ad hoc
Recently Published Documents


TOTAL DOCUMENTS

45550
(FIVE YEARS 8148)

H-INDEX

218
(FIVE YEARS 20)

2022 ◽  
Vol 40 (3) ◽  
pp. 1-37
Author(s):  
Edward Kai Fung Dang ◽  
Robert Wing Pong Luk ◽  
James Allan

In Information Retrieval, numerous retrieval models or document ranking functions have been developed in the quest for better retrieval effectiveness. Apart from some formal retrieval models formulated on a theoretical basis, various recent works have applied heuristic constraints to guide the derivation of document ranking functions. While many recent methods are shown to improve over established and successful models, comparison among these new methods under a common environment is often missing. To address this issue, we perform an extensive and up-to-date comparison of leading term-independence retrieval models implemented in our own retrieval system. Our study focuses on the following questions: (RQ1) Is there a retrieval model that consistently outperforms all other models across multiple collections; (RQ2) What are the important features of an effective document ranking function? Our retrieval experiments performed on several TREC test collections of a wide range of sizes (up to the terabyte-sized Clueweb09 Category B) enable us to answer these research questions. This work also serves as a reproducibility study for leading retrieval models. While our experiments show that no single retrieval model outperforms all others across all tested collections, some recent retrieval models, such as MATF and MVD, consistently perform better than the common baselines.


Author(s):  
Arudra Annepu ◽  
◽  
Priti Mishra ◽  

Wireless network technically, refers to the category of network in which communication is carried out without using wires. In modern era wireless network has great importance because the communication is taking place with the use of radio waves. Thus, the use of ad-hoc network starts yielding a great importance in variety of applications. The certain research work is carried out in this particular field. MANET is a constructed from various mobility in the form of mobile nodes and anytime without any need of fixed infrastructure. MANET can be made on fly due to lack of fixed infrastructure. MANET is numerous threats types of attacks due to dynamic changing topologies and wireless medium. Security of the MANET becomes one of the challenging tasks. Black hole attacks is the main type of attack that are possible in MANET. Black hole node not forward any data packets to the neighbour node instead it drops all the data packets. Black hole attacks are bit hard to detect due to lack of centralized access. This research work concentrates to enhance the security of MANET by identifying and blocking black hole assaults from occurring. A reactive routing system such as Ad-Hoc on Demand Distance Vector has previously been used to address security problems in the MANET (AODV). Various attack types were investigated, and the consequences of these assaults were detailed by describing how MANET performance was disrupted. Network Simulator 3 (NS3) is used for the simulation process.


2022 ◽  
Vol 11 (3) ◽  
pp. 1-10
Author(s):  
Sudhakar Sengan ◽  
Osamah Ibrahim Khalaf ◽  
Ganga Rama Koteswara Rao ◽  
Dilip Kumar Sharma ◽  
Amarendra K. ◽  
...  

An ad hoc structure is self-organizing, self-forming, and system-free, with no nearby associations. One of the significant limits we must focus on in frameworks is leading. As for directions, we can send the packet or communications from the sender to the recipient node. AODV Routing Protocol, a short display that will make the tutorial available on demand. Machine Learning (ML) based IDS must be integrated and perfected to support the detection of vulnerabilities and enable frameworks to make intrusion decisions while ML is about their mobile context. This paper considers the combined effect of stooped difficulties along the way, problems at the medium get-right-of-area to impact layer, or pack disasters triggered by the remote control going off route. The AODV as the Routing MANET protocol is used in this work, and the process is designed and evaluated using Support Vector Machine (SVM) to detect the malicious network nodes.


2022 ◽  
Vol 22 (1) ◽  
pp. 1-27
Author(s):  
Gaurav Singal ◽  
Vijay Laxmi ◽  
Manoj Singh Gaur ◽  
D. Vijay Rao ◽  
Riti Kushwaha ◽  
...  

