The proceedings contain 25 papers. The topics discussed include: using pressure sensors for floor identification in wireless sensors networks;global localization of automated guided vehicles in wireless networks;hybri...
ISBN:
(纸本)9781467346771
The proceedings contain 25 papers. The topics discussed include: using pressure sensors for floor identification in wireless sensors networks;global localization of automated guided vehicles in wireless networks;hybrid person localization in ad-hoc networks using model-based control and visualization;radio-based indoor localization using the eZ430-chronos platform;pedestrian localization using ieee 802.15.4a TdoA wireless sensor network;multimodal and collaborative localization service for diverse environments;architecture of device independent communication applied in language learning game;application of wireless technology for IP-based aircraft in-flight entertainment;mobile transfer of wireless technologies;media façade: technical tools for interactive content control;improved method of ant colonies to search independent data transmission routes in WSN;and performance analysis of an Bluetooth low energy sensor system.
The proceedings contain 112 papers. The topics discussed include: self-calibration of ultrasonic transducers in an intelligentdataacquisition system;intelligent measurement multiplex system;first ukrainian multi-cha...
详细信息
ISBN:
(纸本)0780381386
The proceedings contain 112 papers. The topics discussed include: self-calibration of ultrasonic transducers in an intelligentdataacquisition system;intelligent measurement multiplex system;first ukrainian multi-channel magneto cardiograph^ assembling and testing;developing an environment for embedded software energy estimation;a proposal for a sort-middle cluster rendering system;intelligent solving machines on modem parallel architectures;a genetic based technique for the determination of power system topological observability;a new hybrid heuristic technique for solving job-shop scheduling problem;investigation of a hybrid algorithm for decision tree generation;and an approach for determining the periodicity of regulation work of risk technical systems.
IoT device identification is often used as the first line of defense. However, it is challenging due to the acquisition of IoT as a business by the existing vendors of traditional computing devices, making it difficul...
详细信息
Decentralized governance is going through radical changes due to the innovative use of blockchain which allows decisions to be made in a transparent, secure and more im- portantly, immutable way, without the authority...
详细信息
Water quality monitoring is a crucial aspect of public health, particularly in mitigating the risks associated with waterborne diseases and ensuring safe drinking water. Traditional monitoring methods are often labor-...
详细信息
ISBN:
(数字)9798331527495
ISBN:
(纸本)9798331527501
Water quality monitoring is a crucial aspect of public health, particularly in mitigating the risks associated with waterborne diseases and ensuring safe drinking water. Traditional monitoring methods are often labor-intensive, costly, and lack real-time capabilities, making them unsuitable for widespread and rural deployment. This paper examines the integration of advanced technologies, specifically the Internet of Things (IoT) and Machine Learning (ML), to design a sophisticated, low-cost water quality monitoring system. Leveraging an array of sensors, including pH, turbidity, temperature, total dissolved solids (TDS), and dissolved oxygen (DO), combined with the advanced embedded processor, the system ensures seamless dataacquisition and processing. IoT enables continuous remote monitoring, while ML algorithms provide predictive analytics and intelligent anomaly detection to identify potential contaminants and trends. These value-driven solutions underscore the transformative potential of advanced technologies in revolutionizing water quality assessment. This review article carefully reviews the available literature on water quality assessment in order to lay out an assortment of conclusions on the concerns, problems, challenges, and research gaps that have emerged during the last few years. Research gaps are identified by thoroughly examining the previously suggested methodologies. The study presented in this article primarily identified the problems with the accuracy of the models, the generation of data collection mechanisms, and the types of data that were used in the suggested frameworks. Subsequently, research avenues towards smart water quality monitoring are offered by examining key concepts crucial to the expansion of this field of research.
The journey from 2G to emerging 6G is impressive, mirroring the long evolutionary path of wireless communication technology. We address critical transitions in cellular networks in light of architectural transformatio...
详细信息
The proceedings contain 58 papers. The topics discussed include: container filling level estimation using vibration resonance behavior;method of reliable data storage based on redundant residue number system;a scenari...
ISBN:
(纸本)9781728199603
The proceedings contain 58 papers. The topics discussed include: container filling level estimation using vibration resonance behavior;method of reliable data storage based on redundant residue number system;a scenario for a multi-UAV mapping and surveillance system in emergency response applications;remote sensing approaches for deforestation identification in Ukraine;automatic anomaly detection methodology for crop classification data using morphological features;adaptive radar system configuration tuning;investigation of hybrid beamforming in mmWave massive MIMO systems;an improved XGBoost model based on spark for credit card fraud prediction;losses assessment for winter crops based on satellite data and fuzzy logic;an improved K-means clustering algorithm;and embedded models realization platform in IoT.
The proceedings contain 24 papers. The topics discussed include: NS3 simulation studies for optimized neighbor discovery in 6LoWPAN networks;integration and analysis of an extended ieee 802.15.4 modules with smartMAC ...
ISBN:
(纸本)9781509043163
The proceedings contain 24 papers. The topics discussed include: NS3 simulation studies for optimized neighbor discovery in 6LoWPAN networks;integration and analysis of an extended ieee 802.15.4 modules with smartMAC and wake-on-radio functions into the network simulator NS3;automatic signal strength map construction in indoor positioning system based on round trip time of flight measurements and inertial navigation;non disjoint set covers approach for wireless sensor networks lifetime optimization;the multi-mode inertial tracking system for unconstrained indoor positioning;high Q impedance matching for RF energy harvesting applications;backhaul infrastructures in building automation systems: wired or wireless?;and radio module for fast real-time control of inverse triple pendulum.
The ontology functions as a universally accepted framework for the representation, exchange, and reuse of knowledge. Due to its importance, multiple approaches have been proposed for building ontologies. However, the ...
详细信息
The proceedings contain 50 papers. The topics discussed include: the features of wireless technologies application for smart house systems;an improved binary whale optimization algorithm for feature selection of netwo...
ISBN:
(纸本)9781538675878
The proceedings contain 50 papers. The topics discussed include: the features of wireless technologies application for smart house systems;an improved binary whale optimization algorithm for feature selection of network intrusion detection;application of elephant herd optimization algorithm based on levy flight strategy in intrusion detection;hybrid MAC for low latency wireless communication enabling industrial HMI applications;the technology of the video stream intensity controlling based on the bit-planes recombination;the linguometric approach for co-authoring author's style definition;modified naive bayes algorithm for network intrusion detection based on artificial bee colony algorithm;and wrapper feature selection based on lightning attachment procedure optimization and support vector machine for intrusion detection.
暂无评论