Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
Design and implementation of geographic information system with mobile terminal and 5G network
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley +1 more source
Distributed wireless network resource optimisation method based on mobile edge computing
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang +4 more
wiley +1 more source
Big Data Technology Fusion Back Propagation Neural Network in Product Innovation Design Method
This research uses big data technology to combine the process of product innovation design method, which has certain significance for the formation of intelligent and systematic product innovation design method. Meanwhile, while predicting the results of all products innovative design methods, it can improve the product's predictive innovative design ...
Ren Li, Qiang Zeng
wiley +1 more source
Analysis of Node Router Performance with Babel and OLSR Protocol on MANET in Disaster Area
Natural disasters are events caused by nature, including earthquakes, tsunamis, volcanic eruptions, droughts, hurricanes, and landslides. Natural disasters can cause telecommunications infrastructure to become damaged or malfunction.
Kelfin Agung Satriawan +2 more
doaj
On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case [PDF]
One of the most challenging fields in vehicular communications has been the experimental assessment of protocols and novel technologies. Researchers usually tend to simulate vehicular scenarios and/or partially validate new contributions in the area by ...
Ernst, Thierry +4 more
core +5 more sources
Mediator-assisted multi-source routing in information-centric networks [PDF]
Among the new communication paradigms recently proposed, information-centric networking (ICN) is able to natively support content awareness at the network layer shifting the focus from hosts (as in traditional IP networks) to information objects. In this
Carrea, Laura +3 more
core +1 more source
Dual-hop transmissions with fixed-gain relays over Generalized-Gamma fading channels [PDF]
In this paper, a study on the end-to-end performance of dual-hop wireless communication systems equipped with fixed-gain relays and operating over Generalized-Gamma (GG) fading channels is presented.
Mansour, Akil +2 more
core
SIMPLE: Stable Increased-throughput Multi-hop Protocol for Link Efficiency in Wireless Body Area Networks [PDF]
In this work, we propose a reliable, power efficient and high throughput routing protocol for Wireless Body Area Networks (WBANs). We use multi-hop topology to achieve minimum energy consumption and longer network lifetime.
Gull, M. +5 more
core +1 more source
Fully printed bipolar organic thermoelectric generators are fabricated on flexible substrates and characterized entirely under ambient conditions. The devices exhibit Seebeck coefficients up to 30 µV K−1 and output powers up to 8.8 nW, with enhanced performance under bending.
Loup Chopplet +7 more
wiley +1 more source

