From AI-assisted art creation to large language model (LLM)-powered ChatGPT, AI-generated contents and services are becoming a transforming force. It calls for the telecom industry to embrace the prospects of AIGC ser...
详细信息
Enhancing the coverage area of the sensing range with the limiting resource is a critical problem in the wireless sensor network (WSN). Mobile sensors are patched coverage holes and they also have limited energy to mo...
详细信息
Iris recognition is one of the most widely used human authentication mechanism that has gained huge popularity due to its security and efficiency. However, recently attackers have breached the security of these system...
详细信息
Generative adversarial networks (GANs) have gained popularity for their ability to synthesize images from random inputs in deep learning models. One of the notable applications of this technology is the creation of re...
详细信息
In response to the shortcomings of Dwarf Mongoose Optimization(DMO)algorithm,such as insufficient exploitation capability and slow convergence speed,this paper proposes a multi-strategy enhanced DMO,referred to as ***...
详细信息
In response to the shortcomings of Dwarf Mongoose Optimization(DMO)algorithm,such as insufficient exploitation capability and slow convergence speed,this paper proposes a multi-strategy enhanced DMO,referred to as ***,we propose an improved solution search equation that utilizes the Gbest-guided strategy with different parameters to achieve a trade-off between exploration and exploitation(EE).Secondly,the Lévy flight is introduced to increase the diversity of population distribution and avoid the algorithm getting stuck in a local *** addition,in order to address the problem of low convergence efficiency of DMO,this study uses the strong nonlinear convergence factor Sigmaid function as the moving step size parameter of the mongoose during collective activities,and combines the strategy of the salp swarm leader with the mongoose for cooperative optimization,which enhances the search efficiency of agents and accelerating the convergence of the algorithm to the global optimal solution(Gbest).Subsequently,the superiority of GLSDMO is verified on CEC2017 and CEC2019,and the optimization effect of GLSDMO is analyzed in *** results show that GLSDMO is significantly superior to the compared algorithms in solution quality,robustness and global convergence rate on most test ***,the optimization performance of GLSDMO is verified on three classic engineering examples and one truss topology optimization *** simulation results show that GLSDMO achieves optimal costs on these real-world engineering problems.
Many electronic components can be combined into a single chip using VLSI technology. However, as Moore predicted, this technology will soon reach a limit, making it impossible to reduce the size of VLSI circuits furth...
详细信息
Social networks have shaped modern society by revolutionizing how people connect and communicate with others around the world. Social media bots have become more prevalent as a result of social networks' phenomena...
详细信息
Disruption and disturbance in activities in the work environment are the causes of stress in employees. A variety of IoT sensors, Kinect 3D sensors, health data sensors, log files, etc. assist in fetching human activi...
详细信息
Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the *** and Cloud providers both leverage the benefits as networks can be configured and optimized b...
详细信息
Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the *** and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application *** integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care *** has improved the real-time monitoring of patients by medical ***’data get stored at the central server on the cloud from where it is available to medical practitioners in no *** centralisation of data on the server makes it more vulnerable to malicious attacks and causes a major threat to patients’*** recent days,several schemes have been proposed to ensure the safety of patients’*** most of the techniques still lack the practical implementation and safety of *** this paper,a secure multi-factor authentication protocol using a hash function has been ***(Body Area Network)logic has been used to formally analyse the proposed scheme and ensure that no unauthenticated user can steal sensitivepatient *** Protocol Animator(SPAN)–Automated Validation of Internet Security Protocols and Applications(AVISPA)tool has been used for *** results prove that the proposed scheme ensures secure access to the database in terms of spoofing and *** comparisons of the proposed scheme with other related historical schemes regarding time complexity,computation cost which accounts to only 423 ms in proposed,and security parameters such as identification and spoofing prove its efficiency.
Escape routing is a critical task in the design of printed circuit boards (PCB) and integrated circuits (IC), aiming to establish effective connections among multiple pin points while avoiding path overlaps and interf...
详细信息
暂无评论