The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications,such as remote health monitoring,industria...
详细信息
The seamless integration of intelligent Internet of Things devices with conventional wireless sensor networks has revolutionized data communication for different applications,such as remote health monitoring,industrial monitoring,transportation,and smart *** and reliable data routing is one of the major challenges in the Internet of Things network due to the heterogeneity of *** paper presents a traffic-aware,cluster-based,and energy-efficient routing protocol that employs traffic-aware and cluster-based techniques to improve the data delivery in such *** proposed protocol divides the network into clusters where optimal cluster heads are selected among super and normal nodes based on their residual *** protocol considers multi-criteria attributes,i.e.,energy,traffic load,and distance parameters to select the next hop for data delivery towards the base *** performance of the proposed protocol is evaluated through the network simulator *** different traffic rates,number of nodes,and different packet sizes,the proposed protocol outperformed LoRaWAN in terms of end-to-end packet delivery ratio,energy consumption,end-to-end delay,and network *** 100 nodes,the proposed protocol achieved a 13%improvement in packet delivery ratio,10 ms improvement in delay,and 10 mJ improvement in average energy consumption over LoRaWAN.
Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all ***,single-signature applications in transactions can lead to user i...
详细信息
Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all ***,single-signature applications in transactions can lead to user identification issues due to the reuse of public *** address this issue,group signatures can be used,where the same group public key is used to verify signatures from group members to provide anonymity to ***,in dynamic groups where membership may change,an attack can occur where a user who has left the group can disguise themselves as a group member by leaking a partial *** problem cannot be traced back to the partial key *** this paper,we propose assigning different partial keys to group members to trace partial key leakers and partially alleviate the damage caused by partial key *** schemes have shown that arbitrary tracing issues occurred when a single administrator had exclusive key generation and tracing *** paper proposes a group signature scheme that solves the synchronization problem by involving a threshold number of TMs while preventing arbitrary tracing by distributing authority among multiple TMs.
Signature verification plays an important role in document authentication. The efficient and robust system is required for forgery detection in documents in the presence of distortion such as rotation, scaling and noi...
详细信息
Seismic events, globally, are known to impact electricity networks, causing disruptions in the provision of energy and affecting the recovery well-being of communities. Contingency analysis is an established method fo...
详细信息
Machine learning models are the backbone of smart grid optimization, but their effectiveness hinges on access to vast amounts of training data. However, smart grids face critical communication bottlenecks due to the e...
详细信息
Embedded Systems Operations (ESOps) introduces a feature-driven development pipeline for next-generation embedded system, leveraging domain-specific Large Language Models (LLMs) to expedite the development process. Ta...
详细信息
This research concentrates on author profiling using transfer learning models for classifying age and gender. The investigation encompassed a diverse set of transfer learning techniques, including Roberta, BERT, ALBER...
详细信息
Zero-knowledge proof systems are becoming powerful tools in domains like blockchain networks. In this work, we improve abstract interpretation methods to sanity check PLONKish arithmetizations of computation, such as ...
详细信息
Ontology-based test case reduction in regression testing during software testing is a sophisticated approach that leverages semantic knowledge representation to optimize the selection of test cases. By harnessing doma...
详细信息
The current COVID-19 epidemic is responsible for causing a catastrophe on a global scale due to its risky spread. The community’s insecurity is growing as a result of a lack of appropriate remedial measures and immun...
详细信息
暂无评论