This article presents an in-depth exploration of the acoustofluidic capabilities of guided flexural waves(GFWs)generated by a membrane acoustic waveguide actuator(MAWA).By harnessing the potential of GFWs,cavity-agnos...
详细信息
This article presents an in-depth exploration of the acoustofluidic capabilities of guided flexural waves(GFWs)generated by a membrane acoustic waveguide actuator(MAWA).By harnessing the potential of GFWs,cavity-agnostic advanced particle manipulation functions are achieved,unlocking new avenues for microfluidic systems and lab-on-a-chip *** localized acoustofluidic effects of GFWs arising from the evanescent nature of the acoustic fields they induce inside a liquid medium are numerically investigated to highlight their unique and promising *** traditional acoustofluidic technologies,the GFWs propagating on the MAWA’s membrane waveguide allow for cavity-agnostic particle manipulation,irrespective of the resonant properties of the fluidic ***,the acoustofluidic functions enabled by the device depend on the flexural mode populating the active region of the membrane *** demonstrations using two types of particles include in-sessile-droplet particle transport,mixing,and spatial separation based on particle diameter,along with streaming-induced counter-flow virtual channel generation in microfluidic PDMS *** experiments emphasize the versatility and potential applications of the MAWA as a microfluidic platform targeted at lab-on-a-chip development and showcase the MAWA’s compatibility with existing microfluidic systems.
Aim: Cloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from...
详细信息
Aim: Cloud computing (CC) is a revolutionary new archetype in which users pool their computing resources to provide greater efficiency for everyone. Data become increasingly vulnerable to diverse security threats from attackers when millions of users circulate the same network for data transmission. Protecting these reports has shifted to the vanguard of priorities. The existing data security approach prioritizes protecting data at rest in cloud storage but gives less thought to protecting data in transit. During transmission, the data are vulnerable to intrusion attempts. Methods: The third-party auditor is provided access to data during the transfer phase, which is also the current pattern. As the attacker can now pose as a trusted third party, it makes the data more susceptible to unauthorized access. However, growing concerns regarding data privacy and security have made outsourcing sensitive information to faraway data centers difficult. As a result, new security concerns in the cloud necessitate an improved version of the tried-and-true advanced encryption standard (AES) algorithm. Key aspects presented in this study include a secure and private framework for owner data. It improves upon the 128 AES technique by adding a second round of encryption using a different key, allowing for a throughput of 1000 blocks per second. However, the standard method uses a single round key and only 800 blocks per second. The suggested approach reduces energy consumption, improves load distribution, and optimizes network trust and resource management. Results: The proposed architecture allows for the use of AES with cipher lengths of 16, 32, 64, and 128 bytes. The effectiveness of the algorithm in terms of attaining target quality metrics is illustrated graphically via simulation results. This strategy reduces power consumption by 13.23%, network utilization by 12.43%, and delay by 16.53%, according to the outcomes. Conclusion: As a result, the recommended architecture enhance
Over the past years, researchers across the globe have made significant efforts to develop systems capable of identifying the presence of hate speech in different languages. This paper describes the team Transformers&...
详细信息
Around the world, kidney diseases are a major open prosperity concern. Environmental components, tall salt levels, and additional minutes are all risk factors. Kidney dissatisfaction can be a critical prosperity issue...
详细信息
Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission *** is depicted as significant research challenges that pose during the design of network protocol...
详细信息
Link asymmetry in wireless mesh access networks(WMAN)of Mobile ad-hoc Networks(MANETs)is due mesh routers’transmission *** is depicted as significant research challenges that pose during the design of network protocol in wireless *** on the extensive review,it is noted that the substantial link percentage is symmetric,i.e.,many links are *** is identified that the synchronous acknowledgement reliability is higher than the asynchronous ***,the process of establishing bidirectional link quality through asynchronous beacons underrates the link reliability of asym-metric *** paves the way to exploit an investigation on asymmetric links to enhance network functions through link ***,a novel Learning-based Dynamic Tree routing(LDTR)model is proposed to improve network performance and *** the evaluation of delay measures,asymmetric link,interference,probability of transmission failure is *** proportion of energy consumed is used for monitoring energy conditions based on the total energy *** learning model is a productive way for resolving the routing issues over the network model during *** asymmetric path is chosen to achieve exploitation and exploration *** learning-based Dynamic Tree routing model is utilized to resolve the multi-objective routing ***,the simulation is done with MATLAB 2020a simulation environment and path with energy-efficiency and lesser E2E delay is evaluated and compared with existing approaches like the Dyna-Q-network model(DQN),asymmetric MAC model(AMAC),and cooperative asymmetric MAC model(CAMAC)*** simulation outcomes demonstrate that the anticipated LDTR model attains superior network performance compared to *** average energy consump-tion is 250 J,packet energy consumption is 6.5 J,PRR is 50 bits/sec,95%PDR,average delay percentage is 20%.
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled ...
详细信息
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled smart *** high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for ***,there is a high computation latency due to the presence of a remote cloud *** computing,which brings the computation close to the data source is introduced to overcome this *** an IoT-enabled smart city environment,one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay *** efficient resource allocation at the edge is helpful to address this *** this paper,an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation ***,we presented a three-layer network architecture for IoT-enabled smart ***,we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization *** Automata(LA)is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource *** extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.
The increasing spread of diseases transmitted by mosquitoes, including malaria and dengue, poses a major global health challenge. Traditional mosquito detection methods, which are based on manual trapping and counting...
详细信息
Selecting a cloud service provider (CSP) from a wide range of options with varying offerings poses a crucial challenge for service requesting consumers (SRCs). The decision criteria outlined in Service Level Agreement...
详细信息
This paper introduces a novel data collection model called ConciseNet that leverages a cutting-edge data reconstruction method to significantly enhance signal reconstruction accuracy in wireless sensor networks (WSNs)...
详细信息
Due to increased network traffic and security concerns, intrusion detection system (IDS) research has received a lot of attention in computer science. Advanced intrusion detection systems have arbitrary incursion cate...
详细信息
暂无评论