This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of *** objective was to delve into an...
详细信息
This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of *** objective was to delve into and refine the application of the Dijkstra’s algorithm in this context,a method conventionally esteemed for its efficiency in static ***,this paper has carried out a comparative theoretical analysis with the Bellman-Ford algorithm,considering adaptation to the dynamic network conditions that are typical for *** paper has shown through detailed algorithmic analysis that Dijkstra’s algorithm,when adapted for dynamic updates,yields a very workable solution to the problem of real-time routing in *** results indicate that with these changes,Dijkstra’s algorithm performs much better computationally and 30%better in routing optimization than Bellman-Ford when working with configurations of sparse *** theoretical framework adapted,with the adaptation of the Dijkstra’s algorithm for dynamically changing network topologies,is novel in this work and quite different from any traditional *** adaptation should offer more efficient routing and less computational overhead,most apt in the limited resource environment of ***,from these findings,one may derive a conclusion that the proposed version of Dijkstra’s algorithm is the best and most feasible choice of the routing protocol for MANETs given all pertinent key performance and resource consumption indicators and further that the proposed method offers a marked improvement over traditional *** paper,therefore,operationalizes the theoretical model into practical scenarios and also further research with empirical simulations to understand more about its operational effectiveness.
Conventional authentication methods, such as passwords and PINs, are vulnerable to multiple threats, from sophisticated hacking attempts to the inherent weaknesses of human memory. This highlights a critical need for ...
详细信息
Super-resolution techniques are used to reconstruct an image with a high resolution from one or more low-resolution image(s).In this paper,we proposed a single image super-resolution *** uses the nonlocal mean filter ...
详细信息
Super-resolution techniques are used to reconstruct an image with a high resolution from one or more low-resolution image(s).In this paper,we proposed a single image super-resolution *** uses the nonlocal mean filter as a prior step to produce a denoised *** proposed algorithm is based on curvelet *** converts the denoised image into low and high frequencies(sub-bands).Then we applied a multi-dimensional interpolation called Lancozos interpolation over both *** parallel,we applied sparse representation with over complete dictionary for the denoised *** proposed algorithm then combines the dictionary learning in the sparse representation and the interpolated sub-bands using inverse curvelet transform to have an image with a higher *** experimental results of the proposed super-resolution algorithm show superior performance and obviously better-recovering images with enhanced *** comparison study shows that the proposed super-resolution algorithm outperforms the *** mean absolute error is 0.021±0.008 and the structural similarity index measure is 0.89±0.08.
Users may now create and use large amounts of data saved online thanks to e-commerce systems. Modern shoppers examine online reviews before making purchases. Evaluations are essential for both people and organizations...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity *** use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional *** suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhance...
详细信息
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhances the prediction performance of classifiers when tested on unseen *** learning(DL)models have a lot of parameters,and they frequently ***,to avoid overfitting,data plays a major role to augment the latest improvements in ***,reliable data collection is a major limiting ***,this problem is undertaken by combining augmentation of data,transfer learning,dropout,and methods of normalization in *** this paper,we introduce the application of data augmentation in the field of image classification using Random Multi-model Deep Learning(RMDL)which uses the association approaches of multi-DL to yield random models for *** present a methodology for using Generative Adversarial Networks(GANs)to generate images for data *** experiments,we discover that samples generated by GANs when fed into RMDL improve both accuracy and model *** across both MNIST and CIAFAR-10 datasets show that,error rate with proposed approach has been decreased with different random models.
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the *** detection using machine learning(ML)with flow-based features has...
详细信息
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the *** detection using machine learning(ML)with flow-based features has been extensively studied in the *** flow-based detection methods involve significant computational overhead that does not completely capture network communication patterns that might reveal other features ofmalicious ***,Graph-Based Bot Detection methods using ML have gained attention to overcome these limitations,as graphs provide a real representation of network *** purpose of this study is to build a botnet malware detection system utilizing centrality measures for graph-based botnet detection and *** propose BotSward,a graph-based bot detection system that is based on *** apply the efficient centrality measures,which are Closeness Centrality(CC),Degree Centrality(CC),and PageRank(PR),and compare them with others used in the *** efficiency of the proposed method is verified on the available Czech Technical University 13 dataset(CTU-13).The CTU-13 dataset contains 13 real botnet traffic scenarios that are connected to a command-and-control(C&C)channel and that cause malicious actions such as phishing,distributed denial-of-service(DDoS)attacks,spam attacks,*** is robust to zero-day attacks,suitable for large-scale datasets,and is intended to produce better accuracy than state-of-the-art *** proposed BotSward solution achieved 99%accuracy in botnet attack detection with a false positive rate as low as 0.0001%.
Meta-heuristic optimization algorithms have become widely used due to their outstanding features, such as gradient-free mechanisms, high flexibility, and great potential for avoiding local optimal solutions. This rese...
详细信息
Neutrosophic Sets and systems (NSS) has become an important Journal for neutrosophic theory and its applications in uncertainty modeling and decision sciences. In 2023, NSS celebrated its 10th anniversary, marking a d...
详细信息
This study focuses on the classification of Tajweed rules from audio data and evaluates the effectiveness of various machine learning (ML) algorithms in emotion classification from speech. The dataset was created usin...
详细信息
暂无评论