An efficient RBF‐DCNN based DOA estimation in multipath and impulse noise wireless environment
The typical MultiPath (MP) propagation environment attains lots of MP signals as of the antenna array, and the Impulse Noise (IPN) accompanies these MP signals. The Directions‐of‐Arrivals (DOA) of an MP signal is tough to be assessed because of ...
The proposed work comprises “5” phases: (i) pre‐processing, (ii) Feature Extraction (FE), (iii) DR, (iv) DOAE, and (v) post‐processing. In this, the signals‐to‐noise ratio (SNR) is regarded and fixed as the fitness values. At last, the output is attained ...
Anomaly Detection in IoT Network Traffic Using Bidirectional 3D Quasi‐Recurrent Neural Network Optimize With Coati Optimization Algorithm
Anomaly detection in Internet of Things (IOT) network traffic involves identifying abnormal patterns or behaviors, enabling early detection of potential security threats or system malfunctions in the IOT ecosystem. IoT encompasses a variety of ...
Anomaly detection in Internet of Things (IOT) network traffic involves identifying abnormal patterns or behaviors, enabling early detection of potential security threats or system malfunctions in the IOT ecosystem. IoT encompasses a variety of networks, ...
Enhancing Smart Grid Security Using BLS Privacy Blockchain With Siamese Bi‐LSTM for Electricity Theft Detection
Energy management inside a blockchain framework developed for smart grids is primarily concerned with improving intrusion detection to protect data privacy. The emphasis is on real‐time detection of cyberattacks and preemptive forecasting of ...
Attentive Dual Residual Generative Adversarial Network for Energy‐Aware Routing Through Golden Search Optimization Algorithm in Wireless Sensor Network Utilizing Cluster Head Selection
Wireless Sensor Networks (WSNs) are extensively used in event monitoring and tracking, particularly in scenarios that require minimal human intervention. However, a key challenge in WSNs is the short lifespan of sensor nodes (SN), as continuous ...
Wireless Sensor Networks (WSNs) have become indispensable for monitoring and tracking events autonomously, without human intervention. However, a critical challenge in WSNs is the short lifespan of sensor nodes due to continuous sensing, leading to rapid ...
Exploring Illumination and Communication: A Comprehensive Analysis of LED Lighting in Modern Interior Architectural Designs, Enhanced by Weighted Sum Model and Cluster Analysis for Informed Lighting Selection
The study of light is crucial in modern interiors, as it dispels darkness and enhances both functionality and aesthetics. From the primal flicker of flames in ancient caves to the advanced light emitting diode (LED) systems of today, lighting ...
The work evaluates the performance of various light emitting diode‐based lighting configurations in modern architectural designs focusing on their dual function for illumination and visible light communication (VLC). Key metrics such as illuminance, ...
BGHO‐E2EB Model: Enhancing IoT Security With Gaussian Artificial Hummingbird Optimization and Blockchain Technology
The Internet of Things (IoT) is transforming numerous sectors but also presents unique security challenges due to its interconnected and resource‐constrained devices. This study introduces the Bidirectional Gaussian Hummingbird Optimized End‐to‐...
Graphical representation of the detection and classification of cyberattack. image image
Joint Power and Delay Optimization‐Based Resource Allocation in Mu‐MIMO‐OFDM System: Deep Convolutional Red Piranha Pyramid‐Dilated Neural Network
In general, Multi‐User Multiple Input Multiple Output Orthogonal Frequency Division Multiplexing (MU‐MIMO‐OFDM) enables multiple users to simultaneously communicate with a single base station using multiple antennas and OFDM modulation. ...
image image
FL‐IDPP: A Federated Learning Based Intrusion Detection Approach With Privacy Preservation
The growing adoption of Internet of Things (IoT) devices has led to a rising concern about the security of these networks. This paper proposes a proactive intrusion recognition method, FL‐IDPP, ensuring privacy preservation for IoT networks ...
This paper proposes a proactive intrusion recognition method, FL‐IDPP for Internet of Things (IoT) networks using federated learning (FL) and ensemble learning. Our approach employs bidirectional recurrent neural network (RNN) models to detect anomalies ...
Design of Nonstandard Waveguide Slot Array Antenna for High‐Power Applications
Waveguide slot array antennas are extensively used in radar systems, satellite communications, and wireless networks due to their high gain, low side lobe levels, and good impedance matching. Conversely, designing these antennas for high‐power ...
