Wireless Body Area Networks have severe challenges in energy management to enhance the longevity of the system. Specifically, for a WBAN system that operates by ambient energy sources. The system combines energy scave...
详细信息
ISBN:
(纸本)9798400708107
Wireless Body Area Networks have severe challenges in energy management to enhance the longevity of the system. Specifically, for a WBAN system that operates by ambient energy sources. The system combines energy scavenging modules integrated into the sensors carried by patients, enabling data transmission to a personal device. Our approach does not rely on previous information as the characteristics of the scavenged and consumed energy are stochastic. To optimize user utility, a formulation of an optimization problem by employing the Grey Wolf Optimization technique (GWO) compared to previous works that used different optimization techniques, to decompose it into three sub-problems: battery management, collecting rate control, and transmission power allocation. To achieve our goals, we apply the GWO to the introduced online resource allocation algorithm that serves two primary purposes: (1) balancing energy scavenging and consumption of network nodes to ensure system stability, and (2) maximizing user utility. Through simulation results, we validate the effectiveness and optimization capabilities of the algorithm while applying a different optimization technique from the previous works maintained.
The aim of this paper is to establish the existence of at least two non-zero homoclinic solutions for a nonlinear Laplacian difference equation without using AmbrosettiRabinowitz type-conditions. The main tools are mo...
详细信息
The aim of this paper is to establish the existence of at least two non-zero homoclinic solutions for a nonlinear Laplacian difference equation without using AmbrosettiRabinowitz type-conditions. The main tools are mountain pass theorem and Palais-Smale compactness condition involving suitable functionals.
Web services have significantly expanded and become a key enabling technology for online data, application and resource sharing. Designing new methods for efficient and reliable web service recommendation has been of ...
详细信息
While the capabilities of generative foundational models have advanced rapidly in recent years, methods to prevent harmful and unsafe behaviors remain underdeveloped. Among the pressing challenges in AI safety, machin...
In the age of computer technology, new media art Technology has grown rapidly. The technology comprises virtual art, animation, digital art, computer graphics, 3D Art, sound art, video games, robotics, internet art, 3...
详细信息
We exhibit a uniform method for obtaining (wellfounded and non-wellfounded) cut-free sequent-style proof systems that are sound and complete for various classes of action algebras, i.e., Kleene algebras enriched with ...
详细信息
The field of Industrial Internet of Things (IIoT) is now being duly recognized as a revolutionary area in industrial automation. With the budding interest of knowledge discovery that helps the businesses in applying t...
详细信息
The field of Industrial Internet of Things (IIoT) is now being duly recognized as a revolutionary area in industrial automation. With the budding interest of knowledge discovery that helps the businesses in applying technology on a large scale, researchers are now faced with several major security concerns. Blockchain integration is one of the suggested applications of technology that could help secure the data during transmission, storage, and knowledge discovery. Moreover, by integrating smart contracts, a secure architecture could also assimilate accountability during data exchange. Thus, we propose a four-layer security architecture that isolates IIoT devices from user-oriented layers and maintains a record of all IIoT devices registered in the organization to prevent malicious devices from corrupting the database and discovery process. Further, by choosing proof of authority (PoA), we ensure the fair functioning of the Blockchain nodes. Through proxy re-encryption for clients, PoA consensus for Blockchain nodes, and Whitelist-based access control for IIoT Devices, we ensure the legitimacy of all participating nodes. We also implement a prototype using a private Ethereum network with proof of authority consensus and present the time taken for the entire exchange and the gas (ethereum currency) consumed per exchange by the contracts. Also we implemented the secure knowledge discovery to understand the significance of the developed scheme. The results show that the exchange can be implemented in an IIoT environment and work with a reasonable amount of resource consumption.
The authors consider conditions where the distribution of the components of the difference between two independent identically distributed random variables can be uniquely reconstructed with an accuracy of up to a shi...
The authors consider conditions where the distribution of the components of the difference between two independent identically distributed random variables can be uniquely reconstructed with an accuracy of up to a shift and reflection. This uniqueness is essential for solving a number of characterization problems in mathematical statistics. An algorithm for estimating the components is presented for when data are given in a symmetrized form.
In this paper, a multi-server resource loss system with resource requirement-dependent service times is considered. We develop a convolutional algorithm for the evaluation of the stationary probability distribution an...
详细信息
The paper analyzes the problem of improving the self-timed pipeline’s performance. The paper considers possible options for reducing the pipeline latency by decreasing the number of actively operating stages when cer...
The paper analyzes the problem of improving the self-timed pipeline’s performance. The paper considers possible options for reducing the pipeline latency by decreasing the number of actively operating stages when certain conditions occur, determined by the processed data value or an external signal. One stage bypassing becomes appropriate if it occurs in at least 64% of data processing operations, while two stage bypassing decreases the average pipeline latency if it occurs in 50% of operations.
暂无评论