This article aims to investigate the characteristics of Ricci-Yamabe Soliton (briefly: (RYS)n). We study the cosmological models on (RYS)4 under Lorentzian para Sasakian (LPS)4 spacetime. Parallel Ricci tensor, Poisso...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ...
详细信息
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny *** it comes to deploying IoT,everyone agrees that security is the biggest *** is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square *** research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted *** lightweight cryptography,the information sent between these gadgets may be *** order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance *** also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio.
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy...
详细信息
Privacy and transparency in vote counting are the most prevalent concerns these days due to the involvement of untrusted authorities in the counting process. As a result, the counting process faces significant privacy, trust, and transparency hurdles. Hence, there is a need for an efficient and trusted mechanism to resolve such problems. Blockchain technology has the potential to bring transparency and trust in several applications. Therefore, in this work, we explore blockchain technology in conjunction with a secure partitioning scheme to promote transparency, trust, and privacy between users and participating authorities in a decentralized platform. This paper presents a chaincode-based implementation of our proposed secure and verifiable vote counting mechanism that enables trust and fairness over a decentralized platform. Multiple authorities participate in the vote counting process in a trusted manner to cooperate and coordinate in a decision process over a decentralized platform. Our research exhibits that blockchain technology can eliminate the trust gaps and increase transparency and fairness in the election and vote counting procedure. We register user votes in the blockchain platform based on the secret sharing mechanism to enable fairness and openness between counting authorities. Each vote is recorded into the distributed ledger to support openness and verifiability in our mechanism. The ledger is accessible to every registered user as per the permissioned blockchain policy. We created many authorities in the blockchain network and deployed multiple smart contracts on the Hyperledger platform to analyze the feasibility of our strategy. The performance results are obtained and reported using the Hyperledger Caliper benchmark tool. The results demonstrate that the proposed chaincode-based solution achieves the highest throughput at 200–400 tps for fetching and removing contracts. We achieve the optimal latency of 18.09 s for the vote distribution contract
This study evaluates the interval-valued availability of a linear consecutive k-out-of-n: F system while considering uncertainty, where the probability that the system will perform as intended is not known with precis...
详细信息
India's primary source of income is agriculture. Farmers in India have differing perspectives on how to integrate technology into their farming operations. However, farmers lack the knowledge necessary to put tech...
详细信息
The power sector is an important factor in ensuring the development of the national *** simulation and prediction of power consumption help achieve the balance between power generation and power *** this paper,a Multi...
详细信息
The power sector is an important factor in ensuring the development of the national *** simulation and prediction of power consumption help achieve the balance between power generation and power *** this paper,a Multi-strategy Hybrid Coati Optimizer(MCOA)is used to optimize the parameters of the three-parameter combinatorial optimization model TDGM(1,1,r,ξ,Csz)to realize the simulation and prediction of China's daily electricity ***,a novel MCOA is proposed in this paper,by making the following improvements to the Coati Optimization Algorithm(COA):(ⅰ)Introduce improved circle chaotic mapping strategy.(ⅱ)Fusing Aquila Optimizer,to enhance MCOA's exploration capabilities.(ⅲ)Adopt an adaptive optimal neighborhood jitter learning *** improve MCOA escape from local optimal solutions.(ⅳ)Incorporating Differential Evolution to enhance the diversity of the ***,the superiority of the MCOA algorithm is verified by comparing it with the newly proposed algorithm,the improved optimiza-tion algorithm,and the hybrid algorithm on the CEC2019 and CEC2020 test ***,in this paper,MCOA is used to optimize the parameters of TDGM(1,1,r,ξ,Csz),and this model is applied to forecast the daily electricity consumption in China and compared with the predictions of 14 models,including seven intelligent algorithm-optimized TDGM(1,1,r,ξ,Csz),and seven forecasting *** experimental results show that the error of the proposed method is minimized,which verifies the validity of the proposed method.
A self-organizing, reconfigurable, and structure-less wireless network that provides intended communications without any radio infrastructure is called the mobile ad hoc network (MANETs). It is generally utilized in s...
详细信息
A self-organizing, reconfigurable, and structure-less wireless network that provides intended communications without any radio infrastructure is called the mobile ad hoc network (MANETs). It is generally utilized in special outside occasions, locations, military surgeries, and natural disasters. In MANET, providing security is the primary issue because of the adoption of network structures. Moreover, the modifications in dynamic topologies expose the strike selection, such as routing, eavesdropping, and alteration of several programs. If MANET has several privacy and security issues, then it may surpass the quality of services (QoS). Hence, the security in MANET is guaranteed by using intrusion tracking approaches. This intrusion tracking system regulates the MANET in recognizing some other violation weaknesses. High protections are provided by detecting intrusions from the entire network, which includes attacks that are beyond the network layer. The nodes are not merely altered by the power collapse in the system, but it is also capable of transferring the packets in the network, which depends on the total system life. An effective routing protocol is designed to select the optimal paths for enhancing navigation in MANETs. Moreover, the terms secure routing and energy efficiency are critical problems when changing the network topology and limiting resources with this kind of network. A hybridized optimization-aided routing strategy is offered in this research work to provide an energy-efficient routing protocol. At the initial stage, the experimentation is conducted based on the sensor nodes in MANET. Since the existing models are ineffective in achieving high energy efficiency, the new routing protocol is developed by proposing the hybrid optimization algorithm. Accordingly, the suggested work is regarded for optimizing the shortest path in the routing model by using the Hybrid Sailfish Optimizer and Whale Optimization Algorithm (HS-WOA). To validate the network e
Global visual localization is critical for UAVs operating in environments where global navigation satellite systems (GNSS) are unreliable or unavailable. While many methods, such as visual odometry (VIO), rely on opti...
详细信息
Information about encryption and a dozen practical importance of it can be visualized in the last three decades due to the development in the field of computerscience data resource and Internet sharing. Re-visiting t...
详细信息
暂无评论