Results for 'Wireless Sensors Network'

965 found
Order:
  1. DESIGN AND IMPLEMENTATION OF SENSOR NODE FOR WIRELESS SENSORS NETWORK TO MONITOR HUMIDITY OF HIGH-TECH POLYHOUSE ENVIRONMENT.B. P. Ladgaonkar - 2011 - International Journal of Advances in Engineering and Technology 1 (3):1-11.
    Wireless Sensors Network is a novel field shows tremendous application potential. To monitor the environmental parameters of high-tech polyhouse the Wireless Sensors Network (WSN) is developed. The heart of this ubiquitous field is the Wireless Sensor Node. Moreover, the field of microcontroller based embedded technology is innovative and more reliable. Therefore, based on an embedded technology and the RF module Zigbee a wireless senor node is designed about highly promising AVR ATmega8L microcontroller (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  42
    OPTIMIZED AGGREGATED PACKET TRANSMISSION IN DUTY-CYCLED WIRELESS SENSOR NETWORKS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-458.
    t: Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission.
    Download  
     
    Export citation  
     
    Bookmark  
  3.  63
    Efficient Aggregated Data Transmission Scheme for Energy-Constrained Wireless Sensor Networks.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):445-460.
    Optimization algorithms such as Genetic Algorithms (GA) and Particle Swarm Optimization (PSO) are employed to determine the optimal aggregation and transmission schedules, taking into account factors such as network topology, node energy levels, and data urgency. The proposed approach is validated through extensive simulations, demonstrating significant improvements in energy consumption, packet delivery ratio, and overall network performance. The results suggest that the optimized aggregated packet transmission method can effectively extend the lifespan of duty-cycled WSNs while ensuring reliable data (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. EDAP: An Efficient Data-Gathering Protocol for Wireless Sensor Networks.Nastooh Taheri Javan - 2011 - International Journal of Ad Hoc and Ubiquitous Computing 7 (1):12-24.
    Directed Diffusion (DD) uses data aggregation to suppress data overhead however there is no guarantee that paths from nearby sources join after a few hops. In this paper, an efficient data-gathering protocol (EDAP) is proposed to address this problem by using a Virtual Sink (VS) node nearby the sources, which plays the role of sink node and broadcasts local interest messages and routes gathered data toward destination. Also, multiple paths are constructed between VS and the sink node, which leads to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  52
    Wireless IoT Sensors for Environmental Pollution Monitoring in Urban Areas.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):434-441.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  69
    Latency-Aware Packet Transmission Optimization in Duty-Cycled WSNs.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):444-459.
    Wireless Sensor Networks (WSNs) have become increasingly prevalent in various applications, ranging from environmental monitoring to smart cities. However, the limited energy resources of sensor nodes pose significant challenges in maintaining network longevity and data transmission efficiency. Duty-cycled WSNs, where sensor nodes alternate between active and sleep states to conserve energy, offer a solution to these challenges but introduce new complexities in data transmission. This paper presents an optimized approach to aggregated packet transmission in duty-cycled WSNs, utilizing advanced (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. COLLABORATE FRAMEWORK BASED ON SOFTWARE DEFINED NETWORK IN MANET.S. Praveen Kumar - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):39-54.
    Create a novel network model for mobile ad hoc network (MANET) nodes and actors in wireless sensor networks to collaborate on event processing. There are two stages in the development of distributed algorithms: setup and negotiation. The first uses weighted proportional max-min fairness to initially allocate MANET nodes across event zones, whereas the latter uses a market-based method to re-distribute the number of MANET nodes based on existing and new events. A detection technique for malicious packet dropping (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Mobility Enhancement of Patients Body Monitoring based on WBAN with Multipath Routing.Nastooh Taheri Javan - 2014 - 2Nd International Conference on Information and Communication Technology 1 (1):127-132.
    —One of the promising applications of wireless sensor networks (WSNs) is monitoring of the human body for health concerns. For this purpose, a large number of small sensors are implanted in the human body. These sensors altogether provide a network of wireless sensors (WBANs) and monitor the vital signs and signals of the human body; these sensors will then send this information to the doctor. The most important application of the WBAN is the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Adaptive Channel Hopping for IEEE 802.15. 4 TSCH-Based Networks: A Dynamic Bernoulli Bandit Approach.Taheri Javan Nastooh - 2021 - IEEE Sensors Journal 21 (20):23667-23681.
