One of themost prominent research areas in information technology is the Internet of Things (IoT) as its applications are widely used, such as structural monitoring, health care management systems, agriculture and bat...
详细信息
One of themost prominent research areas in information technology is the Internet of Things (IoT) as its applications are widely used, such as structural monitoring, health care management systems, agriculture and battlefield management, and so on. Due to its self-organizing network and simple installation of the network, the researchers have been attracted to pursue research in the various fields of IoTs. However, a huge amount of work has been addressed on various problems confronted by IoT. The nodes densely deploy over critical environments and those are operated on tiny batteries. Moreover, the replacement of dead batteries in the nodes is almost impractical. Therefore, the problem of energy preservation and maximization of IoT networks has become the most prominent research area. However, numerous state-of-The-Art algorithms have addressed this issue. Thus, it has become necessary to gather the information and send it to the base station in an optimized method to maximize the network. Therefore, in this article, we propose a novel quantum-informed ant colony optimization (ACO) routing algorithm with the efficient encoding scheme of cluster head selection and derivation of information heuristic factors. The algorithm has been tested by simulation for various network scenarios. The simulation results of the proposed algorithm show its efficacy over a few existing evolutionary algorithms using various performance metrics, such as residual energy of the network, network lifetime, and the number of live IoT nodes. Impact Statement-Toward IoT-based applications, here we presented the Quantum-inspired ACO clustering algorithm for network lifetime. IoT nodes in the clustering phase choose theirCH through the distance between cluster member IoT nodes and the residual energy. Thus, CH selection reduces the energy consumption of member IoT nodes. Therefore, our significant contributions are summarized as follows. i. Developing Quantum-informed ACO clustered routing algor
Voting is one of the most fundamental and important pillars for smooth functioning of a democracy. The conventional voting system based on a ballot system or Electronic Voting Machine (EVM) is susceptible to multiple ...
详细信息
computer-Aided Diagnostic (CAD) systems enhance clinical decision-making, providing more accurate and streamlined processes. CAD systems based on Content-Based Image Retrieval (CBIR) serve as visual tools that strengt...
详细信息
Cardiovascular disease remains a major issue for mortality and morbidity, making accurate classification crucial. This paper introduces a novel heart disease classification model utilizing Electrocardiogram (ECG) sign...
详细信息
The security and privacy issues in the Internet of Things (IoT) are a mandatory process and also a challenging task for researchers. Blockchain technology enhanced and motivated the recent security parameters, and it ...
详细信息
Machine learning has emerged as one transformative tool in predicting student academic performance. This study evaluates machine learning models regression in predicting student academic performance. It can be found o...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
In the recent yeas, with the increase in the use of different social media platforms, image captioning approach play a major role in automatically describe the whole image into natural language sentence. Image caption...
详细信息
Artificial Intelligence (AI) is transforming numerous domains, including bioinformatics and information extraction systems, by advancing data processing capabilities, enhancing precision, and facilitating automation. ...
详细信息
Depth perception affects 2D image brightness, color, texture, and motion. In addition to stereoscopic vision, depth range, displaying size, 3D visualization, naturalness, and visual comfort can reconstruct 3D depth in...
详细信息
暂无评论