Mental diseases, mental disorders, or psychological disorders is a large group of symptoms which causes changes to the state of mood and reflect this on the behavior of the person with the mental disorder. It affects ...
详细信息
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous systems(AS).BGP nodes,com...
详细信息
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain *** research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP *** this paper,we propose a blockchain-based trust model for inter-domain *** model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the *** BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective *** incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing *** forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing *** use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust *** with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks.
This research focuses on the review of Fintech and its development on the IoT Platform and also the risks that can be posed to the IoT network used. Finance is the most essential side of several other sectors which in...
详细信息
In this paper,we consider the NP-hard problem offinding the minimum connected resolving set of graphs.A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distanc...
详细信息
In this paper,we consider the NP-hard problem offinding the minimum connected resolving set of graphs.A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distances to the ver-tices in B.A resolving set B of G is connected if the subgraph B induced by B is a nontrivial connected subgraph of *** cardinality of the minimal resolving set is the metric dimension of G and the cardinality of minimum connected resolving set is the connected metric dimension of *** problem is solved heuristically by a binary version of an enhanced Harris Hawk Optimization(BEHHO)*** is thefirst attempt to determine the connected resolving set *** combines classical HHO with opposition-based learning,chaotic local search and is equipped with an S-shaped transfer function to convert the contin-uous variable into a binary *** hawks of BEHHO are binary encoded and are used to represent which one of the vertices of a graph belongs to the connected resolving *** feasibility is enforced by repairing hawks such that an addi-tional node selected from V\B is added to B up to obtain the connected resolving *** proposed BEHHO algorithm is compared to binary Harris Hawk Optimi-zation(BHHO),binary opposition-based learning Harris Hawk Optimization(BOHHO),binary chaotic local search Harris Hawk Optimization(BCHHO)*** results confirm the superiority of the BEHHO for determining connected metric dimension.
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
Machine translation has revolutionized the field of language translation in the last decade. Initially dominated by statistical models, the rise of deep learning techniques has led to neural networks, particularly Tra...
详细信息
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s...
详细信息
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s *** exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and *** the time of the attack,it appears the women were immobilized and needed immediate *** self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or *** proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud *** is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud *** can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location *** has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 *** average activation time is 2.079 s.
Blood pressure (BP) is a vital parameter in medical treatment and diagnosis, and as a non-invasive method to measure BP, some deep learning models have been proposed to estimate BP from photoplethysmograms (PPGs). How...
详细信息
Optimizing therapy and rehabilitation for Parkinson's disease (PD) requires early identification and precise evaluation of the illness's course. However, there is disagreement about the best way to use gait an...
详细信息
In this study, we explore the concept of drone-assisted drones. In a mobile edge computing (MEC) setting, unmanned aerial vehicles (UAVs) play a critical role in providing offloading services to mobile devices in regi...
详细信息
暂无评论