Network lifetime has turned out to be the important thing function for comparing sensor networks in a utility precise manner. The Sensor nodes uses power with the aid of utilizing small power sources like batteries in wireless sensor networks(WSN); consequently, vigor usage in operating a Wireless Sensor Network(WSN) have to be as little as feasible. The Wi-Fi sensor community gift whole nodes of sensor creates an identical amount of packets containing information in the Wireless Sensor Network(WSN),sink nodes must relay higher packets and will be predisposed to die prior than different nodes considering fact that of the reality the power intake of sensor nodes is almost pretty much ruled with the support of info verbal alternate in vicinity of via means of sensing and processing. Thus, the overall network lifetime could also be stepped ahead through equilibrium dialog load around a sink across carefully loaded nodes and is the major problem of WSNs. At present, the diversity of networks and sincere cooperative routing method is analyzed. To preclude inequitable growth satisfactory on networks of positive type, currently we introduced one or a small number of nodes to transmit more packets. With any Wireless Sensor Networks node, both the sink and share nodes in touch. Exact Wireless Sensor Network (WSNs) uses cooperative type routing with every exceptional seeing that shared nodes permit sensor nodes to ahead tips from every other WSN since the characteristic of interchange elements amongst respective WSN planes. However, still the sensor nodes facing energy consumption problem. To avoid this problem on this paper we are imposing electrical power saving procedure in wi-fi sensor community. We will observe the reduced transmission energy simulation results of the energy saving on NS2 simulator.
Deep Learning is a relatively new Artificial Intelligence technique that has shown to be extremely effective in a variety of fields. Image categorization and also the identification of artefacts in images are being employed in visual recognition. The goal of this study is to recognize COVID-19 artefacts like cough and also breath noises in signals from realworld situations. The suggested strategy considers two major steps. The first step is a signal-to-image translation that is aided by the Constant-Q Transform (CQT) and a Mel-scale spectrogram method. Next, nine deep transfer models (GoogleNet, ResNet18/34/50/100/101, SqueezeNet, MobileNetv2, and NasNetmobile) are used to extract and also categorise features. The digital audio signal will be represented by the recorded voice. The CQT will transform a time-domain audio input to a frequency-domain signal. To produce a spectrogram, the frequency will really be converted to a log scale as well as the colour dimension will be converted to decibels. To construct a Mel spectrogram, the spectrogram will indeed be translated onto a Mel scale. The dataset contains information from over 1,600 people from all over the world (1185 men as well as 415 women). The suggested DL model takes as input the CQT as well as Melscale spectrograms derived from the breathing and coughing tones of patients diagnosed using the coswara-combined dataset. With the better classification performance employing cough sound CQT and a Mel-spectrogram image, the current proposal outperformed the other nine CNN networks. For patients diagnosed, the accuracy, sensitivity, as well as specificity were 98.9%, 97.3%, and 98.1%, respectively. The Resnet18 is the most reliable network for symptomatic patients using cough and breath sounds. When applied to the Coswara dataset, we discovered that the suggested model's accuracy (98.7%) outperforms the state-of-the-art models (85.6%, 72.9%, 87.1%, and 91.4%) according to the SGDM optimizer. Finally, the research is compared to a comparable investigation. The suggested model is more stable and reliable than any present model. Cough and breathing research precision are good enough just to test extrapolation as well as generalization abilities. As a result, sufferers at their headquarters may utilise this novel method as a main screening tool to try and identify COVID-19 by prioritising patients' RT-PCR testing and decreasing the chance of disease transmission.
The ability to determine infarction thickness using magnetic resonance perfusion modulated imaging (PWI) should assist physicians to decide how vigorously to treat severe stroke victims. Algorithms for predicting tissue fate have indeed been created, although they are largely based on hand-crafted characteristics extracted from perfusion pictures, which seem to be susceptible to background subtraction approaches. Researchers show how deep convolution neural networks (CNNs) can be used to predict final stroke infarction thickness only using primary perfusion data throughout this paper. The number of recoverable tissues determines the alternative treatments for patients with acute ischemic stroke. The accuracy of this measurement technique is currently restricted by a set threshold and limited imagining paradigms. The values collection from real-time sensors was used to create and evaluate this suggested deep learning-based stroke illness statistical method. Several deep-learning systems (CNN-LSTM, LSTM, and CNN-Bidirectional LSTM) that specialize in time series analysis prediction and classification were analyzed and compared. These findings show that noninvasive technologies that can simply measure brainwave activity by itself can forecast and track stroke illnesses in real-time throughout ordinary life are feasible. When compared with the previous measuring approaches, these findings are predicted to lead to considerable improvements in early stroke diagnosis at a lower cost and with less inconvenience.
The internet of things (IoT) technology presents an intelligent way to improve our lives and contributes to many fields such as industry, communications, agriculture, etc. Unfortunately, IoT networks are exposed to many attacks that may destroy the entire network and consume network resources. This paper aims to propose intelligent process automation and an auto-configured intelligent automation detection model (IADM) to detect and prevent malicious network traffic and behaviors/events at distributed multi-access edge computing in an IoT-based smart city. The proposed model consists of two phases. The first phase relies on the intelligent process automation (IPA) technique and contains five modules named, specifically, dataset collection and pre-processing module, intelligent automation detection module, analysis module, detection rules and action module, and database module. In the first phase, each module composes an intelligent connecting module to give feedback reports about each module and send information to the next modules. Therefore, any change in each process can be easily detected and labeled as an intrusion. The intelligent connection module (ICM) may reduce the search time, increase the speed, and increase the security level. The second phase is the dynamic adaptation of the attack detection model based on reinforcement one-shot learning. The first phase is based on a multi-classification technique using Random Forest Trees (RFT), k-Nearest Neighbor (K-NN), J48, AdaBoost, and Bagging. The second phase can learn the new changed behaviors based on reinforced learning to detect zero-day attacks and malicious events in IoT-based smart cities. The experiments are implemented using a UNSW-NB 15 dataset. The proposed model achieves high accuracy rates using RFT, K-NN, and AdaBoost of approximately 98.8%. It is noted that the accuracy rate of the J48 classifier achieves 85.51%, which is lower than the others. Subsequently, the accuracy rates of AdaBoost and Bagging based on J48 are 98.9% and 91.41%, respectively. Additionally, the error rates of RFT, K-NN, and AdaBoost are very low. Similarly, the proposed model achieves high precision, recall, and F1-measure high rates using RFT, K-NN, AdaBoost, and Bagging. The second phase depends on creating an auto-adaptive model through the dynamic adaptation of the attack detection model based on reinforcement one-shot learning using a small number of instances to conserve the memory of any smart device in an IoT network. The proposed auto-adaptive model may reduce false rates of reporting by the intrusion detection system (IDS). It can detect any change in the behaviors of smart devices quickly and easily. The IADM can improve the performance rates for IDS by maintaining the memory consumption, time consumption, and speed of the detection process.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.