Results for ' Underwater Wireless Sensor Networks'

984 found
Order:
  1.  56
    Energy-Aware Depth-Based Routing Protocol for Enhanced Data Transmission in Underwater Wireless Sensor Networks.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):631-639.
    Underwater Wireless Sensor Networks (UWSNs) are pivotal for various applications, including oceanographic data collection, environmental monitoring, and naval operations. However, the harsh underwater environment poses challenges in designing efficient routing protocols, especially concerning energy consumption and data transmission reliability. This paper proposes an optimized depth-based routing protocol for energy-aware data transmission in UWSNs, focusing on minimizing energy usage while ensuring robust data delivery. The protocol dynamically adjusts transmission power based on node depth and residual energy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  55
    Optimized Depth-Based Routing for Energy-Efficient Data Transmission in Underwater Wireless Sensor Networks.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 ( 1):623-628.
    Underwater Wireless Sensor Networks (UWSNs) are pivotal for various applications, including oceanographic data collection, environmental monitoring, and naval operations. However, the harsh underwater environment poses challenges in designing efficient routing protocols, especially concerning energy consumption and data transmission reliability. This paper proposes an optimized depth-based routing protocol for energy-aware data transmission in UWSNs, focusing on minimizing energy usage while ensuring robust data delivery. The protocol dynamically adjusts transmission power based on node depth and residual energy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  47
    Improved Depth-Based Routing for Prolonged Network Lifetime in Underwater Wireless Sensor Systems.R. Senthilkumar - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-630.
    The protocol dynamically adjusts transmission power based on node depth and residual energy, reducing communication overhead and prolonging network lifetime. The proposed methodology employs a multi-step approach, starting with the initialization phase, where nodes calculate their depth and energy levels. Following this, a depth-based clustering mechanism organizes nodes into clusters, allowing more efficient data aggregation. The routing process then prioritizes nodes with higher energy levels, reducing premature node failure. A novel energy-aware transmission algorithm ensures that data packets are transmitted over (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  39
    Adaptive Depth-Based Routing Protocol for Energy-Constrained Underwater Wireless Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):635-640.
    Underwater Wireless Sensor Networks (UWSNs) have emerged as a critical tool for various marine applications, such as underwater surveillance, oceanographic data collection, pollution monitoring, and resource exploration. These networks consist of a group of sensor nodes deployed underwater to monitor and collect data, which are then transmitted to a surface station for analysis.
    Download  
     
    Export citation  
     
    Bookmark  
  5. DESIGN AND IMPLEMENTATION OF SENSOR NODE FOR WIRELESS SENSORS NETWORK TO MONITOR HUMIDITY OF HIGH-TECH POLYHOUSE ENVIRONMENT.B. P. Ladgaonkar - 2011 - International Journal of Advances in Engineering and Technology 1 (3):1-11.
    Wireless Sensors Network is a novel field shows tremendous application potential. To monitor the environmental parameters of high-tech polyhouse the Wireless Sensors Network (WSN) is developed. The heart of this ubiquitous field is the Wireless Sensor Node. Moreover, the field of microcontroller based embedded technology is innovative and more reliable. Therefore, based on an embedded technology and the RF module Zigbee a wireless senor node is designed about highly promising AVR ATmega8L microcontroller and implemented for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  37
    Averting Eavesdrop Intrusion in Industrial Wireless Sensor Networks.Arul Selvan M. - 2016 - International Journal of Innovative Research in Computer Science and Engineering (Ijircse) 2 (1):8-13.
    —Industrial networks are increasingly based on open protocols and platforms that are also employed in the IT industry and Internet background. Most of the industries use wireless networks for communicating information and data, due to high cable cost. Since, the wireless networks are insecure, it is essential to secure the critical information and data during transmission. The data that transmitted is intercepted by eavesdropper can be predicted by secrecy capacity. The secrecy capacity is the difference (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  78
    OPTIMIZED AGGREGATED PACKET TRANSMISSION IN DUTY-CYCLED WIRELESS SENSOR NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-458.
    t: Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission.
    Download  
     
    Export citation  
     
    Bookmark  
  8. Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. EDAP: An Efficient Data-Gathering Protocol for Wireless Sensor Networks.Nastooh Taheri Javan - 2011 - International Journal of Ad Hoc and Ubiquitous Computing 7 (1):12-24.
