Scientific Reports,
Год журнала:
2024,
Номер
14(1)
Опубликована: Июнь 28, 2024
Software-defined
networking
(SDN)
is
a
pioneering
network
paradigm
that
strategically
decouples
the
control
plane
from
data
and
management
planes,
thereby
streamlining
administration.
SDN's
centralized
makes
configuring
access
list
(ACL)
policies
easier,
which
important
as
these
frequently
change
due
to
application
needs
topology
modifications.
Consequently,
this
action
may
trigger
modifications
at
SDN
controller.
In
response,
controller
performs
computational
tasks
generate
updated
flow
rules
in
accordance
with
modified
ACL
installs
plane.
Existing
research
has
investigated
reactive
installation
changes
result
packet
violations
inefficiencies.
Network
becomes
difficult
deleting
inconsistent
computing
new
per
policies.
The
proposed
solution
efficiently
handles
policy
phenomena
by
automatically
detecting
accordingly
along
caching
adding
A
comprehensive
analysis
of
both
proactive
mechanisms
carried
out
achieve
this.
To
facilitate
evaluation
mechanisms,
are
modeled
using
5-tuple
structure
comprising
Source,
Destination,
Protocol,
Ports,
Action.
resulting
then
translated
into
implementation
file
transmitted
Subsequently,
utilizes
calculate
necessary
caches
hash
table
addition
installing
them
switches.
simulated
Mininet
Emulator
set
policies,
hosts,
results
presented
varying
different
time
instances,
inter-packet
delay
timeout
value.
simulation
show
rule
better
than
mechanism
respect
throughput,
violations,
successful
delivery,
normalized
overhead,
detection
end-to-end
delay.
solution,
designed
be
directly
used
on
controllers
support
Pyretic
language,
provides
flexible
efficient
approach
for
installation.
can
employed
administrators
implementing
It
also
integrated
monitoring
debugging
tools
analyze
effectiveness
mechanism.
Computers & Electrical Engineering,
Год журнала:
2024,
Номер
118, С. 109296 - 109296
Опубликована: Май 28, 2024
In
the
dynamic
landscape
of
saliency
detection,
convolutional
neural
networks
have
emerged
as
catalysts
for
innovation,
but
remain
largely
tailored
RGB
imagery,
falling
short
in
context
infrared
images,
particularly
memory-restricted
environments.
These
existing
approaches
tend
to
overlook
wealth
contour
information
vital
a
nuanced
analysis
images.
Addressing
this
notable
gap,
we
introduce
novel
Two-branch
Edge
Guided
Lightweight
Network
(TBENet),
designed
explicitly
robust
image
detection.
The
main
contributions
paper
are
follows.
First,
formulate
detection
task
two
subtasks,
enhancement
and
foreground
segmentation.
Therefore,
TBENet
is
divided
into
specialized
branches:
prediction
branch
extracting
target
map
generation
separating
from
background.
first
employs
an
encoder–decoder
architecture
meticulously
delineate
object
contours,
serving
guiding
blueprint
second
branch.
This
latter
segment
adeptly
integrates
spatial
semantic
data,
creating
precise
that
refined
further
by
innovative
edge-weighted
loss
function.
Second,
enhance
feature
integration
capabilities,
propose
depthwise
multi-scale
multi-cue
modules,
facilitating
sophisticated
aggregation.
Third,
high-level
linear
bottleneck
module
devised
ensure
extraction
rich
information,
replacing
standard
convolution
with
convolution,
it
beneficial
reduce
model
complexity.
Additional,
number
channels
maps
each
stage
decoder
lightweight
model.
Last,
construct
ship
dataset
Small-IRShip
train
evaluate
our
proposed
Experimental
results
on
homemade
publicly
available
datasets,
namely
RGB-T
IRSTD-1k,
demonstrate
TBENet's
superior
performance
over
state-of-the-art
methods,
affirming
its
effectiveness
harnessing
edge
incorporating
advanced
strategies.
Symmetry,
Год журнала:
2024,
Номер
16(6), С. 670 - 670
Опубликована: Май 29, 2024
This
study
explores
the
complexities
of
urban
planning
and
addresses
major
issues
by
carefully
weighing
four
options
for
smart
city
technology,
community-based
development,
green
infrastructure
investment,
transit-oriented
development.
Unlike
traditional
evaluations,
our
applies
novel
SWARA-WASPAS
model
to
spherical
fuzzy
sets
(SFSs),
thus
identifying
navigating
uncertainty
present
in
decision
making.
methodological
approach
improves
accuracy
assessment
providing
detailed
information
about
advantages
disadvantages
each
option.
Our
offers
useful
insights
policymakers
planners
using
weighted
criteria
employing
a
methodical
ranking
procedure.
