In this paper, the computation of graph Fourier transform centrality (GFTC) of complex network using graph filter is presented. For conventional computation method, it needs to use the non-sparse transform matrix of g...
详细信息
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in o...
详细信息
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in order to prolong network lifetime;owing to resource-constrained nature of *** fundamental requirement of any network is routing a packet from its source to *** of a routing algorithm depends on the number of network parameters utilized by that routing *** the recent years,various routing protocol has been developed for the delay tolerant networks(DTN).A routing protocol known as spray and wait(SnW)is one of the most widely used routing algorithms for *** this paper,we study the SnW routing protocol and propose a modified version of it referred to as Pentago SnW which is based on pentagonal number *** to binary SnW shows promising results through simulation using real-life scenarios of cars and pedestrians randomly moving on a map.
VGIS (Virtual Geographic Information System) Platform is a unified oilfield operations management platform based on MaaS (Management as a Service) that integrates advanced technologies such as AIoT (Artificial Intelli...
详细信息
Predicting crimes before they occur can save lives and losses of property. With the help of machine learning, many researchers have studied predicting crimes extensively. In this paper, we evaluate state-of-the-art cr...
详细信息
The correlation of security alerts is crucial for effective threat detection and mitigation in modern cybersecurity landscapes. With the exponential growth in the volume of generated alerts, there arises an imperative...
详细信息
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a...
详细信息
Cloud computing is an emerging field in information technology, enabling users to access a shared pool of computing resources. Despite its potential, cloud technology presents various challenges, with one of the most ...
详细信息
This article proposes a proactive crowdsourced monitoring and sensing (PCMS) framework with the designed Smart iBeacon device to accurately recognize the activities of an equipped target, exclusively customize the rec...
详细信息
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical data is available, yet the vast majority of it is wasted. It will b...
详细信息
暂无评论