Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Más filtros











Base de datos
Intervalo de año de publicación
1.
PeerJ Comput Sci ; 10: e1997, 2024.
Artículo en Inglés | MEDLINE | ID: mdl-38855198

RESUMEN

In wireless sensor networks (WSN), conserving energy is usually a basic issue, and several approaches are applied to optimize energy consumption. In this article, we adopt feature selection approaches by using minimum redundancy maximum relevance (MRMR) as a feature selection technique to minimize the number of sensors thereby conserving energy. MRMR ranks the sensors according to their significance. The selected features are then classified by different types of classifiers; SVM with linear kernel classifier, naïve Bayes classifier, and k-nearest neighbors classifier (KNN) to compare accuracy values. The simulation results illustrated an improvement in the lifetime extension factor of sensors and showed that the KNN classifier gives better results than the naïve Bayes and SVM classifier.

2.
Comput Intell Neurosci ; 2022: 5136865, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-36164421

RESUMEN

Blockchain technology is now regarded as one of the most interesting and possibly innovative technologies. It enables information to be stored and exchanged securely and transparently without the need for a centralized authority to regulate it. Some of the primary benefits of this technology are the atomicity of the stored data. Given its features, this technology has the potential to provide answers to challenges encountered in a very sensitive sector, namely, Internet of Vehicles (IoV). In IoV, vehicles and service providers autonomously capture and produce data without human intervention. This exchanged data must meet certain criteria such as decentralization, automation, security, and stakeholder trust management. To overcome these challenges, the integration of blockchain technology and multi-agent systems is a key solution. Based on smart contracts, the proposed solution consists of exploiting role-based access control (RBAC) and attribute-based access control (ABAC) techniques. This solution removes the central authority (CA) to reduce maintenance costs and eliminate legacy threats from centralized systems. The results, obtained from consumption costs, show that the developed platform is characterized by security, availability, and privacy.


Asunto(s)
Cadena de Bloques , Confianza , Automatización , Comunicación , Humanos , Tecnología
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA