The Mobile nodes are communicating with each other without centralized administration and data is accessed from the data source through multi-hop environment. The accessed data is stored in the mobile node's cache for its own and neighbor's future use. Caching is a significant process to store the frequently accessed data item in the MANET. Data availability and accessibility is a challenging task due to mobility of nodes, limited battery power and insufficient bandwidth. Cooperative caching addresses these challenges to improve the data availability and efficiency of data access by sharing and coordination among the mobile nodes. These challenges have received a tremendous amount of concentration from researchers and led to development of many different cooperative caching strategies. This paper attempts to provide the review and hypothetical analysis of various cooperative caching strategies in the mobile ad hoc networks based on their performance metrics such as cache hit ratio and average query delay with respect to cache size and number of mobile nodes. The Global Cluster Cooperative caching provides better performance than others in terms of cache hit and average query delay.
Image steganography aims at hiding information in a cover medium in an imperceptible way. While traditional steganography methods used invisible inks and microdots, digital world started using images and video files for hiding the secret content in it. Steganalysis is a closely related field for detecting hidden information in these multimedia files. There are many steganography algorithms implemented and tested but most of them fail during Steganalysis. To overcome this issue, in this paper, we are proposing to use generative adversarial networks for image steganography which include discriminative models to identify steganography image during training stage and that helps us to reduce the error rate later during Steganalysis. The proposed modified cycle Generative Adversarial Networks (Mod Cycle GAN) algorithm is tested using the USC-SIPI database and the experimentation results were better when compared with the algorithms in the literature. Because the discriminator block evaluates the image authenticity, we could modify the embedding algorithm until the discriminator could not identify the change made and thereby increasing the robustness.
Fog computing is an emerging research domain to provide computational services such as data transmission, application processing and storage mechanism. Fog computing consists of a set of fog server machines used to communicate with the mobile user in the edge network. Fog is introduced in cloud computing to meet data and communication needs for Internet of Things (IoT) devices. However, the vital challenges in this system are job scheduling, which is solved by examining the makespan, minimizing energy depletion and proper resource allocation. In this paper, we introduced a reinforced strategy Dynamic Opposition Learning based Social Spider Optimization (DOLSSO) Algorithm to enhance individual superiority and schedule workflow in Fog computing. The extensive experiments were conducted using the FogSim simulator to generate the dataset and an energy-efficient open-source tool utilized to model and simulate resource management in fog computing. The performance of the formulated model is ratified using two test cases. The proposed algorithm attained the optimized schedule with minimized cost function concerning the CPU processing period and assigned memory. Our simulation outcomes show the efficacy of the introduced technique in handling job scheduling issues, and the results are contrasted with five existing metaheuristic techniques. The results show that the proposed method achieves 10% - 15% better CPU utilization and 5%-10% less energy consumption than the other techniques.
High-speed single-mode fiber-optic communication systems have been presented based on various hybrid multiplexing schemes. Refractive index step and silica-doped germanium percentage parameters are also preserved during their technological boundaries of attention. It is noticed that the connect design parameters suffer more nonlinearity with the number of connects. Two different propagation techniques have been used to investigate the transmitted data rates as a criterion to enhance system performance. The first technique is soliton propagation, where the control parameters lead to equilibrium between the pulse spreading due to dispersion and the pulse shrinking because of nonlinearity. The second technique is the MTDM technique where the parameters are adjusted to lead to minimum dispersion. Two cases are investigated: no dispersion cancellation and dispersion cancellation. The investigations are conducted over an enormous range of the set of control parameters. Thermal effects are considered through three basic quantities, namely the transmission data rates, the dispersion characteristics, and the spectral losses.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.