Underwater wireless sensor networks(UWSNs)rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the ***,many existing data aggregation techniq...
详细信息
Underwater wireless sensor networks(UWSNs)rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the ***,many existing data aggregation techniques are designed exclusively for static networks and fail to reflect the dynamic nature of underwater ***,conventional multi-hop data gathering techniques often lead to energy depletion problems near the sink,commonly known as the energy hole ***,cluster-based aggregation methods face significant challenges such as cluster head(CH)failures and collisions within clusters that degrade overall network *** address these limitations,this paper introduces an innovative framework,the Cluster-based Data Aggregation using Fuzzy Decision Model(CDAFDM),tailored for mobile *** proposed method has four main phases:clustering,CH selection,data aggregation,and *** CH selection,a fuzzy decision model is utilized to ensure efficient cluster head selection based on parameters such as residual energy,distance to the sink,and data delivery likelihood,enhancing network stability and energy *** the aggregation phase,CHs transmit a single,consolidated set of non-redundant data to the base station(BS),thereby reducing data duplication and saving *** adapt to the changing network topology,the re-clustering phase periodically updates cluster formations and reselects *** results show that CDAFDM outperforms current protocols such as CAPTAIN(Collection Algorithm for underwater oPTical-AcoustIc sensor Networks),EDDG(Event-Driven Data Gathering),and DCBMEC(Data Collection Based on Mobile Edge Computing)with a packet delivery ratio increase of up to 4%,an energy consumption reduction of 18%,and a data collection latency reduction of 52%.These findings highlight the framework’s potential for reliable and energy-efficient data aggregation mobile UWSNs.
Introduction: Several types of cancer can be detected early through thermography, which uses thermal profiles to image tissues in recent years, thermography has gained increasing attention due to its non-invasive and ...
详细信息
Cloud storage is crucial for managing large datasets, but dependence on a single cloud space raises security concerns. Conversely, Distributed Ledger Technology (DLT) provides a secure cloud-based storage system opera...
详细信息
In recent years, transformer-based photo captioning frameworks plays a crucial role in improving individuals’ overall well-being, self-reliance, and inclusivity by giving them access to visual content via written and...
详细信息
Design patterns offer reusable solutions for common software issues,enhancing *** advent of generative large language models(LLMs)marks progress in software development,but their efficacy in applying design patterns i...
详细信息
Design patterns offer reusable solutions for common software issues,enhancing *** advent of generative large language models(LLMs)marks progress in software development,but their efficacy in applying design patterns is not fully *** recent introduction of generative large language models(LLMs)like ChatGPT and CoPilot has demonstrated significant promise in software *** assist with a variety of tasks including code generation,modeling,bug fixing,and testing,leading to enhanced efficiency and *** initial uses of these LLMs have had a positive effect on software development,their potential influence on the application of design patterns remains *** study introduces a method to quantify LLMs’ability to implement design patterns,using Role-Based Metamodeling Language(RBML)for a rigorous specification of the pattern’s problem,solution,and transformation *** method evaluates the pattern applicability of a software application using the pattern’s problem *** deemed applicable,the application is input to the LLM for pattern *** resulting application is assessed for conformance to the pattern’s solution specification and for completeness against the pattern’s transformation *** the method with ChatGPT 4 across three applications reveals ChatGPT’s high proficiency,achieving averages of 98%in conformance and 87%in completeness,thereby demonstrating the effectiveness of the *** RBML,this study confirms that LLMs,specifically ChatGPT 4,have great potential in effective and efficient application of design patterns with high conformance and *** opens avenues for further integrating LLMs into complex software engineering processes.
Breast cancer is a devastating disease that affects women worldwide, and computer-aided algorithms have shown potential in automating cancer diagnosis. Recently Generative Artificial Intelligence (GenAI) opens new pos...
详细信息
As many countries face the challenges of an aging population and declining birth rates, the demand for labor, particularly for assisting the elderly, is increasing. Traditional robots, being standardized products, req...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***...
详细信息
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world *** existing analysis of software security vulnerabilities often focuses on specific features or *** partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the *** key novelty lies in overcoming the constraints of partial *** proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security *** guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each *** guidelines are not only practical but also applicable in real-world software,allowing for prioritized security *** proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related *** analysis resulted in the identification of a total of 121 *** successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.
Resonant operation, exploiting high quality-factor planar inductors, has recently enabled gigahertz (GHz) applications for large-area electronics (LAE), providing a new technology platform for large-scale and flexible...
详细信息
This paper presents a coding approach for achieving omnidirectional transmission of certain common signals in massive multi-input multi-output (MIMO) networks such that the received power at any direction in a cell re...
详细信息
暂无评论