Research Reports on Computer Science最新文献

筛选
英文 中文
TOPSIS-based Optimal Cluster Head Selection for Wireless Sensor Network 基于topsis的无线传感器网络簇头优化选择
Research Reports on Computer Science Pub Date : 2023-05-29 DOI: 10.37256/rrcs.2320232638
S. Pandey, Buddha Singh
{"title":"TOPSIS-based Optimal Cluster Head Selection for Wireless Sensor Network","authors":"S. Pandey, Buddha Singh","doi":"10.37256/rrcs.2320232638","DOIUrl":"https://doi.org/10.37256/rrcs.2320232638","url":null,"abstract":"Due to the advancement of electronics engineering technology, many types of sensors have been developed. But sensors are still battery-powered devices. Once the battery is dead, the sensors are of no use. So, energy optimization in wireless sensor networks is still a hot topic among researchers. This paper proposed a novel clustering method that uses the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) algorithm to select the Cluster Heads (CHs). TOPSIS is a Multi-Attribute Decision Making (MADM) based model which uses several conflicting attributes to select the best alternative. We have compared our proposed model with two other comparable models to evaluate the performance of our proposed model. The result shows that our proposed model performs better than other models.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134204010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review of Problem Variants and Approaches for Electric Vehicle Charging and Location Identification 电动汽车充电与位置识别问题变体与方法综述
Research Reports on Computer Science Pub Date : 2023-05-22 DOI: 10.37256/rrcs.2320232645
D. Prakash, G. Jeyakumar
{"title":"A Review of Problem Variants and Approaches for Electric Vehicle Charging and Location Identification","authors":"D. Prakash, G. Jeyakumar","doi":"10.37256/rrcs.2320232645","DOIUrl":"https://doi.org/10.37256/rrcs.2320232645","url":null,"abstract":"The optimization of electric vehicles (EVs) utilizing meta-heuristics has arisen as the way to propel state-of-the-art advancements, making ready for boundless reception, and reforming the flow transportation framework while lessening ozone-depleting substance discharges. The two factors that keep on obstructing the improvement of EVs are reach and cost. This study digs profoundly into the five significant EV enhancement regions: plan advancement, energy the board, ideal control, upgraded charging and releasing, and steering. Methods for single-objective and multi-objective enhancement are examined and talked about. Following a broad survey of the latest works in every space, an investigation of numerical demonstrating, the development of goal capabilities, time management for charging, and limitations are introduced. What’s more, the different scientific, regular, and nature-roused advancement calculations (swarm-optimization, transformative, and recent meta-heuristics) are arranged in view of their fame. Their merits and detriments are then analyzed, similar to the different requirements for taking care of procedures. This survey of the high-level and redesigned variants of these meta-heuristics likewise gives a precise reference to EV streamlining utilizing wise calculations.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-based Cost Effective IIoT Model Towards Industry 5.0 面向工业5.0的基于云的成本效益IIoT模型
Research Reports on Computer Science Pub Date : 2023-05-19 DOI: 10.37256/rrcs.2320232632
Satyajeet R. Shinge, Urmila Shrawankar
{"title":"Cloud-based Cost Effective IIoT Model Towards Industry 5.0","authors":"Satyajeet R. Shinge, Urmila Shrawankar","doi":"10.37256/rrcs.2320232632","DOIUrl":"https://doi.org/10.37256/rrcs.2320232632","url":null,"abstract":"Companies across industries increasingly depend upon cloud computing to manage their Industrial Internet of Things (IIoT) technology. Machines are connected over a network in the IIoT. Cloud computing plays an essential role by connecting people, devices, work processes, and buildings to deliver cloud services in industries. But cloud computing faces a problem with task scheduling, high latency delay, and memory management, affecting the overall cost of industries using cloud services. A major concern in the cloud computing field is task scheduling which is essential for achieving cost-effective execution and improving resource usage. It refers to assigning available resources to user tasks. This problem can be solved effectively by improving task execution and increasing the use of resources. The waiting time between a client’s sent request and a cloud service provider to give a response, known as latency, is another issue in cloud environments. In cloud computing, this delay can be significantly higher. As a result, users of various cloud services may incur increased expenses due to this delay. Finally, among the most significant topics in cloud computing is efficient memory management, which handles integrated data and optimizes memory management algorithms. This paper proposes a cloud model for IIoT, which provides task scheduling, helps reduce latency, and optimizes memory management. This proposed model helps to reduce the cost of using cloud computing in IIoT.