Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is *** uses have expanded in lockstep with its *** to its instab...
详细信息
Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is *** uses have expanded in lockstep with its *** to its instability in usage and the fact that numerous nodes communicate data concur-rently,adequate channel and forwarder selection is *** this proposed design for a Cognitive Radio Cognitive Network(CRCN),we gain the confidence of each forwarding node by contacting one-hop and second level nodes,obtaining reports from them,and selecting the forwarder appropriately with the use of an optimization *** that point,we concentrate our efforts on their channel,selection,and lastly,the transmission of data packets via the designated *** simulation work is validated in this section using the MATLAB ***,steps show how the node acts as a confident forwarder and shares the channel in a compatible method to communicate,allowing for more packet bits to be transmitted by conveniently picking the channel between *** cal-culate the confidence of the node at the start of the network by combining the reliability report for thefirst hop and the reliability report for the secondary *** then refer to the same node as the confident node in order to operate as a *** a result,we witness an increase in the leftover energy in the *** percentage of data packets delivered has also increased.
The security of integrated circuits is crucial due to their wide range of applications in modern gadgets. An unauthorized access (i.e., third-party access) or a security breach in the logic-locked system can pose a gr...
详细信息
The growing advancements with the Internet of Things(IoT)devices handle an enormous amount of data collected from various applications like healthcare,vehicle-based communication,and smart *** research analyses cloud-...
详细信息
The growing advancements with the Internet of Things(IoT)devices handle an enormous amount of data collected from various applications like healthcare,vehicle-based communication,and smart *** research analyses cloud-based privacy preservation over the smart city based on query ***,there is a lack of resources to handle the incoming data and maintain them with higher privacy and ***,a solution based idea needs to be proposed to preserve the IoT data to set an innovative city environment.A querying service model is proposed to handle the incoming data collected from various environments as the data is not so trusted and highly sensitive towards *** handling privacy,other inter-connected metrics like efficiency are also essential,which must be considered to fulfil the privacy ***,this work provides a query-based service model and clusters the query to measure the relevance of frequently generated ***,a Bag of Query(BoQ)model is designed to collect the query from various *** is done with a descriptive service provisioning model to cluster the query and extract the query’s summary to get thefinal *** processed data is preserved over the cloud storage system and optimized using an improved Grey Wolf Opti-mizer(GWO).It is used to attain global and local solutions regarding privacy *** iterative data is evaluated without any over-fitting issues and computational complexity due to the tremendous data handling *** on this analysis,metrics like privacy,efficiency,computational complexity,the error rate is *** simulation is done with a MATLAB 2020a *** proposed model gives a better trade-off in contrast to existing approaches.
Aim: Recent advances in Artificial Intelligence (AI) and the addition of Deep Learning (DL) have made it possible to analyse both real-time and historical data from the Internet of Things (IoT). Recently, IoT technolo...
详细信息
Recommender systems are techniques designed to enhance user experience in various domains. They suggest relevant items to users based on their behavior and preferences (Linyuan et al. Feb 2012). These systems are bein...
详细信息
The 3GPP vehicle-to-everything (C-V2X) technology is a key solution to provide communication services for applications of intelligent transportation systems (ITS). According to the C-V2X specification, vehicles are al...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
Weed is a plant that grows along with nearly allfield crops,including rice,wheat,cotton,millets and sugar cane,affecting crop yield and *** and accurate identification of all types of weeds is a challenging task for f...
详细信息
Weed is a plant that grows along with nearly allfield crops,including rice,wheat,cotton,millets and sugar cane,affecting crop yield and *** and accurate identification of all types of weeds is a challenging task for farmers in earlier stage of crop growth because of *** address this issue,an efficient weed classification model is proposed with the Deep Convolutional Neural Network(CNN)that implements automatic feature extraction and performs complex feature learning for image *** this work,weed images were trained using the proposed CNN model with evolutionary computing approach to classify the weeds based on the two publicly available weed *** Tamil Nadu Agricultural University(TNAU)dataset used as afirst dataset that consists of 40 classes of weed images and the other dataset is from Indian Council of Agriculture Research–Directorate of Weed Research(ICAR-DWR)which contains 50 classes of weed *** effective Particle Swarm Optimization(PSO)technique is applied in the proposed CNN to automa-tically evolve and improve its classification *** proposed model was evaluated and compared with pre-trained transfer learning models such as GoogLeNet,AlexNet,Residual neural Network(ResNet)and Visual Geometry Group Network(VGGNet)for weed *** work shows that the performance of the PSO assisted proposed CNN model is significantly improved the success rate by 98.58%for TNAU and 97.79%for ICAR-DWR weed datasets.
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io...
详细信息
3GPP edge and fog computing paradigms provide computational services to users at low latency. These paradigms alone are not enough to fulfill the users’ requirements completely. Therefore, a federation among these co...
详细信息
暂无评论