The architecture of integrating Software Defined Networking (SDN) with Network Function Virtualization (NFV) is excellent because the former virtualizes the control plane, and the latter virtualizes the data plane. As...
详细信息
Speaker identification using audio data is quite challenging because of inherent differences between people, ambient noise, and variable recording conditions. Although the classical deep learning methods are effective...
详细信息
Copy-move forgery is a common audio tampering technique in which users copy the contents of one speech and paste them into another region of the same speech signal, thus achieving the effect of tampering with the sema...
详细信息
To learn and analyze graph-structured data, Graph Neural Networks (GNNs) have emerged as a powerful framework over traditional neural networks, which work well on grid-like or sequential structure data. GNNs are parti...
详细信息
Background: Collaborative Representation (CR) has been widely used in Single Image Super Resolution (SISR) with the assumption that Low-resolution (LR) and high-resolution (HR) features can be linearly represented by ...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs ...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs is to extendflexibility into the self-directed,mobile,and wireless domain,in which a cluster of autonomous nodes forms a MANET routing *** Intrusion Detection System(IDS)is a tool that examines a network for mal-icious behavior/policy violations.A network monitoring system is often used to report/gather any suspicious attacks/*** IDS is a software program or hardware system that monitors network/security traffic for malicious attacks,sending out alerts whenever it detects malicious *** impact of Dynamic Source Routing(DSR)in MANETs challenging blackhole attack is investigated in this research *** Cluster Trust Adaptive Acknowledgement(CTAA)method is used to identify unauthorised and malfunctioning nodes in a MANET *** system is active and provides successful delivery of a data packet,which implements Kalman Filters(KF)to anticipate node ***,KF is used to eliminate synchronisation errors that arise during the sending and receiving *** order to provide an energy-efficient solution and to minimize network traffic,route optimization in MANET by using Multi-Objective Particle Swarm Optimization(MOPSO)technique to determine the optimal num-ber of clustered MANET along with energy dissipation in *** to the researchfindings,the proposed CTAA-MPSO achieves a Packet Delivery Ratio(PDR)of 3.3%.In MANET,the PDR of CTAA-MPSO improves CTAA-PSO by 3.5%at 30%malware.
Agriculture is backbone of many economies but still farmers often face many challenges in accessing financial services or available resources for them, making informed crop choices and participating in government init...
详细信息
In this paper, a new approach for mining image association rules is presented, which involves the fine-tuned CNN model, as well as the proposed FIAR and OFIAR algorithms. Initially, the image transactional database is...
详细信息
Cybersecurity is crucial in today’s interconnected world, as digital technologies are increasingly used in various sectors. The risk of cyberattacks targeting financial, military, and political systems has increased ...
详细信息
The CloudIoT paradigm has profoundly transformed the healthcare industry, providing outstanding innovation and practical applications. However, despite its many advantages, the adoption of this paradigm in healthcare ...
详细信息
暂无评论