Search results for "NETWORKS"
showing 10 items of 3260 documents
Statistical modeling, simulation, and experimental verification of wideband indoor mobile radio channel
2018
This paper focuses on the modeling, simulation, and experimental verification of wideband single-input single-output (SISO) mobile fading channels for indoor propagation environments. The indoor reference channel model is derived from a geometrical rectangle scattering model, which consists of an infinite number of scatterers. It is assumed that the scatterers are exponentially distributed over the two-dimensional (2D) horizontal plane of a rectangular room. Analytical expressions are derived for the probability density function (PDF) of the angle of arrival (AOA), the PDF of the propagation path length, the power delay profile (PDP), and the frequency correlation function (FCF). An efficie…
An Effective Wireless Sensor Network Routing Protocol Based on Particle Swarm Optimization Algorithm
2022
Improving wireless communication and artificial intelligence technologies by using Internet of Things (Itoh) paradigm has been contributed in developing a wide range of different applications. However, the exponential growth of smart phones and Internet of Things (IoT) devices in wireless sensor networks (WSNs) is becoming an emerging challenge that adds some limitations on Quality of Service (QoS) requirements. End-to-end latency, energy consumption, and packet loss during transmission are the main QoS requirements that could be affected by increasing the number of IoT applications connected through WSNs. To address these limitations, an effective routing protocol needs to be designed for …
In the Direction of Service Guarantees for Virtualized Network Functions
2022
The trend of consolidating network functions from specialized hardware to software running on virtualization servers brings significant advantages for reducing costs and simplifying service deployment. However, virtualization techniques have significant limitations when it comes to networking as there is no support for guaranteeing that network functions meet their service requirements. In this paper, we present a design for providing service guarantees to virtualized network functions based on rate control. The design is a combination of rate regulation through token bucket filters and the regular scheduling mechanisms in operating systems. It has the attractive property that traffic profi…
Face Mask Detection Using Deep Convolutional Neural Network and MobileNetV2-Based Transfer Learning
2022
The rapid spreading of Coronavirus disease 2019 (COVID-19) is a major health risk that the whole world is facing for the last two years. One of the main causes of the fast spreading of this virus is the direct contact of people with each other. There are many precautionary measures to reduce the spread of this virus; however, the major one is wearing face masks in public places. Detection of face masks in public places is a real challenge that needs to be addressed to reduce the risk of spreading the virus. To address these challenges, an automated system for face mask detection using deep learning (DL) algorithms has been proposed to control the spreading of this infectious disease effecti…
A Deep Learning-Based Framework for Feature Extraction and Classification of Intrusion Detection in Networks
2022
An intrusion detection system, often known as an IDS, is extremely important for preventing attacks on a network, violating network policies, and gaining unauthorized access to a network. The effectiveness of IDS is highly dependent on data preprocessing techniques and classification models used to enhance accuracy and reduce model training and testing time. For the purpose of anomaly identification, researchers have developed several machine learning and deep learning-based algorithms; nonetheless, accurate anomaly detection with low test and train times remains a challenge. Using a hybrid feature selection approach and a deep neural network- (DNN-) based classifier, the authors of this re…
An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home
2022
The delivery of unified intelligent services is accomplished through a networked environment comprised of a wide array of electronic devices. Through the use of Internet of Things (IoT) technology, smart homes collect data from their surroundings and use it to improve their tenants’ lives. Remote control, real-time monitoring, and a fire alarm are all characteristics of smart home security. Since smart homes hold personally identifying information about their residents, security is critical to ensure their reliability and prevent data breaches. In this paper, a certificateless online/offline signcryption (COOS) technique for IoT-enabled smart homes is proposed. The proposed solution takes a…
Post-Quantum Secure Identity-Based Encryption Scheme using Random Integer Lattices for IoT-enabled AI Applications
2022
Identity-based encryption is an important cryptographic system that is employed to ensure confidentiality of a message in communication. This article presents a provably secure identity based encryption based on post quantum security assumption. The security of the proposed encryption is based on the hard problem, namely Learning with Errors on integer lattices. This construction is anonymous and produces pseudo random ciphers. Both public-key size and ciphertext-size have been reduced in the proposed encryption as compared to those for other relevant schemes without compromising the security. Next, we incorporate the constructed identity based encryption (IBE) for Internet of Things (IoT) …
Internet of Things-Based Fire Alarm Navigation System: A Fire-Rescue Department Perspective
2022
In the past few years, fire alarm systems have become increasingly sophisticated and more capable and reliable. The two main objectives are the protection of life and property. As a result of state and local codes, fire protection has become more concerned with life safety over the past two decades. Several safety measures have been implemented to address the problems caused by the fires and reduce the number of fatalities and property damage. Our project is to develop and review a fire alarm navigation system and application that uses the internet of things. Fire alarm systems are designed to warn people about fires in advance so that they can evacuate the fire-affected area and take immed…
A Machine Learning-Based Intelligence Approach for Multiple-Input/Multiple-Output Routing in Wireless Sensor Networks
2022
Computational intelligence methods play an important role for supporting smart networks operations, optimization, and management. In wireless sensor networks (WSNs), increasing the number of nodes has a need for transferring large volume of data to remote nodes without any loss. These large amounts of data transmission might lead to exceeding the capacity of WSNs, which results in congestion, latency, and packet loss. Congestion in WSNs not only results in information loss but also burns a significant amount of energy. To tackle this issue, a practical computational intelligence approach for optimizing data transmission while decreasing latency is necessary. In this article, a Softmax-Regre…
Methodological advances in brain connectivity
2012
Determining how distinct neurons or brain regions are connected and communicate with each other is a crucial point in neuroscience, as it allows to investigate how the functional integration of specialized neural populations enables the emergence of coherent cognitive and behavioral states. The general concept of brain connectivity encompasses different aspects: structural connectivity is related to the description of anatomical pathways and synaptic connections; functional connectivity investigates statistical dependencies between spatially separated brain regions; effective connectivity refers to models aimed at elucidating driver-response relationships. The study of these different modes…