The FOD-R Dataset is a collection of images that depict common types of foreign object debris (FOD) that can be found on runways or taxiways. The dataset has primarily been annotated using bounding boxes to facilitate...
详细信息
Our society is based on its farmers. They are the ones who supply us with all of our food. The nation's whole population is dependent on farmers. Only because of them can we survive on the earth. The farmer is the...
详细信息
Many web applications provide online courses for students to upskill their knowledge. This type of learning system is unique for the students but associates several challenges like lack of motivation to complete the c...
详细信息
There is a vast array of fields making use of WSN, including healthcare, transportation, combat, surveillance, environment, and more. Their limited energy resources, communication capabilities, and processing power de...
详细信息
ISBN:
(纸本)9798350375442
There is a vast array of fields making use of WSN, including healthcare, transportation, combat, surveillance, environment, and more. Their limited energy resources, communication capabilities, and processing power define them. Because of their design and placement in dangerous, unsupervised areas, they are susceptible to assaults. The network's overall security is being enhanced with the introduction of new techniques. The three mainstays of WSN security - intrusion prevention, intrusion detection, and mitigation - are usually implemented together. The Intrusion Detection System (IDS), the second line of defense in a wireless sensor network, receives the algorithms and schemes needed to detect intrusions at various levels from this study. Hierarchical sensor networks, which are the building blocks of this study's sensor network design, include clustering and a tree-like structure for communication with the base station. At each architectural level - the node, the cluster head, and the base station - a hybrid intrusion detection system is deployed. The data modification assault was detected with the use of temporal correlations of sensor signals in the node level intrusion detection system. To identify the discrepancy between the detected value and the threshold value, data anomaly is calculated, updated, and compared. Accuracy and precision are considered while deciding on a threshold value. Handling data with care. The cluster-level intrusion detection system uses the Radial Basis function to identify malicious patterns, malicious flooding assaults, and selfish misbehavior. In order to minimize the number of iterations required for RBF training, the optimization techniques of Self Organizing Map and Particle Swarm Optimization are used. The perfect RBF is taught to identify sinkhole attacks, anomalous behavior, selective forwarding, and self-serving misconduct in base station intrusion detection systems. In order to coordinate the three IDS and identify the assaul
Garbage disposal and management have been one of the pertinent issues in every part of the world. Keeping the city clean is the collective responsibility of every citizen. Instead of blaming civic bodies for being was...
详细信息
Potholes on the road can pose significant risks to drivers and pedestrians. They are a common cause of accidents and vehicle damage. Hence, their timely repair is critical for road safety. However, pothole repairs are...
详细信息
In this paper, we consider a degree sum condition sufficient to imply the existence of k vertex-disjoint chorded cycles in a graph G. Let σ4(G) be the minimum degree sum of four independent vertices of G. We prove th...
详细信息
In recent years, fog computing has extended cloud services to the network edge, lowering network latency and congestion and overcoming cloud computing restrictions. Many hurdles, however, must be overcome before the b...
详细信息
Bankruptcy is a severe financial problem for companies that can lead to significant losses for stakeholders, including employees, investors, and creditors. Early bankruptcy prediction is crucial to reduce default risk...
详细信息
This research study investigates the impact of parallel programming techniques on the performance of searching and sorting algorithms. Traditional sequential algorithms have been the foundation of data processing for ...
详细信息
暂无评论