Hydroponic plants require regular monitoring of plants that grow well and can even cause plants to die. Because too late in providing nutrition or getting too little or too little food or routine monitoring in the hyd...
详细信息
Preeclampsia is a pregnancy complication characterized by high blood pressure and signs of damage to another organ system, most often the liver and kidneys. Preeclampsia usually begins after 20 weeks of pregnancy in w...
详细信息
Mobile Adhoc Networks (MANETs) is an emerging technology in both the industrial and academic research. The major drawback in MANETs is improving the battery capacity. MANETs are dynamic in nature therefore during comm...
Mobile Adhoc Networks (MANETs) is an emerging technology in both the industrial and academic research. The major drawback in MANETs is improving the battery capacity. MANETs are dynamic in nature therefore during communication it consumes more energy that reduces the overall energy efficiency of the network. Many past and present researches are concern about this problem. In this paper, Energy Preservation in MANETs using Self-Adaptive Cluster Head Selection with Advanced Genetic Algorithm (EPMSA-CHAG) approach is proposed where the CH selection is performed using two segments; they are initial parameter based on CH selection and Advanced Genetic Algorithm (AGA) based CH selection. At the initial stage the parameters which are considered for the CH selection are node degree, node stability, distance, residual energy, and speed and delivery rate. Using these parameters are the best fit for CH selection is chosen then in order to find the optimal best fit from the best fit calculation, Advanced Genetic Algorithm (AGA). The proposed EPMSA-CHAG approach is simulated using NS2 and the parameters which are considered for the performance analysis are packet delivery rate, energy efficiency, end to end delay, routing overhead and throughput. The methods that are taken for the comparative analysis are HLSPM-CHSR and HAMBO-CHLD. From the results calculated it is proven that the proposed EPMSA-CHAG approach achieved high packet delivery rate, energy efficiency and throughput as well as lower end to end delay and routing overhead when compared with the earlier methods HLSPM-CHSR and HAMBO-CHLD.
Raspberry Pi is a mini-computer that is provided to carry out activities quickly and precisely, but Raspberry Pi was created to not be able to do the real-time system with the support of Windows 10 IoT operating syste...
详细信息
This research is about smooth support vector machine (SSVM) and Decision Tree in data mining. Many researchers conduct and develop methods to improve the accuracy and classification of data on good results. This resea...
详细信息
In this millennial era, a large amount of digital data traffic going through communication media on digital technology every day. Most of the data are documents and other essential information. The existing rapid deve...
详细信息
Today, almost everyone has done online shopping activities. The presence of e-commerce makes it easier for humans to do shopping. E-commerce companies compete to provide the best service to the community. One of them ...
Today, almost everyone has done online shopping activities. The presence of e-commerce makes it easier for humans to do shopping. E-commerce companies compete to provide the best service to the community. One of them is in the delivery within the city. In terms of city delivery, the 2E-VRP model has been discussed a lot lately in terms of consolidating shipments. This study aims to present the 2E-VRP mathematical model and work in two stages to find a solution. In this article, the author also compares solutions with several heuristic models including 2-opt, repetitive nearest neighbor, nearest neighbor, farthest insertion, cheapest insertion, arbitrary insertion, and nearest insertion. From the results of research conducted by the 2-opt method, farthest insertion, cheapest insertion, and nearest insertion, the total distance is the best, all three get the same distance, then followed by the nearest insertion, arbitrary insertion, and nearest insertion methods.
Indonesia meets the needs of 50% of the world's palm oil needs. Sources of Indonesian palm oil, 34 % are produced by independent smallholders. The lack of governance of independent smallholders leads to low produc...
Indonesia meets the needs of 50% of the world's palm oil needs. Sources of Indonesian palm oil, 34 % are produced by independent smallholders. The lack of governance of independent smallholders leads to low productivity of their crops. Global market demands for palm oil derivative sources become an obligation to compete. The development of blockchain technology that favors traceability and transparency is applied in the supply agriculture sector, and this is an opportunity for how blockchain technology can help the palm oil supply chain become transparent and can find its source. This research uses the system development life cycle (SDLC) method. And business process model and notation in business model design. The results of the design of the FFB sale and purchase transaction system with blockchain technology have succeeded in connecting farmer transactions as FFB providers with traders and PKS as FFB buyers. Every transaction sent by the farmer will be locked by a hash, as immunity makes the data sent immutable. The system can display the traceability of transactions while maintaining the integrity of member information.
Motion planning for many unmanned aircraft is challenging because they have a larger configuration space than self-driving automobile development (Automated guided vehicles). Additionally, there are more significant u...
详细信息
Motion planning for many unmanned aircraft is challenging because they have a larger configuration space than self-driving automobile development (Automated guided vehicles). Additionally, there are more significant uncertainties and disruptions in UAV environments, which makes inter automatic navigation more difficult. In this letter, I proposed a 2 recurrent neural networks (RL) oriented multi-UAV collision avoidance technique by modeling the unpredictability or noise in the environment. Our objective is to create a strategy that can construct a path without clashing with anything using local noisy data. But unlike supervised algorithms, RL lacks a steady training data set with floor labels, thus its collision avoidance strategies often show significant fluctuation and are difficult to reproduce. To solve these issues, we created a two-stage training method for RL-based collision avoidance. We first optimize the policy, and then we utilize a supervised learning methodology with a loss function that encourages the agents to adopt the well-known reciprocity obstacle detection mechanism. In the second step, we use transmission to fine-tune the policy. The complete computer simulation findings demonstrate that this approach can handle noisy local views with erratic sound levels and can design moment & accident paths under inadequate sensing. We review the impact of our policies in a variety of ways.
Inundating a system, network, or application with traffic is the goal of Denial of Service (DoS) attacks, a disruptive form of attack. SSL DoS attacks, particularly those involving renegotiation, are of particular con...
Inundating a system, network, or application with traffic is the goal of Denial of Service (DoS) attacks, a disruptive form of attack. SSL DoS attacks, particularly those involving renegotiation, are of particular concern. In order to address these types of attacks, the study proposes several security measures, including rate restriction, session caching, SSL acceleration, and integrating Intrusion Detection Systems (IDS) with a systematic technique method to reduce the risks associated with SSL renegotiation DoS attacks. This study investigates the security measures for preventing and mitigating SSL DoS attacks, with a focus on renegotiation attacks. It offers advice and insights for protecting systems to SSL server administrators and network security professionals by doing rate restriction, session caching, and SSL acceleration to avoid SSL DoS attacks.
暂无评论