Archives of Computational Methods in Engineering, Journal Year: 2024, Volume and Issue: unknown
Published: April 30, 2024
Language: Английский
Archives of Computational Methods in Engineering, Journal Year: 2024, Volume and Issue: unknown
Published: April 30, 2024
Language: Английский
Archives of Computational Methods in Engineering, Journal Year: 2024, Volume and Issue: unknown
Published: March 29, 2024
Language: Английский
Citations
32IEEE Access, Journal Year: 2025, Volume and Issue: 13, P. 19728 - 19754
Published: Jan. 1, 2025
Language: Английский
Citations
1Multimedia Tools and Applications, Journal Year: 2024, Volume and Issue: unknown
Published: April 10, 2024
Language: Английский
Citations
6Multimedia Tools and Applications, Journal Year: 2024, Volume and Issue: unknown
Published: May 17, 2024
Language: Английский
Citations
6Future Internet, Journal Year: 2024, Volume and Issue: 16(10), P. 365 - 365
Published: Oct. 7, 2024
The evolution of network technologies has significantly transformed global communication, information sharing, and connectivity. Traditional networks, relying on static configurations manual interventions, face substantial challenges such as complex management, inefficiency, susceptibility to human error. rise artificial intelligence (AI) begun address these issues by automating tasks like configuration, traffic optimization, security enhancements. Despite their potential, integrating AI models in engineering encounters practical obstacles including configurations, heterogeneous infrastructure, unstructured data, dynamic environments. Generative AI, particularly large language (LLMs), represents a promising advancement with capabilities extending natural processing translation, summarization, sentiment analysis. This paper aims provide comprehensive review exploring the transformative role LLMs modern engineering. In particular, it addresses gaps existing literature focusing LLM applications design planning, implementation, analytics, management. It also discusses current research efforts, challenges, future opportunities, aiming guide for networking professionals researchers. main goal is facilitate adoption networking, promoting more efficient, resilient, intelligent systems.
Language: Английский
Citations
5Sensors, Journal Year: 2024, Volume and Issue: 24(18), P. 6143 - 6143
Published: Sept. 23, 2024
6G mobile network technology will set new standards to meet performance goals that are too ambitious for 5G networks satisfy. The limitations of have been apparent with the deployment more and networks, which certainly encourages investigation as answer future. This research includes fundamental privacy security issues related technology. Keeping an eye on real-time systems requires secure wireless sensor (WSNs). Denial service (DoS) attacks mark a significant vulnerability WSNs face, they can compromise system whole. proposes novel method in blockchain 6G-based management optimization using machine learning model. In this research, deployed is carried out user datagram transport protocol reinforcement projection regression. Then, completed artificial democratic cuckoo glowworm remora optimization. simulation results based various parameters regarding throughput, energy efficiency, packet delivery ratio, end–end delay, accuracy. order minimise traffic, it also offers capacity determine optimal node path selection data transmission. proposed technique obtained 97% 95% 96% accuracy, 50% 94% ratio.
Language: Английский
Citations
4Electronics, Journal Year: 2025, Volume and Issue: 14(1), P. 200 - 200
Published: Jan. 5, 2025
In wireless power transfer systems, the relative positional misalignment between transmitting and receiving coils significantly impacts system’s mutual inductance characteristics, thereby constraining output stability transmission efficiency optimization potential. Hence, accurate formulas for calculating are crucial optimizing coil structures achieving stability. This study focuses on characteristics of rectangular under conditions in a dual-sided electromagnetic shielding environment. Initially, research deduces incident magnetic flux density induced by current through dual Fourier transform vector potential method. Subsequently, Maxwell’s equations boundary employed to analytically examine eddy currents within layer, allowing calculation reflected density. Based these analyses, derives formula using A prototype was built experimental verification. The experiment results show that maximum error measured calculated result is less than 3.8%, which verifies feasibility accuracy proposed Simulations empirical validation demonstrate superior practicality formula. not only offers an innovative technological pathway enhancing systems but also provides solid theoretical foundation guiding framework design optimization.
Language: Английский
Citations
0The Journal of Supercomputing, Journal Year: 2025, Volume and Issue: 81(3)
Published: Feb. 12, 2025
Language: Английский
Citations
0Salud Ciencia y Tecnología - Serie de Conferencias, Journal Year: 2025, Volume and Issue: 4, P. 1424 - 1424
Published: Jan. 21, 2025
Objective: A Vehicular Ad-Hoc Network (VANET) is one of the crucial elements an Intelligent Transport System (ITS) and plays a significant role in security communication. VANETs are susceptible to Denial Service (DoS) attacks, which inherent threat performance such networks, requiring more sophisticated detection countermeasures. Methods: In response this problem, Spatial Hyena Security Transformer Model (SHSTM) introduced improve use Ad-hoc communication against DoS attacks. The network nodes set up enable Vehicle-to-Vehicle (V2V) communication; SHSTM constantly detects each node detect filter out attack targets. model includes effective Cluster Head (CH) selection approach based on traffic patterns enhance security.Results: Comparative measurements conducted positions before after attacks show enhanced overall terms Packet Delivery Ratio (PDR), Throughput (NT), Energy Consumption (EC), End-to-End Delay (EED), Attack Detection (ADR). attains NT 3.91 Mbps, minimal EC 1.02 mJ, highest PDR 99.04%, EED 0.0206 seconds, higher ADR 98%. Conclusions: design proposed proved improvement performance, outperforms existing state-of-the-art technique. Hence, it considered potential solution address VANET.
Language: Английский
Citations
0Advances in computational intelligence and robotics book series, Journal Year: 2025, Volume and Issue: unknown, P. 427 - 454
Published: Jan. 10, 2025
Machine learning (ML) optimization techniques serve as essential for training models to achieve high performance in a diverse areas. This chapter offers thorough summary of machine techniques. analysis the development over time. A number common constraints are also discussed. Developing model that works effectively and provides accurate predictions certain set instances is main objective ML. We require ML accomplish that. The practice modifying hyper parameters with an technique minimize cost function called optimization. Because indicates difference between actual value estimated parameter predicted by model, it crucial reduce it. will provide general explanation workings drawbacks strategies. Numerous advancements have been put forth this chapter.
Language: Английский
Citations
0