Food Order in Train application is to develop a system that offers new services online. Food Order in Train is an android application which is designed to order the food online via mobile application while traveling through a train.
While people travel the long distance through a train, the main problem they face is food. To overcome such problem...
|
Customers are the essential factor in the organization. The business has to support the customers' preferences and demands for creating the customer loyalty, which make the customer still purchases with the particular company.
The customer may feel dissatisfied with the service when he or she receives the delay of services and they do not know th...
|
Project Scheduling is important since it plays an effective role in project success. To organize and complete your projects in a timely, quality and financially responsible manner, you need to schedule projects carefully. Effective project scheduling plays a crucial role in ensuring project success.
Scheduling is used to keep projects on track, s...
|
Online Complaint Management System provides an online way of solving the problems faced by the public by saving time and eradicate corruption.
The objective of the complaints management system is to make complaints easier to coordinate, monitor, track and resolve, and to provide company with an effective tool to identify and target problem areas,...
|
We have developed an application that will give the patient emergency medical attention because ,in India, deaths occur every second of the day. This project's primary goal is to close the time gap between the patient's request and the ambulance's arrival.
An essential component of emergency medical care is ambulances. Patients typically only hav...
|
Investment in India is a business-based idea. I will be in my project giving investors with a platform and connecting people with strong business concepts.
This will change how much you can invest and where the money can be invested. Good investment returns. Good investment returns. Here are two forms - one for investors and one for business pers...
|
Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. The rapid increase in the use of online platforms for job posting has resulted in fraudulent advertising. The scammers are making money through fraudulent job postings.
Online recruitment fraud has emerged as an important is...
|
Dynamic Searchable Symmetric Encryption (DSSE) is a prospective technique in the field of cloud storage for secure search over encrypted data. A DSSE client can issue update queries to an honest-but-curious server for adding or deleting his ciphertexts to or from the server and delegate keyword search over those ciphertexts to the server.
Numerou...
|
Vehicular edge computing (VEC) has emerged as a solution that places computing resources at the edge of the network to address resource management, service continuity, and scalability issues in dynamic vehicular environments. However, VEC faces challenges such as task offloading, varying communication conditions, and data security.
To tackle thes...
|
Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform. Internet-of-Things (IoT) incorporates power systems, particularly smart grid features and the delivery of new services from the utility side to the end user over a two-way communication channel.
...
|
Blockchain interoperability has become an essential requirement for the advancement of blockchain technology in numerous fields. Enterprise organizations are increasingly utilizing permissioned blockchains to manage and store their organizations’ data and transactions in a private immutable ledger.
Interoperability enables permissioned blockchain...
|
Background: This problem requires an innovative approach to enhance the efficiency and transparency of faculty self-appraisal in the university settings. Through a robust web-based platform, the system should address the complexities associated with traditional evaluation processes. It should capture and manages intricate details of faculty activit...
|
Learn while you play is considered the most effecting way of teaching. Internet/mobile based games could be one of the best ways to lure school kids, youth and water enthusiasts to learn the nuances of ground water management.
With this backdrop it is proposed to develop an internet/mobile based game that teaches good practices in groundwater con...
|
Background: Education and awareness are critical components of the National Anti-Doping Agency’s mission to promote clean sport. Despite ongoing efforts, the reach and impact of current educational initiatives remain limited, particularly in remote and rural areas. The rapid advancement of technology presents an opportunity to bridge these gaps and...
|
Background: Student dropout rates in India are influenced by socio-economic and educational factors, affecting marginalized communities the most. Addressing dropout rates is essential for equitable education and socio-economic development. The National Education Policy (NEP) 2020 emphasizes the importance of reducing dropout rates and ensuring qual...
|
Background: India has a tremendous opportunity to harness the potential of its youth by addressing the skills gap between education and industry requirements. While vocational education programs exist, they are often undervalued compared to traditional academic paths and need enhancement to provide students with the skills demanded by today’s job m...
|
Project Concept: Enhanced Education System for specially abled Background: Interpersonal skills are learned and mastered by children when they interact with the world, but for children with Autism Spectrum Disorder (ASD) and Intellectual Disabilities (ID) this is where the challenges lie.
As traditional classroom settings cannot cater to their un...
|
Background: “Inclusivity” is the motto of Education department, Government of Gujarat. Opportunity for all is the new slogan and The Indian Government has come up with Indian Sign Language. There has been lot of work in done in American sign language and focusing on interpretation in English.
Majority schools in India adopt local language. In Guj...
|
Problem Overview Innovation is a key driver of growth and success in educational institutions. Tracking and measuring innovation excellence is essential for fostering a culture of continuous improvement, recognizing achievements, and guiding strategic decisions. However, identifying, quantifying, and presenting innovation indicators can be challeng...
|
Background: There are numerous engineering and polytechnic institutes in Rajasthan running under the Department of Technical Education, Government of Rajasthan. Notably, during the admission process, there is a significant increase in enquiries from various groups, including students, their parents, and other stakeholders.
These enquiries cover a...
|
Background: The use of Earth Observation Satellite (EOS) technology for estimation of seasonal Actual Evapotranspiration (AET) of crops at various growth stages is well establishd. Due to low levels of water metering in irrigation, it is challenging to control theft from canals and unauthorized ground water extractions.
Therefore, ET based techno...
|
Cyberbullying is when someone is bullied using technology as an intermediary. Despite the fact that it has been a problem for many years, the impact on young people has just recently become more widely recognized.
Bullies thrive on social media platforms, and teens and children who use them are vulnerable to attacks. A copious amount of usergener...
|
Background: As per the census 2011, Disability is more common in elderly people. One of the major reasons for disability among the elderly people is falls. Every year, one-third of community-dwelling older adults (adults aged 65 and older) experience a fall.
Falls, defined as “unexpected event[s] in which the participant comes to rest on the grou...
|
Background: The rehabilitation institutes involved in this activity face high therapy cases load and more number of student therapists with less number of therapy supervisors. Following this system in manual mode impedes providing prompt services.
Description: Clinical services with respect to speech language therapy begins with patient allocatio...
|
Background: Disaster response agencies often stuggle to gather timely and specific information about emergencies from various sources. Social media platforms serve as a valuable repository of such data, but manually monitoring and sorting through the vast amount of information is inefficient and resource-intensive.
Description: There is a pressin...
|
Technological solution as per queuing models in OPDs/availability of beds/admission of patients would be one area. Study of dispensation of various types of medicines/consumables and Inventory management modules at hospital level are key areas requiring support.
NIC has already developed some modules but their implementation in Delhi is yet to be...
|
Hospitals/Departments shall be able to enter and Update Data in the Mobile Application which can be viewed by the Super Admin dynamically for efficient Implementation of Health and Family Welfare Schemes, other Health programmes and provide key inputs for policy formulation and appropriate programme interventions.
This Mobile Application will fac...
|
Background: Glacial Lake Outburst Floods (GLOFs) occur when the dam containing a glacial lake fails, releasing large volumes of water suddenly and causing catastrophic downstream flooding. Climate change is increasing the number and size of glacial lakes, heightening the risk of GLOFs. Curent monitoring and prediction methods can be improved with a...
|
Background: The transportation of temperature-sensitive goods is a critical aspect of supply chain management. Medicines, vaccines, and certain FMCG products require strict temperature control to maintain their efficacy and safety.
Description: Exposure to high temperatures can compromise these products, leading to potential health risks and fina...
|
Background: As per the census 2011, Disability is more common in elderly people. One of the major reasons for disability among the elderly people is falls. Every year, one-third of community-dwelling older adults (adults aged 65 and older) experience a fall.
Falls, defined as “unexpected event[s] in which the participant comes to rest on the grou...
|
Background: Farmers often face challenges in accessing markets, leading to lower income due to middlemen. This gap restricts their ability to sell produce at fair prices. Description: Create a mobile application that connects farmers directly with consumers and retailers.
The app should include features for listing produce, negotiating prices, an...
|
Background: Use of encrypted messaging/social media apps like Telegram, WhatsApp and Instagram for drug trafficking are on the rise. Channels operating on Telegram and WhatsApp and Instagram handles are blatantly being misused by drug traffickers for offering various narcotic drugs and Psychotropic substances for sale. Description: WhatsApp and Tel...
|
Background: Many organization are using Cloud for hosting their web applications. The attackers can try to attack these webservers for achieving Denial of Service attack. Specifically, Distributed Denial-of-Service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network of Cloud infrastructure by ...
|
The recent technological advancement in digital computers has provided a more robust computer based operations in modern industrial society, including manufacturing, transport and distribution, government, the military, health services, education and research.
This impact of modern digital computers as an irreplaceable tool for technological grow...
|
Over the years students use manual ways to raise funds to support their election ambitions, help pay less privileged students school dues, sick friends and many other challenges which they face in the school.
To overcome the problems of manual fund raising, the researcher has developed “an Online Campus Fund Raiser System”.
The system which wil...
|
Computerized lecture reminder is a tool that permites academic students and lectures to know like due dates and locations.
Lecture reminder has turned to be a very important tool in the time management and it is a common saying in the time management that it is better to keep track of things using a system rather than your memory.
A computerized...
|
this project is to design a Web-based distance learning system, where instructors and students can participate fully in distance learning activities while geographically separated from each other.
This project is aimed to design and implement a distance learning system and use internet as the delivery mode. This report discusses in detail backgr...
|
This paper presents the design and implementation of an energy management system (EMS) with fuzzy control for a dc microgrid system. Modeling, analysis, and control of distributed and energy storage devices with MATLAB/Simulink are proposed.
To improve the life cycle of the battery, fuzzy control manages the desired state of charge. A fuzzy netwo...
|
The approximate computing paradigm emerged as a key alternative for trading off accuracy and energy efficiency. Error-tolerant applications, such as multimedia and signal processing, can process the information with lower-than-standard accuracy at the circuit level while still fulfilling a good and acceptable service quality at the application leve...
|
The target of this project "HOSPITAL MANAGEMENT SYSTEM" is to digitise the hospital's front office management and produce software that is user-friendly, fast, and cost-effective. It is related with the gathering of patient information, patient tests, and so on.
Before, it was done by hand. The system's principal job is to register and maintain...
|
The main purpose of this project is to build a face recognition-based attendance monitoring system for educational institution to enhance and upgrade the current attendance system into more efficient and effective as compared to before.
The current old system has a lot of ambiguity that caused inaccurate and inefficient of attendance taking. Ma...
|
In recent years, due to the booming development of online social networks, fake news for various commercial and political purposes has been appearing in large numbers and widespread in the online world.
With deceptive words, online social network users can get infected by these online fake news easily, which has brought about tremendous effects...
|
Fake news, deceptive information, and conspiracy theories are part of our everyday life. It is really hard to distinguish between false and valid information.
As contemporary people receive the majority of information from electronic publications, in many cases fake information can seriously harm people’s health or economic status.
This article...
|
About 33,000 people die because the ambulance cannot reach them in time. It is not necessary that when you call an ambulance, the nearest ambulance will reach you.
The paper describe a model to track the nearest free ambulance in the area using global positioning system and bring it to the person in distress.
The GPS device continuously mov...
|
Fingerprint authentication is one of the most popular and accurate technology. Our project is a fingerprint attendance system that records the attendance of students based on their fingerprint matches them against the database to mark their attendance.
Fingerprint-based attendance system used for ensures that there is a minimal fault in gatheri...
|
Internet-of-Things (IoT) devices have a strict necessity for power consumption to achieve the expected battery life. Therefore, measuring and optimizing the energy consumption of IoT nodes are essential.
IoT nodes feature extreme current consumption range over 100 dB between their operating modes. The main focus of this article is to design and...
|
Brain Computer Interface (BCI) sometimes called Brain-Machine Interface (BMI). It is a direct communication pathway between the Brain’s Electrical Activity and external device. Computer based system that acquires brainsignals, analyzes the man dtranslatesthemintocommandsthatarerelayed to an output device to carry out into desired action.
We can...
|
The need for efficient fire detection systems is highlighted by the substantial threats that forest fires pose to both human lives and the ecosystem. Limited coverage, high false alarm rates, and delays in signal transmission are just a few of the problems traditional methods for detecting forest fires sometimes encounter.