    In IEEE 802.15.4 standard for low-power low-range wireless communications, only one channel is employed for transmission which can result in increased energy consumption, high network delay and poor packet delivery ratio (PDR). In the subsequent IEEE 802.15.4-2015 standard, a Time-slotted Channel Hopping (TSCH) mechanism has been developed which allows for a periodic yet fixed frequency hopping pattern over 16 different channels. Unfortunately, however, most of these channels are susceptible to high-power coexisting Wi-Fi signal interference and to possibly some (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Grip force as a functional window to somatosensory cognition.Birgitta Dresp-Langley - 2022 - Frontiers in Psychology 13:1026439.
    Analysis of grip force signals tailored to hand and finger movement evolution and changes in grip force control during task execution provide unprecedented functional insight into somatosensory cognition. Somatosensory cognition is a basis of our ability to manipulate, move, and transform objects of the physical world around us, to recognize them on the basis of touch alone, and to grasp them with the right amount of force for lifting and manipulating them. Recent technology has permitted the wireless monitoring of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  11. Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
    Abstract: Wireless security is the avoidance of unlawful access or impairment to computers using wireless networks. Securing wireless network has been a research in the past two decades without coming up with prior solution to which security method should be employed to prevent unlawful access of data. The aim of this study was to review some literatures on wireless security in the areas of attacks, threats, vulnerabilities and some solutions to deal with those problems. It (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. To overhear or not to overhear: a dilemma between network coding gain and energy consumption in multi-hop wireless networks.Nastooh Taheri Javan - 2019 - Wireless Networks 25 (7):4097-4113.
    Any properly designed network coding technique can result in increased throughput and reliability of multi-hop wireless networks by taking advantage of the broadcast nature of wireless medium. In many inter-flow network coding schemes nodes are encouraged to overhear neighbour’s traffic in order to improve coding opportunities at the transmitter nodes. A study of these schemes reveal that some of the overheard packets are not useful for coding operation and thus this forced overhearing increases energy consumption dramatically. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. To Code or Not to Code: When and How to Use Network Coding in Energy Harvesting Wireless Multi-Hop Networks.Taheri Javan Nastooh - 2024 - IEEE Access 12:22608-22623.
    The broadcast nature of communication in transmission media has driven the rise of network coding’s popularity in wireless networks. Numerous benefits arise from employing network coding in multi-hop wireless networks, including enhanced throughput, reduced energy consumption, and decreased end-to-end delay. These advantages are a direct outcome of the minimized transmission count. This paper introduces a comprehensive framework to employ network coding in these networks. It refines decision-making at coding and decoding nodes simultaneously. The coding-nodes employ (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  57
    Low-Power IoT Sensors for Real-Time Outdoor Environmental Pollution Measurement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):430-440.
    The data collected by these sensors are transmitted to a centralized system where optimization algorithms, such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO), and Simulated Annealing (SA), are applied to optimize sensor placement, data transmission, and processing efficiency. This ensures accurate, real-time pollution monitoring and data analysis, providing actionable insights for policymakers, environmental agencies, and the general public. The system's performance is evaluated through simulations and real-world experiments, demonstrating its capability to deliver reliable and timely pollution data. Future (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Rule Based System for Diagnosing Wireless Connection Problems Using SL5 Object.Samy S. Abu Naser, Wadee W. Alamawi & Mostafa F. Alfarra - 2016 - International Journal of Information Technology and Electrical Engineering 5 (6):26-33.
    There is an increase in the use of in-door wireless networking solutions via Wi-Fi and this increase infiltrated and utilized Wi-Fi enable devices, as well as smart mobiles, games consoles, security systems, tablet PCs and smart TVs. Thus the demand on Wi-Fi connections increased rapidly. Rule Based System is an essential method in helping using the human expertise in many challenging fields. In this paper, a Rule Based System was designed and developed for diagnosing the wireless connection problems (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  16. BATTERY-POWERED DEVICE FOR MONITORING PHYSICAL DISTANCING THROUGH WIRELESS TECHNOLOGY.Angelica A. Cabaya, Rachel Grace B. Rizardo, Clesphsyche April O. Magno, Aubrey Madar B. Magno, Fredolen A. Causing, Steven V. Batislaong & Raffy S. Virtucio - 2023 - Get International Research Journal 1 (2).
