The use of covert communications has become more widespread recently as a solution to the information security issue. Information security can be partially solved by the discovery and creation of covert routes. Covert...
详细信息
Distributed machine learning at the network edge has emerged as a promising new paradigm. Various machine learning (ML) technologies will distill Artificial Intelligence (AI) from enormous mobile data to automate futu...
详细信息
Distributed machine learning at the network edge has emerged as a promising new paradigm. Various machine learning (ML) technologies will distill Artificial Intelligence (AI) from enormous mobile data to automate future wireless networking and a wide range of Internet-of-Things (IoT) applications. In distributed edge learning, multiple edge devices train a common learning model collaboratively without sending their raw data to a central server, which not only helps to preserve data privacy but also reduces network traffic. However, distributed edge training and edge inference typically still require extensive communications among devices and servers connected by wireless links. As a result, the salient features of wireless networks, including interference and channels’ heterogeneity, time-variability, and unreliability, have significant impacts on the learning performance.
In recent years,wireless networks are widely used in different *** phenomenon has increased the number of Internet of Things(IoT)devices and their *** IoT has numerous advantages,the commonly-used IoT devices are expo...
详细信息
In recent years,wireless networks are widely used in different *** phenomenon has increased the number of Internet of Things(IoT)devices and their *** IoT has numerous advantages,the commonly-used IoT devices are exposed to cyber-attacks *** scenario necessitates real-time automated detection and the mitigation of different types of attacks in high-traffic *** Software-Defined Networking(SDN)technique and the Machine Learning(ML)-based intrusion detection technique are effective tools that can quickly respond to different types of attacks in the IoT *** Intrusion Detection system(IDS)models can be employed to secure the SDN-enabled IoT environment in this *** current study devises a Harmony Search algorithmbased Feature Selection with Optimal Convolutional Autoencoder(HSAFSOCAE)for intrusion detection in the SDN-enabled IoT *** presented HSAFS-OCAE method follows a three-stage process in which the Harmony Search Algorithm-based FS(HSAFS)technique is exploited at first for feature ***,the CAE method is leveraged to recognize and classify intrusions in the SDN-enabled IoT ***,the Artificial Fish SwarmAlgorithm(AFSA)is used to fine-tune the *** process improves the outcomes of the intrusion detection process executed by the CAE algorithm and shows the work’s *** proposed HSAFSOCAE technique was experimentally validated under different aspects,and the comparative analysis results established the supremacy of the proposed model.
Swarm intelligence is a class of nature-inspired metaheuristic algorithms, that is specifically derived from biological systems in nature with an emphasis on their social interactions. These algorithms have been prima...
详细信息
The fast-paced growth of artificial intelligence applications provides unparalleled opportunities to improve the efficiency of various *** as the transportation sector faces many obstacles following the implementation...
详细信息
The fast-paced growth of artificial intelligence applications provides unparalleled opportunities to improve the efficiency of various *** as the transportation sector faces many obstacles following the implementation and integration of different vehicular and environmental aspects *** congestion is among the major issues in this regard which demands serious attention due to the rapid growth in the number of vehicles on the *** address this overwhelming problem,in this article,a cloudbased intelligent road traffic congestion prediction model is proposed that is empowered with a hybrid Neuro-Fuzzy *** aim of the study is to reduce the delay in the queues,the vehicles experience at different road junctions across the *** proposed model also intended to help the automated traffic control systems by minimizing the congestion particularly in a smart city environment where observational data is obtained from various implanted Internet of Things(IoT)sensors across the *** due preprocessing over the cloud server,the proposed approach makes use of this data by incorporating the neuro-fuzzy ***,it possesses a high level of accuracy by means of intelligent decision making with minimum error *** results reveal the accuracy of the proposed model as 98.72%during the validation phase in contrast to the highest accuracies achieved by state-of-the-art techniques in the literature such as 90.6%,95.84%,97.56%and 98.03%,*** far as the training phase analysis is concerned,the proposed scheme exhibits 99.214% accuracy. The proposed prediction modelis a potential contribution towards smart cities environment.
Autonomous mission capabilities with optimal path are stringent requirements for Unmanned Aerial Vehicle (UAV) navigation in diverse applications. The proposed research framework is to identify an energy-efficient opt...
