In the past, a small size microcontroller was needed to control and gather data from resource-constrained electronic devices aimed at Internet of Things (IoT) applications. While the server nodes receive the requests ...
详细信息
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This paper aims to develop a color image encryption algorithm that enhances...
详细信息
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha...
详细信息
Due to densely populated urban environment leads to huge traffic in peak hours, Intelligent traffic light management system becomes paramount for emergency vehicle transportation on leveraging the sensor technologies....
详细信息
ISBN:
(纸本)9798331505745
Due to densely populated urban environment leads to huge traffic in peak hours, Intelligent traffic light management system becomes paramount for emergency vehicle transportation on leveraging the sensor technologies. However sensor data acquired from densely populated urban environment helps to process the traffic congestion based traffic density. Many researches has been carried out to enable intelligent transportation system using internet of things, artificial intelligence and communication technologies but still it requires sustainable solutions for intelligent transportation., traffic congestion management, traffic light controlling with respect to the detection of emergency vehicles like ambulance as it saves the life of the human being. In this paper, AI driven Intelligent of Things enabled sustainable solutions for intelligent traffic light management system for emergency vehicles in the large scale urban traffic. Initially sensor or camera deployed in the smart cities monitors the roads and its surroundings environments. Those acquired information is transmitted to the base station containing IoT servers. In IoT Server., video data is transformed into image frames and processed using YoloV9 based AI model. YoloV9 Model uses multiple component like backbone., neck and head for processing the image frame to recognize and tack the objects in each frame. Especially Backbone model employs convolution neural network for multi scale feature extraction and feature map generation on inclusion of the Generalized Efficient aggregation Network while neck component uses the path aggregation network for future fusion process and head component uses anchor box bounding box prediction method to detect and recognize the object of interest. On detect of the object of interest, distance and speed of the object is computed using gradient flow. Further model incorporates prediction approaches to detected emergency vehicle to estimate its speed and distance from traffic signal
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart hom...
详细信息
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)*** into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart *** Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger *** work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the *** simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a *** is done to measure the system's consistency across a variety of device *** experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.
The use of attention mechanisms in deep learning solutions has become popular within natural language processing tasks. The use of these mechanisms allows managing the relevance of the elements of a sequence in accord...
详细信息
Recently,a massive quantity of data is being produced from a distinct number of sources and the size of the daily created on the Internet has crossed two *** the same time,clustering is one of the efficient techniques...
详细信息
Recently,a massive quantity of data is being produced from a distinct number of sources and the size of the daily created on the Internet has crossed two *** the same time,clustering is one of the efficient techniques for mining big data to extract the useful and hidden patterns that exist in ***-based clustering techniques have gained significant attention owing to the fact that it helps to effectively recognize complex patterns in spatial *** data clustering is a trivial process owing to the increasing quantity of data which can be solved by the use of Map Reduce *** this motivation,this paper presents an efficient Map Reduce based hybrid density based clustering and classification algorithm for big data analytics(MR-HDBCC).The proposed MR-HDBCC technique is executed on Map Reduce tool for handling the big *** addition,the MR-HDBCC technique involves three distinct processes namely pre-processing,clustering,and *** proposed model utilizes the Density-Based Spatial Clustering of Applications with Noise(DBSCAN)techni-que which is capable of detecting random shapes and diverse clusters with noisy *** improving the performance of the DBSCAN technique,a hybrid model using cockroach swarm optimization(CSO)algorithm is developed for the exploration of the search space and determine the optimal parameters for density based ***,bidirectional gated recurrent neural network(BGRNN)is employed for the classification of big *** experimental validation of the proposed MR-HDBCC technique takes place using the benchmark dataset and the simulation outcomes demonstrate the promising performance of the proposed model interms of different measures.
Seizures that take place repeatedly and without provocation are referred to as epilepsy. Epilepsy can be diagnosed with electroencephalography (EEG). One of the most influential challenges of the past few years has be...
详细信息
Nowadays, IoT is being used in several applications, such as smart cities, health care and innovating agriculture and other applications. Moreover, the evolution of IoT technologies such as LoRaWAN, SIGFOX, ZigBee, an...
详细信息
Wireless sensor networks(WSNs)are projected to have a wide range of applications in the *** fundamental problem with WSN is that it has afinite *** a network is a common strategy for increasing the life-time of WSNs an...
详细信息
Wireless sensor networks(WSNs)are projected to have a wide range of applications in the *** fundamental problem with WSN is that it has afinite *** a network is a common strategy for increasing the life-time of WSNs and,as a result,allowing for faster data *** cluster-ing algorithm’s goal is to select the best cluster head(CH).In the existing system,Hybrid grey wolf sunflower optimization algorithm(HGWSFO)and optimal clus-ter head selection method is *** does not provide better competence and out-put in the ***,the proposed Hybrid Grey Wolf Ant Colony Optimisation(HGWACO)algorithm is used for reducing the energy utilization and enhances the lifespan of the *** hole method is used for selecting the cluster heads(CHs).The ant colony optimization(ACO)technique is used tofind the route among origin CH and *** open cache of nodes,trans-mission power,and proximity are used to improve the CH *** grey wolf optimisation(GWO)technique is the most recent and well-known optimiser module which deals with grey wolves’hunting activity(GWs).These GWs have the ability to track down and encircle *** GWO method was inspired by this hunting *** proposed HGWACO improves the duration of the net-work,minimizes the power consumption,also it works with the large-scale *** HGWACO method achieves 25.64%of residual energy,25.64%of alive nodes,40.65%of dead nodes also it enhances the lifetime of the network.
暂无评论