Disasters can be mitigated by an early warning signal and proper communication within the hazardous environment using the MANET technology. However, the exact prediction of disaster situation is needed for the timely ...
详细信息
ISBN:
(数字)9798331540364
ISBN:
(纸本)9798331540371
Disasters can be mitigated by an early warning signal and proper communication within the hazardous environment using the MANET technology. However, the exact prediction of disaster situation is needed for the timely disaster management. Hence in addition to MANET technology, deep learning algorithms and Inter of Things (IoT) can also be integrated into disaster detection and communication systems. The presented research developed a novel parallely distributed slimmable neural network with orchard algorithm for the accurate flood disaster prediction. The model processed the dataset containing various measurements such as temperature, humidity, precipitation, air, soil moisture and rainfall level that are collected by the IoT sensor deployed in the various location of the hazardous environment. The gathered data are initially pre-processed using the correlation coefficient min-max normalization approach. Further, the relevant characteristics of the flood disaster from the data are extracted through spike driven transformer process. These refined and dimensionality reduced data are then entered into the proposed framework for the disaster prediction. Here the integrated orchard algorithm increased the disaster monitoring accuracy on the basis of better optimized parameters. The model resulted 95% accuracy, 93% precision, 94% recall and 96% f-score. Therefore, the presented method is an effective prediction mechanism for the disaster management in IoT MANET.
This research study investigates the potential design of autonomous robots for developing the domestic and industrial applications. The system underwent rigorous testing in both commercial and residential settings, de...
This research study investigates the potential design of autonomous robots for developing the domestic and industrial applications. The system underwent rigorous testing in both commercial and residential settings, demonstrating exceptional performance in navigation and achieving near-perfect scores in manipulation. Autonomous robots possess the capacity to enhance productivity, reduce expenses, and enhance safety in various scenarios, as emphasized in the literature. The report also outlines potential avenues for future research, which encompass the development of enhanced sensors and perceptual systems, collaborative systems, and advanced decision-making algorithms. In general, this study constitutes a crucial contribution to the expanding corpus of information pertaining to self-governing robots and will facilitate their prospective conception, advancement, and integration.
Urban grids face the challenge of expanding renewable deployment while curbing emissions and minimizing the capital burden of network reinforcements, all of which depend on effective flexibility integration. A hybrid ...
详细信息
Urban grids face the challenge of expanding renewable deployment while curbing emissions and minimizing the capital burden of network reinforcements, all of which depend on effective flexibility integration. A hybrid optimization framework is introduced, combining Mixed-Integer Nonlinear Programming with a reformulated MILP structure to jointly size photovoltaic systems, battery storage, staged network upgrades, and the dynamic participation of electric vehicles as both load and distributed storage. Thousands of EV constraints are consolidated through a polytope-based approach, and reinforcement costs are captured using a piece-wise linear model tailored to feeder capacity increments. Application to the Tuwaiq Smart City network, covering 3780 households, employs one-minute resolution data for 2024 to benchmark five operational schemes: No Flexibility, Demand Response, Smart Charging, Vehicle-to-Grid, and Integrated Decentralised Energy Management (IDEM). Compared with the baseline, IDEM achieves a 43.8 % reduction in annualised system cost, 46 % decrease in peak imports, and capacity cuts of 75 % and 82 % for PV and storage respectively, alongside a 65 % drop in grid integration expenses. A Monte Carlo test of 150 runs confirms cost stability within ±6 %, validating the robustness of layered flexibility under stochastic solar and mobility profiles. Solving across a full-year span is achieved within minutes on standard hardware, confirming the framework’s practical value for strategic energy planning
There has been a lot of focus on the potential benefits to the industry of combining Renewable Energy Sources (RES) with Internet of Things (IoT) technology. The conventional motor-driven control system often uses tra...
There has been a lot of focus on the potential benefits to the industry of combining Renewable Energy Sources (RES) with Internet of Things (IoT) technology. The conventional motor-driven control system often uses traditional power sources and has poor continuous tracking capabilities, which limits its energy economy and control accuracy. This research introduces a unique method for enhanced energy efficiency and control by integrating a fuzzy algorithm, a photovoltaic (PV) power source, IoT-monitored four-switch induction motor (IM) drive. A fuzzy algorithm is used to improve the motor drive system. According to input factors like torque, load conditions and speed, the fuzzy logic controller (FLC) modifies the motor driving settings. Because of the adaptive properties of the fuzzy algorithm, the IM may be controlled effectively, improving system performance. Additionally, the IoT monitoring feature allows for remote control and real-time data collecting, improving system performance and issue detection. MATLAB/Simulink is employed to demonstrate the obtained results of the developed system. The results of this research may be used in a variety of fields, including robots, electric cars, and industrial automation powered by renewable energy.
