Results for 'Underwater Wireless Sensor Networks'

979 found
Order:
  1. Energy-Aware Depth-Based Routing Protocol for Enhanced Data Transmission in Underwater Wireless Sensor Networks.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):631-639.
    Underwater Wireless Sensor Networks (UWSNs) are pivotal for various applications, including oceanographic data collection, environmental monitoring, and naval operations. However, the harsh underwater environment poses challenges in designing efficient routing protocols, especially concerning energy consumption and data transmission reliability. This paper proposes an optimized depth-based routing protocol for energy-aware data transmission in UWSNs, focusing on minimizing energy usage while ensuring robust data delivery. The protocol dynamically adjusts transmission power based on node depth and residual energy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Optimized Depth-Based Routing for Energy-Efficient Data Transmission in Underwater Wireless Sensor Networks.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 ( 1):623-628.
    Underwater Wireless Sensor Networks (UWSNs) are pivotal for various applications, including oceanographic data collection, environmental monitoring, and naval operations. However, the harsh underwater environment poses challenges in designing efficient routing protocols, especially concerning energy consumption and data transmission reliability. This paper proposes an optimized depth-based routing protocol for energy-aware data transmission in UWSNs, focusing on minimizing energy usage while ensuring robust data delivery. The protocol dynamically adjusts transmission power based on node depth and residual energy, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Improved Depth-Based Routing for Prolonged Network Lifetime in Underwater Wireless Sensor Systems.R. Senthilkumar - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-630.
    The protocol dynamically adjusts transmission power based on node depth and residual energy, reducing communication overhead and prolonging network lifetime. The proposed methodology employs a multi-step approach, starting with the initialization phase, where nodes calculate their depth and energy levels. Following this, a depth-based clustering mechanism organizes nodes into clusters, allowing more efficient data aggregation. The routing process then prioritizes nodes with higher energy levels, reducing premature node failure. A novel energy-aware transmission algorithm ensures that data packets are transmitted over (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Adaptive Depth-Based Routing Protocol for Energy-Constrained Underwater Wireless Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):635-640.
    Underwater Wireless Sensor Networks (UWSNs) have emerged as a critical tool for various marine applications, such as underwater surveillance, oceanographic data collection, pollution monitoring, and resource exploration. These networks consist of a group of sensor nodes deployed underwater to monitor and collect data, which are then transmitted to a surface station for analysis.
    Download  
     
    Export citation  
     
    Bookmark  
  5.  58
    OPTIMIZED AGGREGATED PACKET TRANSMISSION IN DUTY-CYCLED WIRELESS SENSOR NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-458.
    t: Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission.
    Download  
     
    Export citation  
     
    Bookmark  
  6. DESIGN AND IMPLEMENTATION OF SENSOR NODE FOR WIRELESS SENSORS NETWORK TO MONITOR HUMIDITY OF HIGH-TECH POLYHOUSE ENVIRONMENT.B. P. Ladgaonkar - 2011 - International Journal of Advances in Engineering and Technology 1 (3):1-11.
    Wireless Sensors Network is a novel field shows tremendous application potential. To monitor the environmental parameters of high-tech polyhouse the Wireless Sensors Network (WSN) is developed. The heart of this ubiquitous field is the Wireless Sensor Node. Moreover, the field of microcontroller based embedded technology is innovative and more reliable. Therefore, based on an embedded technology and the RF module Zigbee a wireless senor node is designed about highly promising AVR ATmega8L microcontroller and implemented for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. EDAP: An Efficient Data-Gathering Protocol for Wireless Sensor Networks.Nastooh Taheri Javan - 2011 - International Journal of Ad Hoc and Ubiquitous Computing 7 (1):12-24.
    Directed Diffusion (DD) uses data aggregation to suppress data overhead however there is no guarantee that paths from nearby sources join after a few hops. In this paper, an efficient data-gathering protocol (EDAP) is proposed to address this problem by using a Virtual Sink (VS) node nearby the sources, which plays the role of sink node and broadcasts local interest messages and routes gathered data toward destination. Also, multiple paths are constructed between VS and the sink node, which leads to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  81
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data communication. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Depth-Based Routing Algorithms for Sustainable Energy Use in Underwater Wireless Networks.P. Selvaprasanth - 2025 - Journal of Science Technology and Research (JSTAR) 5 (1):630-645.
    The routing process then prioritizes nodes with higher energy levels, reducing premature node failure. A novel energy-aware transmission algorithm ensures that data packets are transmitted over the most energy-efficient paths, thus extending the overall network longevity. Simulation results demonstrate that the proposed protocol achieves significant improvements in energy consumption, data transmission reliability, and network lifetime compared to traditional methods. The conclusion discusses the potential future enhancements, including adaptive algorithms that can further reduce energy consumption in large-scale UWSNs.
    Download  
     
