Lunar domes have always been one of the important windows to understand lunar volcanic activities, but traditional geological dome identification methods are costly. This study attempts to establish an automatic ident...
详细信息
During the last decade of research, a lot of focus has been placed on the subject of frequent pattern mining (FPM). A profitable data set with a large sum of transactions and only a few items in each transaction has b...
详细信息
Currently, Software-Defined Network (SDN) is as one of the most commonly used network architectures. It requires using a software-based, centralized controller to communicate with the underlying network hardware to co...
详细信息
Database accessibility can be challenging for users without technical expertise, particularly when generating SQL queries to retrieve information. This study addresses this gap by developing an OpenAI-powered system d...
详细信息
This article presents a simulation study on the use of LoRaWAN technology in autonomous vehicles. The research focuses on developing an Auto-Handover Gateway for Autonomous Vehicles, utilizing LoRaWAN parameters such ...
详细信息
Mobile Ad hoc Network(MANET)is decentralized wireless network and can communicate without existing infrastructure in many *** is vulnerable to various attacks that affect its performance such as blackhole *** attacker...
详细信息
Mobile Ad hoc Network(MANET)is decentralized wireless network and can communicate without existing infrastructure in many *** is vulnerable to various attacks that affect its performance such as blackhole *** attacker,inject fault routing information to persuade the source node to select the path with malicious node as the shortest *** eliminate malicious nodes from launching any collaborative attack.A cooperative Trapping Approach(CTA)was proposed based on modifying Ad-hoc On-demand Distance Vector(AODV)routing protocol and trapping the malicious nodes by responding to the trap request *** approach aims to eliminate and rule out both single and collaborative malicious blackhole nodes from any *** approach realizes a backward tracking mechanism to perform the elimination *** proposed algorithm(CTA)was executed using NS-2 network *** performance metrics that has been considered to evaluate the performance of the proposed algorithm such as throughput,end to end delay,packet delivery ratio,and consuming *** experimental results have shown the performance metrics of the proposed approach outperformed other state of at algorithms.
The emergence of pandemic diseases like Covid-19 in recent years has made it more important for Internet of Medical Things (IoMT) environments to build contact between patients and doctors in order to control their he...
详细信息
In the digital era, the rapid dissemination of false information has emerged as a formidable challenge, undermining the credibility of online platforms and posing a threat to informed public discourse. Addressing this...
详细信息
This paper presents a comparative analysis of two MEMS Tuning Fork Gyroscope (TFG) designs employing microlever amplification mechanisms for sensitivity amplification in the sense mode. An input frame added in microle...
详细信息
We consider line failure cascading in power networks where an initial random failure of a few lines leads to consecutive other line overloads and failures before the system settles in a steady state. Such cascades are...
详细信息
暂无评论