    Directed Diffusion (DD) uses data aggregation to suppress data overhead however there is no guarantee that paths from nearby sources join after a few hops. In this paper, an efficient data-gathering protocol (EDAP) is proposed to address this problem by using a Virtual Sink (VS) node nearby the sources, which plays the role of sink node and broadcasts local interest messages and routes gathered data toward destination. Also, multiple paths are constructed between VS and the sink node, which leads to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  55
    Depth-Based Routing Algorithms for Sustainable Energy Use in Underwater Wireless Networks.P. Selvaprasanth - 2025 - Journal of Science Technology and Research (JSTAR) 5 (1):630-645.
    The routing process then prioritizes nodes with higher energy levels, reducing premature node failure. A novel energy-aware transmission algorithm ensures that data packets are transmitted over the most energy-efficient paths, thus extending the overall network longevity. Simulation results demonstrate that the proposed protocol achieves significant improvements in energy consumption, data transmission reliability, and network lifetime compared to traditional methods. The conclusion discusses the potential future enhancements, including adaptive algorithms that can further reduce energy consumption in large-scale UWSNs.
    Download  
     
    Export citation  
     
    Bookmark  
  11. Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Latency-Aware Packet Transmission Optimization in Duty-Cycled WSNs.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-459.
    Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission. This paper presents an optimized approach to aggregated packet transmission in duty-cycled (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Mobility Enhancement of Patients Body Monitoring based on WBAN with Multipath Routing.Nastooh Taheri Javan - 2014 - 2Nd International Conference on Information and Communication Technology 1 (1):127-132.
    —One of the promising applications of wireless sensor networks (WSNs) is monitoring of the human body for health concerns. For this purpose, a large number of small sensors are implanted in the human body. These sensors altogether provide a network of wireless sensors (WBANs) and monitor the vital signs and signals of the human body; these sensors will then send this information to the doctor. The most important application of the WBAN is the implementation of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  29
    Reducing End-to-End Delay in Multi-path Routing Algorithms for Mobile Ad Hoc Networks.Nastooh Taheri Javan - 2007 - Mobile Ad-Hoc and Sensor Networks 1 (1):715–724.
    Some of the routing algorithms in mobile ad hoc networks use multiple paths simultaneously. These algorithms can attempt to find node-disjoint paths to achieve higher fault tolerance capability. By using node-disjoint paths, it is expected that the end-to-end delay in each path should be independent of each other. However, because of natural properties of wireless media and medium access mechanisms in ad hoc networks, the end-to-end delay between any source and destination depends on the pattern of communication (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Adaptive Channel Hopping for IEEE 802.15. 4 TSCH-Based Networks: A Dynamic Bernoulli Bandit Approach.Taheri Javan Nastooh - 2021 - IEEE Sensors Journal 21 (20):23667-23681.
    In IEEE 802.15.4 standard for low-power low-range wireless communications, only one channel is employed for transmission which can result in increased energy consumption, high network delay and poor packet delivery ratio (PDR). In the subsequent IEEE 802.15.4-2015 standard, a Time-slotted Channel Hopping (TSCH) mechanism has been developed which allows for a periodic yet fixed frequency hopping pattern over 16 different channels. Unfortunately, however, most of these channels are susceptible to high-power coexisting Wi-Fi signal interference and to possibly some other (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Grip force as a functional window to somatosensory cognition.Birgitta Dresp-Langley - 2022 - Frontiers in Psychology 13:1026439.
    Analysis of grip force signals tailored to hand and finger movement evolution and changes in grip force control during task execution provide unprecedented functional insight into somatosensory cognition. Somatosensory cognition is a basis of our ability to manipulate, move, and transform objects of the physical world around us, to recognize them on the basis of touch alone, and to grasp them with the right amount of force for lifting and manipulating them. Recent technology has permitted the wireless monitoring of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  18. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  41
    User Activity Analysis Via Network Traffic Using DNN and Optimized _Federated Learning based Privacy Preserving Method in Mobile Wireless Networks (14th edition).DrR. Sugumar Drr Udayakumar - 2024 - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 14 (2):66-81.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for better (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  40
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks.DrV. R. Vimal and DrR. Sugumar DrR. Udayakumar, Dr Suvarna Yogesh Pansambal, Dr Yogesh Manohar Gajmal - 2023 - INDIA: ESS- ESS PUBLICATION.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for better (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. To overhear or not to overhear: a dilemma between network coding gain and energy consumption in multi-hop wireless networks.Nastooh Taheri Javan - 2019 - Wireless Networks 25 (7):4097-4113.