    One method for preventing the spread of the coronavirus and other contagious diseases is through social distancing. Therefore, creating a tool to measure and quickly discover the precise distance is necessary. In order to prevent physical contact between individuals, this study aimed to detects individuals’ physical distance, through an inaugurated battery-powered device that monitors physical distance through wireless technology. Specifically, in public or crowded areas, to lessen the spread of the virus. This study focuses on detecting people’s physical distance (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc Networks.Nastooh Taheri Javan - 2009 - Eigth Ieee/Acis International Conference on Computer and Information Science 1 (1):852-857.
    A common characteristic of all popular multi-path routing algorithms in Mobile Ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end to end delay increment. In fact, due to medium access mechanism in wireless networks, such as CSMA/CA, data transmissions even through two Node Disjoint paths are not completely independent and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Design and Control of Steam Flow in Cement Production Process using Neural Network Based Controllers.Mustefa Jibril - 2020 - Researcher 12 (5):76-84.
    In this paper a NARMA L2, model reference and neural network predictive controller is utilized in order to control the output flow rate of the steam in furnace by controlling the steam flow valve. The steam flow control system is basically a feedback control system which is mostly used in cement production industries. The design of the system with the proposed controllers is done with Matlab/Simulink toolbox. The system is designed for the actual steam flow output to track the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  40
    Towards Inclusive Societies: Leveraging IoT for Community Development and Education.Sudip Suklabaidya - 2024 - Novel Insights 1 (1):40-51.
    The proliferation of Internet of Things (IoT) technologies presents a promising avenue for fostering inclusive societies through community development and education initiatives. This paper explores the potential of leveraging IoT to address societal inequalities and empower marginalized communities. Through a multidisciplinary lens, the paper examines the intersection of IoT, community development, and education, elucidating how IoT-enabled solutions can contribute to building more resilient, connected, and equitable societies. By harnessing IoT devices, sensor networks, and data analytics, community development efforts can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Designing the Health-related Internet of Things: Ethical Principles and Guidelines.Brent Mittelstadt - 2017 - Information 8 (3):77.
    The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT) increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  21. Smart Walking System based on Artificial Intelligence.Vanita Babanne, Simranjeet Kaur, Tejal Mehta, Divya Mulay & Rachana Nagarkar - 2018 - International Journal of Research in Engineering, Science and Management 1 (12).
    This paper shows the smart walking stick based on ultrasonic sensors and Arduino for outwardly debilitated individuals. There are roughly 37 million individuals over the globe who are visually impaired as indicated by the World Health Organization. Individuals with visual inabilities are regularly subjected to outer help which can be given by people, trained dogs, or electronic gadgets as supportive networks for basic assistance. Thus, this played as the motivation to develop a smart cane white stick to survive these (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. (1 other version) FIRE MANAGEMENT SYSTEM FOR INDUTRIAL SAFETY APPLICATIONS.M. Arul Selvan - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):247-259.
    The proposed model in this paper employs different integrated detectors, such as heat, smoke, and flame. The signals from those detectors go through the system algorithm to check the fire's potentiality and then broadcast the predicted result to various parties using GSM modem associated with the GSM network system. The system uses various sensors to detect fire, smoke, and gas, then transmits the message using GSM module. After the message, send by the module the help arrives in 15 (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. The Qualitative Role of Big data and Internet of Things for Future Generation-A Review.M. Arun Kumar & A. Manoj Prabaharan - 2021 - Turkish Online Journal of Qualitative Inquiry (TOJQI) 12 (3):4185-4199.
    The Internet of Things (IoT) wireless LAN in healthcare has moved away from traditional methods that include hospital visits and continuous monitoring. The Internet of Things allows the use of certain means, including the detection, processing and transmission of physical and biomedical parameters. With powerful algorithms and intelligent systems, it will be available to provide unprecedented levels of critical data for real-time life that are collected and analyzed to guide people in research, management and emergency care. This chapter provides (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Computational entrepreneurship: from economic complexities to interdisciplinary research.Quan-Hoang Vuong - 2019 - Problems and Perspectives in Management 17 (1):117-129.
