Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)*** networks give a safe and more effective driving experie...
详细信息
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)*** networks give a safe and more effective driving experience by presenting time-sensitive and location-aware *** communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with ***,the scheme of an effectual routing protocol for reliable and stable communications is *** research demonstrates that clustering is an intelligent method for effectual routing in a mobile ***,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in *** FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the *** accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust *** the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR *** experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods.
In the evolving landscape of smart cities, employment strategies have been steering towards a more personalized approach, aiming to enhance job satisfaction and boost economic efficiency. This paper explores an advanc...
详细信息
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security *** security technology based on the physi...
详细信息
Many Internet of things application scenarios have the characteristics of limited hardware resources and limited energy supply,which are not suitable for traditional security *** security technology based on the physicalmechanism has attracted extensive *** to improve the key generation rate has always been one of the urgent problems to be solved in the security technology based on the physical *** this paper,superlattice technology is introduced to the security field of Internet of things,and a high-speed symmetric key generation scheme based on superlattice for Internet of things is *** order to ensure the efficiency and privacy of data transmission,we also combine the superlattice symmetric key and compressive sensing technology to build a lightweight data transmission scheme that supports data compression and data encryption at the same *** analysis and experimental evaluation results show that the proposed scheme is superior to the most closely related work.
The Internet of Things (IoT) has become an emerging technology and is expected to connect billions of more devices to the internet in the near future. With time, more and more devices like wearables, intelligent home ...
详细信息
This research focuses on the use of machine learning methods, especially Random Forest, in designing tuberculosis drugs more effectively and efficiently. The research process begins with the creation of a QSAR (Quanti...
详细信息
Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their data and privacy. A well-known method for preventing individual...
详细信息
Monocular Depth Estimation (MDE) enables the prediction of scene depths from a single RGB image, having been widely integrated into production-grade autonomous driving systems, e.g., Tesla Autopilot. Current adversari...
Two packet scheduling algorithms for rechargeable sensor networks are proposed based on the signal to interference plus noise ratio *** allocate different transmission slots to conflicting packets and overcome the cha...
详细信息
Two packet scheduling algorithms for rechargeable sensor networks are proposed based on the signal to interference plus noise ratio *** allocate different transmission slots to conflicting packets and overcome the challenges caused by the fact that the channel state changes quickly and is *** first algorithm proposes a prioritybased framework for packet scheduling in rechargeable sensor *** packet is assigned a priority related to the transmission delay and the remaining energy of rechargeable batteries,and the packets with higher priority are scheduled *** second algorithm mainly focuses on the energy efficiency of *** priorities are related to the transmission distance of packets,and the packets with short transmission distance are scheduled *** sensors are equipped with low-capacity rechargeable batteries,and the harvest-store-use model is *** consider imperfect *** is,the battery capacity is limited,and battery energy leaks over *** energy harvesting rate,energy retention rate and transmission power are *** simulation results indicate that the battery capacity has little effect on the packet scheduling ***,the algorithms proposed in this paper are very suitable for wireless sensor networks with low-capacity batteries.
Since the advent of smartphones, capturing images has become deeply embedded in human behavior, evolving into a fundamental part of daily life. Research into human perception of image quality is crucial as people freq...
详细信息
Potato crops are vital to global food security, but they are susceptible to several diseases that hinder growth and yield. Traditional methods of detecting these diseases rely on labor-intensive lab tests and human ob...
详细信息
暂无评论