This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication...
详细信息
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication links may be *** paper proposes deploying an intelligent reflecting surface(IRS)on the UAV to enhance the communication performance of mobile vehicles,improve system flexibility,and alleviate eavesdropping on communication *** links for uploading task data from vehicles to a base station(BS)are protected by IRS-assisted physical layer security(PLS).Upon receiving task data,the computing resources provided by the edge computing servers(MEC)are allocated to vehicles for task *** blockchain-based computation offloading schemes typically focus on improving network performance,such as minimizing energy consumption or latency,while neglecting the Gas fees for computation offloading and the costs required for MEC computation,leading to an imbalance between service fees and resource *** paper uses a utility-oriented computation offloading scheme to balance costs and *** paper proposes alternating phase optimization and power optimization to optimize the energy consumption,latency,and communication secrecy rate,thereby maximizing the weighted total utility of the *** results demonstrate a notable enhancement in the weighted total system utility and resource utilization,thereby corroborating the viability of our approach for practical applications.
The grading of fruits relies on inspections, experiences, and observations, with a proposed system integrating machine learning techniques to assess fruit freshness. By analyzing 2D fruit portrayals based on shape and...
详细信息
Using an aspect-based sentiment analysis task, sentiment polarity towards specific aspect phrases within the same sentence or document is to be identified. The process of mechanically determining the underlying attitu...
详细信息
Global trading is undergoing significant changes, necessitating modifications to the trading strategies. This study presents a newly developed cloud-based trading strategy that uses Amazon Web Services (AWS), machine ...
详细信息
As cryptocurrencies become more popular as investment vehicles, bitcoin draws interest from businesses, consumers, and computer scientists all across the world. Bitcoin is a computer file stored in digital wallet appl...
详细信息
Multi-focus image fusion is a technique that combines multiple out-of-focus images to enhance the overall image quality. It has gained significant attention in recent years, thanks to the advancements in deep learning...
详细信息
Message Queuing Telemetry Transport (MQTT) has emerged as the widely adopted application layer protocol for IoT environments because of its lightweight header, minimal power, and bandwidth requirements. Despite its po...
详细信息
Message Queuing Telemetry Transport (MQTT) has emerged as the widely adopted application layer protocol for IoT environments because of its lightweight header, minimal power, and bandwidth requirements. Despite its popularity, the earlier version of the protocol, MQTT v3.1.1, encounters performance issues in large-scale implementations and required an update to handle the growing requirements of modern IoT applications. In response to these concerns, MQTT v5.0 was released with several significant features designed to enhance the reliability, user experience, and performance of IoT systems. While the MQTT protocol features were intended to facilitate robust and efficient communications, adversaries could exploit these features to mount various types of attacks in IoT deployments. More specifically, the Denial of Service (DoS) attacks towards the MQTT protocol have recently gained a lot of attention from the research community. However, the existing works primarily focus only on exploring the possibilities of misusing the MQTT v3.1.1 protocol features to generate DoS attacks in IoT realms. In this work, we attempt to extensively investigate the advanced protocol features of MQTT v5.0 that can be exploited to launch DDoS attacks impacting the IoT paradigm. We present the first critical evaluation of Distributed Denial of Service (DDoS) attacks on the MQTT v5.0 protocol by analyzing three significant features: CONNECT Properties, User Properties, and Flow Control. Moreover, we systematically propose attack scenarios based on the adversary's capabilities, thus illustrating the practicality of proposed attacks in real-world scenarios. Furthermore, we built a real-world testbed for IoT healthcare application to evaluate the severity of the identified attacks. The experimental results demonstrate the effectiveness of these attacks in impacting the availability of guaranteed IoT services to legitimate users, even in times of need. Additionally, we disclose the insightful fi
Wireless Sensor Network(WSNs)consists of a group of nodes that analyze the information from surrounding *** sensor nodes are responsible for accumulating and exchanging ***,node local-ization is the process of identif...
详细信息
Wireless Sensor Network(WSNs)consists of a group of nodes that analyze the information from surrounding *** sensor nodes are responsible for accumulating and exchanging ***,node local-ization is the process of identifying the target node’s *** this research work,a Received Signal Strength Indicator(RSSI)-based optimal node localization approach is proposed to solve the complexities in the conventional node localization ***,the RSSI value is identified using the Deep Neural Network(DNN).The RSSI is conceded as the range-based method and it does not require special hardware for the node localization process,also it consumes a very minimal amount of cost for localizing the nodes in 3D *** position of the anchor nodes is fixed for detecting the location of the ***,the optimal position of the target node is identified using Hybrid T cell Immune with Lotus Effect Optimization algorithm(HTCI-LEO).During the node localization process,the average localization error is minimized,which is the objective of the optimal node *** the regular and irregular surfaces,this hybrid algorithm effectively performs the localization *** suggested hybrid algorithm converges very fast in the three-dimensional(3D)*** accuracy of the proposed node localization process is 94.25%.
Load forecasting plays a crucial role in mitigating risks for utilities by predicting future usage of commodity markets transmission or supplied by the utility. To achieve this, various techniques such as price elasti...
详细信息
Load forecasting plays a crucial role in mitigating risks for utilities by predicting future usage of commodity markets transmission or supplied by the utility. To achieve this, various techniques such as price elastic demand, climate and consumer response, load analysis, and sustainable energy generation predictive modelling are used. As both supply and demand fluctuate, and weather and power prices can rise significantly during peak periods, accurate load forecasting becomes critical for utilities. By providing brief demand forecasts, load forecasting can assist in estimating load flows and making decisions that prevent overloading. Therefore, load forecasting is crucial in helping electric utilities make informed decisions related to power, load switching, voltage regulation, switching, and infrastructure development. Forecasting is a methodology used by electricity companies to forecast the amount of electricity or power production needed to maintain constant supply as well as load demand balance. It is required for the electrical industry to function properly. The smart grid is a new system that enables electricity providers and customers to communicate in real-time. The precise energy consumption sequence of the consumers is required to enhance the demand schedule. This is where predicting the future comes into play. Forecasting future power system load (electricity consumption) is a critical task in providing intelligence to the power grid. Accurate forecasting allows utility companies to allocate resources and assume system control in order to balance the same demand and availability for electricity. In this article, a study on load forecasting algorithms based on deep learning, machine learning, hybrid methods, bio-inspired techniques, and other techniques is carried out. Many other algorithms based on load forecasting are discussed in this study. Different methods of load forecasting were compared using three performance indices: RMSE (Root Mean Square Err
Web applications have become essential tools for communication, commerce, and information dissemination in an era where the internet is pivotal in our daily lives. However, as the digital landscape continues to evolve...
详细信息
暂无评论