This research focuses on energy-efficient routing in WSNs within IoT contexts, comparing established protocols like SEP, HEED, TEEN with the proposed SEP-ACO protocol. By strategically selecting cluster heads based on...
详细信息
Blockchain technology's decentralized and transparent transaction platforms have changed a number of sectors. However, harmful activities like fraud and money laundering are also drawn to blockchain due to its dis...
详细信息
The technique of determining whether a user is legitimate or not is known as authentication. It needs a secret field (password) that only the actual user knows. Every security system is created in such a way that it m...
详细信息
The emergence of blockchain technology has paved the way for innovative solutions in various domains, including social media. This research paper presents the design and implementation of "SocialChain," a de...
详细信息
ISBN:
(数字)9783031660443
ISBN:
(纸本)9783031660436
The emergence of blockchain technology has paved the way for innovative solutions in various domains, including social media. This research paper presents the design and implementation of "SocialChain," a decentralized social media platform built on the Ethereum blockchain using the Solidity programming language. SocialChain aims to address issues related to data privacy, content ownership, and censorship prevalent in traditional social media platforms. The proposed system leverages blockchain’s inherent properties such as immutability, transparency, and decentralization to create a trustless and secure environment for social interactions. The platform allows users to create posts, share content, and engage in discussions while maintaining ownership and control over their data. The underlying blockchain ensures that the history of posts and interactions remains tamper-proof and verifiable. The core components of the SocialChain smart contract include data structures for posts and comments, functions for creating posts and adding comments, as well as mechanisms for retrieving post-related information. Each user’s identity is associated with their Ethereum address, eliminating the need for traditional authentication methods and enhancing user pseudonymity. To ensure efficiency, the contract optimizes data storage by using mappings and arrays, minimizing gas costs and improving scalability. The contract also incorporates modifiers to validate post and comment existence, enhancing security and preventing unauthorized access. The results of this research showcase the feasibility of integrating blockchain technology into social media platforms. However, it is important to note that while the implementation provides a foundational framework, practical deployment requires addressing challenges such as user experience, scalability, and incentivization mechanisms. In conclusion, SocialChain exemplifies the potential of blockchain technology to revolutionize the landscape of s
Wireless Sensor Actuator Networks (WSANs) are sensitive to cyber threats due to present static encryption techniques. Adaptive security methods are required in WSAN settings to reduce evolving dangers and maintain dat...
详细信息
Downy Mildew, caused by Pseudoperonospora cubensis, poses a serious threat to watermelon (Citrullus lanatus) crops, with the potential to drastically reduce yields and cause substantial economic losses in the agricult...
详细信息
ARIMA algorithm is a classic statistical method used for time series prediction, which ensures the stationarity of data by analyzing autoregressive and moving average components in historical data, as well as necessar...
详细信息
The standardization assessment of handwritten Chinese characters currently often relies on manual feature extraction, which excessively depends on subjective experience and lacks feature extraction capability. To addr...
详细信息
Recently,unmanned aerial vehicles(UAV)or drones are widely employed for several application areas such as surveillance,disaster management,*** UAVs are limited to energy,efficient coordination between them becomes ess...
详细信息
Recently,unmanned aerial vehicles(UAV)or drones are widely employed for several application areas such as surveillance,disaster management,*** UAVs are limited to energy,efficient coordination between them becomes essential to optimally utilize the resources and effective communication among them and base station(BS).Therefore,clustering can be employed as an effective way of accomplishing smart communication systems among multiple *** this aspect,this paper presents a group teaching optimization algorithm with deep learning enabled smart communication system(GTOADL-SCS)technique for UAV *** proposed GTOADL-SCS model encompasses a two stage process namely clustering and *** the initial stage,the GTOADL-SCS model includes a GTOA based clustering scheme to elect cluster heads(CHs)and organize ***,the GTOADL-SCS model develops a fitness function containing three input parameters as residual energy of UAVs,average neighoring distance,and UAV *** classification process,the GTOADLSCS model applies pre-trained densely connected network(DenseNet201)feature extractor with gated recurrent unit(GRU)*** ensuring the enhanced performance of the GTOADL-SCS model,a widespread simulation analysis is performed and the comparative study reported the significant outcomes over the existing approaches with maximum packet delivery ratio(PDR)of 92.60%.
In order to overcome the domain shift problem in person re-identifacation algorithms, the paper proposes a person re-identifacation algorithm oriented towards identity information matrix. Firstly, the algorithm traine...
详细信息
暂无评论