In wireless sensor networks energy is a very important issue because these networks consist of lowpower sensor nodes. This paper proposes a new protocol to reach energy efficiency. The protocol has a different priority in energy efficiency as reducing energy consumption in nodes, prolonging lifetime of the whole network, increasing system reliability, increasing the load balance of the network, and reducing packet delays in the network. In the new protocol is proposed an intelligent routing protocol algorithm. It is based on reinforcement learning techniques. In the first step of the protocol, a new clustering method is applied to the network and the network is established using a connected graph. Then data is transmitted using the -value parameter of reinforcement learning technique. The simulation results show that our protocol has improvement in different parameters such as network lifetime, packet delivery, packet delay, and network balance.
A wireless sensor network (WSN) is a collection of sensor nodes that dynamically self-organize themselves into a wireless network without the utilization of any preexisting infrastructure. One of the major problems in WSNs is the energy consumption, whereby the network lifetime is dependent on this factor. In this paper, we propose an optimal routing protocol for WSN inspired by the foraging behavior of ants. The ants try to find existing paths between the source and base station. Furthermore, we have combined this behavior of ants with fuzzy logic in order for the ants to make the best decision. In other words, the fuzzy logic is applied to make the use of these paths optimal. Our algorithm uses the principles of the fuzzy ant colony optimization routing (FACOR) to develop a suitable problem solution. The performance of our routing algorithm is evaluated by Network Simulator 2 (NS2). The simulation results show that our algorithm optimizes the energy consumption amount, decreases the number of routing request packets, and increases the network lifetime in comparison with the original AODV.
The purpose of this paper is to investigate the transmission dynamics of a fractional-order mathematical model of COVID-19 including susceptible ($$\textsc {S}$$ S ), exposed ($$\textsc {E}$$ E ), asymptomatic infected ($$\textsc {I}_1$$ I 1 ), symptomatic infected ($$\textsc {I}_2$$ I 2 ), and recovered ($$\textsc {R}$$ R ) classes named $$\mathrm {SEI_{1}I_{2}R}$$ SEI 1 I 2 R model, using the Caputo fractional derivative. Here, $$\mathrm {SEI_{1}I_{2}R}$$ SEI 1 I 2 R model describes the effect of asymptomatic and symptomatic transmissions on coronavirus disease outbreak. The existence and uniqueness of the solution are studied with the help of Schaefer- and Banach-type fixed point theorems. Sensitivity analysis of the model in terms of the variance of each parameter is examined, and the basic reproduction number $$(R_{0})$$ ( R 0 ) to discuss the local stability at two equilibrium points is proposed. Using the Routh–Hurwitz criterion of stability, it is found that the disease-free equilibrium will be stable for $$R_{0} < 1$$ R 0 < 1 whereas the endemic equilibrium becomes stable for $$R_{0} > 1$$ R 0 > 1 and unstable otherwise. Moreover, the numerical simulations for various values of fractional-order are carried out with the help of the fractional Euler method. The numerical results show that asymptomatic transmission has a lower impact on the disease outbreak rather than symptomatic transmission. Finally, the simulated graph of total infected population by proposed model here is compared with the real data of second-wave infected population of COVID-19 outbreak in India.
In this manuscript, a qualitative analysis of the mathematical model of novel coronavirus ( -19) involving anew devised fractal-fractional operator in the Caputo sense having the fractional-order and the fractal dimension is considered. The concerned model is composed of eight compartments: susceptible, exposed, infected, super-spreaders, asymptomatic, hospitalized, recovery and fatality. Under the new derivative the existence and uniqueness of the solution for considered model are proved using Schaefer’s and Banach type fixed point approaches. Additionally, with the help of nonlinear functional analysis, the condition for Ulam’s type of stability of the solution to the considered model is established. For numerical simulation of proposed model, a fractional type of two-step Lagrange polynomial known as fractional Adams-Bashforth method is applied to simulate the results. At last, the results are tested with real data from -19 outbreak in Wuhan City, Hubei Province of China from 4 January to 9 March 2020, taken from a source [42] . The Numerical results are presented in terms of graphs for different fractional-order and fractal dimensions to describe the transmission dynamics of disease infection.