This research stu...
|
Information security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users. Information Security can be achieved by using cryptographic techniques. It is now very much demanding to develop a system to ensure better long lasting security services for message transaction over the Intern...
|
Emojis are used in Computer Mediated Communication (CMC) as a way to express paralinguistics otherwise missing from text, such as facial expressions or gestures. However, finding an emoji on the ever expanding emoji list is a linear search problem and most users end up using a small subset of emojis that are near the top of the emoji list. Current ...
|
This study aimed to develop accurate and explainable machine learning models for three psychomotor behaviors of delirium for hospitalized adult patients.A prospective pilot study was conducted with 33 participants admitted to a long-term care facility between August 10 and 25, 2020. During the pilot study, we collected 560 cases that included 33 cl...
|
Quantum computing is envisaged as an evolving paradigm for solving computationally complex optimization problems with a large-number factorization and exhaustive search.Recently, there has been a proliferating growth of the size of multi-dimensional datasets, the input-output space dimensionality, and data structures. Hence, the conventional machin...
|
With the rapid development of vehicular networks, vehicle-to-everything (V2X) communications have huge number of tasks to be calculated, which brings challenges to the scarce network resources. Cloud servers can alleviate the terrible situation regarding the lack of computing abilities of vehicular user equipment (VUE), but the limited resources, t...
|
The fault occurred in transmission line is very much dangerous for the locality. In HV and EHV transmission line there are less fault occurrence but in locality the fault occurrence is more as compared to outer transmission line. In our prototype we design a model which is to be detect the fault in transmission line by comparing the voltage signal ...
|
In modern world, the IoT is at its peak. The world is becoming smarter, the home automation is emerging. Smart Door control system is a latest technology in home automation. The main purpose of smart Door technology is to provide a complete security to the door, ease and comfort for users. The aim of this paper is to enlarge the door automation tec...
|
One of the main important resources for higher education is a Learning Management System (LMS), which has shown an enhancement of students’ progress with high quality learning outcomes worldwide. Many e-learning tools exist, each one has its own weaknesses and strongest points to the online learning process. This number increases continuously, and ...
|
In three level graphical, text and color file security system the authentication is done by image representation password. Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce co...
|
In this paper, we propose a system that takes the attendance of students for classroom lecture. Our system takes the attendance automatically using face recognition. However, it is difficult to estimate the attendance precisely using each result of face recognition independently because the face detection rate is not sufficiently high. In this pape...
|
Environmental monitoring is must for all industries as its conditions majorly affect our prosperity, solace and efficiency. Because it is such an essential aspect that have an immense effect on health of operating personnel & other parameters like fire, smoke, dust and intruder detection along with weather forecasting in industries. But the systems...
|
Existing liquefied petroleum gas (LPG) detection systems are ad hoc and designed as stand-alone nodes. This article, however, presents an integrated end-to-end wireless sensor network (WSN) system that integrates hardware and software for early warning gas leakage detection and monitoring applications, fully utilizing the Internet of Things (IoT) f...
|
There are many countries enforcing a regulation that requires the bike rider to wear a helmet when riding on their bike. With this reason, this project is specially developed as to improve the safety of the bike rider. The impact when bike involves in a high speed accident without wearing a helmet is very dangerous and can cause fatality. Wearing a...
|
A new method is discussed to enhance the security of communications over Internet. The method is based on utilization of electronic graphic images being sent as part of messages that require secure communication and certification. At the core of the proposed method are Electronic Virtual Stamps implemented as familiar and easily recognizable electr...
|
Stress is one of the factors that affect human health in many aspects. It is considered as one of the culprits in increasing the risk of getting sick that could probably lead to critical physical or mental illnesses. Stress can be experienced everywhere and in different circumstances. Hence, stress should be controlled and managed by monitoring its...
|
In today's technical era, every startup or a company attempt to establish a better sort of communication between their Plants and the users, and for that purpose, they require a type of mechanism which can promote their plant effectively, and here the recommender system serves this motive. It is basically a filtering system that tries to predict an...
|
Medical Surveillance Solutions are the most important in the brief developing country populace enhances demands for caretaking. Covid-19 is as a substitute contagious it is very important to quarantine covid-19 humans but at the equal time medical examiners need to check fitness of covid-19 sufferers moreover. With the boosting kind of instances it...
|
Identity-based remote data auditing schemes can verify data integrity and provide a simple identity authentication and management for multiple users. However, prior works on identity-based remote data auditing lack the support of dynamic operations. In these schemes, tag generation is linked to the index of data block, which is related to update op...
|
Over the past decades, fire cannot be prevented in our homes and society. Hence, the author came up with an idea to create a robot that will serve as first responder to fire and hazardous chemicals. Problems were identified and objectives were formulated as guides in the establishment “Automated Hazardous Gas Detecting Robot using Wireless Sens...
|
The city’s district attraction ranking plays an essential role in the city’s government because it can be used to reveal the city’s district attraction and thus help government make decisions for urban planning in terms of the smart city. The traditional methods for urban planning mainly rely on the district’s GDP, employment rate, population densi...
|
Typical approaches to visual vehicle tracking across large area require several cameras and complex algorithms to detect, identify and track the vehicle route. Due to memory requirements, computational complexity and hardware constrains, the video images are transmitted to a dedicated workstation equipped with powerful graphic processing units. How...
|
This article deals with multimedia data, which combines basic functions with high quality graphics, sound, video and animation and definitions of multimedia. Also deals with multimedia characteristics, network technology – Ethernet, Provisioning and ATM, bandwidth needs and multimedia networking along with data transfers protocols. Right issues for...
|
In present industry, communication is the key element to progress. Passing on information, to the right person, and in the right manner is very important, not just on a corporate level, but also on a personal level. The world is moving towards digitization, so are the means of communication. Phone calls, emails, text messages etc. have become an in...
|
Recently, automatic vehicle location (AVL) has become more widely used, affordable and popular than ever before. AVL is used for different tracking purposes, especially for those related to tracking one vehicle or a fleet of vehicles. Tracking system technology was made possible by the integration of three new technologies: navigational technologie...
|
Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere an...
|
Changes in consumer preference for safe food have led to innovations in packaging technologies. This article reviews about different smart packaging systems and their applications in food packaging, packaging research with latest innovations. Active and intelligent packing are such packaging technologies which offer to deliver safer and quality pro...
|
The building permission process is to a large extent an analogue process where much information is handled in paper format or as pdf files. With the ongoing digitalisation in society, there is a potential to automate this process by integrating Building Information Models (BIM) of planned buildings and geospatial data to check if a building conform...
|
Computer as a medium for language learning has been acknowledged by many educators in the past years. Using computers for language learning has proved not only interesting but also positive and stimulating for many language teachers and learners. The present paper tries to show the impact/s of computers in the field of second and foreign langua...
|
Information security is a vital aspect of Intelligent Transportation Systems (ITS) involving public data collection. Road images captured for use as a basis of traffic manipulation in ITS should take all precautions for encrypting the wirelessly transferred image. This paper presents an Enhanced Cipher Block Chaining (ECBC) operation mode to ensu...
|
The term Web 2.0 describes web-based applications such as social networking sites, wikis, and blogs that facilitate collaboration, creativity, and sharing among users. Web 2.0 applications are often enabled by reusing content from other web-based applications or web services. This trend is largely parallel to the principles of service-oriented arch...
|
Rapid growth of the urban population leading to housing shortages and poor urban living conditions is a prime challenge for the government of India. Recently launched affordable housing scheme, Pradhan Mantri Awas Yojana (PMAY) -Housing for All (Urban) is drawing attention of the researchers in critically analysing the programme. The focus of this ...
|
Coal mining has always been a necessary evil. We need the coal for various operations, especially electrical power generation. However mining the coal has proven to be very dangerous and has caused many accidental deaths over the years. Keeping this in mind we have designed an intelligent system which can be used on helmets of these underground coa...
|
About 33,000 people die because the ambulance cannot reach them in time. It is not necessary that when you call an ambulance, the nearest ambulance will reach you. The paper describe a model to track the nearest free ambulance in the area using global positioning system and bring it to the person in distress. The GPS device continuously moves with ...
|
A poly-phase based interpolation filter computation involves an input-matrix and coefficient-matrix of size (P×M) each, where P is the up-sampling factor and M=N/P, N is the filter length. The input-matrix and the coefficient-matrix resizes when P changes. An analysis of interpolation filter computation for different up-sampling factors is made in ...
|
The reliability of NAND Flash memory deteriorates due to multi-level cell technique and advanced manufacturing technology. To deal with more errors, LDPC codes show superior performance to conventional BCH codes as ECC of NAND Flash memory systems. However, LDPC codec for NAND Flash memory systems faces problems of high redesign effort, high on-chi...
|
Behavior of adiabatic logic circuits in weak inversion or subthreshold regime is analyzed in depth for the first time in the literature to make great improvement in ultralowpower circuit design. This novel approach is efficacious in low-speed operations where power consumption and longevity are the pivotal concerns instead of performance. The schem...
|
This paper introduces a novel low-complexity multiple-input multiple-output (MIMO) detector tailored for single-carrier frequency division-multiple access (SC-FDMA) systems, suitable for efficient hardware implementations. The proposed detector starts with an initial estimate of the transmitted signal based on a minimum mean square error (MMSE) det...
|
This paper proposes a low-power and area-efficient shift register using pulsed latches. The area and power consumption are reduced by replacing flip-flops with pulsed latches. This method solves the timing problem between pulsed latches through the use of multiple non-overlap delayed pulsed clock signals instead of the conventional single pulsed cl...
|
The dedicated short-range communication (DSRC) is an emerging technique to push the intelligent transportation system into our daily life. The DSRC standards generally adopt FM0 and Manchester codes to reach dcbalance, enhancing the signal reliability. Nevertheless, the coding-diversity between the FM0 and Manchester codes seriously limits the pote...
|
Iterative methods are basic building blocks of communication systems and often represent a dominating part of the system, and therefore, they necessitate careful design and implementation for optimal performance. In this brief, we propose a novel field programmable gate arrays design of matrix–vector multiplier that can be used to efficiently imple...
|
Iterative methods are basic building blocks of communication systems and often represent a dominating part of the system, and therefore, they necessitate careful design and implementation for optimal performance. In this brief, we propose a novel field programmable gate arrays design of matrix–vector multiplier that can be used to efficiently imple...
|
Protection and authentication of digital multimedia content during transmission has become very important with the ongoing development in communication and networking field. Aiming at this popular research topic of recent time, this paper presents a comparative analysis of different watermarking techniques performed in MATLAB. It also presents a ro...
|
As the circuit complexity increases, the number of internal nodes increases proportionally, and individual internal nodes are less accessible due to the limited number of available I/O pins. To address the problem, we proposed power line communications (PLCs) at the IC level, specifically the dual use of power pins and power distribution networks f...
|
This paper presents a fixed-point reconfigurable parallel VLSI hardware architecture for real-time Electrical Capacitance Tomography (ECT). It is modular and consists of a front-end module which performs precise capacitance measurements in a time multiplexed manner using Capacitance to Digital Converter (CDC) technique. Another FPGA module performs...
|
Ultralow-power subthreshold logic circuits are becoming prominent in embedded applications with limited energy budgets. Minimum energy consumption of digital logic circuits can be obtained by operating in the subthreshold regime. However, in this regime process variations can result in up to an order of magnitude variations in ION/IOFF ratios leadi...
|
In this brief, we propose a low-complexity methodology to compute a complex square root using only a circular coordinate rotation digital computer (CORDIC) as opposed to the state-of-the-art techniques that need both circular as well as hyperbolic CORDICs. Subsequently, an architecture has been designed based on the proposed methodology and impleme...
|
One bit full adder cell is one of the most frequently used digital circuit component in arithmetic logic unit (ALU) and it is the essential functional unit of all computational circuit. Till now lots of improvement has been done in this area to refine the architecture and performance of full adder circuit design. In this paper two designs of novel ...
|
Parallel matrix processing is a typical operation in many systems, and in particular matrix–vector multiplication (MVM) is one of the most common operations in the modern digital signal processing and digital communication systems. This paper proposes a faulttolerant design for integer parallel MVMs. The scheme combines ideas from error correction ...
|
This paper proposes an all-digital phase-locked loop (ADPLL) used as the phase-shift keying (PSK) receiver for very high bit rate (VHBR) of 13.56 MHz smartcards. A detailed implementation from system to circuit level is presented. This ADPLL-based PSK demodulator mainly consists of a high dynamic range time to digital converter (TDC) without pulse ...
|
Reversible logic is a computing paradigm that has attracted significant attention in recent years due to its properties that lead to ultra-low power and reliable circuits. Reversible circuits are fundamental, for example, for quantum computing. Since addition is a fundamental operation, designing efficient adders is a cornerstone in the research of...
|
This paper presents two new line-coding schemes, integrated pulse width modulation (iPWM) and consecutive digit chopping (CDC) for equalizing lossy wireline channels with the aim of achieving energy efficient wireline communication. The proposed technology friendly encoding schemes are able to overcome the fundamental limitations imposed by Manches...
|
Due to limited frequency resources, new services are being applied to the existing frequencies, and service providers are allocating some of the existing frequencies for newly enhanced mobile communications. Because of this frequency environment, repeater and base station systems for mobile communications are becoming more complicated, and frequenc...
|
In this paper, a double-error-correcting and tripleerror-detecting (DEC-TED) Bose–Chaudhuri–Hocquenghem (BCH) code decoder with high decoding efficiency and low power for error correction in emerging memories is presented. To increase the decoding efficiency, we propose an adaptive error correction technique for the DEC-TED BCH code that detects th...
