Search results for "55"
showing 10 items of 2320 documents
Artes marciales japonesas: prácticas corporales representativas de su identidad cultural
2011
La implantación y difusión de las artes marciales japonesas en Occidente supuso la importación de prácticas socioculturales privadas de las premisas de su contexto de origen. ¿Cómo afrontar estas prácticas que son ajenas a nuestra identidad cultural? Una interpretación estricta exige entenderlas como prácticas corporales con una idiosincrasia cultural, caracterizadas por incorporar una experiencia vivencial en la que el cuerpo ocupa un lugar preeminente. Su enseñanza y aprendizaje se establecen a través de un sistema triangular integrado por una esencia espiritual, una forma técnica y una estructura física (sin-gi-tai), que se inserta en un proceso singular (shu-ha-ri).
Blockchain-Based Land Registration System: A Conceptual Framework
2022
Land registration authorities are frequently held accountable for the alleged mismanagement and manipulation of land records in various countries. Pakistan’s property records are especially vulnerable to falsification and corruption because of the country’s poverty. Different parties therefore claim varying degrees of authority over a specific piece of land. Given the fact that this data has been consolidated, it has become significantly more vulnerable to security threats. The goal of decentralized system research has been to increase the reliability of these systems. In order to fix the flaws of centralized systems, blockchain-based decentralized systems are currently in development. By u…
An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm
2022
Improving wireless communication and artificial intelligence technologies by using Internet of Things (Itoh) paradigm has been contributed in developing a wide range of different applications. However, the exponential growth of smart phones and Internet of Things (IoT) devices in wireless sensor networks (WSNs) is becoming an emerging challenge that adds some limitations on Quality of Service (QoS) requirements. End-to-end latency, energy consumption, and packet loss during transmission are the main QoS requirements that could be affected by increasing the number of IoT applications connected through WSNs. To address these limitations, an effective routing protocol needs to be designed for …
In the Direction of Service Guarantees for Virtualized Network Functions
2022
The trend of consolidating network functions from specialized hardware to software running on virtualization servers brings significant advantages for reducing costs and simplifying service deployment. However, virtualization techniques have significant limitations when it comes to networking as there is no support for guaranteeing that network functions meet their service requirements. In this paper, we present a design for providing service guarantees to virtualized network functions based on rate control. The design is a combination of rate regulation through token bucket filters and the regular scheduling mechanisms in operating systems. It has the attractive property that traffic profi…
Face Mask Detection Using Deep Convolutional Neural Network and MobileNetV2-Based Transfer Learning
2022
The rapid spreading of Coronavirus disease 2019 (COVID-19) is a major health risk that the whole world is facing for the last two years. One of the main causes of the fast spreading of this virus is the direct contact of people with each other. There are many precautionary measures to reduce the spread of this virus; however, the major one is wearing face masks in public places. Detection of face masks in public places is a real challenge that needs to be addressed to reduce the risk of spreading the virus. To address these challenges, an automated system for face mask detection using deep learning (DL) algorithms has been proposed to control the spreading of this infectious disease effecti…
A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks
2022
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks on a network, violating network policies, and gaining unauthorized access to a network. The effectiveness of IDS is highly dependent on data preprocessing techniques and classification models used to enhance accuracy and reduce model training and testing time. For the purpose of anomaly identification, researchers have developed several machine learning and deep learning-based algorithms; nonetheless, accurate anomaly detection with low test and train times remains a challenge. Using a hybrid feature selection approach and a deep neural network- (DNN-) based classifier, the authors of this re…
An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home
2022
The delivery of unified intelligent services is accomplished through a networked environment comprised of a wide array of electronic devices. Through the use of Internet of Things (IoT) technology, smart homes collect data from their surroundings and use it to improve their tenants’ lives. Remote control, real-time monitoring, and a fire alarm are all characteristics of smart home security. Since smart homes hold personally identifying information about their residents, security is critical to ensure their reliability and prevent data breaches. In this paper, a certificateless online/offline signcryption (COOS) technique for IoT-enabled smart homes is proposed. The proposed solution takes a…
Internet of Things-Based Fire Alarm Navigation System: A Fire-Rescue Department Perspective
2022
In the past few years, fire alarm systems have become increasingly sophisticated and more capable and reliable. The two main objectives are the protection of life and property. As a result of state and local codes, fire protection has become more concerned with life safety over the past two decades. Several safety measures have been implemented to address the problems caused by the fires and reduce the number of fatalities and property damage. Our project is to develop and review a fire alarm navigation system and application that uses the internet of things. Fire alarm systems are designed to warn people about fires in advance so that they can evacuate the fire-affected area and take immed…
Energy-efficient routing control algorithm in large-scale WSN for water environment monitoring with application to Three Gorges Reservoir area
2013
Published version of an article in the journal: The Scientific World Journal. Also available from the publisher at: http://dx.doi.org/10.1155/2014/802915 Open Access The typical application backgrounds of large-scale WSN (wireless sensor networks) for the water environment monitoring in the Three Gorges Reservoir are large coverage area and wide distribution. To maximally prolong lifetime of large-scale WSN, a new energy-saving routing algorithm has been proposed, using the method of maximum energy-welfare optimization clustering. Firstly, temporary clusters are formed based on two main parameters, the remaining energy of nodes and the distance between a node and the base station. Secondly,…
A Machine Learning in Binary and Multiclassification Results on Imbalanced Heart Disease Data Stream
2022
In medical filed, predicting the occurrence of heart diseases is a significant piece of work. Millions of healthcare-related complexities that have remained unsolved up until now can be greatly simplified with the help of machine learning. The proposed study is concerned with the cardiac disease diagnosis decision support system. An OpenML repository data stream with 1 million instances of heart disease and 14 features is used for this study. After applying to preprocess and feature engineering techniques, machine learning approaches like random forest, decision trees, gradient boosted trees, linear support vector classifier, logistic regression, one-vs-rest, and multilayer perceptron are u…