A count of crowds tries to determine the total number of persons in crowded places in order to avoid disruption of the safety system and maintain crowd safety. Accurate estimation of the size of crowds is a challengin...
详细信息
Automated visual quality inspection using machine vision is now widely used to reduce wastage and ensure better quality of products. Numerous algorithms using computer vision were made to solve specific issues in the ...
详细信息
Wireless sensor networks are among the most common communication tools used in military and civilian fields. These networks consist of many tiny devices called sensor nodes. Each node has processing capability and dif...
Wireless sensor networks are among the most common communication tools used in military and civilian fields. These networks consist of many tiny devices called sensor nodes. Each node has processing capability and different types of memory, transmitter, radio frequency receiver, and power supply. In addition, nodes house sensors and actuators. Batteries usually power sensor nodes and need to operate longer without their presence. In most cases, changing or recharging the battery for sensor nodes is very difficult or even impossible. Designing routing protocols in wireless sensor networks is challenging due to network limitations, with an emphasis on energy efficiency. The proposed method uses a hierarchical routing mechanism to optimize routing using asymmetric clustering. The sensor nodes are asymmetrically clustered in the proposed method, and the cluster heads are selected using the Jellyfish Search (JS) optimizer algorithm. The problem of optimal clustering is an optimization problem, so in this research, the Jellyfish Search algorithm is used to provide the most optimal clusters in routing. Due to the utilization of a search mechanism based on chaos theory in the Jellyfish Search optimization, the proposed method exhibits high accuracy in clustering and optimal routing within wireless sensor networks. Evaluations indicate that the proposed method achieves lower energy consumption and longer network lifetime compared to GWO, MO-PSO, WGWO, and HMBCR algorithms.
In this era, wireless networks are economically feasible and flexible to establish in healthcare, defense, surveillance, and traffic monitoring, fire detection. Effective intruder detection systems utilize advanced te...
详细信息
In recent times, the increment of mobile phone usage has resulted in a huge number of spam messages. Spammers continuously apply more and more new tricks that cause managing or preventing spam messages a challenging t...
详细信息
The Hadamard transform is an ancient method for efficient data compression, especially for medical image data. Thus, the proposed work consists of analyzing the filter performance using a novel Hadamard transform to a...
详细信息
computer vision is one of the state-of-The-Art technologies for object detection problems. Accurate detection of obstacles could assist blind and visually impaired people to n avigate safely while they walk. However, ...
详细信息
The proposed project uses a Raspberry Pi microcontroller to prevent crop losses caused by animals like dog, wild pigs, and monkeys. These animals pose a significant threat to farmers, leading to financial losses. This...
详细信息
Unmanned aerial vehicle surveying of the riverbed enables detailed mapping of the river flow, which is useful for various purposes such as flood management, ecosystem monitoring and geological processes. Unmanned aeri...
详细信息
Cell type identification is a crucial step in single-cell RNA-seq (scRNA-seq) data analysis. The supervised cell type identification method is a preferred solution due to its accuracy and efficiency. The performance o...
详细信息
暂无评论