The following article looked into legged wheels with spring suspension. The idea behind the work was to see how adding springs in various places and their stiffness would impact the robot's ability to navigate thr...
详细信息
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate...
详细信息
Mobile ad-hoc networks (MANETs) rely solely on direct node communication and function without a fixed infrastructure. Due to their decentralized design, they are susceptible to numerous security risks, with black hole...
详细信息
ISBN:
(数字)9798350354133
ISBN:
(纸本)9798350354140
Mobile ad-hoc networks (MANETs) rely solely on direct node communication and function without a fixed infrastructure. Due to their decentralized design, they are susceptible to numerous security risks, with black hole attacks posing significant threats to routing integrity and confidentiality. This paper proposes a technique to enhance the Ad hoc On-Demand Multi-path Distance Vector (AOMDV) routing protocol's security against black hole attacks. The method involves a time-based reply message analysis to identify and mitigate malicious nodes. This algorithm improves the protocol's ability to detect and prevent black hole attacks by closely analyzing response time differences between malicious and normal nodes. The results of the simulation show that the suggested solution greatly enhances network performance by lowering the Routing Overhead Ratio from 1388.04% to 0.73% and the Packet Loss Rate from 74% to 11% while keeping a high Packet Delivery Ratio—up to 93% in different scenarios. These enhancements sustain strong data transmission in dynamic MANET environments, supporting network integrity and reliability.
Vaxallot seeks to implement a system to distribute vaccines across high-risk groups accounting for various parameters and prove to be superior to what conventional systems are capable of today. It is a Python flask-ba...
详细信息
Blockchain is a distributed ledger based on peer-to-peer networks, originally used for crypto-currency systems. Blockchains are being used as an enabling technology for decentralised applications in the areas of Inter...
详细信息
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi...
详细信息
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegitimate benefit or createmisleading publicity by using tempered *** forgery detectionmethods can classify only one of the most widely used Copy-Move and splicing ***,an image can contain one or more types of *** study has proposed a hybridmethod for classifying Copy-Move and splicing images using texture information of images in the spatial ***,images are divided into equal blocks to get scale-invariant *** law has been used for getting texture features,and finally,XGBOOST is used to classify both Copy-Move and splicing *** proposed method classified three types of forgeries,i.e.,splicing,Copy-Move,and ***(CASIA 2.0,MICCF200)and RCMFD datasets are used for training and *** average,the proposed method achieved 97.3% accuracy on benchmarked datasets and 98.3% on RCMFD datasets by applying 10-fold cross-validation,which is far better than existing methods.
Mental illness is a considerable global public health problem, impacting both individual well-being and society's health. The growing popularity of social media and the increase of other data sources led to more r...
详细信息
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword...
详细信息
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,swords ***,automatic weapons detection is a vital requirement now a *** current research is concerned about the real-time detection of weapons for the surveillance cameras with an implementation of weapon detection using Efficient–*** time datasets,from local surveillance department’s test sessions are used for model training and *** consist of local environment images and videos from different type and resolution cameras that minimize the *** research also contributes in the making of Efficient-Net that is experimented and results in a positive *** results are also been represented in graphs and in calculations for the representation of results during training and results after training are also shown to represent our research ***-Net algorithm gives better results than existing *** using Efficient-Net algorithms the accuracy achieved 98.12%when epochs increase as compared to other algorithms.
The electric vehicles (EVs) adoption rate has been significant in the last decade and keeps on increasing. Recently, the retired EV battery packs which no longer provide satisfactory performance to power an EV started...
详细信息
ISBN:
(数字)9798350317664
ISBN:
(纸本)9798350317671
The electric vehicles (EVs) adoption rate has been significant in the last decade and keeps on increasing. Recently, the retired EV battery packs which no longer provide satisfactory performance to power an EV started appearing in the market. Typically, EV batteries are declared unfit for EV applications when the battery capacity is reduced to 70-80% of its nominal capacity. Various end-of-life (EOL) options are proposed by researchers before sending the retired batteries to recycle such as low-demanding e-mobility, grid-tired energy storage systems, storage of renewable energy, and home emergency power supplies. It is predicted that this may create new value pools in the energy and transportation sectors shortly. It is noticed in lithium-ion battery packs that all cells do not age similarly, thus clustering of healthy cells among the retired batteries is very crucial for safe and reliable operation in second-life applications. Thus, an efficient cell clustering method utilizing voltage relaxation curves powered by a data-driven BIRCH (Balanced Iterative Reducing and Clustering using Hierarchies) algorithm is proposed in this paper. The efficiency and efficacy of the proposed algorithm compared to the state-of-the-art cell sorting technique are also demonstrated in the paper.
Communication and coordination between OSS developers who do not work physically in the same location have always been the challenging *** pull-based development model,as the state-of-art collaborative development mec...
详细信息
Communication and coordination between OSS developers who do not work physically in the same location have always been the challenging *** pull-based development model,as the state-of-art collaborative development mechanism,provides high openness and transparency to improve the visibility of contributors'***,duplicate contributions may still be submitted by more than one contributors to solve the same problem due to the parallel and uncoordinated nature of this *** not detected in time,duplicate pull-requests can cause contributors and reviewers to waste time and energy on redundant *** this paper,we propose an approach combining textual and change similarities to automatically detect duplicate contributions in pull-based model at submission *** a new-arriving contribution,we first compute textual similarity and change similarity between it and other existing *** then our method returns a list of candidate duplicate contributions that are most similar with the new contribution in terms of the combined textual and change *** evaluation shows that 83.4%of the duplicates can be found in average when we use the combined textual and change similarity compared to 54.8%using only textual similarity and 78.2%using only change similarity.
暂无评论