Ensuring secure and accurate node localization in Underwater Wireless Sensor Networks (UWSN) is a significant challenge, as conventional methods tend to neglect the security risks associated with malicious node interf...
详细信息
作者:
Batra, IsheetaPrasad, S A HariArvind, K.S.
Faculty of Engineering & Technology Department of Computer Science and Engineering Karnataka India
Faculty of Engineering & Technology Department of Electronics and Communication Engineering Karnataka India
The garment industry is the second-most polluting industry after oil. These mass-produced clothes if rejected are dumped and have an enormous impact on the environment. Therefore, to save the cost post production it i...
详细信息
Interference source localization with high accuracy and time efficiency is of crucial importance for protecting spectrum resources. Due to the flexibility of unmanned aerial vehicles(UAVs), exploiting UAVs to locate t...
详细信息
Interference source localization with high accuracy and time efficiency is of crucial importance for protecting spectrum resources. Due to the flexibility of unmanned aerial vehicles(UAVs), exploiting UAVs to locate the interference source has attracted intensive research interests. The off-the-shelf UAV-based interference source localization schemes locate the interference sources by employing the UAV to keep searching until it arrives at the target. This obviously degrades time efficiency of localization. To balance the accuracy and the efficiency of searching and localization, this paper proposes a multi-UAV-based cooperative framework alone with its detailed scheme, where search and remote localization are iteratively performed with a swarm of UAVs. For searching, a low-complexity Q-learning algorithm is proposed to decide the direction of flight in every time interval for each UAV. In the following remote localization phase, a fast Fourier transformation based location prediction algorithm is proposed to estimate the location of the interference source by fusing the searching result of different UAVs in different time intervals. Numerical results reveal that in the proposed scheme outperforms the stateof-the-art schemes, in terms of the accuracy, the robustness and time efficiency of localization.
In response to growing security concerns and the increasing demand for face recognition (FR) technology in various sectors, this research explores the application of deep learning techniques, specifically pre-trained ...
详细信息
In response to growing security concerns and the increasing demand for face recognition (FR) technology in various sectors, this research explores the application of deep learning techniques, specifically pre-trained Convolutional Neural Network (CNN) models, in the field of FR. The study harnesses the power of five pre-trained CNN models—DenseNet201, ResNet152V2, MobileNetV2, SeResNeXt, and Xception—for robust feature extraction, followed by SoftMax classification. A novel weighted average ensemble model, meticulously optimized through a grid search technique, is introduced to augment feature extraction and classification efficacy. Emphasizing the significance of robust data pre-processing, encompassing resizing, data augmentation, splitting, and normalization, the research endeavors to fortify the reliability of FR systems. Methodologically, the study systematically investigates hyperparameters across deep learning models, fine-tuning network depth, learning rate, activation functions, and optimization methods. Comprehensive evaluations unfold across diverse datasets to discern the effectiveness of the proposed models. Key contributions of this work encompass the utilization of pre-trained CNN models for feature extraction, extensive evaluation across multiple datasets, the introduction of a weighted average ensemble model, emphasis on robust data pre-processing, systematic hyperparameter tuning, and the utilization of comprehensive evaluation metrics. The results, meticulously analyzed, unveil the superior performance of the proposed method, consistently outshining alternative models across pivotal metrics, including Recall, Precision, F1 Score, Matthews Correlation Coefficient (MCC), and Accuracy. Notably, the proposed method attains an exceptional accuracy of 99.48% on the labeled faces in the wild (LFW) dataset, surpassing erstwhile state-of-the-art benchmarks. This research represents a significant stride in FR technology, furnishing a dependable and accurate
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on e...
详细信息
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on encryption algorithms,which are shared database technologies on the *** technology has grown significantly because of its features,such as flexibility,support for integration,anonymity,decentralization,and independent *** nodes in the blockchain network are used to verify online ***,this integration creates scalability,interoperability,and security *** the last decade,several advancements in blockchain technology have drawn attention fromresearch communities and *** technology helps IoT networks become more reliable and enhance security and *** also removes single points of failure and lowers the *** recent years,there has been an increasing amount of literature on IoT and blockchain technology *** paper extensively examines the current state of blockchain technologies,focusing specifically on their integration into the Internet of ***,it highlights the benefits,drawbacks,and opportunities of recent studies on security issues based on blockchain solutions into *** survey examined various research papers fromdifferent types of ***,a review of the other IoT applications has been included,focusing on the security requirements and challenges in IoT-based *** research directions are gathered for the effective integration of Blockchain and IoT.
An additional tool for swaying public opinion on social media is to present recent developments in the creation of natural language. The term "Deep fake" originates from deep learning technology, which effor...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
Recommender systems play an essential role in decision-making in the information age by reducing information overload via retrieving the most relevant information in various applications. They also present great oppor...
详细信息
As a new and potentially devastating form of cyberattack, ‘Phishing’ URLs pose a risk to users by impersonating legitimate websites in an effort to obtain sensitive information such as usernames, passwords, and fina...
详细信息
With the advancement of Artificial Intelligence(AI)technology,traditional industrial systems are undergoing an intelligent transformation,bringing together advanced computing,communication and control technologies,Mac...
详细信息
With the advancement of Artificial Intelligence(AI)technology,traditional industrial systems are undergoing an intelligent transformation,bringing together advanced computing,communication and control technologies,Machine Learning(ML)-based intelligentmodelling has become a newparadigm for solving problems in the industrial domain[1–3].With numerous applications and diverse data types in the industrial domain,algorithmic and data-driven ML techniques can intelligently learn potential correlations between complex data and make efficient decisions while reducing human ***,in real-world application scenarios,existing algorithms may have a variety of limitations,such as small data volumes,small detection targets,low efficiency,and algorithmic gaps in specific application domains[4].Therefore,many new algorithms and strategies have been proposed to address the challenges in industrial applications[5–8].
暂无评论