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116059260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning and Deep Learning for Phishing Page Detection 网络钓鱼页面检测的机器学习和深度学习
Research Reports on Computer Science Pub Date : 2023-05-18 DOI: 10.37256/rrcs.2320232629
Swatej Patil, Mayur S. Patil, Kotadi Chinnaiah
{"title":"Machine Learning and Deep Learning for Phishing Page Detection","authors":"Swatej Patil, Mayur S. Patil, Kotadi Chinnaiah","doi":"10.37256/rrcs.2320232629","DOIUrl":"https://doi.org/10.37256/rrcs.2320232629","url":null,"abstract":"The term \"phishing\" is often used to describe an attempt to obtain confidential data such as passwords or credit card details by impersonating a trustworthy source. In most cases, the term refers to attempts to trick users into providing sensitive information in response to a fraudulent email or web page. However, the term is also used to describe a broader category of online attacks to obtain sensitive information or to disrupt services or systems. Incorporating different machine learning and deep learning algorithms, including Support Vector Machine (SVM), Gradient Boosting Machine (GBM), and random forest, the authors of this research presented a technique for identifying phishing websites. The data sets from PhishTank and the University of New Brunswick were used to train and test the learning models. The XGboost model was able to surpass most existing techniques by achieving a maximum accuracy of 86.8%. This technique can be used in modern web browsers like Google Chrome and Mozilla Firefox to accurately detect phishing websites.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Approach for Secured Data Transmission Between IoT and Cloud 物联网与云之间安全数据传输的有效方法
Research Reports on Computer Science Pub Date : 2023-05-15 DOI: 10.37256/rrcs.2320232628
Shatakshi Kokate, Urmila Shrawankar
{"title":"An Efficient Approach for Secured Data Transmission Between IoT and Cloud","authors":"Shatakshi Kokate, Urmila Shrawankar","doi":"10.37256/rrcs.2320232628","DOIUrl":"https://doi.org/10.37256/rrcs.2320232628","url":null,"abstract":"The Internet of Things (IoT) network generates a lot of data and cloud servers collect that data. The server then analyzes the collected data and based on the findings, provides appropriate intelligent services to users as a result. If there is any faulty data while the server analyzes the collected data, distorted results will be created. The data captured from IoT contains lots of heterogeneous as well as suspicious data, so cleaning, filtering, and clustering of it must be done before sending it to the server, otherwise it will unnecessarily create overhead on the server. The proposed system consists of a filtering and clustering mechanism for the data collected from IoT devices so that integrated data is transferred to the cloud server which will reduce its computational load. In the proposed system, the fog computing layer is used as an interface between IoT and cloud computing layer where data filtering and clustering take place to reduce network traffic and latency. The ultimate aim is to provide security for data transmission between IoT and the cloud.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining Homogenous Transformation Matrix from DH Parameter Table using Deep Learning Techniques 利用深度学习技术从DH参数表中确定齐次变换矩阵
Research Reports on Computer Science Pub Date : 2023-05-15 DOI: 10.37256/rrcs.2320232627
V. B. Semwal, Yash Gupta
