This study introduces a groundbreaking circular ring-shaped fractal antenna optimized using particle swarm optimization (PSO) for wireless ultra-wideband (UWB) applications. The proposed fractal antenna design, featur...
详细信息
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo...
详细信息
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental monitoring for a use in both civil and military *** make use of these data to monitor and keep track of the physical data of the surrounding environment in order to ensure the sustainability of the *** data have to be picked up by the sensor,and then sent to the sink node where they may be *** nodes of the WSNs are powered by batteries,therefore they eventually run out of *** energy restriction has an effect on the network life span and environmental *** objective of this study is to further improve the Engroove Leach(EL)protocol’s energy efficiency so that the network can operate for a very long time while consuming the least amount of *** lifespan of WSNs is being extended often using clustering and routing *** Meta Inspired Hawks Fragment Optimization(MIHFO)system,which is based on passive clustering,is used in this study to do *** cluster head is chosen based on the nodes’residual energy,distance to neighbors,distance to base station,node degree,and node *** on distance,residual energy,and node degree,an algorithm known as Heuristic Wing Antfly Optimization(HWAFO)selects the optimum path between the cluster head and Base Station(BS).They examine the number of nodes that are active,their energy consumption,and the number of data packets that the BS *** overall experimentation is carried out under the MATLAB *** the analysis,it has been discovered that the suggested approach yields noticeably superior outcomes in terms of throughput,packet delivery and drop ratio,and average energy consumption.
Biomedical image analysis has progressed significantly with the integration of artificial intelligence, presenting new opportunities for early diagnosis and treatment of diseases with high mortality rates, such as ski...
详细信息
Recently, Artificial Intelligence (AI) algorithms have been used to detect the potholes. In this article, a machine learning algorithm has been designed to solve the problem efficiently. A software model has also been...
详细信息
Unstructured Numerical Image Dataset Separation (UNIDS) method employing an enhanced unsupervised clustering technique. The objective is to delineate an optimal number of distinct groups within the input grayscale (G-...
详细信息
Pulses are one of the most important food crops in the world due to their higher protein content, approximately 21%-25%. Therefore, it is crucial to analyze the crop's quality and impurity levels. Stones, pebbles,...
详细信息
In this work, the antenna optimisation process is done by using ML algorithms such as KNN, random forest, Gradient Boost, XG Boost and MLP. Then the predicted results are ensembled using Voting Regressor. A Cylindrica...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in ...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in the information age. Based on the fact that malware heavily resorts to system application programming interfaces(APIs) to perform its malicious actions,there has been a variety of API-based detection *** of them do not consider the relationship between APIs. We contribute a new approach based on the enhanced API order for Android malware detection, named EAODroid, which learns the similarity of system APIs from a large number of API sequences and groups similar APIs into clusters. The extracted API clusters are further used to enhance the original API calls executed by an app to characterize behaviors and perform classification. We perform multi-dimensional experiments to evaluate EAODroid on three datasets with ground truth. We compare with many state-of-the-art works, showing that EAODroid achieves effective performance in Android malware detection.
The design and analysis of a Multiple Input Multiple Output (MIMO) microstrip patch antenna operating at 28 GHz, catering to the millimeter-wave (mmWave) spectrum for 5G communication systems. The proposed antenna emp...
详细信息
The integration of clusters,grids,clouds,edges and other computing platforms result in contemporary technology of jungle *** novel technique has the aptitude to tackle high performance computation systems and it manag...
详细信息
The integration of clusters,grids,clouds,edges and other computing platforms result in contemporary technology of jungle *** novel technique has the aptitude to tackle high performance computation systems and it manages the usage of all computing platforms at a *** learning is a collaborative machine learning approach without centralized training *** proposed system effectively detects the intrusion attack without human intervention and subsequently detects anomalous deviations in device communication behavior,potentially caused by malicious adversaries and it can emerge with new and unknown *** main objective is to learn overall behavior of an intruder while performing attacks to the assumed target ***,the updated system model is send to the centralized server in jungle computing,to detect their *** learning greatly helps the machine to study the type of attack from each device and this technique paves a way to complete dominion over all malicious *** our proposed work,we have implemented an intrusion detection system that has high accuracy,low False Positive Rate(FPR)scalable,and versatile for the jungle computing *** execution time taken to complete a round is less than two seconds,with an accuracy rate of 96%.
暂无评论