hesitation degree of data point in cluster. From the definition of fuzzy entropy, if a clustering result of a data point has bigger fuzzy entropy, the clustering result should have more uncertainty. It means that we have insufficient information to deal with the clustering of a data point, so the hesitation degree of clustering result of the data point should be greater. Form this opinion, a mathematical model is applied to calculate the hesitation degree of clustering of data point based on fuzzy entropy is given. An IFCM clustering algorithms is present. Experiments are performed using two-dimensional synthetic data-sets referred from previous papers. Results have shown that proposed algorithm is not only effective for linear and nonlinear separation, but also able to describe more information comparing to fuzzy c-means clustering algorithm.
When water and solutes enter the plant root through the epidermis, organic contaminants in solution either cross the root membranes and transport through the vascular pathways to the aerial tissues or accumulate in th...
详细信息
When water and solutes enter the plant root through the epidermis, organic contaminants in solution either cross the root membranes and transport through the vascular pathways to the aerial tissues or accumulate in the plant roots. The accumulation of contaminants in plant roots and edible tissues is measured by root concentration factor (RCF) and fruit concentration factor (FCF). In this paper, 1) a neural network (NN) was applied to model RCF based on physicochemical properties of organic compounds, 2) correlation and significance of physicochemical properties were assessed using statistical analysis, 3) fuzzy logic was used to examine the simultaneous impacts of significant compound properties on RCF and FCF, 4) a clustering algorithm (k-means) was used to identify unique groups and discover hidden relationships within contaminants in various parts of the plants. The physicochemical cutoffs achieved by fuzzy logic for the RCF and the FCF were compared versus the cutoffs for compounds that crossed the plant root membranes and found their way into transpiration stream (measured by transpiration stream concentration factor, TSCF). The NN predicted the RCF with improved accuracy compared to mechanistic models. The analysis indicated that log K-ow, molecular weight, and rotatable bonds are the most important properties for predicting the RCF. These significant compound properties are positively correlated with RCF while they are negatively correlated with TSCF. Comparing the relationships between compound properties in various plant tissues showed that compounds detected in the edible parts have physicochemical cutoffs that are more like the compounds crossing the plant root membranes (into xylem tissues) than the compounds accumulating in the plant roots, with clear relationships to food security. The cluster analysis placed the contaminants into three meaningful groups that were in agreement with the results of fuzzy logic. (C) 2019 Elsevier B.V. All rights reserved
Personalized education aims to provide cooperative and exploratory courses for students by using computer and network technology to construct a more effective cooperative learning mode, thus improving students' co...
详细信息
Personalized education aims to provide cooperative and exploratory courses for students by using computer and network technology to construct a more effective cooperative learning mode, thus improving students' cooperation ability and lifelong learning ability. Based on students' interests, this paper proposes an effective student grouping strategy and group-oriented course recommendation method, comprehensively considering characteristics of students and courses both from a statistical dimension and a semantic dimension. First, this paper combines term frequency-inverse document frequency and Word2Vec to preferably extract student characteristics. Then, an improved K-means algorithm is used to divide students into different interest-based study groups. Finally, the group-oriented course recommendation method recommends appropriate and quality courses according to the similarity and expert score. Based on real data provided by junior high school students, a series of experiments are conducted to recommend proper social practical courses, which verified the feasibility and effectiveness of the proposed strategy.
In this paper, a clustering protocol for Embedded Agent sensor network is proposed. In LEACH protocol, the selection probability P of candidate cluster head is constant without thinking about residual energy, which ca...
详细信息
ISBN:
(纸本)9783037858431
In this paper, a clustering protocol for Embedded Agent sensor network is proposed. In LEACH protocol, the selection probability P of candidate cluster head is constant without thinking about residual energy, which caused the lower residual energy easy to be the candidate cluster head. Compared with traditional structure of wireless sensor network, parameter was optimized. The confidence of the node, select probability and residual energy are the parameter of candidate cluster head, communication cost as the parameter of final cluster node. Compared with LEACH and ASCH, EACA take more parameters than LEACH. Results show that EACA can balance the energy load in the network, and effectively reduce more energy consumption.
In March 2021, the New York City Department of Health and Mental Hygiene (NYCDOHMH) received a supply of single-dose Janssen COVID-19 vaccines to vaccinate the city's patients who are homebound, but they needed as...
