Internet of Things(IoT)is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet ***,some of the nodes in IoT are mobile and dynamic in *** maintaining the link...
详细信息
Internet of Things(IoT)is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet ***,some of the nodes in IoT are mobile and dynamic in *** maintaining the link among the nodes,efficient bandwidth of the links among the mobile nodes with increased life time is a big challenge in IoT as it integrates mobile nodes with static nodes for data *** such networks,many routing-problems arise due to difficulties in energy and bandwidth based quality of *** to the mobility and finite nature of the nodes,transmission links between intermediary nodes may fail frequently,thus affecting the routing-performance of the network and the accessibility of the *** existing protocols do not focus on the transmission links and energy,bandwidth and link stability of the nodes,but node links are significant factors for enhancing the quality of the *** stability helps us to define whether the node is within or out of a coverage *** paper proposed an Optimal Energy and bandwidth based Link Stability Routing(OEBLS)algorithm,to improve the link stable route with minimized error rate and *** this paper,the optimal route from the source to the sink is determined based on the energy and bandwidth,link stability *** the existing routes,the sink node will choose the optimal route which is having less link stability *** stable link is determined by evaluating link stability value using distance and ***-energy of the node is estimated using the current energy and the consumed *** energy is estimated using transmitted power and the received *** bandwidth in the link is estimated using the idle time and channel capacity with the consideration of probability of collision.
3D point cloud object tracking (3D PCOT) plays a vital role in applications such as autonomous driving and robotics. Adversarial attacks offer a promising approach to enhance the robustness and security of tracking mo...
详细信息
The Consumer Internet of Things (CIoT) integrates the advantage of Internet of Things (IoT) technologies to provide convenience in consumers’ daily lives. With the rapid development of the CIoT, data collected from c...
详细信息
The Consumer Internet of Things (CIoT) integrates the advantage of Internet of Things (IoT) technologies to provide convenience in consumers’ daily lives. With the rapid development of the CIoT, data collected from consumer smart devices has increased exponentially. In the CIoT, web pages, as internet information carriers, offer spammers opportunities to conduct security attacks, which could harm the CIoT systems. Inspired by this challenge, this paper introduces an intelligent feature extraction method, page2vec, and a new classification algorithm, RFiRF, to detect web spam in the CIoT. page2vec is based on a score propagation model, which calculates each page’s goodness and badness scores through the links of a web graph. It is observed that different scoring functions can produce different web page features. Based on this observation, 20 to 30 scoring functions are designed and incorporated into page2vec. This way, page2vec can automatically extract web page features from a web graph. Unfortunately, page2vec also brings a high dimensionality problem when constructing binary classifiers for spam detection. To address this problem, a new classification algorithm, called Random Forest in Random Forest (RFiRF), is proposed. RFiRF replaces a random forest’s meta-classifier (decision tree) with a random forest. It divides the sparse data space into dense sub-spaces by randomly sampling training instances and features. Experiments on two benchmark datasets show that 1) page2vec features are much more predictive than the raw link-based and node2vec features, and 2) RFiRF outperforms some classification algorithms in most cases when facing the high dimensionality problem. We hope this paper can give peers valuable insights into the CIoT security. IEEE
Since the list update problem was applied to data compression as an effective encoding technique, numerous deterministic algorithms have been studied and analyzed. A powerful strategy, Move-to-Front (MTF), involves mo...
详细信息
Taiwan plays a significant role in global seafood supply chains, accounting for approximately 10% of global tuna catches. The country is a substantial producer of tuna, shrimp, and squid, and its seafood industry is w...
详细信息
With recent advancements in robotic surgery,notable strides have been made in visual question answering(VQA).Existing VQA systems typically generate textual answers to questions but fail to indicate the location of th...
详细信息
With recent advancements in robotic surgery,notable strides have been made in visual question answering(VQA).Existing VQA systems typically generate textual answers to questions but fail to indicate the location of the relevant content within the *** limitation restricts the interpretative capacity of the VQA models and their abil-ity to explore specific image *** address this issue,this study proposes a grounded VQA model for robotic surgery,capable of localizing a specific region during answer *** inspiration from prompt learning in language models,a dual-modality prompt model was developed to enhance precise multimodal information ***,two complementary prompters were introduced to effectively integrate visual and textual prompts into the encoding process of the model.A visual complementary prompter merges visual prompt knowl-edge with visual information features to guide accurate *** textual complementary prompter aligns vis-ual information with textual prompt knowledge and textual information,guiding textual information towards a more accurate inference of the ***,a multiple iterative fusion strategy was adopted for comprehensive answer reasoning,to ensure high-quality generation of textual and grounded *** experimental results vali-date the effectiveness of the model,demonstrating its superiority over existing methods on the EndoVis-18 and End-oVis-17 datasets.
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data *** TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient t...
详细信息
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data *** TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient to network updates that provoke flow *** this paper,we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates,because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance *** look into the causes and propose a network update-friendly TCP(NUFTCP),which is an extension of the DCTCP variant,as a *** are used to assess the proposed *** findings reveal that NUFTCP can more effectively manage the problems of out-of-order packets and packet drops triggered in network updates,and it outperforms DCTCP considerably.
The central nervous system is impacted by multiple sclerosis (MS), a chronic neurological condition that causes significant cognitive and physical deficits. Better disease management and prompt intervention depend on ...
详细信息
INTRODUCTION Store signboards provide important information in street view images,andcharacter recognition in natural scenes is an important research direction in computer *** view store signboard character recognitio...
INTRODUCTION Store signboards provide important information in street view images,andcharacter recognition in natural scenes is an important research direction in computer *** view store signboard character recognition technology,acombination of the two,
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ...
详细信息
暂无评论