    Export citation  
     
    Bookmark  
  10.  66
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  76
    Latency-Aware Packet Transmission Optimization in Duty-Cycled WSNs.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-459.
    Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission. This paper presents an optimized approach to aggregated packet transmission in duty-cycled (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Mobility Enhancement of Patients Body Monitoring based on WBAN with Multipath Routing.Nastooh Taheri Javan - 2014 - 2Nd International Conference on Information and Communication Technology 1 (1):127-132.
    —One of the promising applications of wireless sensor networks (WSNs) is monitoring of the human body for health concerns. For this purpose, a large number of small sensors are implanted in the human body. These sensors altogether provide a network of wireless sensors (WBANs) and monitor the vital signs and signals of the human body; these sensors will then send this information to the doctor. The most important application of the WBAN is the implementation of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  12
    Reducing End-to-End Delay in Multi-path Routing Algorithms for Mobile Ad Hoc Networks.Nastooh Taheri Javan - 2007 - Mobile Ad-Hoc and Sensor Networks 1 (1):715–724.
    Some of the routing algorithms in mobile ad hoc networks use multiple paths simultaneously. These algorithms can attempt to find node-disjoint paths to achieve higher fault tolerance capability. By using node-disjoint paths, it is expected that the end-to-end delay in each path should be independent of each other. However, because of natural properties of wireless media and medium access mechanisms in ad hoc networks, the end-to-end delay between any source and destination depends on the pattern of communication (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Adaptive Channel Hopping for IEEE 802.15. 4 TSCH-Based Networks: A Dynamic Bernoulli Bandit Approach.Taheri Javan Nastooh - 2021 - IEEE Sensors Journal 21 (20):23667-23681.
    In IEEE 802.15.4 standard for low-power low-range wireless communications, only one channel is employed for transmission which can result in increased energy consumption, high network delay and poor packet delivery ratio (PDR). In the subsequent IEEE 802.15.4-2015 standard, a Time-slotted Channel Hopping (TSCH) mechanism has been developed which allows for a periodic yet fixed frequency hopping pattern over 16 different channels. Unfortunately, however, most of these channels are susceptible to high-power coexisting Wi-Fi signal interference and to possibly some other (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Grip force as a functional window to somatosensory cognition.Birgitta Dresp-Langley - 2022 - Frontiers in Psychology 13:1026439.
    Analysis of grip force signals tailored to hand and finger movement evolution and changes in grip force control during task execution provide unprecedented functional insight into somatosensory cognition. Somatosensory cognition is a basis of our ability to manipulate, move, and transform objects of the physical world around us, to recognize them on the basis of touch alone, and to grasp them with the right amount of force for lifting and manipulating them. Recent technology has permitted the wireless monitoring of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  17. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. To overhear or not to overhear: a dilemma between network coding gain and energy consumption in multi-hop wireless networks.Nastooh Taheri Javan - 2019 - Wireless Networks 25 (7):4097-4113.
    Any properly designed network coding technique can result in increased throughput and reliability of multi-hop wireless networks by taking advantage of the broadcast nature of wireless medium. In many inter-flow network coding schemes nodes are encouraged to overhear neighbour’s traffic in order to improve coding opportunities at the transmitter nodes. A study of these schemes reveal that some of the overheard packets are not useful for coding operation and thus this forced overhearing increases energy consumption dramatically. In (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  16
    To‐send‐or‐not‐to‐send: An optimal stopping approach to network coding in multi‐hop wireless networks.Nastooh Taheri Javan - 2018 - International Journal of Communication Systems 31 (2):e3438.
    Network coding is all about combining a variety of packets and forwarding as much packets as possible in each transmission operation. The network coding technique improves the throughput efficiency of multi‐hop wireless networks by taking advantage of the broadcast nature of wireless channels. However, there are some scenarios where the coding cannot be exploited due to the stochastic nature of the packet arrival process in the network. In these cases, the coding node faces 2 critical choices: forwarding (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. To Code or Not to Code: When and How to Use Network Coding in Energy Harvesting Wireless Multi-Hop Networks.Taheri Javan Nastooh - 2024 - IEEE Access 12:22608-22623.
    The broadcast nature of communication in transmission media has driven the rise of network coding’s popularity in wireless networks. Numerous benefits arise from employing network coding in multi-hop wireless networks, including enhanced throughput, reduced energy consumption, and decreased end-to-end delay. These advantages are a direct outcome of the minimized transmission count. This paper introduces a comprehensive framework to employ network coding in these networks. It refines decision-making at coding and decoding nodes simultaneously. The coding-nodes employ (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  68
    Low-Power IoT Sensors for Real-Time Outdoor Environmental Pollution Measurement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):430-440.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  23. BATTERY-POWERED DEVICE FOR MONITORING PHYSICAL DISTANCING THROUGH WIRELESS TECHNOLOGY.Angelica A. Cabaya, Rachel Grace B. Rizardo, Clesphsyche April O. Magno, Aubrey Madar B. Magno, Fredolen A. Causing, Steven V. Batislaong & Raffy S. Virtucio - 2023 - Get International Research Journal 1 (2).