Multicast communication plays a pivotal role in Edge based Mobile Ad hoc Networks (MANETs). MANETs can provide low-cost self-configuring devices for multimedia data communication that can be used in military battlefield, disaster management, connected living, and public safety networks. A Multicast communication should increase the network performance by decreasing the bandwidth consumption, battery power, and routing overhead. In recent years, a number of multicast routing protocols (MRPs) have been proposed to resolve above listed challenges. Some of them are used for dynamic establishment of reliable route for multimedia data communication. This article provides a detailed survey of the merits and demerits of the recently developed techniques. An ample study of various Quality of Service (QoS) techniques and enhancement is also presented. Later, mesh topology-based MRPs are classified according to enhancement in routing mechanism and QoS modification. This article covers the most recent, robust, and reliable QoS-aware mesh based MRPs, classified on the basis of their operational features, and pros and cons. Finally, a comparative study has been presented on the basis of their performance parameters on the proposed protocols.


2022 ◽  
Vol 34 (4) ◽  
pp. 0-0

Medical sensors are implanted within the vital organs of human body to record and monitor the vital signs of pulse rate, heartbeat, electrocardiogram, body mass index, temperature, blood pressure, etc. to ensure their effective functioning. These are monitored to detect patient’s health from anywhere and at any time. The Wireless Sensor Networks are embedded in the form of Body Area Nets and are capable of sensing and storing the information on a digital device. Later this information could be inspected or even sent to a remotely located storage device specifically (server or any public or private cloud for analysis) so that a medical doctor can diagnose the present medical condition of a person or a patient. Such a facility would be of immense help in the event of an emergency such as a sudden disaster or natural calamity where communication is damaged, and the potential sources become inaccessible. The aim of this paper is to create a mobile platform using Mobile Ad hoc Network to support healthcare connectivity and treatment in emergency situations.


2022 ◽  
Vol 13 (2) ◽  
pp. 1-28
Author(s):  
Yan Tang ◽  
Weilong Cui ◽  
Jianwen Su

A business process (workflow) is an assembly of tasks to accomplish a business goal. Real-world workflow models often demanded to change due to new laws and policies, changes in the environment, and so on. To understand the inner workings of a business process to facilitate changes, workflow logs have the potential to enable inspecting, monitoring, diagnosing, analyzing, and improving the design of a complex workflow. Querying workflow logs, however, is still mostly an ad hoc practice by workflow managers. In this article, we focus on the problem of querying workflow log concerning both control flow and dataflow properties. We develop a query language based on “incident patterns” to allow the user to directly query workflow logs instead of having to transform such queries into database operations. We provide the formal semantics and a query evaluation algorithm of our language. By deriving an accurate cost model, we develop an optimization mechanism to accelerate query evaluation. Our experiment results demonstrate the effectiveness of the optimization and achieves up to 50× speedup over an adaption of existing evaluation method.


2022 ◽  
Vol 13 (2) ◽  
pp. 1-14
Author(s):  
Ankit Temurnikar ◽  
Pushpneel Verma ◽  
Gaurav Dhiman

VANET (Vehicle Ad-hoc Network) is an emerging technology in today’s intelligent transport system. In VANET, there are many moving nodes which are called the vehicle running on the road. They communicate with each other to provide the information to driver regarding the road condition, traffic, weather and parking. VANET is a kind of network where moving nodes talk with each other with the help of equipment. There are various other things which also make complete to VANET like OBU (onboard unit), RSU (Road Aside Unit) and CA (Certificate authority). In this paper, a new PSO enable multi-hop technique is proposed which helps in VANET to Select the best route and find the stable cluster head and remove the malicious node from the network to avoid the false messaging. The false can be occurred when there is the malicious node in a network. Clustering is a technique for making a group of the same type node. This proposed work is based on PSO enable clustering and its importance in VANET. While using this approach in VANET, it has increased the 20% packet delivery ratio.


