The Wireless Sensor Network(WSN)is a network of Sensor Nodes(SN)which adopt radio signals for communication amongst *** is an increase in the prominence of WSN adaptability to emerging applications like the Internet o...
详细信息
The Wireless Sensor Network(WSN)is a network of Sensor Nodes(SN)which adopt radio signals for communication amongst *** is an increase in the prominence of WSN adaptability to emerging applications like the Internet of Things(IoT)and Cyber-Physical Systems(CPS).Data secur-ity,detection of faults,management of energy,collection and distribution of data,network protocol,network coverage,mobility of nodes,and network heterogene-ity are some of the issues confronted by *** is not much published information on issues related to node mobility and management of energy at the time of aggregation of *** the goal of boosting the mobility-based WSNs’network performance and energy,data aggregation protocols such as the presently-used Mobility Low-Energy Adaptive Clustering Hierarchy(LEACH-M)and Energy Efficient Heterogeneous Clustered(EEHC)scheme have been exam-ined in this work.A novel Artificial Bee Colony(ABC)algorithm is proposed in this work for effective election of CHs and multipath routing in WSNs so as to enable effective data transfer to the Base Station(BS)with least energy *** is avoidance of the local optima problem at the time of solution space search in this proposed *** have been conducted on a large WSN network that has issues with mobility of nodes.
Network virtualization can effectively establish dedicated virtual networks to implement various network ***,the existing research works have some shortcomings,for example,although computing resource properties of ind...
详细信息
Network virtualization can effectively establish dedicated virtual networks to implement various network ***,the existing research works have some shortcomings,for example,although computing resource properties of individual nodes are considered,node storage properties and the network topology properties are usually ignored in Virtual Network(VN)modelling,which leads to the inaccurate measurement of node availability and *** addition,most static virtual network mapping methods allocate fixed resources to users during the entire life cycle,and the users’actual resource requirements vary with the workload,which results in resource allocation *** on the above analysis,in this paper,we propose a dynamic resource sharing virtual network mapping algorithm named NMA-PRS-VNE,first,we construct a new,more realistic network framework in which the properties of nodes include computing resources,storage resources and topology *** the node mapping process,three properties of the node are used to measure its mapping ***,we consider the resources of adjacent nodes and links instead of the traditional method of measuring the availability and priority of nodes by considering only the resource properties,so as to more accurately select the physical mapping nodes that meet the constraints and conditions and improve the success rate of subsequent link ***,we divide the resource requirements of Virtual Network Requests(VNRs)into basic subrequirements and variable sub-variable requirements to complete dynamic resource *** former represents monopolizing resource requirements by the VNRs,while the latter represents shared resources by many VNRs with the probability of occupying resources,where we keep a balance between resource sharing and collision among users by calculating the collision *** results show that the proposed NMAPRS-VNE can increase the average acceptance rate and network revenu
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ...
详细信息
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and everpresent threat is Ransomware-as-a-Service(RaaS)assaults,which enable even individuals with minimal technical knowledge to conduct ransomware *** study provides a new approach for RaaS attack detection which uses an ensemble of deep learning *** this purpose,the network intrusion detection dataset“UNSWNB15”from the Intelligent Security Group of the University of New South Wales,Australia is *** the initial phase,the rectified linear unit-,scaled exponential linear unit-,and exponential linear unit-based three separate Multi-Layer Perceptron(MLP)models are ***,using the combined predictive power of these three MLPs,the RansoDetect Fusion ensemble model is introduced in the suggested *** proposed ensemble technique outperforms previous studieswith impressive performance metrics results,including 98.79%accuracy and recall,98.85%precision,and 98.80%*** empirical results of this study validate the ensemble model’s ability to improve cybersecurity defenses by showing that it outperforms individual *** expanding the field of cybersecurity strategy,this research highlights the significance of combined deep learning models in strengthening intrusion detection systems against sophisticated cyber threats.
Federated Learning (FL), an advanced technique in machine learning (ML), allows for model training without transferring data to a central server. This method is particularly valuable in sensitive applications, such as...
详细信息
Indoor Navigation System (INS) supports seamless movement of objects within confined spaces in smart environments. In this paper, a novel INS that relies on ESP32-based Received Signal Strength Indication (RSSI) measu...
详细信息
In this paper, we consider the problem of multi-cell interference coordination by joint beamforming and power control. Recent efforts have explored the use of reinforcement learning (RL) methods to tackle this complex...
详细信息
Multi-image steganography refers to a data-hiding scheme where a user tries to hide confidential messages within multiple images. Different from the traditional steganography which only requires the security of an ind...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syntax,it is hard for the developers to write correctly due to lacking knowledge of the mathematical foundations of the first-order logic,which is approximately half accurate at the first stage of devel-opment.A deep neural network named DeepOCL is proposed,which takes the unre-stricted natural language as inputs and automatically outputs the best-scored OCL candidates without requiring a domain conceptual model that is compulsively required in existing rule-based generation *** demonstrate the validity of our proposed approach,ablation experiments were conducted on a new sentence-aligned dataset named *** experiments show that the proposed DeepOCL can achieve state of the art for OCL statement generation,scored 74.30 on BLEU,and greatly outperformed experienced developers by 35.19%.The proposed approach is the first deep learning approach to generate the OCL expression from the natural *** can be further developed as a CASE tool for the software industry.
With advancement of technology, the technique of selective scalable secret image sharing (SSSIS) was first proposed in 2017 as a new alternative of secret image sharing. The region of interest (ROI) in the protected s...
详细信息
Fast Radio Bursts(FRBs) have emerged as one of the most intriguing and enigmatic phenomena in the field of radio astronomy. The key of current related research is to obtain enough FRB signals. computer-aided search is...
详细信息
Fast Radio Bursts(FRBs) have emerged as one of the most intriguing and enigmatic phenomena in the field of radio astronomy. The key of current related research is to obtain enough FRB signals. computer-aided search is necessary for that task. Considering the scarcity of FRB signals and massive observation data, the main challenge is about searching speed, accuracy and recall. in this paper, we propose a new FRB search method based on Commensal Radio Astronomy FAST Survey(CRAFTS) data. The CRAFTS drift survey data provide extensive sky coverage and high sensitivity, which significantly enhance the probability of detecting transient signals like FRBs. The search process is separated into two stages on the knowledge of the FRB signal with the structural isomorphism, while a different deep learning model is adopted in each stage. To evaluate the proposed method,FRB signal data sets based on FAST observation data are developed combining simulation FRB signals and real FRB signals. Compared with the benchmark method, the proposed method F-score achieved 0.951, and the associated recall achieved 0.936. The method has been applied to search for FRB signals in raw FAST data. The code and data sets used in the paper are available at ***/aoxipo.
暂无评论