With the rapid development of WWW, text classification has become the key technology in organizing and processing large amount of text data. As a simple, effective and nonparametric classification method, k-NN method ...
详细信息
A miniaturized dual U-shaped patch antenna for WiFi-6E applications is designed and fabricated, with a size of 21.5×10×1.0 mm3. The antenna adopts a pair of U-shaped patches to minimize the length of the osc...
详细信息
Throughout the use of the small battery-operated sensor nodes encou-rage us to develop an energy-efficient routing protocol for wireless sensor networks(WSNs).The development of an energy-efficient routing protocol is...
详细信息
Throughout the use of the small battery-operated sensor nodes encou-rage us to develop an energy-efficient routing protocol for wireless sensor networks(WSNs).The development of an energy-efficient routing protocol is a mainly adopted technique to enhance the lifetime of *** routing protocols are available,but the issue is still *** is one of the most important techniques in the existing routing *** the clustering-based model,the important thing is the selection of the cluster *** this paper,we have proposed a scheme that uses the bubble sort algorithm for cluster head selection by considering the remaining energy and the distance of the nodes in each ***,the bubble sort algorithm chose the two nodes with the maximum remaining energy in the cluster and chose a cluster head with a small *** proposed scheme performs hierarchal routing and direct routing with some energy *** simulation will be performed in MATLAB to justify its performance and results and compared with the ECHERP model to justify its ***,the simulations will be performed in two scenarios,gate-way-based and without gateway to achieve more energy-efficient results.
It tends to become a trend of booking transportation through network equipment with the further integration of the Internet into people's life, and online car-hailing platforms have sprung up. However, a new socia...
With the rapid advancement of electric vehicle (EV) technology, EV has been emerging as a promising transportation due to the low carbon emission. However, the frequent and long time charging is indispensable to conti...
详细信息
The immediate international spread of severe acute respiratory syn-drome revealed the potential threat of infectious diseases in a closely integrated and interdependent *** an outbreak occurs,each country must have a ...
详细信息
The immediate international spread of severe acute respiratory syn-drome revealed the potential threat of infectious diseases in a closely integrated and interdependent *** an outbreak occurs,each country must have a well-coordinated and preventative plan to address the *** and Communication Technologies have provided innovative approaches to dealing with numerous facets of daily *** intelligent devices and applica-tions have become a vital part of our everyday lives,smart gadgets have also led to several physical and psychological health problems in modern ***,we used an artificial intelligence AI-based system for disease prediction using an Artificial Neural Network(ANN).The ANN improved the regularization of the classification model,hence increasing its *** unconstrained opti-mization model reduced the classifier’s cost function to obtain the lowest possible *** verify the performance of the intelligent system,we compared the out-comes of the suggested scheme with the results of previously proposed *** proposed intelligent system achieved an accuracy of 0.89,and the miss rate 0.11 was higher than in previously proposed models.
The deployment of sensor nodes is an important aspect in mobile wireless sensor networks for increasing network *** longevity of the networks is mostly determined by the proportion of energy consumed and the sensor no...
详细信息
The deployment of sensor nodes is an important aspect in mobile wireless sensor networks for increasing network *** longevity of the networks is mostly determined by the proportion of energy consumed and the sensor nodes’access *** optimal or ideal positioning of sensors improves the portable sensor networks *** and energy usage are mostly determined by successful sensor placement ***-inspired algorithms are the most effective solution for short sensor *** primary objective of work is to conduct a comparative analysis of nature-inspired optimization for wireless sensor networks(WSNs’)maximum network ***,it identifies quantity of installed sensor nodes for the given *** of algorithm has been identified based on value of optimized *** first half of the paper’s literature on nature-inspired algorithms is *** six metaheuristics algorithms(Grey wolf,Ant lion,Dragonfly,Whale,Moth flame,Sine cosine optimizer)are compared for optimal coverage of *** simulation outcomes confirm that whale opti-mization algorithm(WOA)gives optimized Energy with improved network coverage with the least number of *** comparison will be helpful for researchers who will use WSNs in their applications.
Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the *** have been several reported high-profile ransomware attacks including WannaCry,P...
详细信息
Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the *** have been several reported high-profile ransomware attacks including WannaCry,Petya,and Bad Rabbit resulting in losses of over a billion dollars to various individuals and businesses in the *** analysis of ransomware is often carried out via sandbox environments;however,the initial setup and configuration of such environments is a challenging ***,it is difficult for an ordinary computer user to correctly interpret the complex results presented in the reports generated by such environments and analysis *** this research work,we aim to develop a user-friendly model to understand the taxonomy and analysis of ransomware ***,we aim to present the results of analysis in the form of summarized reports that can easily be understood by an ordinary computer *** model is built on top of the well-known Cuckoo sandbox environment for identification of the ransomware as well as generation of the summarized *** addition,for evaluating the usability and accessibility of our proposed model,we conduct a comprehensive user survey consisting of participants from various fields,e.g.,professional developers from software houses,people from academia(professors,students).Our evaluation results demonstrate a positive feedback of approximately 92%on the usability of our proposed model.
Wireless network technology has developed rapidly and been widely used in different forms, such as Wireless LAN (WLAN), Wireless Sensor Network (WSN) and the 3G Mobile Communications. As one core curriculum of IT majo...
详细信息
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide ***,it has attracted increasing attention from industr...
详细信息
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide ***,it has attracted increasing attention from industry and *** blockchain is based on a distributed network and has the characteristics of non-tampering and traceability of block *** is thus naturally able to solve the security problems of the sensor ***,this paper first analyzes the security risks associated with data storage in the sensor networks,then proposes using blockchain technology to ensure that data storage in the sensor networks is *** the traditional blockchain,the data layer uses a Merkle hash tree to store data;however,the Merkle hash tree cannot provide non-member proof,which makes it unable to resist the attacks of malicious nodes in *** solve this problem,this paper utilizes a cryptographic accumulator rather than a Merkle hash tree to provide both member proof and non-member ***,the number of elements in the existing accumulator is limited and unable to meet the blockchain’s expansion *** paper therefore proposes a new type of unbounded accumulator and provides its definition and security ***,this paper constructs an unbounded accumulator scheme using bilinear pairs and analyzes its performance.
暂无评论