suggested approach
Recently Published Documents





2022 ◽  
Vol 76 ◽  
pp. 110571
Hermann dos Santos Fernandes ◽  
Naveed Siddiqui ◽  
Sharon Peacock ◽  
Ezequiel Vidal ◽  
Jesse Wolfstadt ◽  

Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 252
Manjit Kaur ◽  
Deepak Prashar ◽  
Mamoon Rashid ◽  
Zeba Khanam ◽  
Sultan S. Alshamrani ◽  

In flying ad hoc networks (FANETs), load balancing is a vital issue. Numerous conventional routing protocols that have been created are ineffective at load balancing. The different scope of its applications has given it wide applicability, as well as the necessity for location assessment accuracy. Subsequently, implementing traffic congestion control based on the current connection status is difficult. To successfully tackle the above problem, we frame the traffic congestion control algorithm as a network utility optimization problem that takes different parameters of the network into account. For the location calculation of unknown nodes, the suggested approach distributes the computational load among flying nodes. Furthermore, the technique has been optimized in a FANET utilizing the firefly algorithm along with the traffic congestion control algorithm. The unknown nodes are located using the optimized backbone. Because the computational load is divided efficiently among the flying nodes, the simulation results show that our technique considerably enhances the network longevity and balanced traffic.

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 528
Aitizaz Ali ◽  
Muhammad Fermi Pasha ◽  
Jehad Ali ◽  
Ong Huey Fang ◽  
Mehedi Masud ◽  

Due to the value and importance of patient health records (PHR), security is the most critical feature of encryption over the Internet. Users that perform keyword searches to gain access to the PHR stored in the database are more susceptible to security risks. Although a blockchain-based healthcare system can guarantee security, present schemes have several flaws. Existing techniques have concentrated exclusively on data storage and have utilized blockchain as a storage database. In this research, we developed a unique deep-learning-based secure search-able blockchain as a distributed database using homomorphic encryption to enable users to securely access data via search. Our suggested study will increasingly include secure key revocation and update policies. An IoT dataset was used in this research to evaluate our suggested access control strategies and compare them to benchmark models. The proposed algorithms are implemented using smart contracts in the hyperledger tool. The suggested strategy is evaluated in comparison to existing ones. Our suggested approach significantly improves security, anonymity, and monitoring of user behavior, resulting in a more efficient blockchain-based IoT system as compared to benchmark models.

Mahdi Giozafat

Mobile money services give trade benefits such as bill payment, decreased transaction costs and time, expanded savings possibilities, sales, and convenience. Despite the benefits, traders in Uganda are still slow to adopt and use mobile money services. This article reflects on the findings of a study that looked at the barriers that merchants experience while utilizing and implementing mobile money services in Uganda. A self-administered questionnaire was utilized to obtain data from 394 survey respondents. A model for encouraging traders to use mobile money services is offered. The suggested model expands on the Unified Theory of Technology Acceptance and Use. According to regression study, performance expectancy, social factors, and sensitization components all have a substantial impact on the behavioral intention of mobile money service uptake for trade. On the other hand, security and effort expectation had no significant affect on traders' behavioral intention to use mobile money services. Furthermore, the data show that enabling conditions affected the utilization of mobile money services for commercial transactions. The suggested approach is adaptable and generic, and it may be used in other developing nations with comparable circumstances to Uganda.

Physics ◽  
2022 ◽  
Vol 4 (1) ◽  
pp. 12-20
Sumita Datta ◽  
Vanja Dunjko ◽  
Maxim Olshanii

In this paper, the quantum fluctuations of the relative velocity of constituent solitons in a Gross-Pitaevskii breather are studied. The breather is confined in a weak harmonic trap. These fluctuations are monitored, indirectly, using a two-body correlation function measured at a quarter of the harmonic period after the breather creation. The results of an ab initio quantum Monte Carlo calculation, based on the Feynman-Kac path integration method, are compared with the analytical predictions using the recently suggested approach within the Bogoliubov approximation, and a good agreement is obtained.

