Due to an increase in the load of network, load balancing service, i.e., a service that gives an equal volume of each task assignment to each of the servers in data centers, it is usually performed by the specialized ...
详细信息
作者:
Vanitha, K.Raja Praveen, K.N.
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
The Neuro Controller is an innovative piece of industrial instrumentation designed to monitor conditions in smart industrial settings. It is a powerful and versatile controller that can be used to monitor, control, an...
详细信息
In this article, a new coupled-inductors based three-level bipolar buck-boost ac-ac converter is proposed. The proposed converter can produce highly efficient and symmetric in-phase and antiphase buck and boost modes ...
详细信息
作者:
Mahesh, T.R.Vivek, V.
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
This researcher investigated effective much eye opening and pattern detection algorithms. Finally, this article used two frameworks to argue that geospatial investigation systems for patterns are necessary. One of mos...
详细信息
作者:
Latha, D.U.Mahesh, T.R.
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
Breast cancer is the disease with the greatest incidence rate and the fastest global spread. Compared to men, women are diagnosed with breast cancer far more frequently. If detected early enough, breast cancer can be ...
详细信息
The growing development and utilization of networked systems has led to more concern regarding the energy efficiency of these systems. In this paper, we present a novel approach to minimizing energy consumption in fix...
详细信息
Edge detection plays an important role in various fields by identifying object boundaries and supporting advanced image analysis, such as segmentation, recognition, and tracking. Many edge detection algorithms, such a...
详细信息
作者:
Narasimhayya, B.E.Lanke, Ravikumar
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
The development of short-range communication protocols has been essential for efficient device discovery. Short-range communication allows two devices to communicate over short distances, typically up to 10 meters, us...
详细信息
In the past few years, image processing has been widely adopted for symptom diagnosis of medical application. To achieve accurate analysis, the medical applications require high quality image for applying to the sympt...
详细信息
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh...
详细信息
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering *** proposed version employs a network-based reputation system to select the best and most secure path to a *** achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation *** minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation ***,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast *** proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other *** the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing *** paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different ***,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability.
暂无评论