|
Stress is one of the factors that affect human health in many aspects. It is considered as one of the culprits in increasing the risk of getting sick that could probably lead to critical physical or mental illnesses. Stress can be experienced everywhere and in different circumstances. Hence, stress should be controlled and managed by monitoring its...
|
Electrical energy is very important for everyday life and a spine for day today’s life. Power is the basic necessity for the economic development of a country. That power should be handled in an efficient manner to meet the power requirement. Detecting and locating theft in the power line is very necessary task for the healthy operation and mainten...
|
Privacy-preserving distributed data fusion is a pretreatment process in data mining involving security models. In this paper, we present a method of implementing multiparty data fusion, wherein redundant attributes of a same set of individuals are stored by multiple parties. In particular, the merged data does not suffer from background attacks or ...
|
Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...
|
With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...
|
Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critica...
|
In the most of the developing countries, the effort of collecting electricity utility meter reading and detecting illegal usage of electricity is a very difficult and time consuming task which requires a lot of human resources. Energy meter reading and monitoring system using Internet of Things (IoT) present an efficient and cost-effective way to t...
|
Network embedding assigns nodes in a network to low dimensional representations and effectively preserves the network structure. Recently, a significant amount of progresses have been made toward this emerging network analysis paradigm. In this survey, we focus on categorizing and then reviewing the current development on network embedding methods,...
|
A detailed accumulation of the methods of wireless power transfer (WPT) including short range as well as mid range transmission . The technology and the science behind WPT and the future scope is discussed in detail. While a lot of research has been done on this topic in the previous decade, a large part of it is yet to be explored. The topics furt...
|
With population growth, the demand for vehicles has increased tremendously, which has created an alarming situation in terms of traffic hazards and road accidents. The road accidents percentage is growing exponentially and so are the fatalities caused due to accidents. However, the primary cause of the increased rate of fatalities is due to the del...
|
With the rapid development of wireless communication technology, people's life has undergone great changes. In recent years, the comfort and safety of the building environment have become a universal concern. However, building fire is the greatest threat to building safety. In consideration of the current issues on building security, the design app...
|
This paper aims at realization of the Automated Teller Machine network all around the globe using IPv6, thereby reducing the complexity and total number of transactions involved in the entire process of cash withdrawal. But the major challenge involved in connecting ATM network to public domain is the security. A Near-Field Communication (NFC) is p...
|
Active safety is an important feature of a modern vehicle to provide precaution warning or compensatory control before the pre-crash stage of vehicle safety. All vehicle signals and information are acquired by several in-vehicle sensors on ECUs or surrounding vehicles, and integrated in vehicle gateway throu...
|
The proposed work is focused on automatic speed control of vehicles by detecting the accident prone zone. In this work we are using RF for indicating the speed limit areas. The RF receiver is placed inside the vehicle. The speed is calculated by the help of vehicle speedometer in the vehicle. The controller compares the speed with standard speed li...
|
The application of embedded web technology in the remote monitoring system has given rise to the technological change in the field of industrial control. Nowadays the management of the domestic laboratories in the research institute and universities has issues of poor real time, high cost and low precision. This paper comes up...
|
The Internet of Things is a network of physical objects embedded with electronics, software, sensors and network connectivity that enable these objects to collect and exchange data. Currently, when an accident occurs, either the victim or the witness has to inform the local law enforcement and call the ambulance for help. This manua...
|
Security is a too much important thing to be concerned in our day-to-day life. Everyone wants to be secured as much as possible. Knowing our home or shop is secure provides us peace of mind. We know now a day’s theft has become a major issue. In this paper we design an advanced electronic security system by using small PIR and IR sensors...
|
The main objective is to design a monitoring system for storage atmosphere. Controlled storage atmosphere means constant monitoring of storage environment and adjust accordingly to maintain the atmospheric parameter such as temperature, relative humidity etc. Several actuators are used for controlling the above parameters. The design and implementa...
|
This paper presents the extensions added to the measurement and monitoring tool TestelDroid, to support remote control and instrumentation of Android devices. The extensions include support for Standard Commands for Programmable Instruments (SCPI), cOntrol and Management Framework (OMF) and OMF Measurement Library (OML). SCPI is the most widespread...
|
Microgrids are emerging as an important constituent of large-scale smart grids. They are equipped with the controls necessary for managing the operation in islanded or grid connected mode and serve the loads with clean, reliable, and uninterruptible power. Microgrid must be equipped with a robust grid synchronization (GS) algorithm so as to allow a...
|
This paper presents a proposal for integration of Android into vehicle infotainment systems. The proposed system offers infotainment functionality, while enabling users to use the device as a regular Android device. The proposal includes a specification of a Java API that should be used to access in-vehicle related content from Android applications...
|
In recent years, EEG brainwave-reading device is used more and more in various academic fields and real life. Analyzing brainwave from drivers, we divide the brainwave data into light fatigue, medium fatigue and severe fatigue. Once the driver's Low-a <;0.7, High-a <;0.5, ?>0.5, or attention and meditation less than 40 degrees, then the system is d...
|
The increasing importance in ubiquitous computing and context-dependent information has led in the last years to a growing interest in location-based applications and services. A considerable market demand concentrates on indoor localization tasks. In this setting, WiFi fingerprinting is currently one of the most popular and widespread techniques a...
|
This paper deals with a novel sensor network system designed for gathering disaster information including physical environmental information and potential signals of survivers. The system consists of numerous sensor probes and a central database server. The sensor probes organize their own ZigBee network, which is managed by the central database se...
|
Health monitoring systems have rapidly evolved recently, and smart systems have been proposed to monitor patient current health conditions, in our proposed and implemented system, we focus on monitoring the patient’s blood pressure, and his body temperature. Based on last decade statistics of medical records, death rates due to hypertensive heart d...
|
This paper presents a smart home management system in which a community broker role is used for integrating community services, thereby reducing the workload of community management staff, providing electronic information services, and deepening the community’s integration with the surrounding environment. At the home end, a home intranet was creat...
|
This paper presents a low cost and flexible home control and monitoring system using an embedded micro-web server, with IP connectivity for accessing and controlling devices and appliances remotely using Android based Smart phone app. The proposed system does not require a dedicated server PCwith respect to similar systems and offer...
|
Shopping mall is a place where people get their daily necessities. There has been an emerging demand for quick and easy payment of bills in shopping malls. Quite often, when shopping in a supermarket shoppers are frustrated at locating the items on the shopping list and no assistance is available. To overcome these problems we hav...
|
Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. As security is becoming the primary concern of society and hence having a security system is becoming a big requirement. Video surveillance plays a vital role in securi...
|
In today’s world Automatic system is ubiquitous communication over manual system. The IoT can assist in integration of communications, control, and information processing across various systems. The Internet of Things allows objects to be sensed and controlled remotely. Wireless Home Automation system(WHAS) using I...
|
The optimized solar traffic light control and alert system provides the better approach for traffic congestion. The system is composed of wireless modem and solar panel designed inside the modem itself. The design makes use of solar energy rather electrical energy which makes it energy efficient. The wireless modem tracks the vehicle...
|
Any distribution network is prone to faults, and intermittency in power availability creates loss for the supplier as well as user. Majorly, a supply line can be effected by conditions of overvoltage and overcurrent, also under-voltage condition. During the occurrence of any fault, the incident goes unreported for long duration. Manual reporting ca...
|
This paper presents the technical construction of the vehicle controlled by user mobile. The designed GSM based vehicle could be operated from almost anywhere if GSM network exists. The procedure commences with initiating a call from the cell phone which is auto received by GSM module stacked in the vehicle. In the course of a call, if any of the k...
|
Now a day, technology rapidly growth, but also people do not survive his/her life after road accident because there is no emergency facilities available in our country. So we design a technology which facilitates the emergency facilities. This project inform about an accident that is occurred to vehicle to rescue team and the family members of the ...
|
In recent times, role of women in all industries have increased. Simultaneously, crime against women is also increasing day by day and this is the high time to provide safety for all working women. This paper focuses on women tracking system for all working women. There is no powerful existing system to prevent the crime rates against women. This s...
|
Imbalance in the nervous system causes Epilepsy disease which may lead to death. The most common symptoms of epilepsy disease are sudden fluctuations in heart beat rate and involuntary muscular movements (seizures).The wireless electronic diagnosing system used here is meant for epilepsy patients only. Occurrence of seizures predicated by this syst...
|
The concept of a Smart City highlights the need to enhance quality, interconnection and performance of various urban services with the use of information and communication technologies (ICT). Smart City technologies promote cloud-based and Internet of Things (IoT) based services in which real-world user interfaces use smart phones, sensors and RFID...
|
With new technological advancement in controlled-environment agriculture systems, the level of productivity has significantly increased. Agriculture systems are now more capable, reliable, and provide enhanced productivity. An agriculture environment can range from a single plant in a house, a backyard garden, a small farm, to a large farming facil...
|
This paper presents the creation of a CAN network for monitoring parameters route of cargo vehicles. By decree of law, all cargo vehicles must contain tachograph device that collects and records all information practiced during the trip, such as speed, distance, RPM (rotations per minute), among other parameters. The data provided by the tachograph...
|
The integration of decentralized generation units and the application of demand response programs brings changes to the power systems. Microgrids are emerging with relevant advantages for the power system operation. For this reason, several research projects are currently studding and finding methods to improve microgrids management. The developmen...
|
Recently, the frequent coal mine safety accidents have caused serious casualties and huge economic losses. It is urgent for the global mining industry to increase operational efficiency and improve overall mining safety. This paper proposes a lightweight mashup middleware to achieve remote monitoring and control automation of underground physical s...
|
In this paper, the design of a new upper limb rehabilitation system is presented. The developed system is an exoskeleton with two degrees of freedom that can be used for diagnosis, physical therapy, and outcome evaluation. The system is dedicated to the patients with paraplegia of their upper extremities due to stroke or any disorders of the centra...
|
Sudden Infant Death Syndrome (SIDS) is one of the major causes of death among infants during their sleep. To increase the safety of the infants, we matched different emergent research fields for the development of Baby Night Watch. This Smart Wearable System (SWS), developed under the context of the European Texas Instruments Innovation Challenge (...
|
Many devices and solutions for remote ECG monitoring have been proposed in the literature. These solutions typically have a large marginal cost per added sensor and are not seamlessly integrated with other smart home solutions. Here we propose an ECG remote monitoring system that is dedicated to non-technical users in need of long-term health monit...
|
In this letter, we propose an energy efficient ZigBee-based outdoor light monitoring and control system that can monitor and handle outdoor lights more efficiently as compared to the conventional systems. The proposed system uses the ZigBee-based wireless devices which allow more efficient lamps management. The designed system uses sensors to contr...
|
A home automation system for smart grid is designed and implemented. The system monitors temperature and humidity and controls air conditioning, lights and appliances. The Message Queuing Telemetry Transport protocol and Djanjo web framework are used. A graphical user interface is developed to enable the user to control the devices remotely via a w...
|
Observing activities of working vehicles on a work site, such as a factory, is important in regard to managing the lifetime of vehicles and achieving high operational availability. However, it is a problem that an administrator cannot completely grasp the activities of a working vehicle. Existing systems cannot cover a large area, particularly in a...
|
An interference-mitigated ZigBee based Advanced Metering Infrastructure solution, namely IMM2ZM, has been developed for high traffics smart metering. The IMM2ZM incorporates multi-radios multi-channels network architecture and features an interference mitigation design by using multi-objective optimization. To evaluate the performance of the networ...
|
Nowadays, home appliances manufacturers are increasingly relying on wireless sensor network and single chip embedded technologies to build smart environment. Many existing systems are already in the market, however, they were designed without envisioning the need of residents with special needs. This work presents a framework that enables the integ...
|
This paper proposes a new ZigBee-based communication for multifunctional electronic current transformers (ECTs), which are used in overhead and underground line monitoring. To tackle ZigBee’s low transmission rate, the proposed method involving a transmission strategy can make the ZigBee-based communication satisfy both measurable and protective pu...
|
Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this paper lays in the operational objectives, the quantum ...
|
Information Communication Technology (ICI) has played a major role in the day to day running of companies, organizations and institutions and general life. Through the use of information technology these companies are able to perform daily activities efficiently and accurately. The bakery sector too has benefited from this advancement in informatio...
|
In modern days, people are getting too busy in their works but still they need to spend time in shopping malls. In Shopping malls, customers face a difficulty to follow a queue for the process of billing, which takes a long time under huge crowd. Customer thought that, to avoid the standing time in the billing section at shopping malls. To overcome...
|
Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the da...
|
Academic research faces new methods of knowledge production that trigger a need for managing research by projects. However, the literature reports friction between management and research. In this study, we investigate whether and to what extent academic research projects can be managed using classical project management (PM) principles. An analysi...
