In recent decades, there has been a notable surge in interest surrounding visible light communication (VLC), which utilizes visible light as a means of transmission. LEDs have emerged as the preferred light source for...
详细信息
Agile methodology does not formally define the role of a project manager, and the Scrum methodology distributes this role among team members. However, the success of software development projects often depends heavily...
详细信息
Before a heart attack happens, treating cardiac patients effectively depends on precise heart disease prediction. A heart disease prediction system for the determination of whether the patient has a heart disease cond...
详细信息
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business req...
详细信息
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business requirements with distinctive ***,such benefits lead to a more adverse environment entailing network breakdown,systems paralysis,and online banking fraudulence and *** one of the most common and dangerous threats in SDN,probe attack occurs when the attacker scans SDN devices to collect the necessary knowledge on system susceptibilities,which is thenmanipulated to undermine the entire ***,high performance,and real-time systems prove pivotal in successful goal attainment through feature selection to minimize computation time,optimize prediction performance,and provide a holistic understanding of machine learning *** the extension of astute machine learning algorithms into an Intrusion Detection System(IDS)through SDN has garnered much scholarly attention within the past decade,this study recommended an effective IDS under the Grey-wolf optimizer(GWO)and Light Gradient Boosting Machine(Light-GBM)classifier for probe attack *** InSDN dataset was employed to train and test the proposed IDS,which is deemed to be a novel benchmarking dataset in *** proposed IDS assessment demonstrated an optimized performance against that of peer IDSs in probe attack detection within *** results revealed that the proposed IDS outperforms the state-of-the-art IDSs,as it achieved 99.8%accuracy,99.7%recall,99.99%precision,and 99.8%F-measure.
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul...
详细信息
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network *** saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor *** of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to *** increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor *** Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster *** data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the ***,the MCH overhead *** the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods.
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals...
详细信息
Artificial intelligence (AI) has the potential to revolutionize the field of gastrointestinal disease diagnosis by enabling the development of accurate and efficient automated systems. This study comprehensively inves...
详细信息
Metaverse-based virtual worlds can provide users with an immersive digital experience by utilizing extended reality, IoT, 6G communication, and computing technology. Unlike the multiverse, in which users can access on...
详细信息
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on e...
详细信息
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on encryption algorithms,which are shared database technologies on the *** technology has grown significantly because of its features,such as flexibility,support for integration,anonymity,decentralization,and independent *** nodes in the blockchain network are used to verify online ***,this integration creates scalability,interoperability,and security *** the last decade,several advancements in blockchain technology have drawn attention fromresearch communities and *** technology helps IoT networks become more reliable and enhance security and *** also removes single points of failure and lowers the *** recent years,there has been an increasing amount of literature on IoT and blockchain technology *** paper extensively examines the current state of blockchain technologies,focusing specifically on their integration into the Internet of ***,it highlights the benefits,drawbacks,and opportunities of recent studies on security issues based on blockchain solutions into *** survey examined various research papers fromdifferent types of ***,a review of the other IoT applications has been included,focusing on the security requirements and challenges in IoT-based *** research directions are gathered for the effective integration of Blockchain and IoT.
Serverless computing has shifted cloud server management responsibilities away from end users and towards service providers. Serverless computing offers greater scalability, flexibility, ease of deployment, and cost-e...
详细信息
暂无评论