Opioid abuse and dependence have emerged as a pressing global concern, posing significant challenges to public health and society. Early identification and prediction of opioid dependency represent crucial steps in mi...
详细信息
The Wireless Sensor Networks(WSNs)are characterized by their widespread deployment due to low cost,but the WSNs are vulnerable to various types of *** defend against the attacks,an effective security solution is ***,t...
详细信息
The Wireless Sensor Networks(WSNs)are characterized by their widespread deployment due to low cost,but the WSNs are vulnerable to various types of *** defend against the attacks,an effective security solution is ***,the limits of these networks’battery-based energy to the sensor are the most critical impediments to selecting cryptographic ***,finding a suitable algorithm that achieves the least energy consumption in data encryption and decryption and providing a highly protected system for data remains the fundamental *** this research,the main objective is to obtain data security during transmission by proposing a robust and low-power encryption algorithm,in addition,to examining security algorithms such as ECC and MD5 based on previous *** this research,the Energy Saving and Securing Data algorithm(ESSD)algorithm is introduced,which provides the Message Digest 5(MD5)computation simplicity by modifying the Elliptic Curve Cryptography(ECC)under the primary condition of power *** three algorithms,ECC,MD5,and ESSD,are applied to Low Energy Adaptive Clustering Hierarchy(LEACH)and Threshold-sensitive Energy Efficient Sensor Network Protocol(TEEN)hierarchical routing algorithms which are considered the most widely used in *** results of security methods under the LEACH protocol show that all nodes are dead at 456,496,and 496,respectively,to ECC,MD5,and *** results of security methods under the TEEN protocol show that the test ends at 3743,4815,and 4889,respectively,to ECC,MD5,and *** on these results,the ESSD outperforms better in terms of increased security and less power *** addition,it is advantageous when applied to TEEN protocol.
A comprehensive assessment of blood cell components serves as a pivotal step in recognizing specific health issues in individuals. The analysis of life-Threatening conditions like myeloma and thrombocytopenia undersco...
详细信息
Aiming at the problem that the iForest algorithm is not sensitive enough to local anomalies and produces a large number of false alarms in the detection results on some low sea state datasets, this paper proposes the ...
详细信息
作者:
Vijay, MargretJayan, J.P.
Department of Computer Science Tamil Nadu India
Department of Software Engineering Tamil Nadu India
This study explores the evolving landscape of adaptive gamification-related research from 2014 to 2022. A comprehensive analysis of 1110 documents from journals and books was conducted to investigate publication trend...
详细信息
3D human pose estimation is an important premise for human behavior analysis and understanding, which has a wide range of applications in intelligent transportation, human-computer interaction, and animation productio...
详细信息
This comprehensive review starts with diving into the progress and real-world applications of combining multi-omics data analysis with machine learning techniques in cancer research. Multi-omics involves examining var...
详细信息
The paper proposes a cryptographic protocol two-factor authentication with the zero-knowledge over the extended field GF(2m) on elliptic curves using biometric data and private key of the user. The implementation of a...
详细信息
This study proposes a cutting tool condition monitoring platform for CNC machines used in metal part manufacturing to estimate tool wear values. The PHM 2010 Dataset, along with operational and situational data from C...
详细信息
This paper addresses the problem of predicting population density leveraging cellular station *** wireless communication devices are commonly used,cellular station data has become integral for estimating population fi...
详细信息
This paper addresses the problem of predicting population density leveraging cellular station *** wireless communication devices are commonly used,cellular station data has become integral for estimating population figures and studying their movement,thereby implying significant contributions to urban ***,existing research grapples with issues pertinent to preprocessing base station data and the modeling of population *** address this,we propose methodologies for preprocessing cellular station data to eliminate any irregular or redundant *** preprocessing reveals a distinct cyclical characteristic and high-frequency variation in population ***,we devise a multi-view enhancement model grounded on the Transformer(MVformer),targeting the improvement of the accuracy of extended time-series population *** experiments,conducted on the above-mentioned population dataset using four alternate Transformer-based models,indicate that our proposedMVformer model enhances prediction accuracy by approximately 30%for both univariate and multivariate time-series prediction *** performance of this model in tasks pertaining to population prediction exhibits commendable results.
暂无评论