Cloud computing offers solutions for various scientific and business applications. Large-scale scientific applications, which are organized as scientific workflows, are carried out using cloud computing. However, the ...
详细信息
In this communication, an improved MIMO antenna array with defected ground structure (DGS) is designed for 5G wireless applications. Its schematic comprises eight radiator elements, situated at the center of an FR-4 p...
详细信息
the article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ...
详细信息
Data gathering is an active research topic for wireless sensor networks WSNs with internet of things IoTs. Optimal data gathering enables collecting sensor data efficiently with minimum cost and energy consumption for...
详细信息
orthogonal and quasi-orthogonal matrices with a limited number of element values and structured in some way are of considerable interest for many technical applications related to image processing and signal coding. T...
详细信息
the issue of ensuring the reliability of the functioning of global systems of remote online monitoring of the condition of patients is considered. Remote monitoring is in demand when supervision the health status of d...
详细信息
With the worldwide transport infrastructural development, there are several connecting roads between the cities for transportation. Some of these roads are smooth, and some are very rough, which invites some risks dur...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw...
详细信息
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)networks may be vulnerable to several routing ***’s why a network intrusion detection system(NIDS)is needed to guard against routing assaults on RPL-based IoT *** imbalance between the false and valid attacks in the training set degrades the performance of machine learning employed to detect network ***,we propose in this paper a novel approach to balance the dataset classes based on metaheuristic optimization applied to locality-sensitive hashing and synthetic minority oversampling technique(LSH-SMOTE).The proposed optimization approach is based on a new hybrid between the grey wolf and dipper throated optimization *** prove the effectiveness of the proposed approach,a set of experiments were conducted to evaluate the performance of NIDS for three cases,namely,detection without dataset balancing,detection with SMOTE balancing,and detection with the proposed optimized LSHSOMTE *** results showed that the proposed approach outperforms the other approaches and could boost the detection *** addition,a statistical analysis is performed to study the significance and stability of the proposed *** conducted experiments include seven different types of attack cases in the RPL-NIDS17 *** on the 2696 CMC,2023,vol.74,no.2 proposed approach,the achieved accuracy is(98.1%),sensitivity is(97.8%),and specificity is(98.8%).
Optical speed sensors based on the spatial frequency filter method are a proven technology that offer high measurement accuracy over a wide speed range. Newly developed variants also enable measurements at very low sp...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc...
详细信息
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protocol becomes a major concern in the ***,MANET’s lack of infrastructure,unpredictable topology,and restricted resources,as well as the lack of a previously permitted trust relationship among connected nodes,contribute to the attack detection burden.A novel detection approach is presented in this paper to classify passive and active black-hole *** proposed approach is based on the dipper throated optimization(DTO)algorithm,which presents a plausible path out of multiple paths for statistics transmission to boost MANETs’quality of service.A group of selected packet features will then be weighed by the DTO-based multi-layer perceptron(DTO-MLP),and these features are collected from nodes using the Low Energy Adaptive Clustering Hierarchical(LEACH)clustering *** is a powerful classifier and the DTO weight optimization method has a significant impact on improving the classification process by strengthening the weights of key features while suppressing the weights ofminor *** hybridmethod is primarily designed to combat active black-hole *** the LEACH clustering phase,however,can also detect passive black-hole *** effect of mobility variation on detection error and routing overhead is explored and evaluated using the suggested *** diverse mobility situations,the results demonstrate up to 97%detection accuracy and faster execution ***,the suggested approach uses an adjustable threshold value to make a correct conclusion regarding whether a node is malicious or benign.
暂无评论