|
Vehicle tracking system is a well-established technology in this era which is used by fleet system and owner of vehicle all over the world. It is a very safe and reliable technology. In our thesis we are going to design a system which is used for tracking and positioning of any vehicle by using Global Positioning System [GPS] and Global System for ...
|
We have developed a smart ration card the usage of Radio Frequency identity (RFID) method to save you the ration forgery as there are probabilities that the shopkeeper may additionally promote the cloth to a person else and take the profit and put a few false amount of their statistics. In this device, a RFID tag is used that includes the member of...
|
With the advancement of information and communication technology, life is getting simpler in all aspects. The rapid increase in the number of users on the internet over the past decade has made the internet as a part of human life. Home Automation using the Internet of Things (IoT) is a system that uses a smartphone device or pc to control basic ho...
|
The information and intelligent requirement of modern residence is improving with the development of computer and property management. It is becoming the key problem for property companies how to implement the intelligent property information management. In this paper, we present a framework of property management information system based-on E-busi...
|
E-Mail basically allows the sender to be aware of where, when and how his mail reaches the client and what the receiver does with the mail. Many existing mail clients provide very fundamental features such as Reading, Forwarding, Moving, Deleting, etc. But most of them do not provide a proof for having read the mail. The Tracking and Notification f...
|
Throughout the field of transportation and vessel systems control is gaining importance. This paper focuses on the current key problems engineers in this field are facing and highlights some major recent accomplishments. In the fields like marine or offshore systems, the focus of research is on the swarming behaviour of multiple vessels. New sensor...
|
Invoicing and billing application for different business purposes helps mainly the service providers and freelancers to manage, send professional invoices online, and track its status. Generally, all the small companies in Saudi Arabia facing a various issues for managing and tracking the invoice status of customers, which mostly back to the lacks ...
|
Digital advertising, on internet and mobile gadgets, has outpaced the traditional media advertising and for the first time in 2013 generated more advertising spending than television advertising. Digital advertising is believed to be an effective way to better target potential customers in the global market. Evidence shows that businesses have incr...
|
Igniting a passion for reading and research is core business for school libraries, inevitably placing the library at the centre of the twenty-first century reading and learning experience. Teacher librarians, librarians and library teams in Australian and New Zealand schools are responding to the learning needs within the school community with a fo...
|
The objective of this paper is to enforce some of the emerging technologies like mobile computing, Information and Communication Technology and advances in behavioral science studies to enhance and enrich the current educational system, since education technology in India has been modernizing in the recent years due to the development and penetrati...
|
The purpose of Medical Shop Management System is to automate the existing manual system by the help of computerized equipments and full-fledged computer software, fulfilling their requirements, so that their valuable data/information can be stored for a longer period with easy accessing and manipulation of the same. The required software and hardwa...
|
It is a real time monitoring system which allows parents to check attendance and academics records of their ward. It also helps to college administrative people to maintain student related information. It is time consuming task to check each and every student attendance to the parent. This project gives the information to the parent about their war...
|
One of the essential services on the internet is the Email Service. The Email server can be vulnerable to several types of cyber-attacks. This research aims to analyze and improve the Email service. This mail is the process of following the path and function performed by the receiver on the received mail. The development of this system serves as a ...
|
This paper discusses about the project implementation of social networking site for teaching and learning purposes. The type of social space available to users can provide a more personalized and interactive experience for educative purpose. The growing demand of engineers in the industry makes it very important for the students to know about the p...
|
Using a qualitative research method we studied the case of Linnaeus University. The purpose of this research was to study how Linnaeus University is using their corporate identity in their communication against students and employers. After analyzing the results of our empirical study and reflecting on the theoretical framework we concluded that Li...
|
THE INCOMPATIBLE blood transfusion remains a great danger in hemotherapy. It perhaps is most hazardous to the patient when it involves his receiving incompatible red blood cells. Pain, shock, chills, fever, and renal failure with acute tubular necrosis, abnormal bleeding due to disseminated intravascular coagulation, and death can result. Modern bl...
|
The railway reservation system facilitates the passengers to enquiry about the trains available on the basis of source and destination, booking and cancellation of tickets, enquiry about the status of the booked ticket, etc. The aim of case study is to design and develop a data base maintaining records of different trains, train status and passenge...
|
Child Safety is very important nowadays and everyone wants to get SMS alerts from the school about their child attendance in the school. Traditional ways of sending SMS is very time-consuming. It takes so many hours in collecting data and informing the parent about the child attends. We have a new solution for this in which we automate the attendan...
|
Dams must be permanently maintained in a proper way because of extremely grave consequences that may occur in case of a failure. Maintenance refers to monitoring the condition of a dam and its belonging facilities, that is to identification and undertaking of all necessary measures for ensuring safety and functionality of the facilities in a timely...
|
Effective utilization of Radio Frequency Identification (RFID) technology between vehicle and base station over a wireless channel to facilitate vehicle maintenance monitoring and vehicle authentication is proposed. This system is able to automatically register the vehicles in highways or gas stations and inform the user about the vehicle maintenan...
|
Internet has become the biggest repository of information in the world. It can be considered as a global library where variety of information in different languages and formats is stored in digital form. The volume of information on web is enormous and it has become near to impossible to estimate its size. Because of its size and storing mechanism,...
|
Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalys...
|
With the increase in the consumption of energy and population, there is a great need to conserve energy in every way possible. The inability to access and control the appliances from remote locations is one of the major reasons for energy wastage in Ghana. This project presents the development and implementation of a Global System for Mobile Commun...
|
Electronic Shop Management software helps Electronic showrooms owners and management staff by producing different kind of financial and stock tracking reports, etc. This software is able to manage all electronic stocks. In this software shop owner can manage the data of customer and buyers. Also tax information and other government charges includin...
|
The Management Information System is a concept of the last decade or two. The role of MIS in an organization can be compared to the role of heart in the body. Most of the organizations be it small or large are using computer based information system with centralized, decentralized or distributed networks connecting data flow from and to the various...
|
Now a days Attacker’s launch attack campaigns targeting the zero day vulnerability, compromising internet users on a large scale. The first response to such campaigns is to detect them and collect sufficient information regarding tools, techniques used to exploit the vulnerability. Hence effective capturing of the attack data and its timely dissemi...
|
In this paper, we present the architecture of a new multimedia E-mail system, which has been successfully developed in the Communication and Multimedia Laboratory of National Taiwan University. This prototype E-mail system is fully compatible with traditional Internet E-mails in that the multimedia emails can be sent through Internet. For allowing ...
|
E-mail system is one of the most ubiquitous Internet-based applications today. It enables users to send and receive E-mail messages among each other within and from outside of the local area network. E-mail system is used every day in almost all organizations as a communication tool between managers, employees, customers, and partners for better in...
|
Project management systems represent a rapidly growing technology in IT industry. As the number of users, who utilize project management applications continues to grow, web based project management systems enter a critical role in a multitude of companies. Thus, a proper project management system plays a distinctive part in ensuring reliable, robus...
|
Privacy-preserving distributed data fusion is a pretreatment process in data mining involving security models. In this paper, we present a method of implementing multiparty data fusion, wherein redundant attributes of a same set of individuals are stored by multiple parties. In particular, the merged data does not suffer from background attacks...
|
A detailed accumulation of the methods of wireless power transfer (WPT) including short range as well as mid range transmission . The technology and the science behind WPT and the future scope is discussed in detail. While a lot of research has been done on this topic in the previous decade, a large part of it is yet to be explored. The topics furt...
|
Speech is one of the oldest and most natural means of information exchange between human. Over the years, Attempts have been made to develop vocally interactive computers to realise voice/speech synthesis. Obviously such an interface would yield great benefits. In this case a computer can synthesize text and give out a speech. Text-To-Speech Synthe...
|
To obtain information and knowledge of SNF (Solid not fat), feeding and milking management. System also included the management practices among the dairy farms at various state levels from District to Taluka level for maintaining daily records as well as effective payment system through digital transactions. This system recurring to information of ...
|
Sales management is a key function which helps small and medium size enterprises (SMEs) in monitoring and tracking stock and co-ordinating transaction processing. The efficiency of sales management dependends on effective tools and facilities, especially mordern information and communication technologies. Despite this, majority of businesses in dev...
|
The Java Application World application world soft- ware is totally user oriented and only users access the software programs. The user can use multiple applications that re made with the help of java. In the J Appsor the Java application world, the user can use calculator, word count tool, ip finder etc java run software. Any particular IDE can...
|
This paper deals with development of inventory management system for a manufacturing Industry. The developed software System is easy to use, less time consuming & all detail about the inventory items & transaction status. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The repor...
|
Hospital Management System is an organized computerized system designed and programmed to deal with day to day operations and management of the hospital activities. The program can look after inpatients, outpatients, records, database treatments, status illness, billings in the pharmacy and labs. It also maintains hospital information such as ward ...
|
Parenting is not an easy task. Good parenting requires the parent to quickly respond to the needs of their child. Constant monitoring of the child also becomes a necessity, especially up to an age of 18 months. In this work, a mobile robotic device has been designed and developed. This device can help a parent to keep track of their baby and its su...
|
In the present scenario, any type of communication over the internet and other network applications need to be secure due to their increasing utility. For this task, lots of algorithms for security have been implemented and used so far. With these developments, attackers have also come up with the new ideas to penetrate the communication mediums. T...
|
Wireless Networks are susceptible for a variety of malicious attacks because they use shared transmission medium. The transmission of information may be jammed by an attacker by introducing malicious packets into the network. These jammers create a lot of noise in the total network and create problems at both the ends of transmission and affect the...
|
Network intruders may spoof IP packets by modifying headers of the IP packets to fool people believe that the transmissions are originating from the trusted source. Consequently, various defence mechanisms have been developed to identify and prevent IP spoofing attack. However, the existing prevention mechanisms are implemented on either destinatio...
|
This article investigates the basic design principles for a new Wireless Network Operating System (WNOS), a radically different approach to software-defined networking (SDN) for infrastructure-less wireless networks. Departing from well understood approaches inspired by Open Flow, WNOS provides the network designer with an abstraction hiding (i) th...
|
The integration of multi-access edge computing (MEC) and RAFT consensus makes it feasible to deploy blockchain on trustful base stations and gateways to provide efficient and tamper-proof edge data services for Internet of Things (IoT) applications. However, reducing the latency of storing data on blockchain remains a challenge, especially when an ...
|
A novel carrier sense multiple access strategy with collision avoidance (CSMA/CA) balancing contention probability and channel access time is proposed. The approach can be applied to any context where the computational simplicity of the MAC must be preferred to the complexity of the channel access strategy. Our MAC, called Delay-Collision CSMA (DC-...
|
This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelb...
|
An optimal precoder design is conceived for the decentralized estimation of an unknown spatially as well as temporally correlated parameter vector in a multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) based wireless sensor network (WSN). Furthermore, exploiting the temporal correlation present in the parameter...
|
In this paper, we consider a wireless-powered communication network (WPCN) where one mobile hybrid access point (HAP) coordinates the wireless energy transfer to sensor nodes and receives data from sensor nodes, which are powered exclusively by the harvested wireless energy. As the harvest-then-transmit protocol is employed by sensor nodes, a major...
|
This paper is concerned with the security problem of Time of Arrival (ToA) based localization schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses on defending against external attacks, especially under cooperative external attackers. The prior scheme for defending against the attacks in the localization scheme ...
|
Intelligent reflecting surface (IRS) is a new and promising paradigm to substantially improve the spectral and energy efficiency of wireless networks, by constructing favorable communication channels via tuning massive low-cost passive reflecting elements. Despite recent advances in the link-level performance optimization for various IRS-aided wire...
|
Unmanned aerial vehicles (UAVs) have extensive civilian and military applications, but establishing a UAV network providing high data rate communications with low delay is a challenge. Millimeter wave (mmWave), with its high bandwidth nature, can be adopted in the UAV network to achieve high speed data transfer. However, it is difficult to establis...
|
The flexibility offered by reconfigurable wireless networks, provide new opportunities for various applications such as online AR/VR gaming, high-quality video streaming and autonomous vehicles, that desire high-bandwidth, reliable and low-latency communications. These applications come with very stringent Quality of Service (QoS) requirements and ...
|
In this paper, we consider an unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) network, where the UAV is responsible for sustaining the network with all devices on the ground. The sustainable charge process operates periodically, i.e., in each working period, the UAV flies from and back to a landing position. The initial remainin...
|
This paper proposes a communication strategy for decentralized learning in wireless systems that employs adaptive modulation and coding capability. The main objective of this work is to address a critical issue in decentralized learning based on the cooperative stochastic gradient descent (C-SGD) over wireless systems: the relationship between the ...
|
Wireless sensor networks (WSN) allow to exchange information and to take immediate and remote actions in natural, industrial, military or domestic environment systems. These networks are vulnerable to cyber-attacks, hence, they are vulnerable to being intercepted, interrupted or modified. However, for the last twenty years, the amount of informatio...
