about.jpg

Filter by

Cross-Layer Distributed Attack Detection Model for the IoT

The security of IoT that is based on layered approaches has shortcomings such as the redundancy, inflexibility, and inefficiently of security solutions. There are many harmful attacks in IoT networks such as DoS and DDoS attacks, which can compromise the IoT architecture in all layers. Consequently, cross layer approach is proposed as an effective and practical security defending mechanism. Cross

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

Using X-ray Image Processing Techniques to Improve Pneumonia Diagnosis based on Machine Learning Algorithms

the diagnosis of chest disease depends in most cases on the complex grouping of clinical data and images. According to this complexity, the debate is increased between researchers and doctors about the efficient and accurate method for chest disease prediction. The purpose of this research is to enhance the first handling of the patient data to get a prior diagnosis of the disease. The main

Artificial Intelligence
Healthcare

Walk Through Event Stream Processing Architecture, Use Cases and Frameworks Survey

Nowadays events stream processing is one of the top demanding field(s) because of the business urgent need for ongoing real time analytics & decisions. Most business domains avail huge amount of data aiming to make use of each data point efficiently. Corporate(s) have a cloud of events vary from internal business transactions, social media feeds, IoT devices logs,.. etc. In this paper we would

Artificial Intelligence
Circuit Theory and Applications
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Self Balancing Quad-Copter Using PID Controller

Unmanned Aerial Vehicle (UAV) technology is considered one of the important technologies at present, which is believed to solve many problems in the future, such as delivering small-weighted goods, agriculture, and civil fields. This research paper presents the mathematical model of a quadcopter that was developed as an example of an unmanned aerial vehicle. The MATLAB and Simulink environment

Circuit Theory and Applications
Agriculture and Crops
Mechanical Design

IoT Microchip AVR Microcontroller's Fuses and Lock Bits High Voltage Programmer

This paper proposes a reliable wireless configuration bits programmer for remotely resetting incorrectly-written Microchip AVR microcontrollers' Fuses and Lock Bits. The incorrect configuration bits programming leads critically to a micro-controller malfunction which requires correct reprogramming. The proposed programmer utilizes Wi-Fi for enabling the remote configuration bits programming via a

Circuit Theory and Applications
Software and Communications

Light-Weight Face Shape Classifier for Real-Time Applications

Deep neural networks (DNNs) are memory and computationally intensive; hence they are difficult to apply to real-time systems with limited resources. Therefore, the DNN models need to be carefully optimized. The solution was a model based on a convolutional neural network (CNN) called MobileNet that decreases the computational and space complexities with classification precision loss by utilizing

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

UAV-Assisted IoT Data Collection Optimization Using Gaining-Sharing Knowledge Algorithm

Unmanned aerial vehicles (UAVs) provide an energy-efficient and robust solution for data collection from the internet of things (IoT) devices. However, the UAV’s deployment optimization, including locations of the UAV’s stop points, is necessary to save the overall energy consumption and conduct the data collection efficiently. Thus, the objective is to minimize the energy consumption of the UAV

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications

Liver Disease Diagnosis using Tree-Based Machine Learning Algorithms

Liver Disease (LD) is a lethal yet relatively common disorder that is impacting the lives of millions across the world, causing slow yet irreversible internal organ damage or total organ failure if left untreated. In this study, LD is determined as the damage a Liver sustained due to excessive drug or alcohol abuse and other causes which leave severe scarring on the Liver leading to permanent

Artificial Intelligence
Healthcare
Circuit Theory and Applications
Software and Communications

Threshold Energy Based LEACH-K Effect on the Accessibility of Wireless Sensor Networks

This paper aims to deliver an exhaustive investigation on the threshold energy parameter's direct impact on the Cluster Head (CH) selection phase in Low-Energy Adaptive Clustering Hierarchy Based on K-Means (LEACH-K) protocols. The most prominent threshold energy selection criterion out of the scarcely available research on the LEACH-K threshold energy parameter is used to simulate the LEACH-K

Artificial Intelligence
Energy and Water
Circuit Theory and Applications
Software and Communications

Intrusion Detection in VANETs and ACVs using Deep Learning

There are many novel techniques for intrusion detection in vehicular ad hoc networks and autonomous and connected vehicles. Detecting and reporting an attack is the main responsibility of an Intrusion detection system (IDS). Deep learning is used to make IDS smarter and more accurate. It implies other challenges on the other hand. This paper covers the proposed IDS based deep learning solutions

Artificial Intelligence
Circuit Theory and Applications
Software and Communications