详细信息
One of the most popular techniques for computer-assisted solution estimates for magnetics and gravity field data is Werner deconvolution. The approaches frequently produce erratic results and may not always forecast t...
详细信息
One of the most popular techniques for computer-assisted solution estimates for magnetics and gravity field data is Werner deconvolution. The approaches frequently produce erratic results and may not always forecast the maximum number of the geologic entity that produces them due to the intrinsic instability of potential field data. This led to the application of the K-means machine learning algorithm to further enhance the detection of the geologic potential field-generated bodies. Two substances that resembled dikes were combined to form a synthetic magnetic model. Random noise was added to the synthetic data, to make the solutions a bit more complex. Werner deconvolution technique was applied to the synthetic model to generate solutions. K-means unsupervised machine learning algorithm was applied to the generated solutions created by the synthetic data. We further applied this algorithm to real data sets from a mining site. The clustering result shows a good spatial corre-spondence with the geologic model, and the method was able to estimate the precise location and depth of the dike bodies. The proposed method is entirely data-driven and has proven to work in the presence of noise.
Based on hybrid cellular automata (HCA), we present a two-scale optimization model for heterogeneous structures with non-uniform porous cells at the microscopic scale. The method uses theK-means clustering algorithm t...
详细信息
Based on hybrid cellular automata (HCA), we present a two-scale optimization model for heterogeneous structures with non-uniform porous cells at the microscopic scale. The method uses theK-means clustering algorithm to achieve locally nonperiodicity through easily obtained elemental strain energy. This energy is used again for a two-scale topological optimization procedure without sensitivity analysis, avoiding drastically the computational complexity. Both the experimental tests and numerical results illustrate a significant increase in the resulting structural stiffness with locally nonperiodicity, as compared to using uniform periodic cells. The effects of parameters such as clustering number and adopted method versus classical Optimality Criteria (OC) are discussed. Finally, the proposed methodology is extended to 3D two-scale heterogeneous structure design.
The detection of useful patterns in large datasets has attracted considerable interest recently. The hierarchical K-means clustering algorithm (HKM) is very efficient in large scale data analysis. It has been extensiv...
详细信息
ISBN:
(纸本)9781479916030
The detection of useful patterns in large datasets has attracted considerable interest recently. The hierarchical K-means clustering algorithm (HKM) is very efficient in large scale data analysis. It has been extensively used for building visual vocabulary in large scale image/video retrieval. However, the accuracy and speed of HKM still have room for improvement. In this paper, we propose a Parallel N-path labeling HKM clustering algorithm (PNHKM) which improves on the HKM clustering algorithm in the following ways. Firstly, we adopt a Greedy N-best Paths Labeling (GNPL) method to improve the clustering accuracy. Secondly, we focus on developing a parallel clustering algorithm for multicore processors. Our results confirm that the PNHKM is much faster and more effective.
Darwinian evolution is a population-level phenomenon. This paper deals with a structural population concept within the framework of generalized Darwinism (GD), resp. within a generalized theory of evolution. According...
详细信息
Darwinian evolution is a population-level phenomenon. This paper deals with a structural population concept within the framework of generalized Darwinism (GD), resp. within a generalized theory of evolution. According to some skeptical authors, GD is in need of a valid population concept in order to become a practicable research program. Populations are crucial and basic elements of any evolutionary explanation-biological or cultural-and have to be defined as clearly as possible. I suggest the "causal interactionist population concept" (CIPC), by R. Millstein for this purpose, and I will try to embed the approach into a generalized evolutionary perspective by mathematically formalizing its key definitions. Using graph-theory, (meta-) populations as described in the CIPC can serve as proper clusters of evolutionary classification based on the rates of interactions between their elements. I will introduce the concept of a cohesion index (CI) as a measurement of possible population candidates within a distribution of elements. The strength of this approach lies in its applicability and interactions are relatively easy to observe. Furthermore, problems of clustering tokens (e.g. of cultural information) via typicality, e.g. their similarity in intrinsic key characteristics, can be avoided, because CIPC is a (mainly) external approach. However, some formal problems and conceptual ambiguities occur within a simple version of this CI, which will be addressed in this paper as well as some possible applications.
暂无评论