In this paper, new model on novel coronavirus disease ([Formula: see text]-19) with four compartments including susceptible, exposed, infected, and recovered class with fractal-fractional derivative is proposed. Here, Banach and Leray–Schauder alternative type theorems are used to establish some appropriate conditions for the existence and uniqueness of the solution. Also, stability is needed in respect of the numerical solution. Therefore, Ulam–Hyers stability using nonlinear functional analysis is used for the proposed model. Moreover, the numerical simulation using the technique of fundamental theorem of fractional calculus and the two-step Lagrange polynomial known as fractional Adams-Bashforth [Formula: see text] method is proposed. The obtained results are tested on real data of [Formula: see text]-19 outbreak in Malaysia from 25 January till 10 May 2020. The numerical simulation of the proposed model has performed in terms of graphs for different fractional-order [Formula: see text] and fractal dimensions [Formula: see text] via number of considered days of disease spread in Malaysia. Since [Formula: see text]-19 transmits rapidly, perhaps, the clear understanding of transmission dynamics of [Formula: see text]-19 is important for countries to implement suitable strategies and restrictions such as Movement Control Order (MCO) by the Malaysian government, against the disease spread. The simulated results of the presented model demonstrate that movement control order has a great impact on the transmission dynamics of disease outbreak in Malaysia. It can be concluded that by adopting precautionary measures as restrictions on individual movement the transmission of the disease in society is reduced. In addition, for such type of dynamical study, fractal-fractional calculus tools may be used as powerful tools to understand and predict the global dynamics of the mentioned disease in other countries as well.
Mobile cloud computing is a new computing technology, which provides on-demand resources. Nowadays, this computing paradigm is becoming one the most interesting technology for IT enterprises. The idea of computing and offloading data in cloud computing is utilized to overcome the inherent challenges in mobile computing. This is carried out by utilizing other resource providers besides the mobile device to host the delivery of mobile applications. However, this technology introduces some opportunities as new computing concept, several challenges, including security and privacy are raised from the adoption of this IT paradigm. Authentication plays an important role to mitigate security and privacy issue in the mobile cloud computing. Even some authentication algorithms are proposed for mobile cloud computing, but most of these algorithms designed for traditional computing models, and are not using cloud capabilities. In mobile cloud computing, we access to pooled computation resources and applying more complicated authentication schemes is possible. Using different authentication factors, which is called multifactor authentication algorithms, has been proposed for various areas. In this paper, feasibility of implementation of different kinds of multi-factor authentication protocols are discussed. Furthermore, the security and privacy of these algorithms are analyzed. Finally, some future directions are recommended.
<p>User Authentication is a critical component in information security. Several widely used mechanisms for security to protect services from illegal access include alphanumerical usernames passwords. However, there are several drawbacks attached in this method. For instance, the users themselves usually those passwords that are easy to guess. As difficult passwords are difficult to recall. A new alternative is the graphic-based password and there has been a growing trend in the use of such a password. The human psychology study reveals that humans find it easier to remember pictures as opposed to words. There are two main aspects to the graphical password scheme, namely security and usability. This study comprises of a comprehensive research in the current Recognition-Based graphical password schemes. The common usability attributes and possible attacks on the Recognition-Based graphical password are reviewed, identified and examined in detail. There are several previous surveys on the graphical passwords. The latest research review and summarize graphical password systems concisely and at the same time, analyze usability features for every design. However it was found that there is not a single method that has the most resounding usability attributes. Therefore, this research suggests a set of usability attributes that can be applied into a single Recognition-Based graphical password system. In addition, this study examines and compares success rates on login, login time and memorability of existing systems which are the usability measures most often reported in user studies of graphical passwords. Lastly, a comparison table is revealed to put forth the limitations and strengths of each approach in terms of security and usability.</p>
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.