Mobile Ad-hoc Networks (MANETs) involved in many applications, whether smart or traditional and for both civilian and military uses, and that because of their special features, where it does not depend on any infrastr...
详细信息
Mobile Ad-hoc Networks (MANETs) involved in many applications, whether smart or traditional and for both civilian and military uses, and that because of their special features, where it does not depend on any infrastructure during its working, as well as the nodes in MANETs have a freedom of movement with the ability to self-configure, in addition, to working as a router or client at the same time. Moreover, MANETs considered as an infrastructure less network, so the cost of this type of networks is less in comparison to other traditional networks. On the other hand, the routing considered one of most important challenges in MANETs due to the perpetual motion and randomness of the nodes that can causing a continuous change of the network topology and thus to all paths between nodes, where finding valid paths between the nodes is the core task of routing protocols. Recently, it has been argued that the traditional layered architecture is ineffective to deal with receiving signal strength related problems. In an effort to improve the performance of MANETs, there has been increased in protocols that rely on cross-layer interaction between different layers. In this paper, a Cross-layer design among Network, MAC and Physical layers based on Threshold Multipath Routing Protocol (CTMRP) is proposed. The CTMRP is designed for decision maker based on threshold value of average paths signal for efficient transmission of the Text, image, audio and video as well as sending the data via multiple paths, which mitigate the negatives effects causes from forcing the nodes to send the data via single. The Route Discovery Delay, Number of RREQ Messages, Number of RREP Messages, End-to-End Delay, Packet Delivery Ratio (PDR), and Throughput were selected as the main performance evaluation metrics. The results show that the proposed algorithm has better performance and lead to increase stability of transmission link.
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the d...
详细信息
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the disease are characterized by a paucity of observable symptoms,which necessitates the prompt creation of automated and robust diagnostic *** traditional research focuses on image-level diagnostics that attend to the left and right eyes in isolation without making use of pertinent correlation data between the two sets of *** addition,they usually only target one or a few different kinds of eye diseases at the same *** this study,we design a patient-level multi-label OD(PLML_ODs)classification model that is based on a spatial correlation network(SCNet).This model takes into consideration the relevance of patient-level diagnosis combining bilateral eyes and multi-label ODs ***_ODs is made up of three parts:a backbone convolutional neural network(CNN)for feature extraction i.e.,DenseNet-169,a SCNet for feature correlation,and a classifier for the development of classification *** DenseNet-169 is responsible for retrieving two separate sets of attributes,one from each of the left and right *** then,the SCNet will record the correlations between the two feature sets on a pixel-by-pixel *** the attributes have been analyzed,they are integrated to provide a representation at the patient *** the whole process of ODs categorization,the patient-level representation will be *** efficacy of the PLML_ODs is examined using a soft margin loss on a dataset that is readily accessible to the public,and the results reveal that the classification performance is significantly improved when compared to several baseline approaches.
This paper presents a new robust sliding mode control (SMC) method with well-developed theoretical proof for general uncertain time-varying delay stochastic systems with structural uncertainties and the Brownian noi...
详细信息
This paper presents a new robust sliding mode control (SMC) method with well-developed theoretical proof for general uncertain time-varying delay stochastic systems with structural uncertainties and the Brownian noise (Wiener process). The key features of the proposed method are to apply singular value decomposition (SVD) to all structural uncertainties and to introduce adjustable parameters for control design along with the SMC method. It leads to a less-conservative condition for robust stability and a new robust controller for the general uncertain stochastic systems via linear matrix inequality (LMI) forms. The system states are able to reach the SMC switching surface as guaranteed in probability 1. Furthermore, it is theoretically proved that the proposed method with the SVD and adjustable parameters is less conservatism than the method without the SVD. The paper is mainly to provide all strict theoretical proofs for the method and results.
Energy resilience in renewable energy sources dissemination components such as batteries and inverters is crucial for achieving high operational fidelity. Resilience factors play a vital role in determining the perfor...
详细信息
The relationship between brain structure and function is critical for revealing the pathogenesis of brain disorders, including Alzheimer's disease (AD). However, mapping brain structure to function connections is ...
详细信息
Biosensors are crucial to the diagnosis process since they are designed to detect a specific biological analyte by changing from a biological entity into electrical signals that can be processed for further inspection...
详细信息
Recently, Wireless Sensor Network (WSN) are an important research area because of its real-time response, accurate, improved node capability, low in cost and simple infrastructure. Because of the huge number of sensor...
详细信息
The information leakage problem often exists in bidirectional quantum secure direct communication or quantum dialogue. In this work, we find that this problem also exists in the one-way quantum secure communication pr...
详细信息
The information leakage problem often exists in bidirectional quantum secure direct communication or quantum dialogue. In this work, we find that this problem also exists in the one-way quantum secure communication protocol [Chin. Phys. Lett. 32 (2015) 050301]. Specifically, the first bit of every four-bit message block is leaked out without awareness. A way to improve the information leakage problem is given.
Optimization is the selection of a best set of parameters from available alternative sets. Global optimization is the task of finding the absolutely best set of parameters. In this paper, we present an adaptive flower...
详细信息
Sensitive information can be exposed to critical risks when communicated through computer networks. The ability of attackers in hiding their attacks' intention obstructs existing protection systems to early preven...
详细信息
ISBN:
(纸本)9781631901362
Sensitive information can be exposed to critical risks when communicated through computer networks. The ability of attackers in hiding their attacks' intention obstructs existing protection systems to early prevent their attacks and avoid any possible sabotage in network systems. In this paper, we propose a similarity approach called Attack Intention Recognition based on Similarity of Evidences (AIRSE). In particular, the proposed approach AIRSE aims to recognize attack intention in real time. It classifies attacks according to their characteristics and uses the similar metric method to identify attacks motives and predict their intentions. In this study, attack intentions are categorized into specific and general intentions. General intentions are recognized by investigating violations against the security metrics of confidentiality, integrity, availability, and authenticity. Specific intentions are recognized by investigating the network attacks used to achieve a violation. The obtained results demonstrate that the proposed approach is capable of investigating similarity of attack signatures and recognizing the intentions of network attack.
暂无评论