The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the...
详细信息
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the selection of appropriate routing protocols, which is crucial for maintaining high Quality of Service (QoS). The Internet engineering Task Force’s Routing Over Low Power and Lossy Networks (IETF ROLL) working group developed the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) to meet these needs. While the initial RPL standard focused on single-metric route selection, ongoing research explores enhancing RPL by incorporating multiple routing metrics and developing new Objective Functions (OFs). This paper introduces a novel Objective Function (OF), the Reliable and Secure Objective Function (RSOF), designed to enhance the reliability and trustworthiness of parent selection at both the node and link levels within IoT and RPL routing protocols. The RSOF employs an adaptive parent node selection mechanism that incorporates multiple metrics, including Residual Energy (RE), Expected Transmission Count (ETX), Extended RPL Node Trustworthiness (ERNT), and a novel metric that measures node failure rate (NFR). In this mechanism, nodes with a high NFR are excluded from the parent selection process to improve network reliability and stability. The proposed RSOF was evaluated using random and grid topologies in the Cooja Simulator, with tests conducted across small, medium, and large-scale networks to examine the impact of varying node densities. The simulation results indicate a significant improvement in network performance, particularly in terms of average latency, packet acknowledgment ratio (PAR), packet delivery ratio (PDR), and Control Message Overhead (CMO), compared to the standard Minimum Rank with Hysteresis Objective Function (MRHOF).
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network bandwidth. T...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin...
详细信息
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly prominent.A piece of code,known as a Webshell,is usually uploaded to the target servers to achieve multiple *** Webshell attacks has become a hot spot in current ***,the traditional Webshell detectors are not built for the cloud,making it highly difficult to play a defensive role in the cloud ***,a Webshell detection system based on deep learning that is successfully applied in various scenarios,is proposed in this *** system contains two important components:gray-box and neural network *** gray-box analyzer defines a series of rules and algorithms for extracting static and dynamic behaviors from the code to make the decision *** neural network analyzer transforms suspicious code into Operation Code(OPCODE)sequences,turning the detection task into a classification *** experiment results show that SmartEagleEye achieves an encouraging high detection rate and an acceptable false-positive rate,which indicate its capability to provide good protection for the cloud environment.
Robotic arms are widely used in the automation industry to package and deliver classified objects. When the products are small objects with very similar shapes, such as screwdriver bits with slightly different threads...
详细信息
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser...
详细信息
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such services utilizing GPS through our ***,when users utilize these services,they inevitably expose personal information such as their ID and sensitive location to the *** to untrustworthy servers and malicious attackers with colossal background knowledge,users'personal information is at risk on these ***,many privacy-preserving solutions for protecting trajectories have significantly decreased utility after *** have come up with a new trajectory privacy protection solution that contraposes the area of interest for ***,Staying Points Detection Method based on Temporal-Spatial Restrictions(SPDM-TSR)is an interest area mining method based on temporal-spatial restrictions,which can clearly distinguish between staying and moving ***,our privacy protection mechanism focuses on the user's areas of interest rather than the entire ***,our proposed mechanism does not rely on third-party service providers and the attackers'background knowledge *** test our models on real datasets,and the results indicate that our proposed algorithm can provide a high standard privacy guarantee as well as data availability.
The rapid growth of service-oriented and cloud computing has created large-scale data centres *** data centres’operating costs mostly come from back-end cloud infrastructure and energy *** cloud computing,extensive c...
详细信息
The rapid growth of service-oriented and cloud computing has created large-scale data centres *** data centres’operating costs mostly come from back-end cloud infrastructure and energy *** cloud computing,extensive communication resources are ***,cloud applications require more bandwidth to transfer large amounts of data to satisfy end-user *** is also essential that no communication source can cause congestion or bag loss owing to unnecessary switching *** paper proposes a novel Energy and Communication(EC)aware scheduling(EC-scheduler)algorithm for green cloud computing,which optimizes data centre energy consumption and traffic *** primary goal of the proposed EC-scheduler is to assign user applications to cloud data centre resources with minimal utilization of data *** first introduce a Multi-Objective Leader Salp Swarm(MLSS)algorithm for task sorting,which ensures traffic load balancing,and then an Emotional Artificial Neural Network(EANN)for efficient resource ***-scheduler schedules cloud user requirements to the cloud server by optimizing both energy and communication delay,which supports the lower emission of carbon dioxide by the cloud server system,enabling a green,unalloyed *** tested the proposed plan and existing cloud scheduling methods using the GreenCloud simulator to analyze the efficiency of optimizing data centre energy and other scheduler *** EC-scheduler parameters Power Usage Effectiveness(PUE),Data Centre Energy Productivity(DCEP),Throughput,Average Execution Time(AET),Energy Consumption,and Makespan showed up to 26.738%,37.59%,50%,4.34%,34.2%,and 33.54%higher efficiency,respectively,than existing state of the art schedulers concerning number of user applications and number of user requests.
Crop yield Prediction based on environmental, soil, water, and crop parameters has been an active area of research in agriculture. Many studies have shown that these parameters can have a significant impact on crop yi...
详细信息
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based *** these,multimodal learning-based classification methods have gained ...
详细信息
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based *** these,multimodal learning-based classification methods have gained attention due to their ability to leverage diverse feature sets from encrypted traffic,improving classification ***,existing research predominantly relies on late fusion techniques,which hinder the full utilization of deep features within the *** address this limitation,we propose a novel multimodal encrypted traffic classification model that synchronizes modality fusion with multiscale feature ***,our approach performs real-time fusion of modalities at each stage of feature extraction,enhancing feature representation at each level and preserving inter-level correlations for more effective *** continuous fusion strategy improves the model’s ability to detect subtle variations in encrypted traffic,while boosting its robustness and adaptability to evolving network *** results on two real-world encrypted traffic datasets demonstrate that our method achieves a classification accuracy of 98.23% and 97.63%,outperforming existing multimodal learning-based methods.
With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy leakage events have aroused widespread concerns. Therefore, image sharing...
详细信息
Power is an issue that must be considered in the design of logic circuits. Power optimization is a combinatorial optimization problem, since it is necessary to search for a logical expression that consumes the least a...
详细信息
Power is an issue that must be considered in the design of logic circuits. Power optimization is a combinatorial optimization problem, since it is necessary to search for a logical expression that consumes the least amount of power from a large number of Reed-Muller(RM) logical expressions. The existing approach for optimizing the power of multi-output mixed polarity RM(MPRM) logic circuits suffer from poor optimization results. To solve this problem, a whale optimization algorithm with two-populations strategy and mutation strategy(TMWOA) is proposed in this paper. The two-populations strategy speeds up the convergence of the algorithm by exchanging information about the two-populations. The mutation strategy enhances the ability of the algorithm to jump out of the local optimal solutions by using the information of the current optimal solution. Based on the TMWOA, we propose a multi-output MPRM logic circuits power optimization approach(TMMPOA). Experiments based on the benchmark circuits of the Microelectronics Center of North Carolina(MCNC) validate the effectiveness and superiority of the proposed TMMPOA.
暂无评论