|
Telecommunication service providers have to guarantee acceptable speech quality during a phone call to avoid a negative impact on the users' quality of experience. Currently, there are different speech quality assessment methods. ITU-T Recommendation G.107 describes the E-model algorithm, which is a computational model developed for network plannin...
|
Wireless Ad Hoc Networks are self-organizing networks deployed without any centralized infrastructure. Flooding based Denial-of-Service (DoS) attacks were targeting the constrained resources of mobile nodes as well as the network. Route Request (RREQ) flooding attack is one of the prominent DoS attacks launched from the network layer in which the a...
|
Energy supplies, spectrum resources, and transmission overheads of wireless nodes are the bottlenecks in decentralized networks (e.g., device-to-device communication networks). In this paper, we study the total power minimization problem of secondary users (SUs) for a multiuser simultaneous wireless information and power transfer-based cognitive ad...
|
In this paper, we propose a covert wireless uplink transmission strategy in space-air-ground integrated vehicular networks, where the source vehicle transmits its own message over the channel that being used by the host communication system, to avoid being detected by the warden. It is obvious that the data transmission efficiency of the covert com...
|
Future of massive Internet-of-things (IoT) and low latency applications hinges on delivering fresh information on time. Thus, to analyse data freshness for time critical use cases in future networks, the age of information (AoI) measure is introduced. Besides, energy harvesting is also essential to improve energy sustainability and lifetime of a po...
|
Unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) has recently emerged as a promising technique to provide sustainable energy supply for widely distributed low-power ground devices (GDs) in large-scale wireless networks. Compared with the energy transmitters (ETs) in conventional WPT systems which are deployed at fixed locations, ...
|
This paper investigates the problem of resource allocation for a wireless communication network with distributed reconfigurable intelligent surfaces (RISs). In this network, multiple RISs are spatially distributed to serve wireless users and the energy efficiency of the network is maximized by dynamically controlling the on-off status of each RIS a...
|
In the past two decades, wireless sensor networks (WSNs) and their applications have been the topic of many studies. Different multi-sensor nodes are used to collect, process and distribute data over wireless links to perform different tasks such as smart detection, target tracking, node localization, etc. In this article, the problem of distribute...
|
Replacing base stations with unmanned aerial vehicles (UAVs) to serve the communication of ground users has attracted a lot of attention recently. In this paper, we study the joint resource allocation and UAV trajectory optimization for maximizing the total energy efficiency in UAV-based non-orthogonal multiple access (NOMA) downlink wireless netwo...
|
This paper presents a cost-effective, ultra-low-power and highly sensitive wake-up receiver (WuRX) to reduce overall power consumption of Wireless Sensor Networks (WSN). The proposed tuned radio frequency (TRF) receiver (RX) analogue front-end (AFE) incorporates a 400-MHz, low-power, low-noise amplifier (LNA) with a high voltage gain of 50 dB as we...
|
Traditional ground wireless communication networks cannot provide high-quality services for artificial intelligence (AI) applications such as intelligent transportation systems (ITS) due to deployment, coverage and capacity issues. The space-air-ground integrated network (SAGIN) has become a research focus in the industry. Compared with traditional...
|
Network Function Virtualization is a key technology that enables network operators to provide diverse communication services flexibly over a common infrastructure, resulting in a significantly reduced cost. This paper addresses the problem of optimal network function virtualization for providing multicast services in wireless mesh networks with min...
|
In this modern era, each and every individual needs to utilize the communication medium for sending and receiving the respective data between source and destination entities. A Wireless Sensor Network (WSN) environments provide such facility to clients to perform a successful and range free communication between source and destination. This paper u...
|
Intelligent network management for reconfigurable wireless networks such as 5G and beyond applications is crucial for many industrial applications, and has been the subject of ongoing research. This paper proposes an Artificial Intelligence(AI)-Assisted energy-efficient and intelligent routing, based on both energy efficiency prioritization and AI ...
|
Clock synchronization is crucial for applications in wireless sensor networks, such as event scheduling and data fusion. In practical wireless networks, environmental changes cause the oscillator to be imperfect. Thus, it is necessary to track the nonlinear varying clock dynamically. In this paper, we propose a timestamp-free clock skew (frequency ...
|
The network control plays a vital role in the mega satellite constellation (MSC) to coordinate massive network nodes to ensure the effectiveness and reliability of operations and services for future space wireless communications networks. One of the critical issues in satellite network control is how to design an optimal network control structure (...
|
Unmanned aerial vehicles (UAVs) are anticipated to be integrated into the next generation wireless networks as new aerial mobile nodes, which can provide various live streaming applications such as surveillance, reconnaissance, etc. For such applications, due to the dynamic characteristics of traffic and wireless channels, how to guarantee the qual...
|
Wireless blockchain network is proposed to enable a decentralized and safe wireless networks for various blockchain applications. To achieve blockchain consensus in wireless network, one of the important steps is to broadcast new block using wireless channel. Under wireless network protocols, the block transmitting will be affected significantly. I...
|
This paper presents wChain, a blockchain protocol specifically designed for multihop wireless networks that deeply integrates wireless communication properties and blockchain technologies under the realistic SINR model. We adopt a hierarchical spanner as the communication backbone to address medium contention and achieve fast data aggregation withi...
|
This paper describes systems, devices, and methods to implement a bi-directional integrated inter-tower wireless communications network (IITWCN). The described technology can be implemented in combination with the Broadcast Core Network (BCN) in next generation broadcast eco-system and, therefore, support new business cases for broadcast operators ...
|
Age of information (AoI) is a newly proposed metric to quantify the freshness of system status. However, in many cases, the original raw data collected by IoT devices needs to be preprocessed in real-time to extract the hidden effective information, which is usually time consuming. To this end, we promote an edge computing assisted approach and aim...
|
Backscatter communication (BC) and radio-frequency energy harvesting (RF-EH) are two promising technologies for extending the battery lifetime of wireless devices. Although there have been some qualitative comparisons between these two technologies, quantitative comparisons are still lacking, especially for massive IoT networks. In this paper, we a...
|
With the evolution of the Internet of Things (IoT), smart cities have become the mainstream of urbanization. IoT networks allow distributed smart devices to collect and process data within smart city infrastructure using an open channel, the Internet. Thus, challenges such as centralization, security, privacy (e.g., performing data poisoning and in...
|
The awareness of physical network topology in a large-scale Internet of Things (IoT) system is critical to enable location-based service provisioning and performance optimization. However, due to the dynamics and complexity of IoT networks, it is usually very difficult to discover and update the physical topology of the large-scale IoT systems in r...
|
5G-enabled Industrial Internet of Things (IIoT) deployment will bring more severe security and privacy challenges, which puts forward higher requirements for access control. Blockchain-based access control method has become a promising security technology, but it still faces high latency in consensus process and weak adaptability to dynamic changes...
|
Urban crowd flow prediction is very challenging for public management and planning in smart city applications. Existing work mostly focuses on spatial and temporal dependence based flow prediction that are not well suited for predictions of instantaneous flow change usually due to social emergency incidents and accidents. In this paper, we propose ...
|
Due to resource constraints and working surroundings, many IIoT nodes are easily hacked and turn into zombies from which to launch attacks. It is challenging to detect such networked zombies. We combine federated learning (FL) and fog/edge computing to combat malicious codes. Our protocol trains a global optimized model based on distributed dataset...
|
The increase in electronic loads connected to electrical network became relevant requirements of the quality of supply. Among the equipment used in the power distribution system stands out regulators medium voltage installed over the grid to maintain voltage levels within indifferent operating range of the oscillations. Therefore, the quality of su...
|
This article presents a 2.4 GHz and high-efficiency wireless power receiver (Rx) integrated with a low-power transmitter (Tx) for wireless charging of the Internet-of-Things (IoT) or wearable devices. A single pole double throw (SPDT) circuit isolates the operation of the Rx from Tx, thereby offering the capability of sharing antenna between them. ...
|
Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect and transfer biomedical data pertaining to blood pressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. Among these devices, wearables have found their presenc...
|
The global healthcare industry and artificial intelligence has promoted the development of the diversified intelligent healthcare applications. IoT will play an important role in meeting the high throughput requirements of diversified intelligent healthcare applications. However, the healthcare big data transmission is vulnerable to a potential att...
|
There has been an asymmetric shift towards harnessing cloud-based technologies as the world focuses on shifting operations remotely. Data security for remote operations is crucial for the protection and preservation of critical infrastructure. Furthermore, there has been an emerging trend to integrate IoT based devices with the expanding cloud infr...
|
This article studies the strategic interactions between an IoT service provider (IoTSP) which consists of heterogeneous IoT devices and its energy service provider (ESP). To that end, we propose an economic framework using the Stackelberg game to maximize the network throughput and energy efficiency of both the IoTSP and ESP. To obtain the Stackelb...
|
This paper studies an unmanned aerial vehicle (UAV)-assisted wireless powered IoT network, where a rotary-wing UAV adopts fly-hover-communicate protocol to successively visit IoT devices in demand. During the hovering periods, the UAV works on full-duplex mode to simultaneously collect data from the target device and charge other devices within its...
|
The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people's lives in all directions. The rapid development of the IoT technology accelerates the process of the era of ``Internet of everything'' but also changes the role of terminal equipment at the edge of...
|
Blockchain technology has recently witnessed a rapid proliferation across multiple industries and has the potential to evolve as a popular energy transaction platform for grid operators and general users. The current proof-of-work consensus algorithm used by many blockchain protocols suffer from vulnerabilities such as the majority attacks problem ...
|
Developing products and entering new markets in the Internet of Things (IoT) and industry 4.0 space are challenging because value propositions and business models are complex. IoT products are fundamentally platform products, whose embedded components can measure a disparate set of characteristics for several user types. Deciding in advance which c...
|
In this paper, we propose DRL Track, a framework for target tracking with a collaborative deep reinforcement learning (C-DRL) in Edge-IoT with the aim to obtain high quality of tracking (QoT) and resource-efficient performance. In DRLTrack, a huge number of IoT devices are employed to collect data about a mobile target. One or two edge devices coor...
|
The Internet of Things (IoT) is playing an increasingly vital role in multiple industries and our everyday life. A pressing practical problem of IoT devices (IoT-Ds) is their explosive growth of connectivity which leads to large energy consumption. One of the most promising solutions to achieve a sustainable green IoT network is unmanned aerial veh...
|
Deep Neural Networks (DNNs) have become an essential and important supporting technology for smart Internet-of-Things (IoT) systems. Due to the high computational costs of large-scale DNNs, it might be infeasible to directly deploy them in energy-constrained IoT devices. Through offloading computation-intensive tasks to the cloud or edges, the comp...
|
This paper studies the interplay between device-to-device (D2D) communications and real-time monitoring systems in a cellular-based Internet of Things (IoT) network. In particular, besides the possibility that the IoT devices communicate directly with each other in a D2D fashion, we consider that they frequently send time-sensitive information/stat...
|
In this paper, we study sensing data collection of IoT devices in a sparse IoT-sensor network, using an energy-constrained Unmanned Aerial Vehicle (UAV), where the sensory data is stored in IoT devices while the IoT devices may or may not be within the transmission range of each other. We formulate two novel data collection problems to fully or par...
|
Deploying a mobile edge computing (MEC) server in the mobile blockchain-enabled Internet of things (IoT) system is a promising approach to improve the system performance, however, it imposes a significant challenge on the trust of the MEC server. To address this problem, we first propose an untrusted MEC proof of work (PoW) scheme in mobile blockch...
|
In recent years, Internet of Things (IoT) security has attracted significant interest by researchers due to new characteristics of IoT such as heterogeneity of devices, resource constraints, and new types of attacks targeting IoT. Intrusion detection, which is an indispensable part of a security system, is also included in these studies. In order t...
|
In recent years, the Internet of Things (IoT) has been contemplated as the next technological advancement in the era of internet. This paper discloses the architecture of a multilayer, multimode security system for IoT. The proposed system is capable of providing multiple security solutions that support anonymous authentication, device privacy, dat...
|
Internet-of-Things (IoT) aims to connect intelligent things to the internet, enable thing-to-everything communication, and sustainability sensing and control. However, the exponential increase of connected IoT devices is resulting in tremendous demand on the limited spectrum. Cognitive radio (CR) technology is envisioned to be one of the main enabl...
|
Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a ...
|
Verifying the integrity of IoT data in cloud-based IoT architectures is crucial for building reliable IoT applications. Traditional data integrity verification methods rely on a Trusted Third Party (TTP) that has issues of risk and operational cost by centralization. Distributed Ledger Technology (DLT) has a high potential to verify IoT data integr...