{"title":"Determining Homogenous Transformation Matrix from DH Parameter Table using Deep Learning Techniques","authors":"V. B. Semwal, Yash Gupta","doi":"10.37256/rrcs.2320232627","DOIUrl":"https://doi.org/10.37256/rrcs.2320232627","url":null,"abstract":"One of the most popular ways of representing any robotic model mathematically is through Denavit-Hartenberg (DH) parameter table. And the most common way of finding a forward kinematics solution to any robotic model is by finding its homogenous transformation matrix, which is obtained from the DH parameter table by a certain set of steps or algorithms. In this research work, we have tried solving this problem in just a single step by deep learning method and thus finding forward kinematics of almost any kind of manipulator. This research work shows not just this problem but many more such complex problems which require a certain set of steps or algorithms that can be solved by deep learning techniques in a single step. The results obtained are very close to accurate and show the ability of deep learning techniques for solving different kinds of such problems.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"1467 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Digital Information Using Cryptography Techniques to Enhance IT Security 利用密码技术保护数码资讯以加强资讯科技保安
Research Reports on Computer Science Pub Date : 2023-05-10 DOI: 10.37256/rrcs.2320232635
S. Chaudhari, Archana Thakur, A. Rajan
{"title":"Securing Digital Information Using Cryptography Techniques to Enhance IT Security","authors":"S. Chaudhari, Archana Thakur, A. Rajan","doi":"10.37256/rrcs.2320232635","DOIUrl":"https://doi.org/10.37256/rrcs.2320232635","url":null,"abstract":"In information technology (IT) security, defence in depth is considered the best practice. Protecting data at rest or in transit is a part of the defence in depth approach. Confidentiality, data integrity, authentication, and non-repudiation are four IT security paradigms that need to be achieved to protect data and enhance IT security. Every scientific organisation requires i) to maintain the confidentiality of information like novel research ideas, results, patents, indigenous developed techniques and designs, human resource personal data and remarks, etc. ii) to manage the integrity of Internet-based web resources, users' credentials, etc. and iii) to manage non-repudiation and integrity guarantee enabled implementation of various software systems. The Rivest-Shamir-Adleman (RSA) technique is used to achieve confidentiality of secret data during its storage and transmission over insecure channels. The elliptic curve cryptography (ECC) technique is used for key exchange with extremely constrained devices like wireless and wireless sensor networks. Data hashing is used for maintaining data integrity; digital certificates are employed to achieve non-repudiation. In order to enhance IT security, the application of these cryptographic algorithms has been studied in data security like workflow-based applications, video conferencing, Domain Name System (DNS), web security, and radio frequency identification (RFID) systems and presented in the paper. A novel scheme to ensure website integrity and to detect website attacks using time-stamped hash functions with timestamping is also demonstrated in the paper. The study revealed that symmetric key and asymmetric key algorithms provide confidentiality and authentication. Data integrity and authentication are achieved using digital signatures and message authentication codes. Non-repudiation is established with asymmetric key algorithms and digital signatures.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126608609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study on Genetic algorithm and Reinforcement Learning to Solve the Traveling Salesman Problem 遗传算法与强化学习求解旅行商问题的比较研究
Research Reports on Computer Science Pub Date : 2023-05-02 DOI: 10.37256/rrcs.2320232642
Agash Uthayasuriyan, Hema Chandran G, Kavvin Uv, Sabbineni Hema Mahitha, J. G
{"title":"A Comparative Study on Genetic algorithm and Reinforcement Learning to Solve the Traveling Salesman Problem","authors":"Agash Uthayasuriyan, Hema Chandran G, Kavvin Uv, Sabbineni Hema Mahitha, J. G","doi":"10.37256/rrcs.2320232642","DOIUrl":"https://doi.org/10.37256/rrcs.2320232642","url":null,"abstract":"Machine Learning (ML) and Evolutionary Computing (EC) are the two most popular computational methodologies in computer science to solve learning and optimization problems around us, respectively. It is of research interest in the literature, for exploring these two methodologies and to formulate algorithmic frameworks with 'EA for ML' and 'ML for EA' where EA stands for Evolutionary Algorithm. The objective of this paper is on exploring this dimension of research. The Traveling Salesman Problem (TSP) is one of the NP-hard (nondeterministic polynomial