    Any properly designed network coding technique can result in increased throughput and reliability of multi-hop wireless networks by taking advantage of the broadcast nature of wireless medium. In many inter-flow network coding schemes nodes are encouraged to overhear neighbour’s traffic in order to improve coding opportunities at the transmitter nodes. A study of these schemes reveal that some of the overheard packets are not useful for coding operation and thus this forced overhearing increases energy consumption dramatically. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  33
    Wireless EV Charging _Pathway Based on Electromagnetic Energy (13th edition).S. Karthickeyan A. Bhuvaneswari, - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 13 (5):1363-1368. Translated by P.K.Selvarani S.Pavithra.
    This project presents a dynamic wireless charging system for electric vehicles (EVs) with the Arduino Uno microcontroller as the main controller. The system features a transmitter (TX) coil embedded in roadway infrastructure and a receiver (RX) coil installed in the vehicle unit, enabling continuous charging while in motion. Energy is wirelessly transferred from the TX coil to the RX coil through electromagnetic induction. The Arduino Uno microcontroller serves as the central control unit, managing power transmission, monitoring charging status, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. To Code or Not to Code: When and How to Use Network Coding in Energy Harvesting Wireless Multi-Hop Networks.Taheri Javan Nastooh - 2024 - IEEE Access 12:22608-22623.
    The broadcast nature of communication in transmission media has driven the rise of network coding’s popularity in wireless networks. Numerous benefits arise from employing network coding in multi-hop wireless networks, including enhanced throughput, reduced energy consumption, and decreased end-to-end delay. These advantages are a direct outcome of the minimized transmission count. This paper introduces a comprehensive framework to employ network coding in these networks. It refines decision-making at coding and decoding nodes simultaneously. The coding-nodes employ (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  44
    To‐send‐or‐not‐to‐send: An optimal stopping approach to network coding in multi‐hop wireless networks.Nastooh Taheri Javan - 2018 - International Journal of Communication Systems 31 (2):e3438.
    Network coding is all about combining a variety of packets and forwarding as much packets as possible in each transmission operation. The network coding technique improves the throughput efficiency of multi‐hop wireless networks by taking advantage of the broadcast nature of wireless channels. However, there are some scenarios where the coding cannot be exploited due to the stochastic nature of the packet arrival process in the network. In these cases, the coding node faces 2 critical choices: forwarding (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  26.  94
    Low-Power IoT Sensors for Real-Time Outdoor Environmental Pollution Measurement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):430-440.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. BATTERY-POWERED DEVICE FOR MONITORING PHYSICAL DISTANCING THROUGH WIRELESS TECHNOLOGY.Angelica A. Cabaya, Rachel Grace B. Rizardo, Clesphsyche April O. Magno, Aubrey Madar B. Magno, Fredolen A. Causing, Steven V. Batislaong & Raffy S. Virtucio - 2023 - Get International Research Journal 1 (2).
    One method for preventing the spread of the coronavirus and other contagious diseases is through social distancing. Therefore, creating a tool to measure and quickly discover the precise distance is necessary. In order to prevent physical contact between individuals, this study aimed to detects individuals’ physical distance, through an inaugurated battery-powered device that monitors physical distance through wireless technology. Specifically, in public or crowded areas, to lessen the spread of the virus. This study focuses on detecting people’s physical distance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  44
    Energy & throughput tradeoff in WSN with network coding.Nastooh Taheri Javan - 2013 - 2013 International Conference on Ict Convergence (Ictc) 1 (1):304-309.
    Recently, network coding emerged as a promising technology that can provide significant improvements in throughput and energy efficiency of wireless networks. Many implementations of network coding in wireless networks, such as COPE, encourage nodes to overhear to improve the coding opportunities so that they can create better opportunities for coding at the transmitter node through overhearing more packages. In this paper, we have shown that all overheard packets are not necessarily useful for coding; thus, a node (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Design and Control of Steam Flow in Cement Production Process using Neural Network Based Controllers.Mustefa Jibril - 2020 - Researcher 12 (5):76-84.