2022 ◽  
Vol 16 (4) ◽  
pp. 1-22
Author(s):  
Zhe Fu ◽  
Li Yu ◽  
Xi Niu

As the popularity of online travel platforms increases, users tend to make ad-hoc decisions on places to visit rather than preparing the detailed tour plans in advance. Under the situation of timeliness and uncertainty of users’ demand, how to integrate real-time context into dynamic and personalized recommendations have become a key issue in travel recommender system. In this article, by integrating the users’ historical preferences and real-time context, a location-aware recommender system called TRACE ( T ravel R einforcement Recommendations Based on Location- A ware C ontext E xtraction) is proposed. It captures users’ features based on location-aware context learning model, and makes dynamic recommendations based on reinforcement learning. Specifically, this research: (1) designs a travel reinforcing recommender system based on an Actor-Critic framework, which can dynamically track the user preference shifts and optimize the recommender system performance; (2) proposes a location-aware context learning model, which aims at extracting user context from real-time location and then calculating the impacts of nearby attractions on users’ preferences; and (3) conducts both offline and online experiments. Our proposed model achieves the best performance in both of the two experiments, which demonstrates that tracking the users’ preference shifts based on real-time location is valuable for improving the recommendation results.


Author(s):  
Nirbhay Kumar Chaubey ◽  
Dhananjay Yadav

<span>Vehicular ad hoc network (VANET) is an emerging technology which can be very helpful for providing safety and security as well as for intelligent transportation services. But due to wireless communication of vehicles and high mobility it has certain security issues which cost the safety and security of people on the road. One of the major security concerns is the Sybil attack in which the attacker creates dummy identities to gain high influence in the network that causes delay in some services and fake voting in the network to misguide others. The early detection of this attack can prevent people from being misguided by the attacker and save them from getting into any kind of trap. In this research paper, Sybil attack is detected by first applying the Poisson distribution algorithm to predict the traffic on the road and in the second approach, analysis of the network performance for packet delivery ratio (PDR) is performed in malign and benign environment. The simulation result shows that PDR decreases in presence of fake vehicles in the network. Our approach is simple and effective as it does not require high computational overhead and also does not violate the privacy issues of people in the network.</span>


Retos ◽  
2022 ◽  
Vol 44 ◽  
pp. 739-748
Author(s):  
Beatriz Rodríguez Martín ◽  
Gonzalo Flores Aguilar ◽  
Javier Fernández Río

  Esta investigación valoró los efectos de un programa didáctico gamificado sobre la ansiedad ante el fracaso en Educación Física. Además, pudimos reconocer las posibles causas al analizar las impresiones del alumnado sobre la experiencia. Participaron 143 estudiantes de 5º y 6º de primaria. Se siguió un diseño pre-experimental, pre-test, post-test de un solo grupo, cuantitativo-cualitativo. Se administró la subescala Ansiedad y Agobio ante el Fracaso del Test de Motivación del Logro para el Aprendizaje en Educación Física (versión validada por Ruiz-Pérez et al. (2015) del Achievement Motivation in Physical Education Test, AMPET, de Nishida (1988)) y un cuestionario ad hoc con cuatro preguntas abiertas. Los datos cuantitativos mostraron que, tras la intervención didáctica, la ansiedad disminuyó de manera significativa. Los resultados cualitativos desvelaron aspectos positivos que pudieron promover dicha disminución, como: la superación de pruebas, el trabajo cooperativo, el disfrute de los elementos de la gamificación, la superación personal, el aprendizaje y la mejora de aspectos curriculares. Sin embargo, también se reconocieron otros aspectos negativos, como el trabajo de la resistencia y los grupos estables, lo cual deja entrever algunos aspectos de mejora en este planteamiento gamificado. Abstract: This research assessed the effects of a gamified project on anxiety about failure in Physical Education, perceiving the possible causes through the impressions of the students. 143 students from 5th and 6th grade participated. A pre-experimental, pre-test, post-test single-group, quantitative-qualitative design was followed. The Anxiety and Stress subscale was administered before the Failure of the Motivation Test of Achievement for Learning in Physical Education and open questions were used after the experience (version validated by Ruiz-Pérez et al. (2015) of the Achievement Motivation in Physical Education Test, AMPET, by Nishida (1988)) and an ad hoc questionnaire with four open questions. The quantitative data showed that anxiety decreased significantly after the intervention. The qualitative results revealed positive aspects that could promote said decrease: passing tests, cooperative work, enjoyment of the elements of gamification, personal improvement, learning and improvement of curricular aspects. However, other negative aspects were also recognized, such as resistance work and stable groups, which suggests some aspects of improvement in this gamified approach.


Sign in / Sign up

Export Citation Format

Share Document