The threat posed by phishing websites is significant in the digital era due to the widespread use of online activities, which has prompted the need for a comprehensive remedy. The project involves building a website t...
详细信息
This research study focuses on video categorization, which is a crucial area of computer vision with uses in entertainment, education, and surveillance. Convolutional Neural Networks (CNNs) are used in a two-stage app...
详细信息
3D point cloud classification is one of the important tasks before autonomous driving technology. However, the traditional PointNet++ algorithm has some limitations, such as sensitivity to noise and outliers, and high...
详细信息
Traditional Internet protocol networks cannot provide the service of selecting a secure path to transmit various types of data with specific security ***,to solve the“secure path transmission”problem,this paper firs...
详细信息
Traditional Internet protocol networks cannot provide the service of selecting a secure path to transmit various types of data with specific security ***,to solve the“secure path transmission”problem,this paper first proposes a search-transmit model for secure network path transmission,i.e.,to find a multi-attribute optimized path that meets the specific security requirements in the search phase,and then transmit the packets along the optimized path in the transmission ***,we propose a solution to the search-transmit *** idea of the solution is to use the particle swarm optimization algorithm to search for a secure path that meets the multi-attribute requirements and then set the source route on the router to control the packet ***,a prototype system based on network function virtualization is developed to evaluate the feasibility and performance of the proposed *** results show that the proposed solution outperforms existing algorithms in terms of performance.
The rising need for tomato cultivation has raised concerns about detecting and diagnosing diseases affecting tomato plants. Tomato leaf disease prediction faces several challenges, including the variability of symptom...
详细信息
Precision agriculture, or precision farming, or smart farming, refers to a contemporary approach that combines technology and data analytics with agricultural practices. This research paper examines the concept of pre...
详细信息
Cyberbullying and online harassment present significant challenges to digital safety, demanding robust detection systems capable of identifying abusive content across multiple formats. This work proposes a multi-modal...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention ...
详细信息
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention and detection techniques have been proposed to mitigate these *** this paper,we propose an integrated security framework using blockchain and Machine Learning(ML)to protect IoT sensor *** framework consists of two modules:a blockchain prevention module and an ML detection *** blockchain prevention module has two lightweight mechanisms:identity management and trust *** management employs a lightweight Smart Contract(SC)to manage node registration and authentication,ensuring that unauthorized entities are prohibited from engaging in any tasks,while trust management uses a lightweight SC that is responsible for maintaining trust and credibility between sensor nodes throughout the network’s lifetime and tracking historical node *** and transaction validation are achieved through a Verifiable Byzantine Fault Tolerance(VBFT)mechanism to ensure network reliability and *** ML detection module utilizes the Light Gradient Boosting Machine(LightGBM)algorithm to classify malicious nodes and notify the blockchain network if it must make decisions to mitigate their *** investigate the performance of several off-the-shelf ML algorithms,including Logistic Regression,Complement Naive Bayes,Nearest Centroid,and Stacking,using the WSN-DS *** is selected following a detailed comparative analysis conducted using accuracy,precision,recall,F1-score,processing time,training time,prediction time,computational complexity,and Matthews Correlation Coefficient(MCC)evaluation metrics.
In the Acoustics channel,it is incredibly challenging to offer data transfer for time-sourced applications in an energy-efficient manner due to higher error rate and propagation ***,conventional re-transmission over a...
详细信息
In the Acoustics channel,it is incredibly challenging to offer data transfer for time-sourced applications in an energy-efficient manner due to higher error rate and propagation ***,conventional re-transmission over any failure generally initiates significantly larger end-to-end delay,and therefore it is not probable for time-based ***,standard techniques without any re-transmission consume enormous *** investigation proposes a novel multi-hop energy-aware transmission-based intelligent water wave optimization *** ensures reduced end-to-end while attaining potential amongst overall energy efficiency end-to-end packet *** merges a naturally inspired meta-heuristic approach with multi-hop routing for data packets to reach the *** appropriate design of this Meta heuristic-based energy-aware scheme consumes lesser energy than the conventional one-hop transmission strategy without ***,there is no hop-by-hop re-transmission *** proposed model shows only lesser delay than conventional methods with *** work facilitates extensive work to carry out the proposed model performance with the MATLAB simulation *** results illustrate that the model is exceptionally energyefficient with lesser packet *** 500 nodes,the packet delivery ratio of proposed model is 100%,average delay is reduced by 2%,total energy consumption is 8 J,average packet redundancy is 1.856,and idle energy is *** proposed model outperforms existing approaches like OSF,AOR,and DMR respectively.
the growth of wireless sensor networks has transformed all automation and industrial systems. Nonetheless, guaranteeing safe and privacy-preserving connectivity in sensor networks continues to be a difficult task. Cur...
详细信息
暂无评论