    In this paper a NARMA L2, model reference and neural network predictive controller is utilized in order to control the output flow rate of the steam in furnace by controlling the steam flow valve. The steam flow control system is basically a feedback control system which is mostly used in cement production industries. The design of the system with the proposed controllers is done with Matlab/Simulink toolbox. The system is designed for the actual steam flow output to track the desired (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Eigth Ieee/Acis International Conference on Computer and Information Science 1 (1):852-857.
    A common characteristic of all popular multi-path routing algorithms in Mobile Ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end to end delay increment. In fact, due to medium access mechanism in wireless networks, such as CSMA/CA, data transmissions even through two Node Disjoint paths are not completely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  84
    Towards Inclusive Societies: Leveraging IoT for Community Development and Education.Sudip Suklabaidya - 2024 - Novel Insights 1 (1):40-51.
    The proliferation of Internet of Things (IoT) technologies presents a promising avenue for fostering inclusive societies through community development and education initiatives. This paper explores the potential of leveraging IoT to address societal inequalities and empower marginalized communities. Through a multidisciplinary lens, the paper examines the intersection of IoT, community development, and education, elucidating how IoT-enabled solutions can contribute to building more resilient, connected, and equitable societies. By harnessing IoT devices, sensor networks, and data analytics, community development efforts (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  17
    The Universal Formula for Solving the Free Will Problem and Preventing Global Chaos.Angelito Malicse - manuscript
    -/- The Universal Formula for Solving the Free Will Problem and Preventing Global Chaos -/- By Angelito Malicse -/- Free will has perplexed philosophers, scientists, and theologians for millennia. The notion that humans possess the ability to make independent choices has often clashed with scientific findings indicating that decisions are influenced by biological, psychological, and environmental factors. This unresolved dilemma has far-reaching implications for society, as misunderstandings about human decision-making contribute to ignorance, conflict, and societal dysfunction. Without a clear understanding (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  34. INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Smart Walking System based on Artificial Intelligence.Vanita Babanne, Simranjeet Kaur, Tejal Mehta, Divya Mulay & Rachana Nagarkar - 2018 - International Journal of Research in Engineering, Science and Management 1 (12).
    This paper shows the smart walking stick based on ultrasonic sensors and Arduino for outwardly debilitated individuals. There are roughly 37 million individuals over the globe who are visually impaired as indicated by the World Health Organization. Individuals with visual inabilities are regularly subjected to outer help which can be given by people, trained dogs, or electronic gadgets as supportive networks for basic assistance. Thus, this played as the motivation to develop a smart cane white stick to survive these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter provides (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Classification of Smart Home Applications’ Requirements for the MAC Layer.Yasmeen Altujjar & Hala Mokhtar - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (5):13-21.
    Abstract—Smart homes and Wireless Home Automation Networks (WHAN) face several challenges in terms of cost, scalability, reliability, delay, energy consumption and many others. Smart homes typically have huge number of communicating devices. Efficient management of network resources is a major challenge in such environments. This paper provides insights on how to improve the MAC layer in smart home networks to fulfil the requirements of the different smart home applications. It provides a classification of the different smart home (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Computational entrepreneurship: from economic complexities to interdisciplinary research.Quan-Hoang Vuong - 2019 - Problems and Perspectives in Management 17 (1):117-129.
    The development of technology is unbelievably rapid. From limited local networks to high speed Internet, from crude computing machines to powerful semi-conductors, the world had changed drastically compared to just a few decades ago. In the constantly renewing process of adapting to such an unnaturally high-entropy setting, innovations as well as entirely new concepts, were often born. In the business world, one such phenomenon was the creation of a new type of entrepreneurship. This paper proposes a new academic discipline (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  39. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  40. From Biological Synapses to "Intelligent" Robots.Birgitta Dresp-Langley - 2022 - Electronics 11:1-28.
    This selective review explores biologically inspired learning as a model for intelligent robot control and sensing technology on the basis of specific examples. Hebbian synaptic learning is discussed as a functionally relevant model for machine learning and intelligence, as explained on the basis of examples from the highly plastic biological neural networks of invertebrates and vertebrates. Its potential for adaptive learning and control without supervision, the generation of functional complexity, and control architectures based on self-organization is brought forward. Learning (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  41. Unmanned Ground Vehicle (UGV) Navigation System using GPS.Budi Setiyono, A. Muarif Fandhi, Sumardi & Aris Triwiyatno - 2018 - International Journal of Engineering and Information Systems(IJEAIS) 2 (11):1-9.
