For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul...
详细信息
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network *** saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor *** of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to *** increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor *** Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster *** data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the ***,the MCH overhead *** the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods.
In this research, we propose a neat dual-tampering detection approach to further retrieve the forged content of 1080p images. The recovering of actual information is derived from the low-frequency components of the se...
详细信息
In today's surplus world, wi-fi sensor networks are essential for many systems. This network encapsulates sensor nodes powered by irreplaceable batteries, preserving a fixed topology for displaying specific locati...
详细信息
Hate speech is a serious issue that can have harmful consequences for individuals and groups. In an effort to combat this issue, automated methods for identifying and categorising hate speech in text and other media h...
详细信息
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business req...
详细信息
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business requirements with distinctive ***,such benefits lead to a more adverse environment entailing network breakdown,systems paralysis,and online banking fraudulence and *** one of the most common and dangerous threats in SDN,probe attack occurs when the attacker scans SDN devices to collect the necessary knowledge on system susceptibilities,which is thenmanipulated to undermine the entire ***,high performance,and real-time systems prove pivotal in successful goal attainment through feature selection to minimize computation time,optimize prediction performance,and provide a holistic understanding of machine learning *** the extension of astute machine learning algorithms into an Intrusion Detection System(IDS)through SDN has garnered much scholarly attention within the past decade,this study recommended an effective IDS under the Grey-wolf optimizer(GWO)and Light Gradient Boosting Machine(Light-GBM)classifier for probe attack *** InSDN dataset was employed to train and test the proposed IDS,which is deemed to be a novel benchmarking dataset in *** proposed IDS assessment demonstrated an optimized performance against that of peer IDSs in probe attack detection within *** results revealed that the proposed IDS outperforms the state-of-the-art IDSs,as it achieved 99.8%accuracy,99.7%recall,99.99%precision,and 99.8%F-measure.
Data outsourcing has become indispensable to allow information sharing among multiple parties. The users do not fully trust the cloud platform since it is operated by a third party. Preserving privacy while sharing th...
详细信息
This survey provides a detailed examination of the integration of machine learning (ML) techniques in intrusion detection systems (IDS) tailored for wireless sensor networks (WSNs). With the growing importance of WSNs...
详细信息
Artificial intelligence (AI) has the potential to revolutionize the field of gastrointestinal disease diagnosis by enabling the development of accurate and efficient automated systems. This study comprehensively inves...
详细信息
Software quality analysis has become one of the topmost concerns in the modern world and requires the massive attention of developers and testers during software development. Software quality analysis is a multidimens...
详细信息
Agriculture plays a pivotal role in our lives and holds significant importance in our economy. Proper management of agricultural practices is essential for maximizing profits in agricultural production. However, many ...
详细信息
暂无评论