Flying Ad‐hoc Networks (FANETs) has recently gained significant exposure for their emerging military, civil, and commercial applications. In FANETs, all Unmanned Aerial Vehicles (UAVs) can communicate within a restricted wireless communication range without fixed infrastructure. However, the highly dynamic nature of UAVs imposes a significant issue in FANET's communications. Therefore, designing an effective routing strategy is always necessary for sustaining appropriate network performance in FANETs. This paper is interested in modifying Greedy Perimeter Stateless Routing (GPSR) protocol named Utility Function based Greedy Perimeter Stateless Routing (UF‐GPSR) protocol for FANETs. The proposed approach optimizes the greedy forwarding strategy by considering multiple vital parameters of UAVs: residual energy ratio, distance degree, movement direction, link risk degree, and speed, respectively. The proposed UF‐GPSR applies the utility function on these parameters to enhance the routing performance by selecting optimal next‐hop within the communication range. The effectiveness of the proposed work is mathematically evaluated and then simulated through the NS‐3.23 simulator. The experimental outcomes verify that the proposed routing approach enhances the packet delivery ratio and throughput while decreasing packet drop ratio and delay compared to the other routing approaches: GPSR and GPSR‐PPU.
Internet-based applications are making the habitual society and exploring new ways to perform online-based crimes. Numerous cybercriminals are engaged in the different platforms of the internet-based virtual world, carrying out cybercrimes according to predetermined and preplanned agendas. As technology advances, cyberstalking, cyberbullying, and other forms of cyber harassment are growing on social media, email, and other online platforms. Cyberstalking uses internet-based technology to harass, intimidate, and undermine individuals online with different approaches. In order to examine the impact of feature selection strategies for improving model performance, this paper proposes a machine learning-based cyberstalking detection model. The proposed model used the Term Frequency-Inverse Document Frequency (TF-IDF) feature extraction method to extract features, and three distinct approaches, TF-IDF + Chi-Square Test, and TF-IDF + Information Gain, were used to select the different numbers of relevant features. In the cyberstalking detection model, a Support Vector Machine (SVM) was employed for classification purposes. Based on the SVM classifier's performance, each feature selection approach's impact on the various feature sets was assessed. According to experimental findings, the TF-IDF + Chi-Square Test outperformed other applied approaches and improved detection mode performance. Additionally, experimental findings demonstrate that the TFIDF + Chi-Square Test approach also performs better in a small collection of relevant features than other approaches that have been utilized.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.