Performance analysis of vertical handover techniques based on IEEE 802.21: Media independent handover standard
The introduction of new technologies such as the new families of IEEE, third or fourth generation with long term evolution support, and WiMAX provide support for high data rate in heterogeneous networks. Providing uninterrupted and continuous ...
image image In this work, we investigate all those schemes which are used to enhance the working of MIH standard have been investigated. The basic architecture of current MIH standard with the parameters that directly affects a handover process has been ...
Analysis in big data of satellite communication network based on machine learning algorithms
With the development of satellite communication network technology, the amount of data generated every day and the rate of data growth are amazing. These different types of data (not necessarily structured) contain rich information. Based on this, ...
A novel authentication and key‐agreement scheme for satellite communication network
In these days, satellite communication networks are playing a significant role in facilitating the crucial infrastructural services that include environmental monitoring, electronic surveillance, public safety, intelligence operations for law ...
Design of lightweight key agreement protocol for Satellite Communication System. The protocol protects the userŠs real identity from adversary. Security strength of our protocol against serious attacks is verified through formal analysis. Performance ...
Revamping land coverage analysis using aerial satellite image mapping
- Gowtham Rajmohan,
- Chandru Vignesh Chinnappan,
- Alfred Daniel John William,
- Sivaparthipan Chandrakrishan Balakrishnan,
- Bala Anand Muthu,
- Gunasekaran Manogaran
The customary terrestrial survey involves direct measurement of the land dimension in a particular area. The information accuracy of land dimension changes person to person in the existing method. Moreover, it consumes more time to conduct an ...
Workflow of Aerial image mapping. image image
Artificial bee colony method for identifying eavesdropper in terrestrial cellular networks
Nowadays, with the extensive variety of uses of the terrestrial cellular network, the security requirement for these networks is expanding enormously. Although these networks have faced various attacks, the eavesdropper is the most remarkable one. ...
Artificial Bee Colony Method for Identifying Eavesdropper in Terrestrial Cellular Networks. image image
An internet of health things‐driven deep learning framework for detection and classification of skin cancer using transfer learning
As specified by World Health Organization, the occurrence of skin cancer has been growing over the past decades. At present, 2 to 3 million nonmelanoma skin cancers and 132 000 melanoma skin cancers arise worldwide annually. The detection and ...
Proposed deep learning IoHT framework. IoHT, internet of health and things. image image
A deep learning approach for detecting tic disorder using wireless channel information
Wireless signal technology performs a key role in the research area of medical science to detect diseases that are associated with the human gesture. Recently, wireless channel information (WCI) has received vast consideration because of its ...
Accuracy result of complex motor tics using machine learning methods. image image
Optimal deep learning based image compression technique for data transmission on industrial Internet of things applications
Recently, industrial Internet of things becomes more popular and it involves a group of intelligent devices linked to create systems which observe, gather, communicate, and investigate data. In this view, the demand for compression techniques in ...
Overall structural design of the presented technique. image image
On seamless and high‐bandwidth connectivity for cognitive multi‐unmanned aerial vehicle‐assisted networks
Unmanned aerial vehicles (UAVs) can be useful in many different scenarios including disaster management. UAVs can immediately reach the disaster area and collect data that can help relief and rescue activities. Nevertheless, these advantages can ...
Clustering scheme for seamless and high‐bandwidth connectivity in cognitive multi‐UAV assisted networks.
image image
Multilabel classification of remote sensed satellite imagery
- Ajay Kumar,
- Kumar Abhishek,
- Amit Kumar Singh,
- Pranav Nerurkar,
- Madhav Chandane,
- Sunil Bhirud,
- Dhiren Patel,
- Yann Busnel
Multilabel scene classification has emerged as a critical research area in the domain of remote sensing. Contemporary classification models primarily emphasis on a single object or multiobject scene classification of satellite remote sensed ...
Multi‐label Classification of Remote Sensed Satellite Imagery using Pretrained Deep Learning Neural Networks. image image
Review on remote sensing methods for landslide detection using machine and deep learning
Landslide, one of the most critical natural hazards, is caused due to specific compositional slope movement. In the past decades, due to inflation of urbanized area and climate change, a compelling expansion in landslide prevalence took place ...
