Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh...
详细信息
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering *** proposed version employs a network-based reputation system to select the best and most secure path to a *** achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation *** minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation ***,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast *** proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other *** the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing *** paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different ***,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability.
Brain hemorrhage is a serious and life-threatening condition. It cancause permanent and lifelong disability even when it is not fatal. The wordhemorrhage denotes leakage of blood within the brain and this leakage ofbl...
详细信息
Brain hemorrhage is a serious and life-threatening condition. It cancause permanent and lifelong disability even when it is not fatal. The wordhemorrhage denotes leakage of blood within the brain and this leakage ofblood from capillaries causes stroke and adequate supply of oxygen to thebrain is hindered. Modern imaging methods such as computed tomography(CT) and magnetic resonance imaging (MRI) are employed to get an idearegarding the extent of the damage. An early diagnosis and treatment can savelives and limit the adverse effects of a brain hemorrhage. In this case, a deepneural network (DNN) is an effective choice for the early identification andclassification of brain hemorrhage for the timely recovery and treatment of anaffected person. In this paper, the proposed research work is divided into twonovel approaches, where, one for the classification and the other for volumecalculation of brain hemorrhage. Two different datasets are used for twodifferent techniques classification and volume. A novel algorithm is proposedto calculate the volume of hemorrhage using CT scan images. In the firstapproach, the ‘RSNA’ dataset is used to classify the brain hemorrhage typesusing transfer learning and achieved an accuracy of 93.77%. Furthermore,in the second approach, a novel algorithm has been proposed to calculate thevolume of brain hemorrhage and achieved tremendous results as 1035.91mm3and 9.25 cm3, using the PhysioNet CT scan tomography dataset.
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing work...
详细信息
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing works on Arabic ABSA content separately address them,assume that aspect terms are preidentified,or use a pipeline *** solutions design different models for each task,and the output from the ATE model is used as the input to the APC model,which may result in error propagation among different steps because APC is affected by ATE *** methods are impractical for real-world scenarios where the ATE task is the base task for APC,and its result impacts the accuracy of ***,in this study,we focused on a multi-task learning model for Arabic ATE and APC in which the model is jointly trained on two subtasks simultaneously in a *** paper integrates themulti-task model,namely Local Cotext Foucse-Aspect Term Extraction and Polarity classification(LCF-ATEPC)and Arabic Bidirectional Encoder Representation from Transformers(AraBERT)as a shred layer for Arabic contextual text *** LCF-ATEPC model is based on a multi-head selfattention and local context focus mechanism(LCF)to capture the interactive information between an aspect and its ***,data augmentation techniques are proposed based on state-of-the-art augmentation techniques(word embedding substitution with constraints and contextual embedding(AraBERT))to increase the diversity of the training *** paper examined the effect of data augmentation on the multi-task model for Arabic *** experiments were conducted on the original and combined datasets(merging the original and augmented datasets).Experimental results demonstrate that the proposed Multi-task model outperformed existing APC *** results were obtained by AraBERT and LCF-ATEPC with fusion layer(AR-LCF-ATEPC-Fusion)and the proposed data augmentation
The right partner and high innovation speed are crucial for a successful research and development (R&D) alliance in the high-tech industry. Does homogeneity or heterogeneity between partners benefit innovation spe...
详细信息
With the growing awareness of secure computation, more and more users want to make their digital footprints securely deleted and irrecoverable after updating or removing files on storage devices. To achieve the effect...
详细信息
The immense volume of data generated and collected by smart devices has significantly enhanced various aspects of our daily lives. However, safeguarding the sensitive information shared among these devices is crucial....
详细信息
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict th...
详细信息
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict their utility ***,besides the cost of the physical assets and network resources,such scaling may also imposemore loads on the electricity power grids to feed the added nodes with the required energy to run and cool,which comes with extra costs ***,those CDNproviders who utilize their resources better can certainly afford their services at lower price-units when compared to others who simply choose the scaling *** utilization is a quite challenging process;indeed,clients of CDNs usually tend to exaggerate their true resource requirements when they lease their *** providers are committed to their clients with Service Level Agreements(SLAs).Therefore,any amendment to the resource allocations needs to be approved by the clients *** this work,we propose deploying a Stackelberg leadership framework to formulate a negotiation game between the cloud service providers and their client *** this,the providers seek to retrieve those leased unused resources from their *** is not expected from the clients,and they may ask high price units to return their extra resources to the provider’s ***,to motivate cooperation in such a non-cooperative game,as an extension to theVickery auctions,we developed an incentive-compatible pricingmodel for the returned ***,we also proposed building a behavior belief function that shapes the way of negotiation and compensation for each *** to other benchmark models,the assessment results showthat our proposed models provide for timely negotiation schemes,allowing for better resource utilization rates,higher utilities,and grid-friend CDNs.
The growing advancements with the Internet of Things(IoT)devices handle an enormous amount of data collected from various applications like healthcare,vehicle-based communication,and smart *** research analyses cloud-...
详细信息
The growing advancements with the Internet of Things(IoT)devices handle an enormous amount of data collected from various applications like healthcare,vehicle-based communication,and smart *** research analyses cloud-based privacy preservation over the smart city based on query ***,there is a lack of resources to handle the incoming data and maintain them with higher privacy and ***,a solution based idea needs to be proposed to preserve the IoT data to set an innovative city environment.A querying service model is proposed to handle the incoming data collected from various environments as the data is not so trusted and highly sensitive towards *** handling privacy,other inter-connected metrics like efficiency are also essential,which must be considered to fulfil the privacy ***,this work provides a query-based service model and clusters the query to measure the relevance of frequently generated ***,a Bag of Query(BoQ)model is designed to collect the query from various *** is done with a descriptive service provisioning model to cluster the query and extract the query’s summary to get thefinal *** processed data is preserved over the cloud storage system and optimized using an improved Grey Wolf Opti-mizer(GWO).It is used to attain global and local solutions regarding privacy *** iterative data is evaluated without any over-fitting issues and computational complexity due to the tremendous data handling *** on this analysis,metrics like privacy,efficiency,computational complexity,the error rate is *** simulation is done with a MATLAB 2020a *** proposed model gives a better trade-off in contrast to existing approaches.
In this paper, a cluster based association management for heterogeneous users has been addressed. The aim is to explore frame aggregation for the high throughput (HT) users such as 802.11n type, avoiding the drawback ...
详细信息
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d...
详细信息
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely *** verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented *** this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly *** verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.
暂无评论