The proposed Mode Matching Based Deep Neural Method (MMbDNM) optimizes waveguide slot array antenna designs, enhancing coupling efficiency, and minimizing signal loss.
By integrating deep learning techniques, this approach streamlines the design process,...
Smart Homes of the Future
- Absalom E. Ezugwu,
- Olutosin Taiwo,
- Ojonukpe S. Egwuche,
- Laith Abualigah,
- Annette Van Der Merwe,
- Jayanta Pal,
- Apu K. Saha,
- Ahmed Ibrahim Alzahrani,
- Fahad Alblehai,
- Japie Greeff,
- Micheal O. Olusanya
The advent of the Internet of Things (IoT) has transformed the concept of smart home automation, thereby allowing users to remotely interact with their houses and control home appliances for resource efficiency. This technological development ...
The advent of the Internet of Things (IoT) has revolutionized the concept of smart homes, allowing users to remotely interact with their houses. This technological development has significantly improved convenience, safety, and overall lifestyles for ...
Deep Reinforcement Learning Based Subcarrier Allocation With End‐To‐End Implicit CSI Acquisition in Multiuser OFDM Systems
In multiuser orthogonal frequency division multiplexing (OFDM) systems, subcarrier allocation is a key means for improving the system capacity. During subcarrier allocation process, the channel state information (CSI) plays a key role. Recently, ...
In this article, subcarrier allocation with implicit CSI acquisition in multiuser OFDM systems is studied. To adapt to implicit CSI, a DDPG based proportional fairness (PF) subcarrier allocation scheme is proposed to maximize the long term PF utility. ...
Innovative Video Anomaly Detection: TCN‐AnoDetect With Self‐Supervised Feature Learning
Video anomaly detection is a critical task in surveillance, industrial quality control, and anomaly monitoring systems. Recognizing anomalous events or behaviors within video sequences is challenging due to the diverse and often vague nature of ...
Architecture of self‐supervised learning framework “ConvLSTM”. TCN‐AnoDetect introduces a novel approach to video anomaly detection by combining self‐supervised feature learning with TCNs to address the challenges of anomaly detection effectively. The ...
HACDRAN: A Novel Hybrid Atrous Convolution Model With Densenet and Residual Attenuation Network for Multi‐Plant Leaf Disease Classification
The beneficiation of the plant is majorly crucial for both the environment and human life. The crops do trouble from disorders like other species. Various plant leaf disorders happen and trouble the general growth of the crop. These crop leaf ...
The global need for the production of the agricultural sector is enhancing because of population growth. Plant disorders in the agricultural field lead to financial losses and management issues. Plant disorder is nowadays becoming highly critical because ...
Performance of SWIPT‐Assisted CNOMA System With P‐CSI User Selection Under Nakagami‐m Fading
This paper focuses on the performance investigation of a cooperative non‐orthogonal multiple access (CNOMA) system consisting of a single base station (BS), multiple near users, and a single far user. The near users are energy‐constrained and ...
Healthcare Data Security and Privacy Protection Framework Based on Dual Channel Blockchain
The integration of blockchain technology with healthcare digitalization has the potential to improve data management, reduce administrative costs, increase data security and privacy, and enhance querying capabilities. However, in the traditional ...
Key Findings: 1. A consortium blockchain‐based framework is proposed for securing and querying healthcare data, which considers multiple healthcare entities, including hospitals, doctors, patients, data analysts, and other Third‐Party Alliances (TPAs). 2. ...
A Probabilistic Routing Algorithm Based on CNN and Q‐Learning for Vehicular Edge Network
Vehicular edge networks represent a novel architecture that utilizes vehicles as mobile edge nodes, characterized by high‐speed dynamic changes. To effectively transmit data in vehicular edge networks, opportunistic routing methods can be ...
image image
Modeling of Multi Hermite‐Gaussian MDM Based Passive Star ITU G.989.x Standardardized PON System
Passive optical network (PON) is one of the key enabling technologies to fulfill the latest exceptional bandwidth demand owing to an exponential rise of Internet data traffic induced by the expansion of bandwidth‐hungry applications services. ...
In this work, a star topology based multi Hermite‐Gaussian MDM‐NGPON using VCSEL for high efficiency transmission is proposed and investigated. It enhances bandwidth utilization efficiency, operation functionality, cost effectiveness and power consumption ...