The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the...
详细信息
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the selection of appropriate routing protocols, which is crucial for maintaining high Quality of Service (QoS). The Internet Engineering Task Force’s Routing Over Low Power and Lossy Networks (IETF ROLL) working group developed the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) to meet these needs. While the initial RPL standard focused on single-metric route selection, ongoing research explores enhancing RPL by incorporating multiple routing metrics and developing new Objective Functions (OFs). This paper introduces a novel Objective Function (OF), the Reliable and Secure Objective Function (RSOF), designed to enhance the reliability and trustworthiness of parent selection at both the node and link levels within IoT and RPL routing protocols. The RSOF employs an adaptive parent node selection mechanism that incorporates multiple metrics, including Residual Energy (RE), Expected Transmission Count (ETX), Extended RPL Node Trustworthiness (ERNT), and a novel metric that measures node failure rate (NFR). In this mechanism, nodes with a high NFR are excluded from the parent selection process to improve network reliability and stability. The proposed RSOF was evaluated using random and grid topologies in the Cooja Simulator, with tests conducted across small, medium, and large-scale networks to examine the impact of varying node densities. The simulation results indicate a significant improvement in network performance, particularly in terms of average latency, packet acknowledgment ratio (PAR), packet delivery ratio (PDR), and Control Message Overhead (CMO), compared to the standard Minimum Rank with Hysteresis Objective Function (MRHOF).
With the advent of cloud computing, many organizations, institutions, and individuals have chosen to store their data in the cloud as a way to compensate for limited local storage capabilities and reduce expenses. How...
详细信息
During recent decades, using credit cards represents a pivotal part of the financial lifeline. Credit cards and online payment gateways are vital elements in the world of world-wide-web. Given the fact that credit car...
详细信息
This study provides a detailed study of a Сonvolutional Neural Network (СNN) model optimized for facial eхpression recognition with Fuzzy logic using Fuzzy2DPooling and Fuzzy Neural Networks (FNN), and discusses da...
详细信息
The startup business model has grown rapidly in the last few years. However, giving investment or funding to a startup, especially in its early stages, is difficult because the risk is higher than a conventional compa...
详细信息
Lip-reading is a method that focuses on the observation and interpretation of lip movements to understand spoken language. Previous studies have exclusively concentrated on a single variation of residual networks (Res...
详细信息
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention...
详细信息
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)*** Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent *** this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN *** model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant *** adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack *** proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble *** proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in *** provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving *** comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing *** results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.
This study proposes a gender classification method for Twitter data using a hybrid XLNet-fastText model. The objective is to enhance gender classification accuracy by leveraging the contextual understanding of XLNet a...
详细信息
While databases are widely-used in commercial user-facing services that have stringent quality-of-service(QoS)requirement,it is crucial to ensure their good performance and minimize the hardware usage at the same *** ...
详细信息
While databases are widely-used in commercial user-facing services that have stringent quality-of-service(QoS)requirement,it is crucial to ensure their good performance and minimize the hardware usage at the same *** investigation shows that the optimal DBMS(database management system)software configuration varies for different user request patterns(i.e.,workloads)and hardware *** is challenging to identify the optimal software and hardware configurations for a database workload,because DBMSs have hundreds of tunable knobs,the effect of tuning a knob depends on other knobs,and the dependency relationship changes under different hardware *** this paper,we propose SHA,a software and hardware auto-tuning system for *** is comprised of a scaling-based performance predictor,a reinforcement learning(RL)based software tuner,and a QoS-aware resource *** performance predictor predicts its optimal performance with different hardware configurations and identifies the minimum amount of resources for satisfying its performance *** software tuner fine-tunes the DBMS software knobs to optimize the performance of the *** resource reallocator assigns the saved resources to other applications to improve resource utilization without incurring QoS violation of the database *** results show that SHA improves the performance of database workloads by 9.9%on average compared with a state-of-the-art solution when the hardware configuration is fixed,and improves 43.2%of resource utilization while ensuring the QoS.
This research investigates the novel application of Dynamic Game Balancing (DGB) techniques in the context of a hybrid chess-survival roguelike game, a unique combination of genres not widely explored in previous stud...
详细信息
暂无评论