This paper aims to implement and use the Spring Security framework to secure and authenticate the connection between a web application and the ESP32 device. In the context of a web application, by analyzing the integr...
详细信息
Registration of point clouds is a fundamental task in robotic SLAM pipelines. Typically this task is performed only on point clouds of the same sensor or at least the same sensing modality. However, robots designed fo...
详细信息
Lunar domes have always been one of the important windows to understand lunar volcanic activities, but traditional geological dome identification methods are costly. This study attempts to establish an automatic ident...
详细信息
An index is a tool for comparing a phenomenon or several phenomena dating back to different periods to know the amount of change in the phenomena or the difference between them. For example, we compare the price of a ...
详细信息
In the context of Intelligent Transportation Systems (ITS), the role of vehicle detection and classification is indispensable for streamlining transportation management, refining traffic control, and conducting in-dep...
详细信息
Simulating the method of neurons in the human brain that process signals is crucial for constructing a neural network with biological interpretability. However, existing deep neural networks simplify the function of a...
详细信息
As a high-level programming language, Python supports user-friendly coding and system integration. It is not only used for data analytics but is also applied in software development. Although it has several benefits, ...
详细信息
Multi-objective optimization is critical for problem-solving in engineering,economics,and *** study introduces the Multi-Objective Chef-Based Optimization Algorithm(MOCBOA),an upgraded version of the Chef-Based Optimi...
详细信息
Multi-objective optimization is critical for problem-solving in engineering,economics,and *** study introduces the Multi-Objective Chef-Based Optimization Algorithm(MOCBOA),an upgraded version of the Chef-Based Optimization Algorithm(CBOA)that addresses distinct *** approach is unique in systematically examining four dominance relations—Pareto,Epsilon,Cone-epsilon,and Strengthened dominance—to evaluate their influence on sustaining solution variety and driving convergence toward the Pareto *** comparison investigation,which was conducted on fifty test problems from the CEC 2021 benchmark and applied to areas such as chemical engineering,mechanical design,and power systems,reveals that the dominance approach used has a considerable impact on the key optimization measures such as the hypervolume *** paper provides a solid foundation for determining themost effective dominance approach and significant insights for both theoretical research and practical applications in multi-objective optimization.
The network switches in the data plane of Software Defined Networking (SDN) are empowered by an elementary process, in which enormous number of packets which resemble big volumes of data are classified into specific f...
详细信息
The network switches in the data plane of Software Defined Networking (SDN) are empowered by an elementary process, in which enormous number of packets which resemble big volumes of data are classified into specific flows by matching them against a set of dynamic rules. This basic process accelerates the processing of data, so that instead of processing singular packets repeatedly, corresponding actions are performed on corresponding flows of packets. In this paper, first, we address limitations on a typical packet classification algorithm like Tuple Space Search (TSS). Then, we present a set of different scenarios to parallelize it on different parallel processing platforms, including Graphics Processing Units (GPUs), clusters of Central Processing Units (CPUs), and hybrid clusters. Experimental results show that the hybrid cluster provides the best platform for parallelizing packet classification algorithms, which promises the average throughput rate of 4.2 Million packets per second (Mpps). That is, the hybrid cluster produced by the integration of Compute Unified Device Architecture (CUDA), Message Passing Interface (MPI), and OpenMP programming model could classify 0.24 million packets per second more than the GPU cluster scheme. Such a packet classifier satisfies the required processing speed in the programmable network systems that would be used to communicate big medical data.
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Inte...
详细信息
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Internet of Things(IoT)connects numerous devices to the Internet,enabling autonomous interactions with minimal human ***,implementing and managing an SDN-IoT system is inherently complex,particularly for those with limited resources,as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN *** findings of this study underscore the primary security and privacy challenges across application,control,and data planes.A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy *** investigations have explored cutting-edge methods,such as leveraging blockchain for transaction recording to enhance security and privacy,along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service(DoS)and Distributed DoS(DDoS)***,the analysis indicates that encryption and hashing techniques are prevalent in the data plane,whereas access control and certificate authorization are prominently considered in the control plane,and authentication is commonly employed within the application ***,this paper outlines future directions,offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem.
暂无评论