|
Edge computing, as a new computing paradigm that extends cloud computing, allows a service vendor to deploy its services on distributed edge servers to serve its service users in close geographic proximity to those edge servers. Caching edge data on edge servers can minimize service users data retrieval latency. However, such edge data are subject ...
|
Attribute-based authentication is considered a cornerstone component to achieve scalable fine-grained access control in the fast growing market of cloud-based services. Unfortunately, it also poses a privacy concern. Users attributes should not be linked to the users identity and spread across different organizations. To tackle this issue, several ...
|
With the rapid development of 5G, Mobile Edge Computing (MEC) paradigm has emerged to enable various devices or servers at the network edge to contribute their computing capacity for reducing communication delay. A fundamental problem is to preserve satisfactory quality-of-service (QoS) for mobile users in light of densely dispersed wireless commun...
|
This paper presents V-Sight, a network monitoring framework for programmable virtual networks in clouds. Network virtualization based on software-defined networking (SDN-NV) in clouds makes it possible to realize programmable virtual networks; consequently, this technology offers many benefits to cloud services for tenants. However, to the best of ...
|
In the edge computing environment, app vendors can cache their data on a large number of geographically distributed edge servers to serve their users. However, those cached data are particularly vulnerable to both intentional and accidental corruption, which makes data security a major concern in the EC environment. Given limited computing resource...
|
Delivering cloud-like computing facilities at the network edge provides computing services with ultra-low-latency access, yielding highly responsive computing services to application requests. The concept of fog computing has emerged as a computing paradigm that adds layers of computing nodes between the edge and the cloud, also known as cloudlets,...
|
As a rising star of social apps, short video apps, e.g., TikTok, have attracted a large number of mobile users by providing fresh and short video contents that highly match their watching preferences. Meanwhile, the booming growth of short video apps imposes new technical challenges on the existing computation and communication infrastructure. Trad...
|
Fog computing extends cloud computing capabilities to the edge of the network and reduces high latency and network congestion. This paradigm enables portions of a transaction to be executed at a fog server and other portions at the cloud. Fog servers are generally not as robust as cloud servers; at peak loads, the data that cannot be processed by f...
|
In order to protect data privacy in cloud storage, sensitive data is encrypted before being uploaded to a cloud server. How to retrieve ciphertext safely and effectively has become a problem. Public key encryption with keyword search (PEKS) realizes the retrieval of ciphertexts in clouds without disclosing secret information. However, most PEKS pro...
|
In the context of the global energy ecosystem transformation, we introduce a new approach to reduce the carbon emissions of the cloud-computing sector and, at the same time, foster the deployment of small-scale private photovoltaic plants. We consider the opportunity cost of moving some cloud services to private, distributed, solar-powered computin...
|
For a robot to perform a task, several algorithms must be executed, sometimes simultaneously. The algorithms can be executed either on the robot itself or, if desired, on a cloud infrastructure. The term cloud infrastructure refers to hardware, storage, abstracted resources, and network resources associated with cloud computing. Depending on the de...
|
Fog computing is an emerging computing paradigm that uses processing and storage capabilities located at the edge, in the cloud, and possibly in between. Testing and benchmarking fog applications, however, is hard since runtime infrastructure will typically be in use or may not exist, yet. While approaches for the emulation of infrastructure testbe...
|
Due to the excessive concentration of computing resources in the traditional centralized cloud service system, there will be three prominent problems of management confusion, construction cost and network delay. Therefore, we propose to virtualize regional edge computing resources in intelligent buildings as edge service pooling, then presents a hi...
|
Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...
|
In recent years, edge computing has attracted significant attention because it can effectively support many delay-sensitive applications. Despite such a salient feature, edge computing also faces many challenges, especially for efficiency and security, because edge devices are usually heterogeneous and may be untrustworthy. To address these challen...
|
The population of cloud computing greatly facilitates the sharing of explosively generated image today. While benefiting from the convenient of cloud, the privacy protection mechanism that commonly applied in cloud service makes the spreading of illegal and harmful data very hard to be detected or controlled. Such a realistic threat should be serio...
|
Recent advances in smart connected vehicles and Intelligent Transportation Systems (ITS) are based upon the capture and processing of large amounts of sensor data. Modern vehicles contain many internal sensors to monitor a wide range of mechanical and electrical systems and the move to semi-autonomous vehicles adds outward looking sensors such as c...
|
In recent years, with the rapid development of cloud computing industry, big data processing technology is also constantly mature. At the same time, the scale of domestic mobile Internet market continues to expand, with more than 500 million users, bringing huge mobile Internet business data. In this context, the method of large-scale network data ...
|
Broadcast encryption provides a promising technique of data access control for specified users in cloud computing. A data uploader can generate a ciphertext for a set of chosen users such that only the intended users are able to learn the data content. However, with the rapidly increasing of collaboration between users, it is desired to extend the ...
|
Federated learning (FL) is a machine-learning setting, where multiple clients collaboratively train a model under the coordination of a central server. The clients' raw data are locally stored, and each client only uploads the trained weight to the server, which can mitigate the privacy risks from the centralized machine learning. However, most of ...
|
Predicting attention-modulated brain responses is a major area of investigation in brain-computer interface (BCI) research that aims to translate neural activities into useful control and communication commands. Such studies involve collecting electroencephalographic (EEG) data from subjects to train classifiers for decoding users' mental states. H...
|
Due to the development of convenient brain-machine interfaces (BMIs), the automatic selection of a minimum channel (electrode) set has attracted increasing interest because the decrease in the number of channels increases the efficiency of BMIs. This study proposes a deep-learning-based technique to automatically search for the minimum number of ch...
|
The increasing demand for wireless connectivity and the emergence of the notion of the Internet of Everything require new communication paradigms that will ultimately enable a plethora of new applications and new disruptive technologies. In this context, the present contribution investigates the use of the recently introduced intelligent reflecting...
|
Data in modern industrial applications and data science presents multidimensional progressively, the dimension and the structural complexity of these data are becoming extremely high, which renders existing data analysis methods and machine learning algorithms inadequate to the extent. In addition, high-dimensional data in actual scenarios often sh...
|
This paper addresses the problem of decentralized sensor selection in an energy-constrained wireless sensor network-based Internet-of-Things, for monitoring a spatio-temporally varying process. To do so, an adaptive edge computing framework and its variants are proposed which distributedly optimize a critical trade-off between sensing quality and r...
|
The rapid development of the Industrial Internet of Things (IIoT) has led to the explosive growth of industrial control data. Cloud computing-based industrial control models cause vast energy consumption. Most existing solutions try to reduce the overall energy consumption by optimizing task scheduling and disregard how to reduce the load of comput...
|
Driving behaviors are highly relevant to automotive statuses and on-board safety, which offer compelling shreds of evidence for mobility as a service (MaaS) providers to develop personalized rental prices and insurance products. However, the direct dissemination of driving behaviors may lead to violations of identity and location privacy. In this p...
|
It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication protocol based on device signature generated during voltage over-scaling (VOS) was recently proposed to address this issue. VOS-based authentication employs the computation unit such as adder...
|
In Green Internet of Things, energy consumption research is a hot topic. Our research focuses on Supervisory Control And Data Acquisition (SCADA) system, and it is a system consisting of a plurality of self-organized sensing networks. Live data gathering from numerous Sub-connected SCADA (S-SCADA) networks to make unified decisions based on collect...
|
An always-on video-based human action recognition (HAR) system on chip (SoC) integrated with a CMOS image sensor (CIS) is proposed for the Internet of Things (IoT) devices. The proposed SoC is the first always-on integrated circuit (IC) performing the full process of HAR in a single chip. To resolve large power consumption from vision sensor and co...
|
Owing to the nature of battery-operated sensors, the residual energy of their battery should be considered when a sink node collects sensory data from them. If a sink attempts to collect data from a sensor that does not have sufficient residual energy to transmit data, the utilization of wireless communication resources may be degraded. However, re...
|
Recent research has shown that large-scale Internet of Things (IoT)-based load altering attacks can have a serious impact on power grid operations such as causing unsafe frequency excursions and destabilizing the grid’s control loops. In this work, we present an analytical framework to investigate the impact of IoT-based static/dynamic load alterin...
|
Internet-of-Things (IoT) innovations produce interesting opportunities, impact ethical and social aspects toward human society, and influence operational and technical solutions toward the structural systems. This article discusses the impact of some relevant characteristics of the IoT innovations. Significant debated aspects are the product discon...
|
Fog/edge computing has been recently regarded as a promising approach for supporting emerging mission-critical Internet of Things (IoT) applications on capacity and battery constrained devices. By harvesting and collaborating a massive crowd of devices in close proximity for computation, communication and caching resource sharing (i.e., 3C resource...
|
Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
|
Non-orthogonal multiple access (NOMA) exploits the potential of power domain to enhance the connectivity for Internet of Things (IoT). Due to time-varying communication channels, dynamic user clustering is a promising method to increase the throughput of NOMA-IoT networks. This paper develops an intelligent resource allocation scheme for uplink NOM...
|
Nowadays, adopting blockchain technology to Internet of Things has become a trend and it is important to minimize energy consumption while providing a high quality of service (QoS) in Blockchain-based IoT networks. Pre-caching popular and fresh IoT content avoids activating sensors frequently, thus effectively reducing network energy consumption. H...
|
The next generation Internet of Things (IoT) exhibits a unique feature that IoT devices have different energy profiles and quality of service (QoS) requirements. In this paper, two energy and spectrally efficient transmission strategies, namely wireless power transfer assisted non-orthogonal multiple access (WPT-NOMA) and backscatter communication ...
|
The Internet of Things (IoT) is an emerging paradigm and has penetrated deeply into our daily life. Due to the seamless connections of the IoT devices with the physical world through the Internet, the IoT applications use the cloud to store and provide ubiquitous access to collected data. Sharing of data with third party services and other users in...
|
Current Internet of Things (IoT) infrastructures rely on cloud storage however, relying on a single cloud provider puts limitations on the IoT applications and Service Level Agreement (SLA) requirements. Recently, multiple decentralized storage solutions (e.g., based on blockchains) have entered the market with distinct architecture, Quality of Ser...
|
In this paper, we propose a region-based pricing scheme, named as RegPrice, for provisioning safety-related decisions dynamically to the end-users. Typically, heterogeneous type of sensor nodes are present in the device layer of Safe-aaS. Considering the case of safety in road transportation, we compute the fixed and variable costs incurred in proc...
|
In this paper, an innovative quadrupole-based broadside-radiating unidirectional antenna is designed at 28.475 GHz for 5G IoT applications. The planar antenna is based on a single-layer technology and realized on a flexible substrate to facilitate conformal applications. It consists of a coax-fed driven dipole and two quadrupolar near-field resonan...
|
With the booming of smart grid, The ubiquitously deployed smart meters constitutes an energy internet of things. This paper develops a novel blockchain-based transactive energy management system for IoT-aided smart homes. We consider a holistic set of options for smart homes to participate in transactive energy. Smart homes can interact with the gr...
|
We investigate massive access in the Internet-ofThings (IoT) relying on multi-pair two-way amplify-and-forward (AF) relay systems using massive multiple-input multiple-output (MIMO). We utilize the approximate message passing (AMP) algorithm for joint device activity detection and channel estimation. Furthermore, we analyze the achievable rates for...
|
The integration of drones, IoT, and AI domains can produce exceptional solutions to today's complex problems in smart cities. A drone, which essentially is a data-gathering robot, can access geographical areas that are difficult, unsafe, or even impossible for humans to reach. In this paper, an intelligent technique is proposed to predict the signa...
|
In this paper, we propose and study an energy-efficient trajectory optimization scheme for unmanned aerial vehicle (UAV) assisted Internet of Things (IoT) networks. In such networks, a single UAV is powered by both solar energy and charging stations (CSs), resulting in sustainable communication services, while avoiding energy outage. In particular,...
|
In recent years, the Internet of Things (IoT) has made great progress. The interconnection between IoT and the Internet enables real-time information processing and transaction implementation through heterogeneous intelligent devices. But the security, the privacy, and the reliability of IoT are key challenges that limit its development. The featur...
|
The social Internet of Things (IoT) (SIoT) helps to enable an autonomous interaction between the two architectures that have already been established: social networks and the IoT. SIoT also integrates the concepts of social networking and IoT into collaborative edge computing (CEC), the so-called CEC-based SIoT architecture. In closer proximity, Io...
|
In this paper, we consider an overlay satellite-terrestrial network (OSTN) where an opportunistically selected terrestrial internet-of-things (IoT) network assists the primary satellite communications as well as accesses the spectrum for its own communications under hybrid interference received from extra-terrestrial sources (ETSs) and terrestrial ...
|
An optimized three-dimensional one-step leapfrog finite-difference time-domain (FDTD) method has been investigated, which is with a weakly conditional stability (WCS) to reduce numerical dispersion further. By introducing the artificial anisotropy parameters in a cross-correspondence manner, the phase velocity error is effectively limited without a...