    One method for preventing the spread of the coronavirus and other contagious diseases is through social distancing. Therefore, creating a tool to measure and quickly discover the precise distance is necessary. In order to prevent physical contact between individuals, this study aimed to detects individuals’ physical distance, through an inaugurated battery-powered device that monitors physical distance through wireless technology. Specifically, in public or crowded areas, to lessen the spread of the virus. This study focuses on detecting people’s physical distance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  14
    Energy & throughput tradeoff in WSN with network coding.Nastooh Taheri Javan - 2013 - 2013 International Conference on Ict Convergence (Ictc) 1 (1):304-309.
    Recently, network coding emerged as a promising technology that can provide significant improvements in throughput and energy efficiency of wireless networks. Many implementations of network coding in wireless networks, such as COPE, encourage nodes to overhear to improve the coding opportunities so that they can create better opportunities for coding at the transmitter node through overhearing more packages. In this paper, we have shown that all overheard packets are not necessarily useful for coding; thus, a node (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Eigth Ieee/Acis International Conference on Computer and Information Science 1 (1):852-857.
    A common characteristic of all popular multi-path routing algorithms in Mobile Ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end to end delay increment. In fact, due to medium access mechanism in wireless networks, such as CSMA/CA, data transmissions even through two Node Disjoint paths are not completely (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Design and Control of Steam Flow in Cement Production Process using Neural Network Based Controllers.Mustefa Jibril - 2020 - Researcher 12 (5):76-84.
    In this paper a NARMA L2, model reference and neural network predictive controller is utilized in order to control the output flow rate of the steam in furnace by controlling the steam flow valve. The steam flow control system is basically a feedback control system which is mostly used in cement production industries. The design of the system with the proposed controllers is done with Matlab/Simulink toolbox. The system is designed for the actual steam flow output to track the desired (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  47
    Towards Inclusive Societies: Leveraging IoT for Community Development and Education.Sudip Suklabaidya - 2024 - Novel Insights 1 (1):40-51.
    The proliferation of Internet of Things (IoT) technologies presents a promising avenue for fostering inclusive societies through community development and education initiatives. This paper explores the potential of leveraging IoT to address societal inequalities and empower marginalized communities. Through a multidisciplinary lens, the paper examines the intersection of IoT, community development, and education, elucidating how IoT-enabled solutions can contribute to building more resilient, connected, and equitable societies. By harnessing IoT devices, sensor networks, and data analytics, community development efforts (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  29. (1 other version) FIRE MANAGEMENT SYSTEM FOR INDUTRIAL SAFETY APPLICATIONS.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 minutes. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Smart Walking System based on Artificial Intelligence.Vanita Babanne, Simranjeet Kaur, Tejal Mehta, Divya Mulay & Rachana Nagarkar - 2018 - International Journal of Research in Engineering, Science and Management 1 (12).
    This paper shows the smart walking stick based on ultrasonic sensors and Arduino for outwardly debilitated individuals. There are roughly 37 million individuals over the globe who are visually impaired as indicated by the World Health Organization. Individuals with visual inabilities are regularly subjected to outer help which can be given by people, trained dogs, or electronic gadgets as supportive networks for basic assistance. Thus, this played as the motivation to develop a smart cane white stick to survive these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter provides (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  33. Computational entrepreneurship: from economic complexities to interdisciplinary research.Quan-Hoang Vuong - 2019 - Problems and Perspectives in Management 17 (1):117-129.
    The development of technology is unbelievably rapid. From limited local networks to high speed Internet, from crude computing machines to powerful semi-conductors, the world had changed drastically compared to just a few decades ago. In the constantly renewing process of adapting to such an unnaturally high-entropy setting, innovations as well as entirely new concepts, were often born. In the business world, one such phenomenon was the creation of a new type of entrepreneurship. This paper proposes a new academic discipline (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  34.  81
    IMPROVING ENERGY EFFICIENCY IN MANETS BY MULTI-PATH ROUTING.Nastooh Taheri Javan - 2013 - International Journal of Wireless and Mobile Networks 5 (1):163-176.
    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions among neighboring nodes, in order to obtain the joint channel in adjacent paths. The represented algorithm in this study tries to discover the distinct paths between source and destination nodes with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Classification of Smart Home Applications’ Requirements for the MAC Layer.Yasmeen Altujjar & Hala Mokhtar - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (5):13-21.
