The performance of Wireless Sensor Networks(WSNs)is an important fragment of the Internet of Things(IoT),where the current WSNbuilt IoT network’s sensor hubs are enticing due to their critical *** grouping hubs,a clu...
详细信息
The performance of Wireless Sensor Networks(WSNs)is an important fragment of the Internet of Things(IoT),where the current WSNbuilt IoT network’s sensor hubs are enticing due to their critical *** grouping hubs,a clustering convention offers a useful solution for ensuring energy-saving of hubs andHybridMedia Access Control(HMAC)during the course of the ***,current grouping standards suffer from issues with the grouping structure that impacts the exhibition of these conventions *** this investigation,we recommend an Improved Energy-Proficient Algorithm(IEPA)for HMAC throughout the lifetime of the WSN-based *** consecutive segments are *** the covering of adjusted clusters,an ideal number of clusters is determined ***,fair static clusters are shaped,based on an updated calculation for fluffy cluster heads,to reduce and adapt the energy use of the sensor *** heads(CHs)are,ultimately,selected in optimal locations,with the pivot of the cluster heads working among cluster ***,the proposed convention diminishes and balances the energy utilization of hubs by improving the grouping structure,where the IEPAis reasonable for systems that need a long *** assessment results demonstrate that the IEPA performs better than existing conventions.
In the evolving landscape of Industry 4.0, the convergence of peer-to-peer (P2P) systems, LoRa-enabled wireless sensor networks (WSNs), and distributed hash tables (DHTs) represents a major advancement that enhances s...
详细信息
Batik, a unique blend of art and craftsmanship, is a distinct artistic and technological creation for Indonesian society. Research on batik motifs is primarily focused on classification. However, further studies may e...
详细信息
The satellite simulator platform is necessary for the satellite development. It is an essential tool to verify the operations of flight software. The Controller-in-the-Loop simulation with Simulation Third Generation ...
详细信息
This paper presents a novel approach to automatically summarize lecture slides using eye-tracking data. The tool generates personalized summaries by analyzing learners’ visual attention patterns, with the aim of redu...
This paper presents a novel approach to automatically summarize lecture slides using eye-tracking data. The tool generates personalized summaries by analyzing learners’ visual attention patterns, with the aim of reducing information overload and enhancing comprehension. While existing text summarization methods often overlook individual preferences and attention patterns, our proposed approach considers all slide elements, including text and visuals. It dynamically selects areas of interest based on learners’ fixation points. The tool is developed as a web application, enabling users to access presentations, receive personalized summaries, and save them for optimized studying. It incorporates features such as administration and settings, slides uploading, and summary viewing. To evaluate the tool, we conducted an experiment involving 62 participants to assess usability and satisfaction with the automated summaries. The evaluation results indicated positive feedback in terms of ease of use and visual appeal. Participants expressed satisfaction with the generated summaries and were given the option to select their preferred summarization percentage. Our analysis revealed that summarization preferences are not related to prior knowledge. Overall, this tool demonstrates the potential of personalized summarization based on eye-tracking data, thereby enhancing learning experiences.
Devices and networks constantly upgrade,leading to rapid technological ***-dimensional(3D)point cloud transmission plays a crucial role in aerial computing terminology,facilitating information *** network types,includ...
详细信息
Devices and networks constantly upgrade,leading to rapid technological ***-dimensional(3D)point cloud transmission plays a crucial role in aerial computing terminology,facilitating information *** network types,including sensor networks and 5G mobile networks,support this ***,Flying Ad hoc Networks(FANETs)utilize Unmanned Aerial Vehicles(UAVs)as nodes,operating in a 3D environment with Six Degrees of Freedom(6DoF).This study comprehensively surveys UAV networks,focusing on models for Light Detection and Ranging(LiDAR)3D point cloud compression/*** topics covered include autonomous navigation,challenges in video streaming infrastructure,motivations for Quality of Experience(QoE)enhancement,and avenues for future ***,the paper conducts an extensive review of UAVs,encompassing current wireless technologies,applications across various sectors,routing protocols,design considerations,security measures,blockchain applications in UAVs,contributions to healthcare systems,and integration with the Internet of Things(IoT),Artificial Intelligence(AI),Machine Learning(ML),and Deep Learning(DL).Furthermore,the paper thoroughly discusses the core contributions of LiDAR 3D point clouds in UAV systems and their future prediction along with mobility *** also explores the prospects of UAV systems and presents state-of-the-art solutions.
In today's world, where digital threats are on the rise, one particularly concerning threat is the Mirai botnet. This malware is designed to infect and command a collection of Internet of Things (IoT) devices. The...
详细信息
Currently cyberspace has often been used for crime. Ransomware is a type of malware that takes the victim's data hostage by asking for a ransom accompanied by threats. This attack is more aimed at Windows users. P...
Currently cyberspace has often been used for crime. Ransomware is a type of malware that takes the victim's data hostage by asking for a ransom accompanied by threats. This attack is more aimed at Windows users. Preventive measures are needed to prevent ransomware attacks, one of which is a learning-based approach. The challenge to the learning-based approach is data. We propose a static non-signature approach for extracting PE-based ransomware. The main focus of this research is the development of a non-signature static analysis approach that can identify and extract ransomware code from PE files without being affected by signature obfuscation or mutation. We extracted the 3 main headers namely dos_header, file_header, and optional_header plus the derived feature. The results show that from 132 samples, 71 of them were successfully extracted with PE file ransomware. This research contributes to the development of ransomware detection methodologies by offering a non-signature static analysis approach that improves resilience against evolving ransomware threats.
Facial expression editing has attracted increasing attention with the advance of deep neural networks in recent years. However, most existing methods suffer from compromised editing fidelity and limited usability as t...
详细信息
The skeletonisation methods of 3D object models gained noteworthy attention in recent years and have been extensively investigated, inspired by their wide-range applications, including computer graphics and robotics. ...
详细信息
暂无评论