The
aim
is
provide
decisions
that
promote
equity,
environmental
consciousness,
resilience,
symmetry
environments.
application
not
only
advances
field
but
also
provides
strong
basis
informed
evaluations
into
option’s
pros
cons.
uses
systematic
advise
planners.
main
goal
help
populations
make
resilient,
environmentally
responsible,
equitable,
symmetrical
decisions.
research
aims
further
conversation
on
sustainable
development
offering
framework
based
data
difficulties
associated
with
dynamic
In
end,
we
want
humanized
viewpoint
speak
wider
audience
inspire
shared
dedication
creating
cities
flourish
face
changing
International Journal of Computational Intelligence Systems,
Год журнала:
2024,
Номер
17(1)
Опубликована: Июнь 13, 2024
Abstract
Recently,
the
field
of
lightweight
cryptography
(LWC)
has
emerged
in
response
to
security
needs
low-cost,
widely
used
technology.
It
is
essential
implement
an
encryption
approach
with
access
control
give
less
complex,
more
flexible,
and
safe
sensitive
data.
In
this
work,
a
novel
chaotic
fuzzy
presented
encrypt
light
images
IoT
domain,
while
maintaining
image
quality.
With
aid
multiplexer
modeling
information
shift
register
technology,
algorithm’s
design
combines
random
mapping
based
on
specific
password
key
predetermined
number
logic
shifts
for
pixels.
Further,
extract
private
complexity
boost
defense
against
attacks,
logical
xor
combination
employed.
The
simulation
proposed
model
AVR
microcontroller
been
done
under
MATLAB
software
various
components
mapping.
system
evaluated
terms
histogram
analysis,
adjacent
pixel
correlation
contrast
homogeneity
energy
NIST
error
mean
square
entropy,
change
rate,
integrated
intensity,
peak
signal-to-noise
ratio,
time
complexity.
Remarkably,
technique
demonstrated
high
efficiency.
results
show
that
homogeneity,
energy,
contrast,
NPCR,
UACI
criteria
have
improved
by
11.5%,
13.1%,
19%,
0.53%,
0.12%,
respectively,
compared
other
methods
articles.
IEEE Access,
Год журнала:
2024,
Номер
12, С. 90952 - 90970
Опубликована: Янв. 1, 2024
Many
Industrial
Internet
of
Things
(IIoT)
applications
require
wireless
networks
with
low
power
consumption,
latency,
and
secure
communication.
The
IPv6
over
the
TSCH
mode
IEEE
802.15.4e
(IETF
6TiSCH)
standard
has
been
created
to
fulfill
these
requirements
provide
reliable
efficient
communication,
specifically
in
industrial
environments.
A
authentication
process
is
first
step
towards
ensuring
privacy
security
a
IoT
network.
IETF
Constrained
Join
Protocol
(CoJP)
centralized
protocol
developed
by
6TiSCH
Working
Group
which
used
manage
node
bootstrapping
processes
through
entity
named
as
Registrar/Coordinator
(JRC).
This
requires
joining
nodes
be
authenticated
via
JRC
entity.
Centralized
within
exhibits
scalability
limitations
beyond
small-to-medium
deployments,
necessitating
alternative
approaches
for
requiring
large
number
deployed
nodes.
Using
distributed
approach
where
role
among
network
can
help
mitigate
this
drawback.
In
paper,
placement
method
decentralized
introduced
address
challenges
heuristic
solution
that
optimise
Proxy-JRC
proposed.
Experimental
results
2,3
4
placed
proposed
show
up
25%
improvement
terms
key
update
time
22%
consumption.
These
highlight
benefits
employing
mechanism
meet
communication
large-scale
networks.
Abstract
Online
voting
is
gaining
traction
in
contemporary
society
to
reduce
costs
and
boost
voter
turnout,
allowing
individuals
cast
their
ballots
from
anywhere
with
an
internet
connection.
This
innovation
cautiously
met
due
the
inherent
security
risks,
where
a
single
vulnerability
can
lead
widespread
vote
manipulation.
Blockchain
technology
has
emerged
as
promising
solution
address
these
concerns
create
trustworthy
electoral
process.
offers
decentralized
network
of
nodes
that
enhances
transparency,
security,
verifiability.
Its
distributed
ledger
non‐repudiation
features
make
it
compelling
alternative
traditional
electronic
systems,
ensuring
integrity
elections.
To
further
bolster
online
voting,
we
propose
DemocracyGuard
platform
on
Ethereum
blockchain,
which
incorporates
facial
recognition
authenticate
voters.
By
leveraging
advancements,
aims
provide
secure
resilient
for
paving
way
its
broader
adoption
revolutionizing
landscape.