the proceedings contain 81 papers. the topics discussed include: delivery packets reliably and efficiently over error prone channel of WSNs;compensating for the latency of data acquisition for localization in mobile w...
ISBN:
(纸本)9781424435180
the proceedings contain 81 papers. the topics discussed include: delivery packets reliably and efficiently over error prone channel of WSNs;compensating for the latency of data acquisition for localization in mobile wireless sensornetworks;bounded degree energy aware topology discovery in ad hoc wireless sensornetworks;resource allocation in adhoc networks using Markov random fields;resource allocation in adhoc networks using Markov random fields;formation control of robotic swarms based on sonar sensing;control of unmanned aerial vehicles performing multiple target passive detection and tracking;evolving discriminative features robust to sensor displacement for activity recognition in body area sensornetworks;an adaptive algorithm for sensor activation in renewable energy based sensor systems;sensor scheduling for bearings-only tracking with a single sensor;and an improved cluster-head selection approach in wireless sensornetworks.
WBA networks support various medical applications consisting of heterogeneous requirements. For reliable data transfer, an effective media access control protocol must be used. Here in this project, a dynamic MAC prot...
详细信息
WBA networks support various medical applications consisting of heterogeneous requirements. For reliable data transfer, an effective media access control protocol must be used. Here in this project, a dynamic MAC protocol based on Super frame structure is proposed by extending the standard principles from IEEE 802.15.6 which is a standard protocol, a mechanism for allocating reserved slots with prioritization is used which is known to be Importance criteria through Inter-criteria Correlation, to assign a slot allocation for each sensor device. the sensor device values are calculated based on various sensor parameters using the CRITIC method. Here, we compare our proposed work withthe IEEE 802.15.6 MAC standard and other MAC protocols. the simulation shows that our proposed MAC protocol performed better in reliability, throughput, energy efficiency as well as packet delivery delay. the results show that data transmission reliability is increased by more than 60% compared to the IEEE 802.15.6 MAC standard.
Intrusion Detection Systems (IDS), are an essential component of Wireless sensornetworks (WSN) since they monitor the integrity of the network and report any suspicious or illegal activity. WSNs are susceptible to a ...
详细信息
Intrusion Detection Systems (IDS), are an essential component of Wireless sensornetworks (WSN) since they monitor the integrity of the network and report any suspicious or illegal activity. WSNs are susceptible to a wide variety of security risks, some of the most common of which being malicious attacks, data manipulation, unauthorized access, and compromised nodes. Identifying and addressing these security issues is much easier withthe assistance of an IDS. this paper presents a machine learning model for employing IDS in WSN using Histogram Gradient Boosting Classifier. the proposed model is able to capture intricate patterns and distributions in the data in an effective manner thanks to the use of histogram representations. In addition, since gradient boosting is an iterative process, the model is able to zero in on difficult-to-detect instances of infiltration, hence continually enhancing its detection skills. However, in order to obtain optimum performance, it is necessary to appropriately tune the hyperparameters and solve possible difficulties such as class imbalance or noisy data. the proposed IDS model classified different attacks with an accuracy of 93.7%.
Signal processing has made extensive use of neural networks. this study examines neural network training using the PSO and BP algorithms. To train the neural network, the PSO algorithm alone, the BP algorithm alone, a...
详细信息
this paper presents a novel approach for optimizing sensor placement within a designated area, leveraging a combination of cellular communication systems and feed-forward neural networks to streamline the selection pr...
详细信息
Cyberbullying on social media using hate speech in text is applying depreciatory dialect in message dispatches on online forums to abuse, defile, as well as ill-treat recipients. A report by the New Indian Express sta...
详细信息
Cyberbullying on social media using hate speech in text is applying depreciatory dialect in message dispatches on online forums to abuse, defile, as well as ill-treat recipients. A report by the New Indian Express stated that 93% of Indian children were subordinated to cyberbullying out of which 45% were bullied by strangers and 48% were bullied by people known to them. the existing system uses feature extraction using count vectorizer with Support Vector Machine classifier to give an accuracy of 94.78%. the proposed system uses feature extraction using tokenization and padding with Artificial Neural networks Classifier to achieve an accuracy of 95.85%. the system examines the text content of social media dispatches using Natural Language processingthrough Artificial Neural networks.
As the Internet of things (IoT) transforms the structure of our globalized society there is an urgent need for energy-efficient and reconfigurable network solutions. In this paper, we explore the software-defined wire...
详细信息
Deep learning, a profound advancement in artificial intelligence, has demonstrated remarkable achievements, particularly in image processing. the rapid evolution of deep learning in architecture, training methods, and...
详细信息
Deep learning, a profound advancement in artificial intelligence, has demonstrated remarkable achievements, particularly in image processing. the rapid evolution of deep learning in architecture, training methods, and specifications has driven the expansion of image processing techniques. However, the increasing complexity of model structures challenges the effectiveness of the back propagation algorithm, and issues like the accumulation of unlabeled training data and class imbalances hinder deep learning performance. To address these challenges, there's a growing need for innovative deep models and cutting-edge computing paradigms to enable more sophisticated image content analysis. In this study, we conduct a comprehensive examination of four deep learning models utilizing Convolutional Neural networks (CNNs), clarifying their theoretical foundations within the image processing context, opening the door for further research. CNNs are notably essential for image processing due to their ability to handle complex images effectively.
Image sensors are widely employed across various industries, including smart mobile devices, autonomous vehicles, and surveillance systems. the Image sensor Interface processing Unit is typically characterized by a hi...
详细信息
To understand the recent advancements in the application of artificial intelligence in the field of signal processing, this paper employs VOSviewer and CiteSpace to conduct a quantitive analysis and visualization of r...
详细信息
暂无评论