Rapid development in Information technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)*** networks give a safe and more effective driving experie...
详细信息
Rapid development in Information technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)*** networks give a safe and more effective driving experience by presenting time-sensitive and location-aware *** communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with ***,the scheme of an effectual routing protocol for reliable and stable communications is *** research demonstrates that clustering is an intelligent method for effectual routing in a mobile ***,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in *** FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the *** accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust *** the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR *** experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods.
The Telecare Medical Information System (TMIS) faces challenges in securely exchanging sensitive health information between TMIS nodes. A Mutual Authenticated Key Agreement (MAKA) scheme is used to eliminate security ...
详细信息
In today’s digital era, the security of sensitive data such as Aadhaar data is of utmost importance. To ensure the privacy and integrity of this data, a conceptual framework is proposed that employs the Diffie-Hellma...
详细信息
ChatGPT, an advanced language model powered by artificial intelligence, has emerged as a transformative tool in the field of education. This article explores the potential of ChatGPT in revolutionizing learning and co...
详细信息
The upsurge in urbanization is depleting natural resources due to the wide usage of aggregates in construction, posing a menace to further progress. If the contemporary state persists, it becomes a threat for further ...
详细信息
The immunity of multilayer perceptron (MLP) is less effective toward input noise. In this article, we have focused on the robustness of MLP with respect to input noise where noise can be additive or multiplicative. He...
详细信息
Heart disease is a critical concern of healthcare for everyone in today’s era. An effective and noninvasive indication of heart disease is an electrocardiogram (ECG). Understanding regular ECG signal patterns and com...
详细信息
Summarizing lengthy text involves distilling crucial information into a concise form by covering the key events in the source text. Previous researchers mostly explored the supervised approaches for the task, but due ...
详细信息
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul...
详细信息
Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a...
详细信息
暂无评论