Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sensors (Basel) ; 21(19)2021 Sep 29.
Artigo em Inglês | MEDLINE | ID: mdl-34640818

RESUMO

The aim of this work is to solve the case study singular model involving the Neumann-Robin, Dirichlet, and Neumann boundary conditions using a novel computing framework that is based on the artificial neural network (ANN), global search genetic algorithm (GA), and local search sequential quadratic programming method (SQPM), i.e., ANN-GA-SQPM. The inspiration to present this numerical framework comes through the objective of introducing a reliable structure that associates the operative ANNs features using the optimization procedures of soft computing to deal with such stimulating systems. Four different problems that are based on the singular equations involving Neumann-Robin, Dirichlet, and Neumann boundary conditions have been occupied to scrutinize the robustness, stability, and proficiency of the designed ANN-GA-SQPM. The proposed results through ANN-GA-SQPM have been compared with the exact results to check the efficiency of the scheme through the statistical performances for taking fifty independent trials. Moreover, the study of the neuron analysis based on three and 15 neurons is also performed to check the authenticity of the proposed ANN-GA-SQPM.


Assuntos
Algoritmos , Aves Canoras , Animais , Redes Neurais de Computação
2.
Sensors (Basel) ; 19(24)2019 Dec 14.
Artigo em Inglês | MEDLINE | ID: mdl-31847431

RESUMO

In recent years, edge computing has emerged as a new concept in the computing paradigm that empowers several future technologies, such as 5G, vehicle-to-vehicle communications, and the Internet of Things (IoT), by providing cloud computing facilities, as well as services to the end users. However, open communication among the entities in an edge based IoT environment makes it vulnerable to various potential attacks that are executed by an adversary. Device authentication is one of the prominent techniques in security that permits an IoT device to authenticate mutually with a cloud server with the help of an edge node. If authentication is successful, they establish a session key between them for secure communication. To achieve this goal, a novel device authentication and key management mechanism for the edge based IoT environment, called the lightweight authentication and key management scheme for the edge based IoT environment (LDAKM-EIoT), was designed. The detailed security analysis and formal security verification conducted by the widely used "Automated Validation of Internet Security Protocols and Applications (AVISPA)" tool prove that the proposed LDAKM-EIoT is secure against several attack vectors that exist in the infrastructure of the edge based IoT environment. The elaborated comparative analysis of the proposed LDAKM-EIoT and different closely related schemes provides evidence that LDAKM-EIoT is more secure with less communication and computation costs. Finally, the network performance parameters are calculated and analyzed using the NS2 simulation to demonstrate the practical facets of the proposed LDAKM-EIoT.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...