|
With convenient Internet access and ubiquitous high-quality sensors in end-user devices, a growing number of content consumers are engaging in the content creation process. Meanwhile, mobile edge computing (MEC) can provision distributed computing resources for local data processing. The MEC-enhanced video crowdsourcing application will gather user...
|
Mobile edge computing (MEC) is an emerging architecture for accommodating latency sensitive virtualized services (VSs). Many of these VSs are expected to be safety critical, and will have some form of reliability requirements. In order to support provisioning reliability to such VSs in MEC in an efficient and confidentiality preserving manner, in t...
|
Most UAVs depend on realtime 3D point clouds to navigate through unknown environments. However, both point clouds processing and trajectory planning are computationally expensive and will deplete UAV's battery quickly. There are also inevitable uncertainties in point clouds, which further makes collision-free trajectory planning a very challenging ...
|
Edge computing has emerged as a new paradigm to bring cloud applications closer to users for increased performance. Unlike back-end cloud systems which consolidate their resources in a centralized data center location with virtually unlimited capacity, edge-clouds comprise distributed resources at various computation spots, each with very limited c...
|
With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...
|
To increase the flexibility and the dynamism of communication networks, Software Defined Networking (SDN) has emerged as the challenging approach to decouple control and data planes, using a logically centralized controller able to manage the underlying network resources. However, traditional network solutions can not be always used in SDN. In this...
|
This Special Section on ‘`Cloud-Edge Computing for Cyber-Physical Systems and Internet-of-Things’' is oriented to the dissemination of a few of those latest research and innovation results, covering many aspects of design, optimization, implementation, and evaluation of emerging cloud-edge solutions for CPS and IoT applications. The selected high-q...
|
As a promising technology in the development of human healthcare services, the wireless body area networks (WBANs) technology has attracted widespread attention in recent years from both industry and academia. However, due to the sensitiveness of the medical system and the capability limitation of the wearable devices, security, privacy, and effici...
|
With the widespread application of cloud storage, ensuring the integrity of user outsourced data catches more and more attention. To remotely check the integrity of cloud storage, plenty of protocols have been proposed, implemented by checking the equation constructed by the aggregated blocks, tags, and indices. However, the verifier only has the k...
|
Cloud computing becomes a promising technology to reduce computation cost by providing users with elastic resources and application-deploying environments as a pay-per-use model. More scientific workflow applications have been moved or are being migrated to the cloud. Scheduling workflows turns to the main bottleneck for increasing resource utiliza...
|
In recent years, the investigations on Cyber-Physical Systems~(CPS) have become increasingly popular in both academia and industry. A primary obstruction against the booming deployment of CPS applications lies in how to process and manage large amounts of generated data for decision making. To tackle this predicament, researchers advocate the idea ...
|
IaaS from the public cloud is becoming a new option for organizations in need of HPC capabilities. IaaS offers greater flexibility in hardware choices and operational costs. Furthermore, IaaS enables small organizations to access resources previously reserved for organizations with larger capitals. This study uses the HPCG benchmark to assess the p...
|
With the widespread use of cloud emails and frequent reports on large-scale email leakage events, a security property so-called forward secrecy becomes desirable and indispensable for both individuals and cloud email service providers to strengthen the security of cloud email systems. However, due to the failure to meet the security and practicalit...
|
This article studies the group coordinated control problem for distributed nonlinear multiagent systems (MASs) with unknown dynamics. Cloud computing systems are employed to divide agents into groups and establish networked distributed multigroup-agent systems (ND-MGASs). To achieve the coordination of all agents and actively compensate for communi...
|
Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
|
Nowadays transceiver-free (also referred to as device-free) localization using Received Signal Strength (RSS) is a hot topic for researchers due to its widespread applicability. However, RSS is easily affected by the indoor environment, resulting in a dense deployment of reference nodes. Some hybrid systems have already been proposed to help RSS lo...
|
A swarm of Autonomous Underwater Vehicles (AUVs) can provide richer spatial-temporal information than the traditional single-robot system, which can be used for underwater mapping, exploration, target tracking, among others. However, the limitation of AUVs’ battery cannot support persistent services, which restricts AUVs’ operating range and missio...
|
In the coming 6G communications, network densification, high throughput, positioning accuracy, energy efficiency, and many other key performance indicator requirements are becoming increasingly strict. In the future, how to improve work efficiency while saving costs is one of the foremost research directions in wireless communications. Being able t...
|
Recently, wireless edge networks have realized intelligent operation and management with edge artificial intelligence (AI) techniques (i.e., federated edge learning). However, the trustworthiness and effective incentive mechanisms of federated edge learning (FEL) have not been fully studied. Thus, the current FEL framework will still suffer untrust...
|
We study federated learning (FL) at the wireless edge, where power-limited devices with local datasets collaboratively train a joint model with the help of a remote parameter server (PS). We assume that the devices are connected to the PS through a bandwidth-limited shared wireless channel. At each iteration of FL, a subset of the devices are sched...
|
Recently, wireless powered cooperative cognitive radio networks (CRNs), which combine the technologies of radio frequency (RF) energy harvesting and CR, have drawn great attention. In such networks, energy cooperation between the cognitive users (CUs) and the wireless powered primary users (PUs) can be performed, where the CUs can charge the PUs wi...
|
The excessive use of nodes and communication links in a wireless control system (WCS) causes unnecessary utilization of resources. In this article, a strategic topological formation is studied for a WCS, where a previously proposed topology consisting of a plant system, a controller system, and an intermediate network system is further developed. M...
|
Next generation wireless systems have witnessed significant R&D attention from academia and industries to enable wide range of applications for connected environment around us. The technical design of next generation wireless systems in terms of relay and transmit power control is very critical due to the ever-reducing size of these sensor enabled ...
|
This paper deals with the problem of achieving finite-time max-consensus in a multi-agent system that communicates over a fading wireless channel. A key feature of the wireless channel is the superposition (or broadcast) property. In traditional wireless communication systems, the superposition property is usually undesired since it might cause int...
|
Intelligent reflecting surface (IRS) is an enabling technology to engineer the radio signal propagation in wireless networks. By smartly tuning the signal reflection via a large number of low-cost passive reflecting elements, IRS is capable of dynamically altering wireless channels to enhance the communication performance. It is thus expected that ...
|
This correspondence studies resource allocation for a wireless-powered relay network, where a hybrid relay with constant energy supply assists an energy-constrained source to send confidential information to a destination in the presence of an eavesdropper. We propose a novel transmission protocol termed charge-then-cooperate to support secure comm...
|
Underwater wireless sensor networks (UWSNs) have emerged as an enabling technology for aquatic monitoring. However, data delivery in UWSNs is challenging, due to the harsh aquatic environment and characteristics of the underwater acoustic channel. In recent years, underwater nodes with multi-modal communication capabilities have been proposed to cr...
|
The multi-hop protocols are proved effective in the railway disaster wireless monitoring system. However, farther transmission distance with the larger data will decline the valid lifetime and reliability of the system. Most existing studies focused primarily on the communication protocols optimization, and some works tried to utilize the limited c...
|
To perform large-scale monitoring of sensitive events, energy harvesting wireless sensor network is considered where a mobile data sink MS collects data while travelling on a fixed path Pms. The sensor nodes sense environmental data continuously at a pre-specified rate. The sensors close to Pms are referred as gateways. Sensors forward their data t...
|
Communicating over multi-hop connections simplifies the establishment of wireless multi-hop networks but brings new challenges such as limited reliability, bottlenecks, and weak connections. The minimum cut of a graph is the smallest subset of edges whose removal disconnects some nodes from the others. Finding minimum cuts of a wireless multi-hop n...
|
Thanks to flexible deployment and excellent maneuverability, autonomous drones are regarded as an effective means to enable aerial data capture in large-scale wireless sensor networks with limited to no cellular infrastructure, e.g., smart farming in a remote area. A key challenge in drone-assisted sensor networks is that the autonomous drone's man...
|
Edge computing promises to facilitate the collaboration of smart sensors at the network edge, in order to satisfying the delay constraints of certain requests, and decreasing the transmission of large-volume sensory data from the edge to the cloud. Generally, the functionalities provided by smart sensors are encapsulated as services, and the satisf...
|
Radio links in Wireless Body Area Networks (WBANs) suffer from both short-term and long-term variations due to the dynamic network topology and frequent blockage caused by body movements, making it challenging to achieve reliable, energy-efficient and real-time data communication. Through experiments with TelosB motes, we observe a strong positive ...
|
With advances in wireless power transfer techniques, Battery-Free Wireless Sensor Networks (BF-WSNs) which can support long-term applications, has been attracting increasing interests in recent years. Unfortunately, the problem of Minimum Latency Aggregation Scheduling (MLAS) is not well studied in BF-WSNs. Existing works always have a rigid assump...
|
This paper studies an intelligent reflecting surface (IRS) aided wireless powered sensor network (WPSN). Specifically, a power station (PS) provides wireless energy to multiple internet of thing (IoT) devices which supports them to deliver their own messages to an access point (AP). Moreover, we deploy an IRS to enhance the performance of the WPSN ...
|
The byzantine model is widely used to depict a variety of node faults in networks. Previous studies on byzantine-resilient protocols in wireless networks assume reliable communications and do not consider the jamming behavior of byzantine nodes. Such jamming, however, is a very critical and realistic behavior to be considered in modern wireless net...
|
Sensor scheduling is a well studied problem in signal processing and control with numerous applications. Despite its successful history, most of the related literature assumes the knowledge of the underlying probabilistic model of the sensor measurements such as the correlation structure or the entire joint probability density function. Herein, a f...
|
Wireless sensor networks have wide applications in monitoring applications. However, sensors' energy and processing power constraints, as well as the limited network bandwidth, constitute significant obstacles to near-real-time requirements of modern IoT applications. Offloading sensor data on an edge computing infrastructure instead of in-cloud or...
|
Wireless sensor network (WSN) is composed of many micro sensor nodes, and the localization technology is one of the most important applications of WSN technology. At present, many positioning algorithms have high position-ing accuracy in line-of-sight (LOS) environment, but poor positioning accuracy in non-line-of-sight (NLOS) environ-ment. In this...
|
With the development of sensor-clouds, the traditional WSN is expanded and the computing capacity is greatly improved. However, there are still challenges to be solved in sensor-clouds, such as how to disseminate codes to all nodes in a fast and energy-saving way. In this paper, an early wake-up ahead (EWA) code dissemination scheme is proposed to ...
|
A subranging analog-to-digital converter (ADC) with reference-embedded comparators (RECs) is proposed. By adjusting the bias current and/or body voltage of the REC’s input differential pair, the REC offset can be adjusted to a specific voltage equal to a reference voltage referred to henceforth as the embedded reference. For the ADC’s coarse stage,...
|
As a class of context-aware systems, context-aware service recommendation aims to bind high-quality services to users while taking into account their context requirements, including invocation time, location, social profiles, connectivity, and so on. However, current CASR approaches are not scalable with the huge amount of service data (QoS and con...
|
In wireless network virtualization processes, load imbalance in substrate nodes and substrate links may significantly reduce the number of virtual network requests served by a substrate network. In addition, load imbalance also impairs resource utilization and increases embedding cost of the virtual networks. To tackle these issues, this work propo...
|
A strategy was developed for reactive power control of the line-commutated converters (LCCs) of hybrid multi-terminal high-voltage direct current (MT-HVDC) systems. In the conventional method, the reactive power outputs of hybrid MT-HVDC systems are regulated discontinuously by only using switched shunt devices (SSDs). If continuous reactive power ...
|
This work proposes a novel frequency regulation paradigm for multi-area interconnected power systems. The developed approach capitalizes on phasor measurement units (PMUs) advanced monitoring to overcome design limitations imposed by legacy supervisory control and data acquisition (SCADA) systems. For this, a novel measurement-based controller inte...
|
Compared with a power system under centralized control, a power system under fully distributed control has stronger interdependence between its physical side and cyber side. Such a system is a typical cyber-physical system (CPS). The time delay problem is one of the most critical issues in the application of distributed control for power systems. F...
|
Load frequency control (LFC) of modern power systems tends to employ open communication networks to transmit measurement/control signals. Under a limited network bandwidth, the continuous and high-sampling-rate signal transmission will be prone to degradation of the LFC performance through network congestion. This brief proposes a decentralized con...
|
Power electronic devices are important in the modern power system. Control functions and operational characteristics of power electronic devices bring higher nonlinearity and heavier calculation burden for power system analysis, especially in optimization problems. In this paper, a general steady-state model of power electronic devices in the AC-DC...
|
In this brief, we develop a novel model to study the cascading failure in cyber-physical power systems. We use a discrete packet traffic model that follows a specific routing strategy to describe the dynamic data transmission in the information network. Moreover, the dynamic load flow model that takes into account the power-frequency characteristic...
