Due to developments in technologies like Cloud Computing (CC), the Internet of Things (IoT), etc., the data volume transmitted across communication infrastructures has skyrocketed recently. In order to make network sy...
详细信息
In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary *** tactical...
详细信息
In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary *** tactical Mobile Ad-hoc Network(MANET),hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out,self-mending and *** in the routing process is one of the key aspects to increase MANET performance by coordinat-ing the pathways using multiple criteria and *** present a Group Adaptive Hybrid Routing Algorithm(GAHRA)for gathering portability,which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile *** on this aspect,the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach,with the objectives of enhancing the out-put of MANET routing computation in each *** analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications.
A recent study revealed that fake articles spread considerably faster than factual content on Twitter, specifically at a 70% higher rate of retweets and reaching the first 1,500 users six times faster. This highlights...
详细信息
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various...
详细信息
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various frequency bands.A recent wireless communication network uses OFDM in longterm evolution(LTE)and 5G,among *** main problem faced by 5G wireless OFDM is distortion of transmission signals in the *** transmission loss is called peak-to-average power ratio(PAPR).This wireless signal distortion can be reduced using various *** study uses machine learning-based algorithm to solve the problem of PAPR in 5G wireless *** transmit sequence(PTS)helps in the fast transfer of data in wireless *** is merged with deep belief neural network(DBNet)for the efficient processing of signals in wireless 5G *** indicates that the proposed system outperforms other existing ***,PAPR reduction in OFDM by DBNet is optimized with the help of an evolutionary algorithm called particle swarm ***,the specified design supports in improving the proposed PAPR reduction architecture.
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-ba...
详细信息
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-based rehabilitation. It is intended to observe the children's performance in terms of concentration, attention, and identification. The observation has been done through placards as a target image to display the 3D objects on a mobile phone or tablet. In this project, observations are made for 21 autism children in the age group of 7–14, out of whom 17 are boys and 5 are girls. Those 21 children are given practice identifying 15 different objects in an augmented reality environment. Their performance was initially evaluated using conventional instructional techniques. The majority of the kids were having more difficulty identifying things during that observation. Then, with an Augmented Reality environment, the identical observation has been made once more. Using a mobile device or tablet, the 3D objects from the provided placard photos are produced in an augmented reality environment with animation and voice in the languages of English and Tamil. Children with autism are able to recognize and also grasp the behaviors of those objects while viewing them in 3D. Their efforts are measured using a two-point scale (0, 1, 2). The pre-assessment and post-assessment reports for the above observations are tabulated. All the observations are made in the presence of the special education teacher (therapist). However, the children observed in this project fall into three different categories: mild, moderate, and severe. In the Mild category, statistical significance is evident with p values of 0.002 in pre-assessment and 0.014 in post-assessment. Likewise, in the Moderate category, where p values are 0.023 in pre-assessment and 0.033 in post-assessment, significance is observed, as all p values fall below the chosen significance level of 0.05. This leads to rejecti
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular *** machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of ***,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of ***,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning ***,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of ***,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of ***,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training *** evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets.
Cloud computing offers numerous web-based *** adoption of many Cloud applications has been hindered by concerns about data security and *** service providers’access to private information raises more security *** add...
详细信息
Cloud computing offers numerous web-based *** adoption of many Cloud applications has been hindered by concerns about data security and *** service providers’access to private information raises more security *** addition,Cloud computing is incompatible with several industries,including finance and ***-key cryptography is frequently cited as a significant advancement in *** contrast,the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive *** study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key *** strategic design,the hybrid Envelope model adequately supports enterprises delivering routine customer services via independent multi-sourced *** the Cloud service provider and the consumer benefit from the proposed scheme since it results in more resilient and secure *** suggested approach employs a secret version of the distributed equation to ensure the highest level of security and confidentiality for large amounts of *** on the proposed scheme,a Digital Envelope application is developed which prohibits Cloud service providers from directly accessing insufficient or encrypted data.
Video surveillance systems are often used for traffic monitoring and to characterize traffic load. However, most of the surveillance videos are low frame rated and extracting the right motion feature from them is a ch...
详细信息
The threat posed by credit card fraud, and by extension, online banking, continues to grow with the convenience brought forth by online banking services. Many financial institutions and customers stand at great risk b...
详细信息
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ...
详细信息
暂无评论