With the growing demand for wireless networks, network traffic has surged, particularly involving large-scale data transmission. This results in an increased number of network security threats and the emergence of var...
详细信息
Every year, approximately 70,000 wildfires occur around the world. Forest fires can have a variety of negative effects on forest cover, soil, tree development, vegetation, and general flora and fauna. Fires destroy se...
详细信息
Recently,Internet of Things(IoT)has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track *** sensor network(WSN)is a vital element of IoT...
详细信息
Recently,Internet of Things(IoT)has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track *** sensor network(WSN)is a vital element of IoT paradigm since its inception and has developed into one of the chosen platforms for deploying many smart city application regions such as disaster management,intelligent transportation,home automation,smart buildings,and other such IoT-based *** routing approaches were extremely-utilized energy efficient approaches with an initial drive that is,for balancing the energy amongst sensor *** clustering and routing procedures assumed that Non-Polynomial(NP)hard problems but bio-simulated approaches are utilized to a recognized time for resolving such *** this motivation,this paper presents a new blockchain with Enhanced Hunger Games Search based Route Planning(BCEHGS-RP)scheme for IoT assisted *** presented BCEHGS-RP model majorly employs BC technology for secure communication in the IoT supportedWSN *** addition,an effective multihop route planning approach was designed by the use of EHGS *** proposed EHGS technique is derived from the concept of Hill Climbing strategy(HCS)and HGS ***,a fitness function with two parameters namely residual energy(RE)and intercluster distance to elect optimal *** performance validation of the BCEHGS-RP model is experimented with under diverse number of *** experimental outcomes highlighted the better performance of the BCEHGS-RP technique on recent approaches.
In earlier developments, CMOS technology played a great role in realizing majority identifiers. There are huge drawbacks that affect the circuit's performance. To overcome the drawbacks of CMOS-based majority Iden...
详细信息
This study explores cloud-based data mining algorithm integration in elevating smart city infrastructure management and decision support systems. Specifically, the authors focus on optimizing traffic management throug...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
During the Covid-19 pandemic, the insurance industry's digital shift quickened, resulting in a surge in insurance fraud. To combat insurance fraud, a system that securely manages and monitors insurance processes m...
详细信息
Authentication is a crucial step in the cyber security process that confirms user identities. Even though they are widely used, traditional password based techniques are frequently vulnerable to attacks like guessing ...
详细信息
Ordinal real-world data such as concept hierarchies, ontologies, genealogies, or task dependencies in scheduling often has the property to not only contain pairwise comparable, but also incomparable elements. Order di...
详细信息
Redundancy elimination techniques are extensively investigated to reduce storage overheads for cloud-assisted health *** eliminates the redundancy of duplicate blocks by storing one physical instance referenced by mul...
详细信息
Redundancy elimination techniques are extensively investigated to reduce storage overheads for cloud-assisted health *** eliminates the redundancy of duplicate blocks by storing one physical instance referenced by multiple *** compression is usually regarded as a complementary technique to deduplication to further remove the redundancy of similar blocks,but our observations indicate that this is disobedient when data have sparse duplicate *** addition,there are many overlapped deltas in the resemblance detection process of post-deduplication delta compression,which hinders the efficiency of delta compression and the index phase of resemblance detection inquires abundant non-similar blocks,resulting in inefficient system ***,a multi-feature-based redundancy elimination scheme,called MFRE,is proposed to solve these *** similarity feature and temporal locality feature are excavated to assist redundancy elimination where the similarity feature well expresses the duplicate ***,similarity-based dynamic post-deduplication delta compression and temporal locality-based dynamic delta compression discover more similar base blocks to minimise overlapped deltas and improve compression ***,the clustering method based on block-relationship and the feature index strategy based on bloom filters reduce IO overheads and improve system *** demonstrate that the proposed method,compared to the state-of-the-art method,improves the compression ratio and system throughput by 9.68%and 50%,respectively.
暂无评论