In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,***,the sensor nodes of WSNs ar...
详细信息
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,***,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to *** recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and *** traditional models,the solution has been made for defending the networks,only to specific ***,in real-time applications,the kind of attack that is launched by the adversary is not ***,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be *** that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various ***,for efficient model design,the work includes the part of feature evaluation of some general attacks of *** IDRM also includes determination of optimal secure paths and Node security for secure routing *** performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN *** is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.
Digital data is growing vastly and is generated from different sources in a structured manner, and the management of this high volume of data is critical, forcing clients to use storage services. The cloud storage ser...
详细信息
Abnormal behavior detection is challenging and one of the growing research areas in computer *** main aim of this research work is to focus on panic and escape behavior detections that occur during unexpected/uncertai...
详细信息
Abnormal behavior detection is challenging and one of the growing research areas in computer *** main aim of this research work is to focus on panic and escape behavior detections that occur during unexpected/uncertain *** this work,Pyramidal Lucas Kanade algorithm is optimized using EME-HOs to achieve the *** stage,OPLKT-EMEHOs algorithm is used to generate the opticalflow from *** stage,the MIIs opticalflow is applied as input to 3 layer CNN for detect the abnormal crowd *** of Minnesota(UMN)dataset is used to evaluate the proposed *** experi-mental result shows that the proposed method provides better classification accu-racy by comparing with the existing *** method provides 95.78%of precision,90.67%of recall,93.09%of f-measure and accuracy with 91.67%.
Blockchain architecture is a multi-layered system with various components that work together to ensure stability, security, and efficiency. The bottom layer, the Data Layer, holds transactions and data, while the Cons...
详细信息
Skin health is a critical concern for humans, especially in geographical areas where environmental conditions and lifestyle factors adversely affect their condition, leading to a prevalence of skin diseases. This issu...
详细信息
Information communications technology (ICT) refers to the technology used for communication and managing information must be utilized to enhance the environment, economics, mobility, and governance, among other facets...
详细信息
Hypertension, also referred to as high blood pressure, is a condition arising from the consistently high blood pressure against artery walls. The volume and output of blood from the heart primarily control blood press...
详细信息
Wireless body sensor networks have gained significant importance across diverse fields, including environmental monitoring, healthcare, and sports. This research is concentrated on sports applications, specifically ex...
详细信息
Crowd management and analysis(CMA)systems have gained a lot of interest in the vulgarization of unmanned aerial vehicles(UAVs)*** tracking using UAVs is among the most important services provided by a *** this paper,w...
详细信息
Crowd management and analysis(CMA)systems have gained a lot of interest in the vulgarization of unmanned aerial vehicles(UAVs)*** tracking using UAVs is among the most important services provided by a *** this paper,we studied the periodic crowd-tracking(PCT)*** consists in usingUAVs to follow-up crowds,during the life-cycle of an open crowded area(OCA).Two criteria were considered for this *** first is related to the CMA initial investment,while the second is to guarantee the quality of service(QoS).The existing works focus on very specified assumptions that are highly committed to CMAs applications *** study outlined a new binary linear programming(BLP)model to optimally solve the PCT motivated by a real-world application study taking into consideration the high level of *** closely approach different real-world contexts,we carefully defined and investigated a set of parameters related to the OCA characteristics,behaviors,and theCMAinitial infrastructure investment(e.g.,UAVs,charging stations(CSs)).In order to periodically update theUAVs/crowds andUAVs/CSs assignments,the proposed BLP was integrated into a linear algorithm called PCTs *** main objective was to study the PCT problem fromboth theoretical and numerical *** prove the PCTs solver effectiveness,we generated a diversified set of PCTs instances with different scenarios for simulation *** empirical results analysis enabled us to validate the BLPmodel and the PCTs solver,and to point out a set of new challenges for future research directions.
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism wit...
详细信息
Capturing the distributed platform with remotely controlled compromised machines using botnet is extensively analyzed by various ***,certain limitations need to be addressed *** provisioning of detection mechanism with learning approaches provides a better solution more broadly by saluting multi-objective *** bots’patterns or features over the network have to be analyzed in both linear and non-linear *** linear and non-linear features are composed of high-level and low-level *** collected features are maintained over the Bag of Features(BoF)where the most influencing features are collected and provided into the classifier ***,the linearity and non-linearity of the threat are evaluated with Support Vector Machine(SVM).Next,with the collected BoF,the redundant features are eliminated as it triggers overhead towards the predictor ***,a novel Incoming data Redundancy Elimination-based learning model(RedE-L)is built to classify the network features to provide robustness towards BotNets *** simulation is carried out in MATLAB environment,and the evaluation of proposed RedE-L model is performed with various online accessible network traffic dataset(benchmark dataset).The proposed model intends to show better tradeoff compared to the existing approaches like conventional SVM,C4.5,RepTree and so ***,various metrics like Accuracy,detection rate,Mathews Correlation Coefficient(MCC),and some other statistical analysis are performed to show the proposed RedE-L model's *** F1-measure is 99.98%,precision is 99.93%,Accuracy is 99.84%,TPR is 99.92%,TNR is 99.94%,FNR is 0.06 and FPR is 0.06 respectively.
暂无评论