    Abstract—Smart homes and Wireless Home Automation Networks (WHAN) face several challenges in terms of cost, scalability, reliability, delay, energy consumption and many others. Smart homes typically have huge number of communicating devices. Efficient management of network resources is a major challenge in such environments. This paper provides insights on how to improve the MAC layer in smart home networks to fulfil the requirements of the different smart home applications. It provides a classification of the different smart home (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. From Biological Synapses to "Intelligent" Robots.Birgitta Dresp-Langley - 2022 - Electronics 11:1-28.
    This selective review explores biologically inspired learning as a model for intelligent robot control and sensing technology on the basis of specific examples. Hebbian synaptic learning is discussed as a functionally relevant model for machine learning and intelligence, as explained on the basis of examples from the highly plastic biological neural networks of invertebrates and vertebrates. Its potential for adaptive learning and control without supervision, the generation of functional complexity, and control architectures based on self-organization is brought forward. Learning (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  37. Utility Curves, Mean Opinion Scores Considered Biased.David Kirsh, H. Knoche & H. De Meer - 1999 - Proceedings of the Seventh Interna- Tional Workshop on Quality of Service.
    Mechanisms for QoS provisioning in communication networks range from flow-based resource reservation schemes, providing QoS guarantees, through QoS differentiation based on reservation aggregation techniques to adaptation of applications, compensating for incomplete reservations. Scalable, aggregation-based reservations can also be combined with adaptations for a more flexible and robust overall QoS provisioning. Adaptation is particularly important in wireless networks, where reservations schemes are more difficult to realize. It is widely accepted that usability of Cellular or Mobile IP can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Unmanned Ground Vehicle (UGV) Navigation System using GPS.Budi Setiyono, A. Muarif Fandhi, Sumardi & Aris Triwiyatno - 2018 - International Journal of Engineering and Information Systems(IJEAIS) 2 (11):1-9.
    Abstract— Unmanned Ground Vehicle (UGV) is a mechanical device that moves on the sky and serves as a means of carrying, transporting something, or mapping the location and controlled remotely. UGV is widely used in a variety of terrain difficult to reach or dangerous for human safety, eg for the location of a natural disaster, radiation, or to defuse the bomb in the military. This research was designed and manufactured human machine interface for remote control system and displayed the UGV (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  75
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (CO), sulfur (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  73
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41.  70
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  35
    AI in Climate Change Mitigation.Mohammad Alnajjar, Mohammed Hazem M. Hamadaqa, Mohammed N. Ayyad, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (10):31-37.
    Abstract: Climate change presents a critical challenge that demands advanced analytical tools to predict and mitigate its impacts. This paper explores the role of artificial intelligence (AI) in enhancing climate modeling, emphasizing how AI-driven methods are revolutionizing our understanding and response to climate change. By integrating machine learning algorithms with diverse data sources such as satellite imagery, historical climate records, and real-time sensor data, AI improves the accuracy, efficiency, and granularity of climate predictions. The paper reviews key AI techniques, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Availability of Digital Resources and Institutional Compliance with COVID-19 Mitigation Measures in a Nigerian University: A Descriptive Study.Valentine Joseph Owan & Mercy Valentine Owan - 2022 - Electronic Journal of Medical and Educational Technologies 15 (4):Article em2208.
    The state of the availability of digital resources and institutional compliance to COVID-19 mitigation measures was evaluated by the researchers in this study. Informed by the need to answer two research questions, the study adopted the descriptive survey design. A sample of 409 participants was drawn from a population of 2,410 academic staff at the University of Calabar, leveraging the multistage sampling process. “Availability of digital resources and institutional compliance with COVID-19 mitigation measures questionnaire” was used for data collection. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Using Inexpensive Home Alarm for Computer Based Carbon Monoxide Monitoring.Abdullah Hussein Mohammed - 2012 - Asian Transactions on Engineering 2 (02):6.
    The current increase of air pollution rates and its consequences of global warming, health problems and threats to human lives necessitate the continuous search for more efficient and cost effective gas monitoring devices. Devices that is easily available and implementable worldwide. In developing countries the cost and the availability of the equipment is one of the obstacles that contribute to not having an efficient monitoring system. Hence, modifying cheap and easily available devices to work as pollution monitoring system will be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging internet technology. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home automation system (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  50. Ontology-based fusion of sensor data and natural language.Erik Thomsen & Barry Smith - 2018 - Applied ontology 13 (4):295-333.
    We describe a prototype ontology-driven information system (ODIS) that exploits what we call Portion of Reality (POR) representations. The system takes both sensor data and natural language text as inputs and composes on this basis logically structured POR assertions. The goal of our prototype is to represent both natural language and sensor data within a single framework that is able to support both axiomatic reasoning and computation. In addition, the framework should be capable of discovering and representing new (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 979