Advances in GPU have facilitated design and execution of complex and computation-intensive deep learning models. As the model complexity increases, the risk of encountering problems due to very large model size, indiv...
详细信息
This paper solves the boundary value problem of the second-order differential equation under the neutrosophic fuzzy boundary condition. The proposed solution is approximated using the finite difference method but dene...
详细信息
Payment Channel Networks(PCNs)are a promising alternative to improve the scalability of a blockchain network.A PCN employs off-chain micropayment channels that do not need a global block confirmation procedure,thereby...
详细信息
Payment Channel Networks(PCNs)are a promising alternative to improve the scalability of a blockchain network.A PCN employs off-chain micropayment channels that do not need a global block confirmation procedure,thereby sacrificing the ability to confirm transactions *** uses a routing algorithm to identify a path between two users who do not have a direct channel between them to settle a *** performance of most of the existing centralized path-finding algorithms does not scale with network *** rapid growth of Bitcoin PCN necessitates considering distributed ***,the existing decentralized algorithms suffer from resource *** present a decentralized routing algorithm,Swift,focusing on fee *** concept of a secret path is used to reduce the path length between a sender and a receiver to optimize the ***,we reduce a network structure into combinations of cycles to theoretically study fee optimization with changes in cloud *** secret path also helps in edge load sharing,which results in an improvement of *** routing achieves up to 21%and 63%in fee and throughput optimization,*** results from the simulations follow the trends identified in the theoretical analysis.
Admissions examinations are crucial in shaping students' academic and career paths. Machine learning (ML) offers a promising avenue for transforming the assessment process in universities, schools, and colleges. T...
详细信息
Wireless networks have become integral to modern communication systems,enabling the seamless exchange of information across a myriad of ***,the inherent characteristics of wireless channels,such as fading,interference...
详细信息
Wireless networks have become integral to modern communication systems,enabling the seamless exchange of information across a myriad of ***,the inherent characteristics of wireless channels,such as fading,interference,and openness,pose significant challenges to achieving fault-tolerant consensus within these ***-tolerant consensus,a critical aspect of distributed systems,ensures that network nodes collectively agree on a consistent value even in the presence of faulty or compromised *** survey paper provides a comprehensive overview of faulttolerant consensus mechanisms specifically tailored for wireless *** explore the diverse range of consensus protocols and techniques that have been developed to address the unique challenges of wireless *** paper systematically categorizes these consensus mechanisms based on their underlying principles,communication models,and fault *** investigates how these mechanisms handle various types of faults,including communication errors,node failures,and malicious *** highlights key use cases,such as sensor networks,Internet of Things(IoT)applications,wireless blockchain,and vehicular networks,where fault-tolerant consensus plays a pivotal role in ensuring reliable and accurate data dissemination.
Nowadays, smartphones are used for various activities, including checking emails, paying bills, and playing games, which have become essential parts of daily life. Also, IoT devices can be managed and controlled using...
详细信息
Nowadays, smartphones are used for various activities, including checking emails, paying bills, and playing games, which have become essential parts of daily life. Also, IoT devices can be managed and controlled using applications. While applications can provide numerous benefits, they have also led to several security risks, such as theft of data, eavesdropping, compromised data, and denial-of-service attacks. This study examines security breaches, attacks targeting Android system applications, and vulnerabilities present at every layer of the Android architecture. Additionally, the study aims to compare and evaluate various treatment methods to identify their advantages and disadvantages. Furthermore, the study aims to examine Android's architecture for weaknesses that might lead to app vulnerabilities and potential attacks. To achieve the objectives of this study, a comprehensive analysis of security breaches and attacks targeting Android system applications will be conducted. Various treatment methods will be compared and evaluated through rigorous examination. Additionally, Android's architecture will be thoroughly examined to identify potential weaknesses and vulnerabilities. The analysis will focus on identifying the security risks associated with the use of applications on smartphones and IoT devices. The vulnerabilities present at every layer of the Android architecture will also be analyzed. Furthermore, the advantages and disadvantages of various treatment methods will be assessed. The findings of this study will reveal the various security risks, vulnerabilities, and potential weaknesses present in Android system applications and the Android architecture. The advantages and disadvantages of different treatment methods will also be highlighted. This study contributes to the development of more precise and robust security measures for Android, aiming to mitigate security breaches, attacks, and vulnerabilities. By identifying weaknesses and vulnerabilities,
This paper shows the outcomes of computer virus propagation (CVP) model, represented with susceptible, exposed, infected, quarantine and recovered computers (SEIRQ), classes based mathematical model using the stochast...
详细信息
Instead of earlier traditional farming, wireless sensor networks (WSNs) can be effectively used in the precision agriculture to improve the farmer’s livelihood. Whereas, hierarchical routing based protocols in WSNs a...
详细信息
Speech Emotion Recognition (SER) refers to the recognition of human emotions from natural speech, vital for building human-centered context-aware intelligent systems. Here, domain shift, where models' trained on o...
详细信息
Predictive modelling can be a huge benefit when it comes to optimizing patient flows in a hospital. Hospital beds are considered critical resources, thus the need for optimizing patient flow is evident. This paper foc...
详细信息
暂无评论