    Abstract— Unmanned Ground Vehicle (UGV) is a mechanical device that moves on the sky and serves as a means of carrying, transporting something, or mapping the location and controlled remotely. UGV is widely used in a variety of terrain difficult to reach or dangerous for human safety, eg for the location of a natural disaster, radiation, or to defuse the bomb in the military. This research was designed and manufactured human machine interface for remote control system and displayed the UGV (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Utility Curves, Mean Opinion Scores Considered Biased.David Kirsh, H. Knoche & H. De Meer - 1999 - Proceedings of the Seventh Interna- Tional Workshop on Quality of Service.
    Mechanisms for QoS provisioning in communication networks range from flow-based resource reservation schemes, providing QoS guarantees, through QoS differentiation based on reservation aggregation techniques to adaptation of applications, compensating for incomplete reservations. Scalable, aggregation-based reservations can also be combined with adaptations for a more flexible and robust overall QoS provisioning. Adaptation is particularly important in wireless networks, where reservations schemes are more difficult to realize. It is widely accepted that usability of Cellular or Mobile IP can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. IMPROVING ENERGY EFFICIENCY IN MANETS BY MULTI-PATH ROUTING.Nastooh Taheri Javan - 2013 - International Journal of Wireless and Mobile Networks 5 (1):163-176.
    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions among neighboring nodes, in order to obtain the joint channel in adjacent paths. The represented algorithm in this study tries to discover the distinct paths between source and destination nodes with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44.  55
    AI-Enhanced Urban Mobility: Optimizing Public Transportation Systems in Smart Cities.Eric Garcia - manuscript
    Urban transportation systems face significant challenges due to increasing congestion, inefficient routes, and fluctuating passenger demand. Traditional public transportation networks often struggle to adapt dynamically to these challenges, leading to delays, overcrowding, and environmental inefficiencies. This paper explores how Artificial Intelligence (AI) and IoT technologies can optimize urban mobility by enabling real-time route optimization, demand forecasting, and passenger flow management. By integrating data from GPS trackers, fare collection systems, and environmental sensors, cities can reduce travel times, enhance commuter satisfaction, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Availability of Digital Resources and Institutional Compliance with COVID-19 Mitigation Measures in a Nigerian University: A Descriptive Study.Valentine Joseph Owan & Mercy Valentine Owan - 2022 - Electronic Journal of Medical and Educational Technologies 15 (4):Article em2208.
    The state of the availability of digital resources and institutional compliance to COVID-19 mitigation measures was evaluated by the researchers in this study. Informed by the need to answer two research questions, the study adopted the descriptive survey design. A sample of 409 participants was drawn from a population of 2,410 academic staff at the University of Calabar, leveraging the multistage sampling process. “Availability of digital resources and institutional compliance with COVID-19 mitigation measures questionnaire” was used for data collection. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Using Inexpensive Home Alarm for Computer Based Carbon Monoxide Monitoring.Abdullah Hussein Mohammed - 2012 - Asian Transactions on Engineering 2 (02):6.
    The current increase of air pollution rates and its consequences of global warming, health problems and threats to human lives necessitate the continuous search for more efficient and cost effective gas monitoring devices. Devices that is easily available and implementable worldwide. In developing countries the cost and the availability of the equipment is one of the obstacles that contribute to not having an efficient monitoring system. Hence, modifying cheap and easily available devices to work as pollution monitoring system will be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (CO), sulfur (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  89
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  45
    Geo-Tagging of Plantation in The Catchment Area of Hydro Project.G. Prabhakar Raju - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-13.
    This project centers on developing a geo-tagging and monitoring system for plantations within the catchment area of a hydro project. Designed for the forest department, it provides real-time insights into environmental conditions to support the sustainable management of forest resources. The system comprises an Arduino Uno microcontroller that integrates GPS, DHT11 (temperature and humidity sensor), and LoRa modules to track and communicate critical data, such as the geographic location, temperature, and humidity around each plantation site. Powered by a 7.4V (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging internet technology. (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 984