|
This article proposes a resilient reliable H8 load frequency control (LFC) design for power system involving the external load disturbances, stochastic actuator failures, and randomly occurring gain fluctuations. In this regard, the separate random variables are introduced which characterize the actuator failures and gain fluctuations in an individ...
|
Resilient distributed coordination control is studied on multiarea power systems with low inertia under hybrid attacks, including denial-of-service (DoS) attack and deception attack. The communication among various areas under the DoS attack is deteriorated to switching residual topologies whose time characteristic is modeled by model-dependent ave...
|
The renewable power-based hydrogen production can lead to the integrated electric power and hydrogen system (IPHS) and a pathway to a sustainable energy utilization. Hydrogen is mainly transported via hydrogen tube trailers (HTs), making the hydrogen energy system (HES) operation quite different from those of others energy technologies. This paper ...
|
The switching operations of circuit breakers and disconnectors in substations can generate very fast transients, including transient earth voltage rise and intense electromagnetic radiation, causing severe disturbance of on-site electronic devices in substations and seriously affecting the development of smart power equipment. The power supply of a...
|
Voltage and current waveforms contain the most authentic and granular information on the behaviors of power systems. In recent years, it has become possible to synchronize waveform data measured from different locations. Thus largescale coordinated analyses of multiple waveforms over a wide area are within our reach. This development could unle...
|
This paper proposes to utilize intentional time delays as part of controllers to improve the damping of electromechanical oscillations of power systems. Through stability theory, the control parameter settings for which these delays in Power System Stabilizers (PSSs) improve the small signal stability of a power system are systematically identi...
|
The development of vehicular Internet of Things (IoT) applications, such as E-Transport, Augmented Reality, and Virtual Reality are growing progressively. The mobility aware services and network-based security are fundamental requirements of these applications. However, multiside offloading enabling blockchain and cost-efficient scheduling in heter...
|
Mobile cloud and edge computing protocols make it possible to offer computationally heavy applications to mobile devices via computational offloading from devices to nearby edge servers or more powerful, but remote, cloud servers. Previous work assumed that computational tasks can be fractionally offloaded at both cloud processor (CP) and at a l...
|
A methodology for automating the identification of single-event transients (SETs) through Ionizing Radiation Effects Spectroscopy (IRES) and machine learning (ML) is provided. IRES enhances the identification of SETs through statistical analysis of waveform behavior, allowing for the capture of subtle circuit dynamics changes.Automated identificati...
|
Wide-area protection scheme (WAPS) provides system-wide protection by detecting and mitigating small and large-scale disturbances that are difficult to resolve using local protection schemes. As this protection scheme is evolving from a substation-based distributed remedial action scheme (DRAS) to the control center-based centralized RAS (CRAS), it...
|
We propose a framework to analyze mm-wave baluns directly from physical parameters by adding a dimension of Machine Learning (ML) to existing electromagnetic (EM) methods.From a generalized physical model of mm-wave baluns, we train physical-electrical Machine Learning models that both accurately and quickly compute the electrical parameters of mm-...
|
The communication-based train control (CBTC) system is a typical cyber physical system in urban rail transit.The train-ground communication system is a very important subsystem of the CBTC system and uses the wireless communication protocols to transmit control commands.However, it faces some potential information security risks.To ensure informati...
|
Multi-task learning technique is widely utilized in machine learning modeling where commonalities and differences across multiple tasks are exploited. However, multiple conflicting objectives often occur in multi-task learning. Conventionally, a common compromise is to minimize the weighted sum of multiple objectives which may be invalid if the obj...
|
? Due to the additive property of most machine learning objective functions, the training can be distributed to multiple machines.
? Distributed machine learning is an efficient way to deal with the rapid growth of data volume at the cost of extra inter-machine communication.
? One common implementation is the parameter server system which cont...
|
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trust worth entity in an electronic communication there are several different techniques to control phishing, including legislation and technology created specifically to protect against phishing. This project provides...
|
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trust worth entity in an electronic communication there are several different techniques to control phishing, including legislation and technology created specifically to protect against phishing. This project provide...
|
With the wide deployment of public clouds, owners of big graphs want to use the cloud to handle the scalability issues. However, the privacy and ownership of the graphs in the cloud has become a major concern. In this paper, we study privacy-preserving algorithms for graph spectral analysis of outsourced encrypted graph in the cloud. We consider a ...
|
Telemedicine is the newest technology which is the combination of telecommunication and information technology for medical purposes. An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints It is embedded as part of a complete device often including...
|
“GSM Based DC Motor Speed Control” implements the emerging applications of the GSM technology. Using GSM networks, a control system has been proposed that will act as an embedded system which can monitor and control appliances and other devices locally using built-in input and output peripherals.
Remotely the system allows the user to effectively ...
|
Home automation or smart home is building automation for the home. It involves the control and automation of lighting, heating, ventilation, air conditioning, and security, as well as home appliances such as washer/dryers, ovens or refrigerators/freezers. Wi-Fi is often used for remote monitoring and control Home devices, when remotely monitored an...
|
In this busy world, everyone using different kind of vehicle in day to day life, but they are forgetting to service their vehicle at certain time. So the lifetime of the vehicle gets reduced and lots of fire accidents are occurred each and every day. This project concept is mainly focused on preventing fire during accident in vehicle and reminding ...
|
Research is conducted in VLSI circuits and computer-aided design, building blocks for new circuit technology, integrated circuit testing and fault diagnosis, digital signal processing, computer-aided synthesis, field programmable gate arrays (FPGAs), and design of low-power circuits. Software tools are under development to assist engineers in the s...
|
An analog signal is any continuous signal for which the time varying feature of the signal is a representation of some other time varying quantity. In audio signal, noise can refer to the unwanted residual electronic noise signal that gives rise to acoustic noise heard as a hiss. Noise reduction, the recovery of the original signal from the noise- ...
|
The Internet of Medical Things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks. Medical devices equipped with Wi-Fi allow the communication that is the basis of IoMT. IoMT devices link to cloud platforms such as Things Speak, Amazon Web Services, on which captured d...
|
The disasters in underground coal mine are very serious issues to day. So the safe production of coal in the mine is an important factor to be considered. To improve the safety system in the mines, a reliable communication system must be there, between the workers of the mine, and the control base station. Wired communication system was used inside...
|
Inevitably, today’s technology keeps developing all the time, the need towards electrical energy keeps increasing. For the case, some countries have volunteered to the supply of energy by renewable energy, such as solar, wind, tidal, wave, bioethanol, etc. besides that, people concerning the technological development work harder in developing the g...
|
The Blind person navigation system can be used in house, hospitals where the blind people are living. The system consists of indoor transmitter section and blind person receiver section. The transmitter section is kept in the indoor and receiver section given to blind person. Whenever the Li-Fi receiver receives the data from transmitter section, i...
|
This project presents automatic street lamp using solar energy efficiency based on ZigBee network.
In this project, eco-friendly solar energy as source energy for street lighting system in which street lamp will glow up automatically if there is passing vehicles or human beings.
Backup power is also available for this street lighting system, d...
|
The identification of network attacks which target information and communication systems has been a focus of the research community for years. Network intrusion detection is a complex problem which presents a diverse number of challenges. Many attacks currently remain undetected, while newer ones emerge due to the proliferation of connected devices...
|
ALTEC defined and developed a framework with the main aim to process a big amount of data allowing a seamless connection between the collected information and the analyses performed by end users.This is the ASDP environment, that allows to organize data in the most adapt domain data store in order to have data ready for complex analyses. In particu...
|
Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years.With the integration of block chain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicle sat any time.Specifically, the block chain technology...
|
In this paper, heart disease prediction modeled using partially observable Markova decision process (POMDP) is proposed. In emergency, the patient is alerted through the doctor by fog computing. Ambulance sent to the location of patient at critical situations. The doctor gets the data through fog computing iFogSim. Fog computing in healthcare is a ...
|
Smart grid applications, such as teleportation, synchrophasors, remote condition monitoring, and control of assets, require timely and reliable data communication systems. Many communication architectures and solutions have been proposed to provide support for these smart grid applications, including ber networks, wireless mobile networks, wireless...
|
In this paper, the concept o 2-Layer routing for wireless 5G networks is presented. New fifth generations of the network along with the platform known asthe Internet of Things (IoT) are an upcoming trend not only in the commercial market but also in the research area. The 5G networks and IoT will be part of smart homes, smart cities and every aspec...
|
About 33,000 people die because the ambulance cannot reach them in time. It is not necessary that when you call an ambulance, the nearest ambulance will reach you. The paper describe a model to track the nearest free ambulance in the area using global positioning system and bring it to the person in distress. The GPS device continuously moves with ...
|
The evolution of multipurpose sensors over the last decades has been investigated with the aim of developing innovative devices with applications in several ?elds of technology, including in the food industry. The integration of such sensors in food packaging technology has paved the way for intelligent food packaging. These integrated systems are ...
|
In WSN network there is Cyber Attack occurs are one of the most common and most dangerous attacks among cybercrimes. The aim of these attacks is to steal the information used by individuals and organizations to conduct transactions. Phishing websites contain various hints among their contents and web browser-based information. The purpose of this s...
|
Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and proactively handled. Fault tolerance techniques are used to predict these failures and take an appropriate...
|
As global energy demand is constantly on the rise; power management has been becoming a major issue in the past decades or so due to less energy reserves. Power shutdown is a key crisis at the present time whereas disruption of power can cause a huge production loss for industries which calls for proper power management and monitoring in a systemat...
|
A united and automated fault management platform for heterogeneous optical networks is quite important for telecom operators to monitor and respond to various levels of network events. In this demo, we are demonstrating the details of the design, implementation and evaluation of the proposed Optical router platform while targeting to manage the und...
|
Some of the modern smart grid infrastructures, phasor measurement units (PMUs) for instance, are vulnerable to cyber attacks due to their ever-increasing dependence on information and communications technologies. In general, existing solutions to cyber attacks focus on creating redundancy and/or enhancing security levels of sensing and communicatio...
|
Today, the growth of technology is rapid and provides all necessary and effective solutions for the requirements. One of the most important areas of concern is security. In this scenario, IOT Asset tracking system is developed to increase the safety of women, children, people with mental disorder and any valuable items through the technology of Rad...
|
Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which is an essential process when users change their mobile phones to a different provider. However, due to the insufficient local storage and computational capabilities of the smart phones, it is often very difficult for users to backup all data from the origina...
|
With the explosive growth of mobile data demand, the fifth generation (5G) mobile network would exploit the enormous amount of spectrum in the millimeter wave (mmWave) bands to greatly increase communication capacity. There are fundamental differences between mmWave communications and existing other communication systems, in terms of high propagati...
|
In this digital world, transferring sensitive data electronically has become inevitable. The objective of this work is to hide and retrieve confidential information in image mosaics. The photo mosaic approach has been used for the creation of the mosaic and the least significant bit (LSB) technique has been adopted for the embedding of the hidden i...
|
This paper presents a technique for secret communication using Cryptography and Steganography. In this paper, the secret message of different size is hidden into an image for making the system more secure. The only authorized users can hide and extract the secret message. The secret messages of different size are used to test the system and the sys...
|
With the rapid development of communication technology in recent years, Wireless Sensor Network (WSN) has become a promising research project. WSN is widely applied in a number of fields such as military, environmental monitoring, space exploration and so on. The non-line-of-sight (NLOS) localization is one of the most essential techniques for WSN....
|
A united and automated fault management platform for heterogeneous optical networks is quite important for telecom operators to monitor and respond to various levels of network events. In this demo, we are demonstrating the details of the design, implementation and evaluation of the proposed Optical router platform while targeting to manage the und...
|
The recent growth in intensive services and applications demand has triggered the functional integration of cloud computing with edge computing capabilities. One of the main goals is to allow a fast processing to tasks with strict real time constraints in order to lower the task dropping probabi...
|
Cloud computing systems fail in complex and unexpected ways, due to unexpected combinations of events and interactions between hardware and software components. Fault injection is an effective means to bring out these failures in a controlled environment. However, fault injection experiments produce massive amounts of data, and manually analyzing t...
|
Rapid growth in numbers of connected devices including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this...
|
Fog computing as an extension of the cloud based infrastructure, provides a better computing platform than cloud computing for mobile computing, Internet of Things, etc. One of the problems is how to make full use of the resources of the fog so that more requests of applications can be executed on the edge, reducing the pressure on the network and ...
|
Distributed cloud computing environments rely on sophisticated communication and sharing paradigms for ease of access, information processing, and analysis. The challenging characteristic of such cloud computing environments is the concurrency and access as both the service provider and end-user rely on the common sharing platform. In this manuscri...
|
Security issues have resulted in severe damage to the cloud computing environment, adversely affecting the healthy and sustainable development of cloud computing. Intrusion detection is one of the technologies for protecting the cloud computing environment from malicious attacks. However, network traffic in the cloud computing environment is charac...
|