The computational domain facilitates the performance of novel and innovative medical research and development tasks by providing support and computational power. This analysis method forecasts the future by analyzing ...
详细信息
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ...
详细信息
Routing is a key function inWireless Sensor Networks(WSNs)since it facilitates data transfer to base *** attacks have the potential to destroy and degrade the functionality ofWSNs.A trustworthy routing system is essen...
详细信息
Routing is a key function inWireless Sensor Networks(WSNs)since it facilitates data transfer to base *** attacks have the potential to destroy and degrade the functionality ofWSNs.A trustworthy routing system is essential for routing security andWSN *** methods have been implemented to build trust between routing nodes,including the use of cryptographic methods and centralized ***,the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node *** the moment,there is no effective way to avoid malicious node *** a consequence of these concerns,this paper proposes a trusted routing technique that combines blockchain infrastructure,deep neural networks,and Markov Decision Processes(MDPs)to improve the security and efficiency of WSN *** authenticate the transmission process,the suggested methodology makes use of a Proof of Authority(PoA)mechanism inside the blockchain *** validation group required for proofing is chosen using a deep learning approach that prioritizes each node’s *** are then utilized to determine the suitable next-hop as a forwarding node capable of securely transmitting *** to testing data,our routing system outperforms current routing algorithms in a 50%malicious node routing scenario.
In this note, we present the synthesis of secure-by-construction controllers that address safety and security properties simultaneously in cyber-physical systems. Our focus is on studying a specific security property ...
详细信息
Various machine learning techniques have been proposed to improve the effectiveness of Intrusion Detection systems (IDS), where IDS is one of the important parts of the network that functions to maintain network secur...
详细信息
Performance of concatenated multilevel coding with probabilistic shaping (PS) and Voronoi constellations (VCs) is analysed over AWGN channel. Numerical results show that VCs provide up to 1.3 dB SNR gains over PS-QAM ...
详细信息
Human gender classification based on biometric features is a major concern for computer vision due to its vast variety of applications. The human ear is popular among researchers as a soft biometric trait, because it ...
详细信息
Nowadays, information and knowledge represent the fundamental wealth of an organisation. Enterprises try to utilise this wealth to gain advantage when making decisions such as a project’s acceptance. After a project ...
详细信息
Evaluation is a process that compares the results with the target, an initial situation with the final one. ‘Evaluate’ means making an assessment based on some measure or information and referring to some criteria. ...
详细信息
Street lights currently use more energy than other types of lighting because of an inefficient mechanism that makes the bulbs use a lot of electricity. The suggested approach uses various sensors on intelligent street...
详细信息
暂无评论