详细信息
Autonomous mission capabilities with optimal path are stringent requirements for Unmanned Aerial Vehicle (UAV) navigation in diverse applications. The proposed research framework is to identify an energy-efficient optimal path to achieve the designated missions for the navigation of UAVs in various constrained and denser obstacle prone regions. Hence, the present work is aimed to develop an optimal energy-efficient path planning algorithm through combining well known modified ant colony optimization algorithm (MACO) and a variant of A*, namely the memory-efficient A* algorithm (MEA*) for avoiding the obstacles in three dimensional (3D) environment and arrive at an optimal path with minimal energy consumption. The novelty of the proposed method relies on integrating the above two efficient algorithms to optimize the UAV path planning task. The basic design of this study is, that by utilizing an improved version of the pheromone strategy in MACO, the local trap and premature convergence are minimized, and also an optimal path is found by means of reward and penalty mechanism. The sole notion of integrating the MEA* algorithm arises from the fact that it is essential to overcome the stringent memory requirement of conventional A* algorithm and to resolve the issue of tracking only the edges of the grids. Combining the competencies of MACO and MEA*, a hybrid algorithm is proposed to avoid obstacles and find an efficient path. Simulation studies are performed by varying the number of obstacles in a 3D domain. The real-time flight trials are conducted experimentally using a UAV by implementing the attained optimal path. A comparison of the total energy consumption of UAV with theoretical analysis is accomplished. The significant finding of this study is that, the MACO-MEA* algorithm achieved 21% less energy consumption and 55% shorter execution time than the MACO-A*. moreover, the path traversed in both simulation and experimental methods is 99% coherent with each other.
Intrusion Detection systems (IDSs) have become a key security problem due to the increasing number of connected automobiles and the sensitive nature of the data transferred in Vehicular Ad-hoc networks (VANETs). By ke...
详细信息
ISBN:
(数字)9798350354133
ISBN:
(纸本)9798350354140
Intrusion Detection systems (IDSs) have become a key security problem due to the increasing number of connected automobiles and the sensitive nature of the data transferred in Vehicular Ad-hoc networks (VANETs). By keeping an eye on network traffic, spotting questionable activity, and putting countermeasures in place to lessen risks, IDSs protect the integrity and security of VANETs. For VANETs, this study explores the state-of-the-art in machine learning-based IDSs, with a particular emphasis on work released in 2020–2022. We provide a thorough analysis of developments in widely used machine learning methods used for VANET intrusion detection throughout this time. This investigation explores certain machine learning methods that have been recently applied to VANET IDSs. The survey ends with a summary of the current issues and an exploration of potential directions for further investigation.
Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology th...
详细信息
Emerging technologies such as edge computing,Internet of Things(IoT),5G networks,big data,Artificial Intelligence(AI),and Unmanned Aerial Vehicles(UAVs)empower,Industry 4.0,with a progressive production methodology that shows attention to the interaction between machine and human *** the literature,various authors have focused on resolving security problems in UAV communication to provide safety for vital *** current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification(CSODL-SUAVC)model for Industry 4.0 *** suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image steganography and image ***,the proposed CSODL-SUAVC method involves the following methods such as Multi-Level Discrete Wavelet Transformation(ML-DWT),CSO-related Optimal Pixel Selection(CSO-OPS),and signcryption-based *** proposed model deploys the CSO-OPS technique to select the optimal pixel points in cover *** secret images,encrypted by signcryption technique,are embedded into cover ***,the image classification process includes three components namely,Super-Resolution using Convolution Neural Network(SRCNN),Adam optimizer,and softmax *** integration of the CSO-OPS algorithm and Adam optimizer helps in achieving the maximum performance upon UAV *** proposed CSODLSUAVC model was experimentally validated using benchmark datasets and the outcomes were evaluated under distinct *** simulation outcomes established the supreme better performance of the CSODL-SUAVC model over recent approaches.
This paper deals with the problem of establishing the effects of the technical and functional integration of wind power plants (WPP) in the Kosovo Power system (KPS). The analysis pertains to establishing the impact a...
详细信息
This paper deals with the problem of establishing the effects of the technical and functional integration of wind power plants (WPP) in the Kosovo Power system (KPS). The analysis pertains to establishing the impact and the effects of interconnecting the Selac Wind Power Plant on the voltage profile, on the fault, that is, short circuit levels, as well as on the fault-ride-through capability of the wind park generators on the electrically adjacent power system network. The case study analyzed the Selac WPP in the Mitrovica region of Kosovo. It has a total of twenty-seven wind turbines each with a power rating of 3.8 MW with the total installed power generating capacity of 102.6 MW representing approximately one-tenth of the overall power-generating capacity of KPS. The WPP has been appropriately modelled mathematically, and numerous wide-ranging simulations have been carried out pertaining to the related analysis under various load conditions of the KPS, both with and without the contribution of the Selac WPP. The DigSilent Power Factory software package was used to perform simulations and obtain the results. All simulations were performed using accurate factory-provided data for wind generators, cables, transformers, and lines.
Underwater acoustic wave propagation time delay and fluctuations are much greater than radio waves. However, many of the protocols used for underwater acoustic networking and communication are designed according to th...
详细信息
暂无评论