In today's Internet routing infrastructure, designers have addressed scaling concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary constrain. In tactical Mobile Ad-hoc Network (MANET), hubs can function based on the work plan in various social affairs and the internally connected hubs are almost having the related moving standards where the topology between one and the other are tightly coupled in steady support by considering the touchstone of hubs such as a self-sorted out, self-mending and self-administration. Clustering in the routing process is one of the key aspects to increase MANET performance by coordinating the pathways using multiple criteria and analytics. We present a Group Adaptive Hybrid Routing Algorithm (GAHRA) for gathering portability, which pursues table-driven directing methodology in stable accumulations and on-request steering strategy for versatile situations. Based on this aspect, the research demonstrates an adjustable framework for commuting between the table-driven approach and the on-request approach, with the objectives of enhancing the output of MANET routing computation in each hub. Simulation analysis and replication results reveal that the proposed method is promising than a single well-known existing routing approach and is well-suited for sensitive MANET applications. 相似文献
In this work, a deep learning (DL)-based massive multiple-input multiple-output (mMIMO) orthogonal frequency division multiplexing (OFDM) system is investigated over the tapped delay line type C (TDL-C) model with a Rayleigh fading distribution at frequencies ranging from 0.5 to 100 GHz. The proposed bi-directional long short-term memory (Bi-LSTM) channel state information (CSI) estimator uses online learning during training and offline learning during the practical implementation phase. The design of the estimator takes into account situations in which prior knowledge of channel statistics is limited and targets excellent performance, even with limited pilot symbols (PS). Three separate loss functions (mean square logarithmic error [MSLE], Huber, and Kullback–Leibler Distance [KLD]) are assessed in three classification layers. The symbol error rate (SER) and outage probability performance of the proposed estimator are evaluated using a number of optimization techniques, such as stochastic gradient descent (SGD), momentum, and the adaptive gradient (AdaGrad) algorithm. The Bi-LSTM-based CSI estimator is trained considering a specific number of PS. It can be readily seen that by incorporating a cyclic prefix (CP), the system becomes more resilient to channel impairments, resulting in a lower SER. Simulations show that the SGD optimization approach and Huber loss function-trained Bi-LSTM-based CSI estimator have the lowest SER and very high estimation accuracy. By using deep neural networks (DNNs), the Bi-LSTM method for CSI estimation achieves a superior channel capacity (in bps/Hz) at 10 dB than long short-term memory (LSTM) and other conventional CSI estimators, such as minimum mean square error (MMSE) and least squares (LS). The simulation results validate the analytical results in the study. 相似文献
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol. 相似文献
Engineering with Computers - Plate structures are the integral parts of any maritime engineering platform. With the recent focus on composite structures, the need for optimizing their design and... 相似文献
The Journal of Supercomputing - Data transmission is a great challenge in any network environment. However, medical data collected from IoT devices need to be transmitted at high speed to ensure... 相似文献
In recent years, we face an increasing interest in protecting multimedia data and copyrights due to the high exchange of information. Attackers are trying to get confidential information from various sources, which brings the importance of securing the data. Many researchers implemented techniques to hide secret information to maintain the integrity and privacy of data. In order to protect confidential data, histogram-based reversible data hiding with other cryptographic algorithms are widely used. Therefore, in the proposed work, a robust method for securing digital video is suggested. We implemented histogram bit shifting based reversible data hiding by embedding the encrypted watermark in featured video frames. Histogram bit shifting is used for hiding highly secured watermarks so that security for the watermark symbol is also being achieved. The novelty of the work is that only based on the quality threshold a few unique frames are selected, which holds the encrypted watermark symbol. The optimal value for this threshold is obtained using the Firefly Algorithm. The proposed method is capable of hiding high-capacity data in the video signal. The experimental result shows the higher capacity and video quality compared to other reversible data hiding techniques. The recovered watermark provides better identity identification against various attacks. A high value of PSNR and a low value of BER and MSE is reported from the results.
In today’s world, Cloud Computing (CC) enables the users to access computing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, located in remote locations, is integrated to perform operations like data collection, processing, data profiling and data storage. In this context, resource allocation and task scheduling are important processes which must be managed based on the requirements of a user. In order to allocate the resources effectively, hybrid cloud is employed since it is a capable solution to process large-scale consumer applications in a pay-by-use manner. Hence, the model is to be designed as a profit-driven framework to reduce cost and make span. With this motivation, the current research work develops a Cost-Effective Optimal Task Scheduling Model (CEOTS). A novel algorithm called Target-based Cost Derivation (TCD) model is used in the proposed work for hybrid clouds. Moreover, the algorithm works on the basis of multi-intentional task completion process with optimal resource allocation. The model was successfully simulated to validate its effectiveness based on factors such as processing time, make span and efficient utilization of virtual machines. The results infer that the proposed model outperformed the existing works and can be relied in future for real-time applications. 相似文献
In this article, we introduce new field equations for incompressible non-viscous fluids, which can be treated similarly to Maxwell’s electromagnetic equations based on artificial intelligence algorithms. Lagrangian and Hamiltonian formulations are used to arrive at field equations that are solved using convolutional neural networks. Four linear differential equations, which describe the two fields, namely, the dynamic pressure and the vortex fields, are derived, and these can be used in place of Euler’s equation. The only assumption while deriving this equation is that the dynamic pressure and vortex fields obey the superposition principle. The important finding to be noted is that Euler’s fluid equations can be converted into field equations analogous to Maxwell’s electromagnetic equations. We solve the flow problem for laminar flow past a cylinder, sphere, and cone in two dimensions similar to the conduction in a uniform electric field and arrive at closed-form expressions. These closed-form expressions, which are obtained for the potentials of fluid flow, are similar to the streamline potential functions in the case of fluid dynamics.
The insulation resistance of conventional atmospheric plasma-sprayed alumina coatings with 10–15% porosity is ~1011 Ω. The presence of pores, lamellae boundaries, and other non-fillings dampens the insulation resistance of the coating. In the present study, aluminum phosphate was used to seal the surface of plasma-sprayed alumina coating and evaluate the effect of sealing on the insulation resistance and its thermal cycling response. Sealing was carried out with three concentrations of sealant (P/Al molar ratio of 3, 10, and 15). Characterization by X-ray diffraction and scanning electron microscopy revealed the primary sealing phase as aluminum metaphosphate and effective sealing of the pores by the aluminum phosphate phases. Insulation resistance is improved by two orders of magnitude after sealing the coated samples. Sealing with P/Al molar ratio 3 exhibited maximum insulation resistance of ~1013 Ω at room temperature. Thermal cycling studies between 650°C and 200°C on the sealed samples showed deterioration in thermal cycling life after sealing. 相似文献
A new data-driven reference vector-guided evolutionary algorithm has been successfully implemented to construct surrogate models for various objectives pertinent to an industrial blast furnace. A total of eight objectives have been modeled using the operational data of the furnace using 12 process variables identified through a principal component analysis and optimized simultaneously. The capability of this algorithm to handle a large number of objectives, which has been lacking earlier, results in a more efficient setting of the operational parameters of the furnace, leading to a precisely optimized hot metal production process. 相似文献