time hard) problems in combinatorial optimization problems. The solution for a TSP is the shortest path covering all the nodes in a given city. This paper compares two algorithms, \"Genetic Algorithm (GA)\" of the EC domain and \"Epsilon-Greedy Q-Learning Algorithm (EQLA)\" of the ML domain on solving TSP. The detailed design methodology involved in both these algorithms is discussed in this paper. The experiments are carried out on two different data sets (random and ATT48) to compare the speed and accuracy of the algorithms. The comparative results reveal that the GA could solve the TSP more effectively than EQLA. The obtained inferences along with the limitations are presented in this paper.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Design for Silent Link User Equilibrium 基于静默链路用户均衡的网络设计
Research Reports on Computer Science Pub Date : 2023-03-16 DOI: 10.37256/rrcs.2120232295
Xu Chen, Zeguan Wu, Xuan Di
{"title":"Network Design for Silent Link User Equilibrium","authors":"Xu Chen, Zeguan Wu, Xuan Di","doi":"10.37256/rrcs.2120232295","DOIUrl":"https://doi.org/10.37256/rrcs.2120232295","url":null,"abstract":"Connected vehicles (CVs) are anticipated to improve road safety and travel efficiency in a transportation system. However, the deployment of CV technologies in transportation networks can lead to privacy issues, as the communication among CVs can expose vehicles' location information. To address this issue, we introduce a privacy protection method named \"silent link\" to transportation networks and propose a silent link user equilibrium (SLUE) framework to study the impact of privacy protection countermeasures on network flow. A theoretical analysis regarding existence and uniqueness conditions of SLUE is provided. The proposed SLUE facilitates privacy-oriented network design to achieve optimal levels of privacy for CVs. Accordingly, a bi-level network optimization problem is formulated for the design of silent links in transportation networks. Numerical examples are demonstrated using the Braess and Sioux Falls networks.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122339226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blended Teaching for Signal and System Course Based on Internet-Engineering Education 基于网络工程教育的信号与系统课程混合式教学
Research Reports on Computer Science Pub Date : 2023-02-22 DOI: 10.37256/rrcs.2120232076
Z. Dou, Yajing Wang, Zhenmei Li, Xianming Sun, Qinqin Wei, Wengang Chen
{"title":"Blended Teaching for Signal and System Course Based on Internet-Engineering Education","authors":"Z. Dou, Yajing Wang, Zhenmei Li, Xianming Sun, Qinqin Wei, Wengang Chen","doi":"10.37256/rrcs.2120232076","DOIUrl":"https://doi.org/10.37256/rrcs.2120232076","url":null,"abstract":"Aiming at the teaching difficulties of signal and system course, adapting to the new situation of the information age and the engineering education of outcome-based education (OBE), adhering to the traditional classroom teaching and making full use of the network teaching platform and internet technology, a blended teaching mode of internet-engineering education (BTM-IEE) is proposed. In this mode, we adhered to the educational concept of OBE, formulated teaching objectives, optimized teaching content, and built matching teaching resources. In three teaching stages: before class, in class and after class, online-offline blended teaching was effectively organized and implemented by using internet technology, network teaching platform, independently developed a comprehensive experimental system, remote virtual experiment platform, QQ group, etc. In order to ensure a good cycle of teaching quality, a multi-dimensional evaluation system is constructed. A variety of application examples and questionnaire data showed that BTM-IEE can achieve a deep integration of in class-out of class and online-offline, improve students’ engineering application ability, autonomous learning ability, cooperation, communication ability, and cultivate innovative thinking. The horizontal and vertical comparison between the traditional and the improved teaching mode shows that the BTM-IEE can improve the teaching effect, the excellent rate is significantly increased, and the failure rate is significantly reduced. This mode provides a reference for the improvement of the teaching quality of professional courses and has important practical significance.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133671867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书