Images are present in everything these days, from satellite photography to medical scans, and they have a profound impact on how people view and understand the world. The daily generation of an ever-increasing volume ...
详细信息
Underwater wireless sensor networks(UWSNs)rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the ***,many existing data aggregation techniq...
详细信息
Underwater wireless sensor networks(UWSNs)rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the ***,many existing data aggregation techniques are designed exclusively for static networks and fail to reflect the dynamic nature of underwater ***,conventional multi-hop data gathering techniques often lead to energy depletion problems near the sink,commonly known as the energy hole ***,cluster-based aggregation methods face significant challenges such as cluster head(CH)failures and collisions within clusters that degrade overall network *** address these limitations,this paper introduces an innovative framework,the Cluster-based Data Aggregation using Fuzzy Decision Model(CDAFDM),tailored for mobile *** proposed method has four main phases:clustering,CH selection,data aggregation,and *** CH selection,a fuzzy decision model is utilized to ensure efficient cluster head selection based on parameters such as residual energy,distance to the sink,and data delivery likelihood,enhancing network stability and energy *** the aggregation phase,CHs transmit a single,consolidated set of non-redundant data to the base station(BS),thereby reducing data duplication and saving *** adapt to the changing network topology,the re-clustering phase periodically updates cluster formations and reselects *** results show that CDAFDM outperforms current protocols such as CAPTAIN(Collection Algorithm for underwater oPTical-AcoustIc sensor Networks),EDDG(Event-Driven Data Gathering),and DCBMEC(Data Collection Based on Mobile Edge Computing)with a packet delivery ratio increase of up to 4%,an energy consumption reduction of 18%,and a data collection latency reduction of 52%.These findings highlight the framework’s potential for reliable and energy-efficient data aggregation mobile UWSNs.
This research introduces a web-based fisheries management system that leverages Artificial Neural Networks (ANNs) to accurately predict fish weight. By utilizing a public dataset sourced from a fish market, encompassi...
详细信息
A key component of contemporary banking systems and e-commerce platforms is identifying fraud in online transactions. Traditional rule-based techniques are insufficient for preventing sophisticated fraud schemes becau...
详细信息
With the rapid development of modern electronics and computation capability, biomechanical mining is attracting more and more attention. Due to the complexity and inter-person variance among the biomechanical dynamics...
详细信息
The term sentiment analysis deals with sentiment classification based on the review made by the user in a social *** sentiment classification accuracy is evaluated using various selection methods,especially those that d...
详细信息
The term sentiment analysis deals with sentiment classification based on the review made by the user in a social *** sentiment classification accuracy is evaluated using various selection methods,especially those that deal with algorithm *** this work,every sentiment received through user expressions is ranked in order to categorise sentiments as informative and *** order to do so,the work focus on Query Expansion Ranking(QER)algorithm that takes user text as input and process for sentiment analysis andfinally produces the results as informative or *** challenge is to convert non-informative into informative using the concepts of classifiers like Bayes multinomial,entropy modelling along with the traditional sentimental analysis algorithm like Support Vector Machine(SVM)and decision *** work also addresses simulated annealing along with QER to classify data based on sentiment *** the input volume is very fast,the work also addresses the concept of big data for information retrieval and *** result com-parison shows that the QER algorithm proved to be versatile when compared with the result of *** work uses Twitter user comments for evaluating senti-ment analysis.
This paper proposes an improved version of the Partial Reinforcement Optimizer(PRO),termed *** LNPRO has undergone a learner phase,which allows for further communication of information among the PRO population,changin...
详细信息
This paper proposes an improved version of the Partial Reinforcement Optimizer(PRO),termed *** LNPRO has undergone a learner phase,which allows for further communication of information among the PRO population,changing the state of the PRO in terms of ***,the Nelder-Mead simplex is used to optimize the best agent in the population,accelerating the convergence speed and improving the accuracy of the PRO *** comparing LNPRO with nine advanced algorithms in the IEEE CEC 2022 benchmark function,the convergence accuracy of the LNPRO has been *** accuracy and stability of simulated data and real data in the parameter extraction of PV systems are *** to the PRO,the precision and stability of LNPRO have indeed been enhanced in four types of photovoltaic components,and it is also superior to other excellent *** further verify the parameter extraction problem of LNPRO in complex environments,LNPRO has been applied to three types of manufacturer data,demonstrating excellent results under varying irradiation and *** summary,LNPRO holds immense potential in solving the parameter extraction problems in PV systems.
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity *** this paper,the eavesdropping attack...
详细信息
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity *** this paper,the eavesdropping attacks that lead to privacy breaches are addressed for the IoT-enabled ADN.A privacy-preserving energy management system(EMS)is proposed and empowered by secure data exchange protocols based on the homomorphic *** the information transmission among distributed generators and load customers in the EMS,private information including power usage and electricity bidding price can be effectively protected against eavesdropping *** correctness of the final solutions,e.g.,optimal market clearing price and unified power utilization ratio,can be deterministically *** simulation results demonstrate the effectiveness and the computational efficiency of the proposed homomorphically encrypted EMS.
Recognizing the emotional content of Natural Language sentences can improve the way humans communicate with a computer system by enabling them to recognize and imitate emotional expressions. In this paper, deep learni...
详细信息
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of *** ensure the security and privacy of these images,theymust be watermarked and encrypted before **...
详细信息
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of *** ensure the security and privacy of these images,theymust be watermarked and encrypted before ***,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash *** watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,*** bitwise XOR and substitution,the TD-ERCS map encrypts the watermark *** ciphered watermark image is embedded in the plaintext *** embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic *** permuted image is then bitwise XORed with the values obtained from the Duffing *** additional security,the XORed image is substituted through a dynamic *** evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks.
暂无评论