A nonprofit organization like college, works to assist all student needs and advance science, particularly in the academic sector. Hence, offering a high-quality placement aid service has emerged as a key indicator of...
详细信息
This paper introduces a 5G multi-frequency antenna design method based on multi-objective sequential domain patching. By etching helical metamaterials on radiation patches and loading asymmetric electric-inductive-cap...
详细信息
Irregular and unexpected slow or fast heartbeat is called arrhythmia. The two lower chambers of the heart, known as the ventricles, are where an irregular heart rhythm called a ventricular arrhythmia (VA) originates s...
详细信息
In order to enhance daily life and actualize the Internet-of-Things (IoT) goal, several IoT gadgets have been created. IoT, which is based on the information-sharing capabilities of Radio Frequency Identification (RFI...
详细信息
The proposed system aims to enhance student transportation security through real-time face detection and recognition. Leveraging the MTCNN framework for accurate face detection and the FaceNet model for reliable face ...
详细信息
Teaching the practical aspects of requirements engineering is challenging due to the lack of effective tools, methods, and practices for teaching requirements elicitation, especially for novices. The research communit...
详细信息
Predicting the pixel is crucial in prediction error expansion (PEE) based reversible data hiding (RDH). There are a number of methods for predicting pixels that can be found in research papers. The gradients are used ...
详细信息
Cloud computing is a dynamic and rapidly evolving field,where the demand for resources fluctuates *** paper delves into the imperative need for adaptability in the allocation of resources to applications and services ...
详细信息
Cloud computing is a dynamic and rapidly evolving field,where the demand for resources fluctuates *** paper delves into the imperative need for adaptability in the allocation of resources to applications and services within cloud computing *** motivation stems from the pressing issue of accommodating fluctuating levels of user demand *** adhering to the proposed resource allocation method,we aim to achieve a substantial reduction in energy *** reduction hinges on the precise and efficient allocation of resources to the tasks that require those most,aligning with the broader goal of sustainable and eco-friendly cloud computing *** enhance the resource allocation process,we introduce a novel knowledge-based optimization *** this study,we rigorously evaluate its efficacy by comparing it to existing algorithms,including the Flower Pollination Algorithm(FPA),Spark Lion Whale Optimization(SLWO),and Firefly *** findings reveal that our proposed algorithm,Knowledge Based Flower Pollination Algorithm(KB-FPA),consistently outperforms these conventional methods in both resource allocation efficiency and energy consumption *** paper underscores the profound significance of resource allocation in the realm of cloud *** addressing the critical issue of adaptability and energy efficiency,it lays the groundwork for a more sustainable future in cloud computing *** contribution to the field lies in the introduction of a new resource allocation strategy,offering the potential for significantly improved efficiency and sustainability within cloud computing infrastructures.
The mmWave and sub-THz signals rely on Line-of-Sight (LOS) links for higher throughput. Blocking these links can lead to a sudden drop in the received SNR and increase the latency of the communication network. We prop...
详细信息
Routing protocols, responsible for determining optimal paths, fall into two main categories: reactive and proactive protocols. In the realm of reactive routing protocols, exemplified by Ad hoc On-demand Distance Vecto...
详细信息
Routing protocols, responsible for determining optimal paths, fall into two main categories: reactive and proactive protocols. In the realm of reactive routing protocols, exemplified by Ad hoc On-demand Distance Vector (AODV), routes are created only when there is an actual data transmission requirement. In contrast, proactive routing protocols maintain pre-computed paths to all potential destinations, resulting in reduced resource utilization within reactive protocols and continuous route maintenance within proactive ones. Reactive routing protocols are resource efficient as they establish routes as needed, while proactive counterparts maintain routing tables for all possible destinations, ensuring constant route availability regardless of data transmission demands. This paper primarily concentrates on the reactive routing protocol category, focusing on real-time path optimization and routing information updates. In the context of Vehicular Internet of Things (VIoT) networks, where malicious entities might attempt to flood, mislead, or impersonate routing packets, it is imperative to ensure robust security measures within the routing protocol. Unfortunately, secure routing protocols in VIoT networks, including AODV, SAODV, and SGHRP, often exhibit inefficiencies and impose a high overhead. To address these challenges, this research paper introduces the Security Metrics and Authentication-based RouTing (SMART) protocol for VIoT networks, with a focus on enhancing security while minimizing overhead. The SMART protocol utilizes the Merkle tree for hash (digest) generation, which is then encrypted using Elliptic Curve Cryptography (ECC) to reduce overhead. This proposed protocol enhances security by authenticating the source and incorporating security metrics into the routing information. To assess the performance of the SMART protocol, simulations were conducted using Network Simulator-2 (NS2). The results demonstrated an improved packet delivery ratio, red
暂无评论