2022 ◽  
Vol 2022 ◽  
pp. 1-20
Chun-Nen Huang ◽  
Shahzaib Ashraf ◽  
Noor Rehman ◽  
Saleem Abdullah ◽  
Azmat Hussain

Industrial control system (ICS) attacks are usually targeted attacks that use the ICS entry approach to get a foothold within a system and move laterally throughout the organization. In recent decades, powerful attacks such as Stuxnet, Duqu, Flame, and Havex have served as wake-up calls for industrial units. All organizations are faced with the rise of security challenges in technological innovations. This paper aims to develop aggregation operators that can be used to address the decision-making problems based on a spherical fuzzy rough environment. Meanwhile, some interesting properties of idempotence, boundedness, and monotonicity for the proposed operators are analyzed. Moreover, we use this newly constructed framework to select ICS security suppliers and validate its acceptability. Furthermore, a different test has been performed based on a new operator to strengthen the suggested approach. Additionally, comparative analysis based on the novel extended TOPSIS method is presented to demonstrate the superiority of the proposed technique. The results show that the conventional approach has a larger area for information representation, better adaptability to the evaluation environment, and higher reliability of the evaluation results.

Horticulturae ◽  
2022 ◽  
Vol 8 (1) ◽  
pp. 48
László Huzsvai ◽  
Safwan Mohammed ◽  
Endre Harsányi ◽  
Adrienn Széles

In recent decades, the agricultural sector has witnessed rapid technological interventions from field to the production stage. Thus, the importance of these technological interventions must be strictly evaluated. The traditional statistical method often deems low statistical differences as a significant one, which cannot be considered effective from different perspectives. In this sense, the aim of this research was to develop a new statistical method for evaluating agricultural experiments based on different criteria; hence, the significant importance of the technological interventions can be clearly determined. Data were collected from of a long-term (13-year) crop production experiment (Central Europe, Hungary), which involved five different fertilization levels, along with non-fertilized treatment (control), two irrigation treatments (irrigated and non-irrigated), and 15–20 genotypes of maize. The output of this research showed that the classic statistical approach for testing the significant differences among treatments should be accompanied with our new suggested approach (i.e., professional test), which reflect whether treatments were professionally effective or not. Also, results showed that good statistical background is not enough for interoperating the analysis of agricultural experiments. This research suggested that erroneous conclusions can be avoided by merging classical and professional statistical tests, and correct recommendations could be provided to decision makers and farmers based on their financial resources.

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

One of the most critical activities of revealing terrorism-related information is classifying online documents.The internet provides consumers with a variety of useful knowledge, and the volume of web material is increasingly growing. This makes finding potentially hazardous records incredibly difficult. To define the contents, merely extracting keywords from records is inadequate. Many methods have been studied so far to develop automatic document classification systems, they are mainly computational and knowledge-based approaches. due to the complexities of natural languages, these approaches do not provide sufficient results. To fix this shortcoming, we given approach of structure dependent on the WordNet hierarchy and the frequency of n-gram data that employs word similarity. Using four different queries terms from four different regions, this approach was checked for the NY Times articles that were sampled. Our suggested approach successfully removes background words and phrases from the document recognizes connected to terrorism texts, according to experimental findings.

Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 317
Alexander Zuev ◽  
Alexey N. Zhirabok ◽  
Vladimir Filaretov ◽  
Alexander Protsenko

The problem of fault identification in electric servo actuators of robot manipulators described by nonstationary nonlinear dynamic models under disturbances is considered. To solve the problem, sliding mode observers are used. The suggested approach is based on the reduced order model of the original system having different sensitivity to faults and disturbances. This model is realized in canonical form that enables relaxing the limitation imposed on the original system. Theoretical results are illustrated by practical example.

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Hongyang He ◽  
Yue Gao ◽  
Yong Zheng ◽  
Yining Liu

Companies that produce energy transmit it to any or all households via a power grid, which is a regulated power transmission hub that acts as a middleman. When a power grid fails, the whole area it serves is blacked out. To ensure smooth and effective functioning, a power grid monitoring system is required. Computer vision is among the most commonly utilized and active research applications in the world of video surveillance. Though a lot has been accomplished in the field of power grid surveillance, a more effective compression method is still required for large quantities of grid surveillance video data to be archived compactly and sent efficiently. Video compression has become increasingly essential with the advent of contemporary video processing algorithms. An algorithm’s efficacy in a power grid monitoring system depends on the rate at which video data is sent. A novel compression technique for video inputs from power grid monitoring equipment is described in this study. Due to a lack of redundancy in visual input, traditional techniques are unable to fulfill the current demand standards for modern technology. As a result, the volume of data that needs to be saved and handled in live time grows. Encoding frames and decreasing duplication in surveillance video using texture information similarity, the proposed technique overcomes the aforementioned problems by Robust Particle Swarm Optimization (RPSO) based run-length coding approach. Our solution surpasses other current and relevant existing algorithms based on experimental findings and assessments of different surveillance video sequences utilizing varied parameters. A massive collection of surveillance films was compressed at a 50% higher rate using the suggested approach than with existing methods.

Sign in / Sign up

Export Citation Format

Share Document