Investigation article
09. November 2022
K. Sathish|C. V. Ravikumar|...|Olutayo Oyeyemi Oyerinde
Planet Earth is the richest place in water because the oceans cover more than 75% of its land surface. Due to the extraordinary activity at depth, we know very little about the oceans. Wireless underwater sensors are tools that can continuously transmit data to one of the source sensors, as well as monitor and record the physical and environmental parameters of its surroundings. An underwater wireless sensor network (UWSN) is the name given to the network created by the collection of these underwater wireless sensors. This particular technology is the most efficient way to analyze performance parameters. A network path is chosen to send traffic using the routing method, a process also known as protocol. Ad-hoc Demand Distance Vector Routing (AODV) protocols, Dynamic Source Routing (DSR), Dynamic Demand Routing (DYMO) protocol, Location Assisted Routing 1 (LAR 1), Optimized Link State Routing (OLSR), Tree Adaptive Routing source, Optimal Routing Approach (STAR-ORA), Zone Routing Protocol (ZRP), and STAR-Least Overhead Routing Approach (STAR-LORA) are some models of routing techniques. By changing the number of nodes in the model and the maximum speed of each node, performance parameters such as average transmit delay, average jitter, percentage utilization, and power used in transmit and receive modes are examined. . The results obtained with the QualNet 7.1 simulator suggest the adequacy of the routing protocols in the UWSN.
Read the full article
Investigation article
08. November 2022
Hailu Gizachew - Yirga (Official Video)
MANET (Mobile Ad Hoc Network) is a wireless ad hoc network comprised of mobile devices that use point-to-point routing to provide network access instead of using pre-existing network infrastructure. Despite the simplicity of the network infrastructure, it faces problems such as variable link capacity, dynamic topology, node battery depletion, and inadequate physical security. Broadcasting is a standard MANET approach for sending messages from one source node to all other nodes on the network. Flooding is a common method of transmitting RREQ (Routing Request) packets, which are vulnerable to broadcast storms. The high retransmission rate is caused by the standard flooding technique which causes media congestion and packet collisions which can drastically reduce throughput and network throughput. In a mobile ad hoc network, efficient transmission focuses on selecting a compact set of forwarding nodes while ensuring transmission coverage. The goal is to find a limited number of forwarding nodes that provide full coverage. In this article, we propose an optimized and energy efficient routing protocol for MANET (mobile ad hoc network) based on dynamic forwarding probability in general and AODV (ad hoc distance vector on demand) in particular, where the packets requested by the route are randomized to increase network resilience and reduce packet loss in the flooding algorithm. We test and evaluate the results of our proposed solution against various network performance factors once implemented and integrated into the NS-2. According to the simulation results, our proposed technique effectively reduced the Route Request Propagation (RREQ) messages. The proposed technique is more efficient, has a longer network lifetime, and evenly uses the residual power of the node, improves network performance, and minimizes routing overhead compared to regular and modified AODV protocols.
Read the full article
Investigation article
11. October 2022
Driss Ait Omar|Hamid Garmani|...|Mohamed Baslam
This article attempts to examine the complex features of the communications market in which Internet Service Providers (ISPs) lease network access services and compete to serve a large group of subscribers. To do this, we analyze the dynamics of a mixed duopoly game with two decision parameters: price and quality of service (QoS). We calculate and discuss the stability of each equilibrium solution using the nonlinear system. A numerical simulation is used to show the shift from bifurcation to chaos through the decisions of different state ISPs. We have found that the Nash equilibrium loses stability as the tuning speed and baud rate increase. We show that the system parameter changes the stability of the communication market. In addition, we use a control method to keep the communications market in a stable state.
Read the full article
Investigation article
08. October 2022
Lijie Zhou | Weihai Yu
Convolutional Neural Network (CNN) is a very important method in deep learning that solves many complex pattern recognition problems. Fruitful results have been obtained in image recognition, speech recognition and natural language processing. Compared with the traditional neural network, the convolution weight division, sparse connection, and pooling operations in the convolution neural network greatly reduce the number of training parameters, reduce the size of the feature map, simplify the network model and improve training efficiency. Based on the convolution operation, the pooling operation, the Softmax classifier, and the LeNet-5 enhanced convolutional neural network network optimization algorithm, this article performs image recognition experiments on handwritten digits and facial data sets. , respectively. A method combining a local binary pattern and a convolutional neural network is proposed for facial recognition research. Through experiments, it was found that adding LBP image information to the advanced convolutional neural network of LeNet-5 can improve the accuracy of face recognition to 99.8%, which has important theoretical and practical significance.
Read the full article
Investigation article
05. October 2022
Minfeng-chen
As the "new oil of the future", big data will become the main industry of the new economy, the main asset of the country and companies, the "new blue ocean" to be followed and the national strategy to be developed by all countries . . The development of big data and related technology supports and promotes a new round of technological innovation, creates a new generation of information security technology reform and innovation, and provides opportunities and challenges for optimizing and consolidating national information security. What are the challenges and impacts of information security in the age of big data? And is it crucial to explore reaction strategies? At present, China has become the world's largest number of Internet users and the largest number of people using smart phones, but since information security in China is at an early stage and includes information security information, especially the national information security laws and regulations are not many. There are not many national social supervision and monitoring mechanisms, the application level of science and technology content is relatively backward, the core technology does not have much proprietary technology, resulting in today's flood network data. Therefore, the illegal secret activities of the "data industry chain" are widespread. Therefore, this article proposes a security model based on the combination of distributed data analysis technology and data resources. The model uses data resources to dynamically generate a library of situation anomalies, effectively solving the problem of analyzing and processing rapidly and dynamically generated data streams, increasing the detection rate to more than 98%, effectively reducing the possibility of erroneous detection and achieving good results in large records.
Read the full article
review article
26. September 2022
Angelina Ankah Amengu - Jamal Deen Abdulai (Offizieller Video Clip) Angelina Ankah Amengu - Jamal Deen Abdulai (Offizieller Video Clip)
Wireless Sensor Networks (WSNS) have become an indispensable tool in this era of technological advancement, mainly due to advances in the Internet of Things. Wireless sensor nodes are used to collect important environmental data and transmit it to a base station for analysis. However, the limited battery power of the sensor nodes depletes quickly if they are awake for a long time. Research has shown that the key sources of sensor node power dissipation are idle listening, packet collision, controller overload, and listening. An ideal solution is to use a low duty cycle Mac protocol, specifically the Sensor Mac Protocol (SMAC). It is important to have a detailed understanding of the challenges identified in the SMAC and the proposed solutions to mitigate those challenges and future directions. In this article, we discuss the techniques in the SMAC protocols implemented in WSNS. In particular, we provide highlights of recent developments in the schemes used in SMAC to mitigate SMAC challenges and present research gaps in the SMAC protocol. Finally, we discuss open questions that need to be addressed to move forward with the design and implementation of SMAC in WSN applications.
Read the full article