Suggested Topics within your search.
Suggested Topics within your search.
-
421
Contextual Deep Semantic Feature Driven Multi-Types Network Intrusion Detection System for IoT-Edge Networks
Published 2024-12-01“…There exists an array of applications employing edge- internet of things (Edge-IoT) where the edge nodes collect local data to perform real-time decisions. …”
Get full text
Article -
422
Sistem Smart Trash Pemilah Sampah Organik dan Anorganik Berbasis Internet of Things
Published 2023-09-01“…Arduino microcontroller, Node MCU ESP8266. The ultrasonic sensor reads the presence of object in front of the sensor then servo opens the trash can lid, and the garbage is put in the trash can. …”
Get full text
Article -
423
Use Linear Weighted Genetic Algorithm to Optimize the Scheduling of Fog Computing Resources
Published 2021-01-01“…This paper establishes a mathematical model for the resource management and scheduling of the fog node cluster and establishes the optimization goals of delay, communication load, and service cost. …”
Get full text
Article -
424
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01“…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
Get full text
Article -
425
A Multiobjective Evolutionary Algorithm for Energy-Efficient Cooperative Spectrum Sensing in Cognitive Radio Sensor Network
Published 2015-05-01“…The simulation results show that the proposed algorithm can reduce the average energy consumption of cognitive sensor node, while improving the global probability of spectrum sensing.…”
Get full text
Article -
426
An effective scheduling in data centres for efficient CPU usage and service level agreement fulfilment using machine learning
Published 2021-10-01“…In addition, the power consumption, as well as management of the node clusters is also a problematic situation when the CPU utilisation increases up to the limit. …”
Get full text
Article -
427
A Scalable Multi-Target Tracking Algorithm for Wireless Sensor Networks
Published 2012-09-01“…The task of tracking multiple objects in a wireless sensor network is challenging due to constraints on a sensor node such as short communication and sensing ranges, a limited amount of memory, and limited computational power. …”
Get full text
Article -
428
A self-configuration framework for balancing services in the fog of things
Published 2024-01-01“…Specifically, in scenarios with ten fog nodes, our approach increases average availability by 10 %–20 % and achieves 70 %–80 % load balancing. …”
Get full text
Article -
429
Multi-level clustering and Prediction based energy efficient routing protocol to eliminate Hotspot problem in Wireless Sensor Networks.
Published 2025-01-01“…Analysis indicates that the proposed protocol effectively mitigates the hot-spot problem and reduces data transmission overhead of sensor nodes. In simulation, the proposed protocol on an average improves network life by 34.5%, 23.5%, 14.5% and 5.5% as compared to existing protocols FCEEC, DBSCAN, LPGCR and FBECS respectively for deployment of nodes between 600 to 1200. …”
Get full text
Article -
430
Energy-Efficient Hybrid Adaptive Clustering for Dynamic MANETs
Published 2025-01-01“…Mobile ad hoc network (MANET) is a wireless, mobile node network in which the nodes move randomly and operate without centralized management. …”
Get full text
Article -
431
Deep Reinforcement Learning-Based Routing Method for Low Earth Orbit Mega-Constellation Satellite Networks with Service Function Constraints
Published 2025-02-01“…Specifically, this method constructs the system model based on the latest NTN low-orbit satellite network end-to-end transmission architecture, taking into account the SFC constraints, transmission delays, and network node loads in the end-to-end traffic transmission, uses a GNN to extract node attributes and dynamic topology features, and uses the DRL method to design specific reward functions to train the model to learn routing policies that satisfy the SFC constraints. …”
Get full text
Article -
432
From MRI to FEM: an automated pipeline for biomechanical simulations of vertebrae and intervertebral discs
Published 2025-01-01“…We rated mesh quality metrics and processing times.ResultsWith an average number of 21 vertebrae and 20 IVDs per subject, the average processing time was 4.4 min for a vertebra and 31 s for an IVD. …”
Get full text
Article -
433
GNODEVAE: a graph-based ODE-VAE enhances clustering for single-cell data
Published 2025-08-01“…Results We present GNODEVAE, a novel architecture integrating Graph Attention Networks (GAT), Neural Ordinary Differential Equations (NODE), and Variational Autoencoders (VAE) for comprehensive single-cell analysis. …”
Get full text
Article -
434
Heap Optimization in A* Pathfinding for Horror Games
Published 2025-03-01“…Heap optimization is introduced to enhance A* performance by reducing the time required to identify the lowest-cost node in the Open List. Experimental results from a Unity-based prototype demonstrate that the optimized A* achieves an average pathfinding time of 1.6 ms, compared to 3.16 ms without optimization—representing a 49.37% improvement. …”
Get full text
Article -
435
Synchronous Firefly Algorithm for Cluster Head Selection in WSN
Published 2015-01-01“…Wireless Sensor Network (WSN) consists of small low-cost, low-power multifunctional nodes interconnected to efficiently aggregate and transmit data to sink. …”
Get full text
Article -
436
Hyperspectral target detection based on graph sampling and aggregation network.
Published 2025-01-01“…This proposed model is capable of autonomously learning the effective feature representations of nodes within the graph, thereby facilitating the extraction and processing of graph data. …”
Get full text
Article -
437
Crowd-based collaboration caching mechanism in smart identifier network
Published 2018-12-01“…Smart identifier network (SINET) is an innovative network architecture.Through dynamic collaboration of service resource,function groups and physical components,the network scalability,resource utilization and service quality were effectively improved by SINET,and an effective solution for the development of industrial Internet of things(IoT) could be provided.To promote content delivery in resource-constrained IoT,caching function was introduced in network components by SINET,and the bandwidth waste caused by traffic redundancy in resource-constrained node could be reduced.Therefore,how to efficiently cache content became an important research topic.Based on SINET architecture,a crowd-based collaboration cache (C2Cache) mechanism was proposed in this scheme.According to the actual network topology,the caching function group was dynamically created and optimized by C2Cache,and a function group as crowd minimum unit to execute the maximum benefit cache (MBC) algorithm was defined to maximize the caching space efficiency.With the self-developed emulation system,named EmuStack,the performance of C2Cache was evaluated.The experimental results show that,comparing with LCE,Random,Prob Cache,LCD and Greedy caching mechanisms,the cache hit rate can be improved effectively,then the average access time can be reduced significantly by C2Cache.In the simulated network scenario,the performance increases 15% to 30%.…”
Get full text
Article -
438
Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning
Published 2014-01-01“…Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. …”
Get full text
Article -
439
A high‐performance full swing 1‐bit hybrid full adder cell
Published 2022-05-01“…The performance evaluation of the proposed FA cell has been carried out using an HSPICE simulator at the 16 nm process node by comparing it with eight existing FAs over the supply voltage ranging from 0.4 to 1.0 V. …”
Get full text
Article -
440
Minimizing the Number of Mobile Chargers to Keep Large-Scale WRSNs Working Perpetually
Published 2015-06-01“…Wireless Rechargeable Sensor Networks, in which mobile chargers ( M C s) are employed to recharge the sensor nodes, have attracted wide attention in recent years. …”
Get full text
Article