    The development of technology is unbelievably rapid. From limited local networks to high speed Internet, from crude computing machines to powerful semi-conductors, the world had changed drastically compared to just a few decades ago. In the constantly renewing process of adapting to such an unnaturally high-entropy setting, innovations as well as entirely new concepts, were often born. In the business world, one such phenomenon was the creation of a new type of entrepreneurship. This paper proposes a new academic discipline of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  25. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset size, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  74
    IMPROVING ENERGY EFFICIENCY IN MANETS BY MULTI-PATH ROUTING.Nastooh Taheri Javan - 2013 - International Journal of Wireless and Mobile Networks 5 (1):163-176.
    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions among neighboring nodes, in order to obtain the joint channel in adjacent paths. The represented algorithm in this study tries to discover the distinct paths between source and destination nodes with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Classification of Smart Home Applications’ Requirements for the MAC Layer.Yasmeen Altujjar & Hala Mokhtar - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (5):13-21.
    Abstract—Smart homes and Wireless Home Automation Networks (WHAN) face several challenges in terms of cost, scalability, reliability, delay, energy consumption and many others. Smart homes typically have huge number of communicating devices. Efficient management of network resources is a major challenge in such environments. This paper provides insights on how to improve the MAC layer in smart home networks to fulfil the requirements of the different smart home applications. It provides a classification of the different smart home applications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Utility Curves, Mean Opinion Scores Considered Biased.David Kirsh, H. Knoche & H. De Meer - 1999 - Proceedings of the Seventh Interna- Tional Workshop on Quality of Service.
    Mechanisms for QoS provisioning in communication networks range from flow-based resource reservation schemes, providing QoS guarantees, through QoS differentiation based on reservation aggregation techniques to adaptation of applications, compensating for incomplete reservations. Scalable, aggregation-based reservations can also be combined with adaptations for a more flexible and robust overall QoS provisioning. Adaptation is particularly important in wireless networks, where reservations schemes are more difficult to realize. It is widely accepted that usability of Cellular or Mobile IP can be largely improved (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Unmanned Ground Vehicle (UGV) Navigation System using GPS.Budi Setiyono, A. Muarif Fandhi, Sumardi & Aris Triwiyatno - 2018 - International Journal of Engineering and Information Systems(IJEAIS) 2 (11):1-9.
    Abstract— Unmanned Ground Vehicle (UGV) is a mechanical device that moves on the sky and serves as a means of carrying, transporting something, or mapping the location and controlled remotely. UGV is widely used in a variety of terrain difficult to reach or dangerous for human safety, eg for the location of a natural disaster, radiation, or to defuse the bomb in the military. This research was designed and manufactured human machine interface for remote control system and displayed the UGV (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. From Biological Synapses to "Intelligent" Robots.Birgitta Dresp-Langley - 2022 - Electronics 11:1-28.
    This selective review explores biologically inspired learning as a model for intelligent robot control and sensing technology on the basis of specific examples. Hebbian synaptic learning is discussed as a functionally relevant model for machine learning and intelligence, as explained on the basis of examples from the highly plastic biological neural networks of invertebrates and vertebrates. Its potential for adaptive learning and control without supervision, the generation of functional complexity, and control architectures based on self-organization is brought forward. Learning without (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  31. Using Inexpensive Home Alarm for Computer Based Carbon Monoxide Monitoring.Abdullah Hussein Mohammed - 2012 - Asian Transactions on Engineering 2 (02):6.
    The current increase of air pollution rates and its consequences of global warming, health problems and threats to human lives necessitate the continuous search for more efficient and cost effective gas monitoring devices. Devices that is easily available and implementable worldwide. In developing countries the cost and the availability of the equipment is one of the obstacles that contribute to not having an efficient monitoring system. Hence, modifying cheap and easily available devices to work as pollution monitoring system will be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32.  68
    Cloud-Based IoT System for Outdoor Pollution Detection and Data Analysis.Prathap Jeyapandi - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):424-430.
    Air pollution is a significant environmental concern that affects human health, ecosystems, and climate change. Effective monitoring and management of outdoor air quality are crucial for mitigating its adverse effects. This paper presents an advanced approach to outdoor pollution measurement utilizing Internet of Things (IoT) technology, combined with optimization techniques to enhance system efficiency and data accuracy. The proposed framework integrates a network of IoT sensors that continuously monitor various air pollutants, such as particulate matter (PM), carbon monoxide (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33.  65
    Intelligent Driver Drowsiness Detection System Using Optimized Machine Learning Models.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-405.
    : Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  64
    Advanced Driver Drowsiness Detection Model Using Optimized Machine Learning Algorithms.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):396-402.
    Driver drowsiness is a significant factor contributing to road accidents, resulting in severe injuries and fatalities. This study presents an optimized approach for detecting driver drowsiness using machine learning techniques. The proposed system utilizes real-time data to analyze driver behavior and physiological signals to identify signs of fatigue. Various machine learning algorithms, including Support Vector Machines (SVM), Convolutional Neural Networks (CNN), and Random Forest, are explored for their efficacy in detecting drowsiness. The system incorporates an optimization technique—such as Genetic Algorithms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging internet technology. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Availability of Digital Resources and Institutional Compliance with COVID-19 Mitigation Measures in a Nigerian University: A Descriptive Study.Valentine Joseph Owan & Mercy Valentine Owan - 2022 - Electronic Journal of Medical and Educational Technologies 15 (4):Article em2208.
    The state of the availability of digital resources and institutional compliance to COVID-19 mitigation measures was evaluated by the researchers in this study. Informed by the need to answer two research questions, the study adopted the descriptive survey design. A sample of 409 participants was drawn from a population of 2,410 academic staff at the University of Calabar, leveraging the multistage sampling process. “Availability of digital resources and institutional compliance with COVID-19 mitigation measures questionnaire” was used for data collection. After (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Artificial intelligent smart home automation with secured camera management-based GSM, cloud computing and arduino.Musaddak Abdul Zahra & Laith A. Abdul-Rahaim Musaddak M. Abdul Zahra, Marwa Jaleel Mohsin - 2020 - Periodicals of Engineering and Natural Sciences 8 (4):2160-2168.
    Home management and controlling have seen a great introduction to network that enabled digital technology, especially in recent decades. For the purpose of home automation, this technique offers an exciting capability to enhance the connectivity of equipment within the home. Also, with the rapid expansion of the Internet, there are potentials that added to the remote control and monitoring of such network-enabled devices. In this paper, we had been designed and implemented a fully manageable and secure smart home (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Consensus-Based Data Management within Fog Computing For the Internet of Things.Al-Doghman Firas Qais Mohammed Saleh - 2019 - Dissertation, University of Technology Sydney
    The Internet of Things (IoT) infrastructure forms a gigantic network of interconnected and interacting devices. This infrastructure involves a new generation of service delivery models, more advanced data management and policy schemes, sophisticated data analytics tools, and effective decision making applications. IoT technology brings automation to a new level wherein nodes can communicate and make autonomous decisions in the absence of human interventions. IoT enabled solutions generate and process enormous volumes of heterogeneous data exchanged among billions of nodes. This (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge data set, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  41. Network representation and complex systems.Charles Rathkopf - 2018 - Synthese (1).
    In this article, network science is discussed from a methodological perspective, and two central theses are defended. The first is that network science exploits the very properties that make a system complex. Rather than using idealization techniques to strip those properties away, as is standard practice in other areas of science, network science brings them to the fore, and uses them to furnish new forms of explanation. The second thesis is that network representations are particularly helpful (...)
    Download  
     
    Export citation  
     
    Bookmark   34 citations  
  42. From Sensor Variables to Phenomenal Facts.W. Schwarz - 2019 - Journal of Consciousness Studies 26 (9-10):217-227.
    Some cognitive processes appear to have “phenomenal” properties that are directly revealed to the subject and not determined by physical properties. I suggest that the source of this appearance is the method by which our brain processes sensory information. The appearance is an illusion. Nonetheless, we are not mistaken when we judge that people sometimes fee lpain.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  43. Ontology-based fusion of sensor data and natural language.Erik Thomsen & Barry Smith - 2018 - Applied ontology 13 (4):295-333.
    We describe a prototype ontology-driven information system (ODIS) that exploits what we call Portion of Reality (POR) representations. The system takes both sensor data and natural language text as inputs and composes on this basis logically structured POR assertions. The goal of our prototype is to represent both natural language and sensor data within a single framework that is able to support both axiomatic reasoning and computation. In addition, the framework should be capable of discovering and representing new kinds of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  44. Impact of Wireless Electronic Medical Record System on the Quality of Patient Documentation by Emergency Field Responders during a Disaster Mass-Casualty Exercise.David Kirsh - 2011 - Prehospital and Disaster Medicine 26 (4):268-275.