Intrusion Detection systems (IDS) show a major part in computer cyber defense by detecting and reacting to unauthorized activities. These systems monitor network and system activity, evaluating developments to identif...
Intrusion Detection systems (IDS) show a major part in computer cyber defense by detecting and reacting to unauthorized activities. These systems monitor network and system activity, evaluating developments to identify possible security breaches. Enhancing Detection Rates in IDS includes optimizing algorithms, employing Machine Learning (ML) approaches, and employing intrusion detection to enhance the system's functionality to find novel vulnerabilities immediately. Continuous improvement in detection capabilities is essential for adapting to evolving challenges from cyberspace and maintaining resilience of the online infrastructure. To enhance the detection rates, data preprocessing like min-max normalization, followed by t-distributed Stochastic Neighbor Embedding (t-SNE) feature extraction technique to capture most discriminative attributes for attack classifications. The established Genetic Fuzzy systems (GFS) throughout paired learning framework for detecting input attack. The model enhances accuracy for unusual attack occurrences by better distinguishing between normal activity and distinct attack categories. To proposed Generative Adversarial Network (GAN) as a classifier for enhancing detection rates. This research explores the performance of the proposed GFS-GAN model on two prominent intrusion detection datasets are the TII-SSRC-23 for dataset 1 and NSL-KDD for dataset 2. The suggested GFS-GAN model demonstrated exceptional performance on the TII-SSRC-23 dataset, achieving 99.23 % accuracy. The GFS-GAN model also performed well on the NSL-KDD dataset, with an accuracy of 99.13 %, The findings illustrate GANs' capabilities to progress the efficacy and durability of IDS, resulting in effective protection against complicated cyber-attacks.
This paper proposes a novel security method for protecting biometric fingerprint templates and storing them safely by creating a combined fingerprint template from different fingerprints, thereby creating a new virtua...
This paper proposes a novel security method for protecting biometric fingerprint templates and storing them safely by creating a combined fingerprint template from different fingerprints, thereby creating a new virtual identity during enrolment. However, the second fingerprint image combined would be an image that was dynamically created by merging parts of several different images based on a merging algorithm used. We further extract the minutiae features from the two fingerprints. A combined fingerprint template is produced using the extracted information. Finally, the biometric values from the template are stored in a user-defined tree created. A new virtual identity is thus created to protect biometric templates from hackers and crackers. Even though the hacker has access to the database, they will not be able to match the biometric template with a person’s identity. Thus, when the database is stolen, the method avoids compromising complete minutiae features belonging to a single fingerprint. The proposed method achieves 0.3% FRR and 0.1% FAR. Hence, it balances both the recognition and security of the system.
作者:
M NagalakshmiK SaravananMohammad JabirullahT Rajesh KumarAssociate Professor
Department of Computer Science and Engineering Marri Laxman Reddy Institute of Technology Dundigal Telangana India Associate Professor
Department of Information Technology R.M.D Engineering College Kavaraipettai Tamil Nadu India Associate Professor
Department of Electronics and Communication Engineering CMR Engineering College Hyderabad Telangana India Associate Professor
Department of Computer Science and Engineering Koneru Lakshmaiah Deemed to be University Guntur Andhra Pradesh India
Verification and completeness are main challenges for today's ever more diverse supply chains. Even with the ability to counter blockchain technologies by offering a trail of manipulation-resistant audit It does n...
Verification and completeness are main challenges for today's ever more diverse supply chains. Even with the ability to counter blockchain technologies by offering a trail of manipulation-resistant audit It does not address the confidence issue associated with the source chain activities also information related to a produce life cycle Information itself. Reputation mechanisms are a promising solution for this faith problem. Yet existing structures of credibility are Not ideal for supply chain applications based on blockchain as centred on restricted findings, lack of granularity and their overhead was not discussed and automation. We recommend the system as a three-layer faith in this job. Management platform is using a blockchain consortium tracking relationships between actors in the supply chain and Assign trust and prestige dynamically dependent on these interactions. Its novelty is based on a Model for credibility assessing product quality and the trust of individuals based on many observations funding for credibility qualities in supply chain incidents separating the member in the supply chain from the goods, enables brand credibility to be reserved for smart contracts for straightforward use by the same participant, Effective, secure, and automatic credibility scoring measurement, and the latency and throughput minimum overhead as compared to a straightforward supply chain model based on blockchain.
The concept hydroponic cultivation is performed in greenhouses or in various plat factories. This sort of cultivation is generally evaluated with pH and electrical conductivity. It may not provide complete information...