This article presents various landslide detection techniques. Remote sensing methods for detection of landslide based on Machine learning and deep learning‐based classification methods have been discussed. image image
Deep learning recognition of diseased and normal cell representation
Cell classification refers to detecting normal and diseased cells from small amount of data. Sometimes, classification of cells becomes difficult because some cells fall into more than one categories/classes. Current state‐of‐the‐art cell ...
A framework of the proposed method NDCC (normal and diseased cell classification), used traditional machine learning and deep learning. image image
Leveraging mist and fog for big data analytics in IoT environment
Internet of Things (IoT) emerged as one of the leading technological advancements of our days. IoT generates enormous quantities of valuable data that need on time processing, resulting in reliable, and accurate decisions based on the Internet of ...
This article provides a systematic way to review the IoT environment according to big data analytics together with a proposed framework for patient monitoring using the mist and fog computing. Moreover, different machine learning models are applied to “...
Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks
Attack detection is a significant problem to be resolved to attain security in industrial sensor network. Few research works have been designed for performing attack discovery process with the help of different classification algorithms. However, ...
Secure Industrial sensor network using Bipolar Fully Recurrent Deep Structured Neural Learning for attack detection. In the proposed technique it measures the feature of nodes to detect the intruder, if the results are “1” it considers as a normal and if “0”...
Service‐oriented routing with Markov space‐time graph in low earth orbit satellite networks
Low earth orbit (LEO) satellite network has been more and more widely used because of its advantages of low delay, low overhead, and flexible networking. However, the reliability and effectiveness of data transmission are affected by the specific ...
SOR‐MSG: Service‐Oriented Routing with Markov Space‐time Graph. image image
A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique
As the number of user equipment (UE) in any heterogeneous network (HetNet) assisted by unmanned aerial vehicles (UAV) continues to grow, so does the number of intruder nodes. The intruder/malicious nodes are able to interfere with the ongoing data ...
Flowchart of FE technique. FE, functional encryption image image
Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities
- Dukka KarunKumar Reddy,
- Himansu Sekhar Behera,
- Janmenjoy Nayak,
- Pandi Vijayakumar,
- Bighnaraj Naik,
- Pradeep Kumar Singh
An anomaly exposure system's foremost objective is to categorize the behavior of the system into normal and untruthful actions. To estimate the possible incidents, the administrators of smart cities have to apply anomaly detection engines to avert ...
Key Findings
In this article, the strategy for the identification of network attacks against IoT networks is mentioned. Proposed techniques is applied on data set and anomalies are detected with higher accuracy in IoT enabled systems. The proposed solution ...
A survey on recent optimal techniques for securing unmanned aerial vehicles applications
Unmanned aerial vehicles (UAVs) or Drones technology has a huge potential for supporting different efficient solutions for the smart applications in our world. The applications include smart things, smart transportation, smart cities, smart ...
Unmanned aerial vehicles (UAVs) or Drones technology has a huge potential for supporting different efficient solutions for the smart applications in our world. Due to the sensitive applications of UAVs, the security has become a major concern, and ...
Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions
In a wireless Industrial Internet of Things (IIoT) network, enforcing security is a challenge due to the large number of devices forming the network and their limited computation capabilities. Furthermore, different security attacks require ...
In this paper, a framework that enables generalized security for the IIoT network using interest‐based and physical‐aware coalitions, and Blockchain has been proposed. A deep learning‐based technique for malicious IIoT device identification as a ...
Deep neuro‐fuzzy approach for risk and severity prediction using recommendation systems in connected health care
Internet of Things (IoT) and Data science have revolutionized the entire technological landscape across the globe. Because of it, the health care ecosystems are adopting the cutting‐edge technologies to provide assistive and personalized care to ...
A healthcare recommendation system has been designed that provides a multilevel decision making related to the risk and severity of the patient diseases. This system use an all‐disease classification mechanism based on convolutional neural networks to ...
The role of unmanned aerial vehicles and mmWave in 5G: Recent advances and challenges
Next‐generation wireless communication networks, in particular, the densified 5G will bring many developments to the existing telecommunications industry. The key benefits will be the higher throughput and very low latency. In this context, the ...
Consolidated synthesis on the role of UAVs and mmWave in 5G, emphasis on recent developments and challenges.
The review focuses on UAV relay architectures, identifies the relevant problems and limitations in the deployment of UAVs using mmWave in both ...