    The use of wireless, electronic, medical records and communications in the prehospital and disaster field is increasing. Objective: This study examines the role of wireless, electronic, medical records and com- munications technologies on the quality of patient documentation by emergency field responders during a mass-casualty exercise.
    Download  
     
    Export citation  
     
    Bookmark  
  45. Scientific Networks on Data Landscapes: Question Difficulty, Epistemic Success, and Convergence.Patrick Grim, Daniel J. Singer, Steven Fisher, Aaron Bramson, William J. Berger, Christopher Reade, Carissa Flocken & Adam Sales - 2013 - Episteme 10 (4):441-464.
    A scientific community can be modeled as a collection of epistemic agents attempting to answer questions, in part by communicating about their hypotheses and results. We can treat the pathways of scientific communication as a network. When we do, it becomes clear that the interaction between the structure of the network and the nature of the question under investigation affects epistemic desiderata, including accuracy and speed to community consensus. Here we build on previous work, both our own and (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  46.  70
    Nanochemical electrochemical sensors and a method called as say sandwich component Three.Afshin Rashid - 2024 - Authorea 7.
    The antenna is considered as the primary means of absorbing electromagnetic waves in space and has its own engineering knowledge, which is very developed and extensive. In general, in order to receive the electromagnetic wave in space, the dimensions of the antenna must be in the order of the size of the input wavelength to its surface. Due to the very low dimensions of nano-sensors, nano-antennas need a very high operating frequency to be usable. The use of graphene greatly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47.  42
    Digital Authentication for Wireless Domain Using Variable Marking of Multiple Secret Signatures and its Practical Implication in E-Stamp Authentication.Mohit Gangwar - 2024 - International Journal of Intelligent Systems and Applications in Engineering 12 (2):29-41.
    This work focuses on enhancing security for transmitted e-documents, such as e-stamp papers, within wireless environments through dynamic authentication using variable circular concealment of multiple invisible signature images. This method is driven by encrypted secret keys and session-based random numbers, alongside a region-specific bit casting strategy and dynamic bit sequencing for multiple signatures to bolster security and robustness. Multi-copy signature marking on non-overlapping document areas, coupled with varied bit encoding strategies for each modified pixel byte coefficient in cover image (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. Hierarchies, Networks, and Causality: The Applied Evolutionary Epistemological Approach.Nathalie Gontier - 2021 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 52 (2):313-334.
    Applied Evolutionary Epistemology is a scientific-philosophical theory that defines evolution as the set of phenomena whereby units evolve at levels of ontological hierarchies by mechanisms and processes. This theory also provides a methodology to study evolution, namely, studying evolution involves identifying the units that evolve, the levels at which they evolve, and the mechanisms and processes whereby they evolve. Identifying units and levels of evolution in turn requires the development of ontological hierarchy theories, and examining mechanisms and processes necessitates theorizing (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  49. Neural Network-Based Water Quality Prediction.Mohammed Ashraf Al-Madhoun & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (9):25-31.
    Water quality assessment is critical for environmental sustainability and public health. This research employs neural networks to predict water quality, utilizing a dataset of 21 diverse features, including metals, chemicals, and biological indicators. With 8000 samples, our neural network model, consisting of four layers, achieved an impressive 94.22% accuracy with an average error of 0.031. Feature importance analysis revealed arsenic, perchlorate, cadmium, and others as pivotal factors in water quality prediction. This study offers a valuable contribution to enhancing water (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  50. Learning Networks and Connective Knowledge.Stephen Downes - 2010 - In Harrison Hao Yang & Steve Chi-Yin Yuen (eds.), Collective Intelligence and E-Learning 2.0: Implications of Web-Based Communities and Networking. IGI Global.
    The purpose of this chapter is to outline some of the thinking behind new e-learning technology, including e-portfolios and personal learning environments. Part of this thinking is centered around the theory of connectivism, which asserts that knowledge - and therefore the learning of knowledge - is distributive, that is, not located in any given place (and therefore not 'transferred' or 'transacted' per se) but rather consists of the network of connections formed from experience and interactions with a knowing community. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 965