The concept hydroponic cultivation is performed in greenhouses or in various plat factories. This sort of cultivation is generally evaluated with pH and electrical conductivity. It may not provide complete information regarding any imbalance that is encountered in cultivation process. This causes poor yield or wastage of resources Thus, to overcome these limitation IoT measurement system has to be implanted in this cultivation process, where sensors and actuators may measure the corresponding reading when need and given to man power. Therefore, imbalance in attaining nutrients is eliminated by constant monitoring of resources towards plant cultivation. This facilitates farmers to handle the nutrients issues that are encountered in cultivation. The performance measurement of the system developed was computed with feasibility of IoT system for automatic measurements. The outcomes of the systems are computed and validated for further processing. Some specific measures are considered where there is no specific relationship among standardized analysis. The sensitive responses have to be examined and analyzed.
作者:
Dutt, NikilRegazzoni, Carlo S.Rinner, BernhardYao, XinNikil Dutt (Fellow
IEEE) received the Ph.D. degree from the University of Illinois at Urbana–Champaign Champaign IL USA in 1989.""He is currently a Distinguished Professor of computer science (CS) cognitive sciences and electrical engineering and computer sciences (EECS) with the University of California at Irvine Irvine CA USA. He is a coauthor of seven books. His research interests include embedded systems electronic design automation (EDA) computer architecture distributed systems healthcare Internet of Things (IoT) and brain-inspired architectures and computing.""Dr. Dutt is a Fellow of ACM. He was a recipient of the IFIP Silver Core Award. He has received numerous best paper awards. He serves as the Steering Committee Chair of the IEEE/ACM Embedded Systems Week (ESWEEK). He is also on the steering organizing and program committees of several premier EDA and embedded system design conferences and workshops. He has served on the Editorial Boards for the IEEE Transactions on Very Large Scale Integration (VLSI) Systems and the ACM Transactions on Embedded Computing Systems and also previously served as the Editor-in-Chief (EiC) for the ACM Transactions on Design Automation of Electronic Systems. He served on the Advisory Boards of the IEEE Embedded Systems Letters the ACM Special Interest Group on Embedded Systems the ACM Special Interest Group on Design Automationt and the ACM Transactions on Embedded Computing Systems. Carlo S. Regazzoni (Senior Member
IEEE) received the M.S. and Ph.D. degrees in electronic and telecommunications engineering from the University of Genoa Genoa Italy in 1987 and 1992 respectively.""He is currently a Full Professor of cognitive telecommunications systems with the Department of Electrical Electronics and Telecommunication Engineering and Naval Architecture (DITEN) University of Genoa and a Co-Ordinator of the Joint Doctorate on Interactive and Cognitive Environments (JDICE) international Ph.D. course started initially as EU Erasmus Mundus Project and
Autonomous systems are able to make decisions and potentially take actions without direct human intervention, which requires some knowledge about the system and its environment as well as goal-oriented reasoning. In c...
详细信息
Autonomous systems are able to make decisions and potentially take actions without direct human intervention, which requires some knowledge about the system and its environment as well as goal-oriented reasoning. In computersystems, one can derive such behavior from the concept of a rational agent with autonomy (“control over its own actions”), reactivity (“react to events from the environment”), proactivity (“act on its own initiative”), and sociality (“interact with other agents”) as fundamental properties \n[1]\n. Autonomous systems will undoubtedly pervade into our everyday lives, and we will find them in a variety of domains and applications including robotics, transportation, health care, communications, and entertainment to name a few. \nThe articles in this month’s special issue cover concepts and fundamentals, architectures and techniques, and applications and case studies in the exciting area of self-awareness in autonomous systems.
作者:
K. VaidehiT.S. SubashiniResearch Scholar
Department of Computer Science and Engineering Faculty of Engineering and Technology Annamalai University India Associate Professor
Department of Computer Science and EngineeringFaculty of Engineering and Technology Annamalai University India
The paper aims to develop an automated breast mass characterization system for assisting the radiologist to analyze the digital mammograms. Mammographic Image Analysis Society (MIAS) database images are used in this s...
详细信息
The paper aims to develop an automated breast mass characterization system for assisting the radiologist to analyze the digital mammograms. Mammographic Image Analysis Society (MIAS) database images are used in this study. Fuzzy C-means technique is used to segment the mass region from the input image. GLCM texture features namely contrast, correlation, energy and homogeneity are obtained from the region of interest. The texture features extracted from gray level co-occurrence matrix (GLCM) are computed at distance d=1 and θ=0 o , 45 o , 90 o , 135 o . These with three classifiers namely adaboost, back propagation neural network and sparse representation classifiers are used for characterizing the region containing either benign mass or malignant mass. The experimental results show the SRC classifier is more effective with an accuracy of 93.75% and with the Mathew's correlation coefficient (MCC) of 87.35%.
暂无评论