Starting with the advent of the Internet, the concept of online distance education became a more vibrant and viable alternative and has grown rapidly. With the arrival of the COVID-19 pandemic and low-cost Internet-ba...
详细信息
The wireless network is limited by the transmission medium,and the transmission process is subject to large interference and *** jitter can cause sporadic loss and is mistaken for congestion by the congestion control ...
详细信息
The wireless network is limited by the transmission medium,and the transmission process is subject to large interference and *** jitter can cause sporadic loss and is mistaken for congestion by the congestion control *** TCP Westwood protocol(referred to as TCPW)is such that it cannot distinguish between congestion loss and wireless jitter loss,which makes the congestion mechanism too sensitive and reduces bandwidth *** on this,the TCPW protocol is modified based on the estimate of the Round-Trip Time(referred to as RTT)value-called TCPW *** algorithm uses the measured smooth RTT value and divides the congestion level according to the weighted average idea to determine congestion loss and wireless jitter *** simulation results show that the TCPW BR algorithm enhances the wireless network’s ability to judge congestion and random errors.
The present work encompasses a new image enhancement algorithm using newly constructed Chebyshev fractional order differentiator. We have used Chebyshev polynomials to design Chebyshev fractional order differentiator....
详细信息
The present work encompasses a new image enhancement algorithm using newly constructed Chebyshev fractional order differentiator. We have used Chebyshev polynomials to design Chebyshev fractional order differentiator. We have generated the high pass filter corresponding to it. The designed filters are applied for decomposing the input image into four bands and low-low(L-L) sub-band is updated using correction coefficients. Reconstructed image with updated L-L sub-band provides the enhanced image. The visual results obtained are encouraging for image enhancement. The applicability of the developed algorithm is illustrated on three different test *** effects of order of differentiation on the edges of images have also been presented and discussed.
The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time *** IoT's foremost task is ensuring that there is proper communication among different types ...
详细信息
The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time *** IoT's foremost task is ensuring that there is proper communication among different types of applications and devices,and that the application layer protocols fulfill this ***,as the number of applications grows,it is necessary to modify or enhance the application layer protocols according to specific IoT applications,allowing specific issues to be addressed,such as dynamic adaption to network conditions and ***,several IoT application layer protocols have been enhanced and modified according to application ***,no existing survey articles focus on these *** this article,we survey traditional and recent advances in IoT application layer protocols,as well as relevant real-time applications and their adapted application layer protocols for improving *** changing the nature of protocols for each application is unrealistic,machine learning offers means of making protocols intelligent and is able to adapt *** this context,we focus on providing open challenges to drive IoT application layer protocols in such a direction.
One of the major challenges in bioinformatics lies in identification of modified gene expressions of an affected person due to medical ailments. Focused research has been observed till date in such identification, lea...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(...
详细信息
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(BPSK)modulation and can be operated with two frequency bands,868 and 915 *** frequency noise could interfere with the BPSK signal,which causes distortion to the signal before its arrival at ***,filtering the BPSK signal from noise is essential to ensure carrying the signal from the sen-der to the receiver with less ***,removing signal noise in the BPSK signal is necessary to mitigate its negative sequences and increase its capability in industrial wireless sensor ***,researchers have reported a posi-tive impact of utilizing the Kalmen filter in detecting the modulated signal at the receiver side in different communication systems,including ***-while,artificial neural network(ANN)and machine learning(ML)models outper-formed results for predicting signals for detection and classification *** paper develops a neural network predictive detection method to enhance the performance of BPSK ***,a simulation-based model is used to generate the modulated signal of BPSK in the IEEE802.15.4 wireless personal area network(WPAN)***,Gaussian noise was injected into the BPSK simulation *** reduce the noise of BPSK phase signals,a recurrent neural networks(RNN)model is implemented and integrated at the receiver side to esti-mate the BPSK’s phase *** evaluated our predictive-detection RNN model using mean square error(MSE),correlation coefficient,recall,and F1-score *** result shows that our predictive-detection method is superior to the existing model due to the low MSE and correlation coefficient(R-value)metric for different signal-to-noise(SNR)*** addition,our RNN-based model scored 98.71%and 96.34%based on recall and F1-score,respectively.
In the context of mobile edge computing, achieving dynamic service caching and updating to guarantee the QoS of users and reduce system costs is a challenging problem. However, existing research still has certain defi...
详细信息
A method using message redirection mechanism to reduce communication overhead of an SOA (Service Oriented Application) based enterprise application is proposed. First, an SOA enterprise application design is modeled a...
详细信息
Wireless communication has become a basic utility in personal and business life such that it becomes a fundamental of our lives and this communication uses the radio spectrum for data transfer. There are issues in usi...
详细信息
暂无评论