259 research outputs found

    IoT based car accident detection and notification algorithm for general road accidents

    Get PDF
    With an increase in population, there is an increase in the number of accidents that happen every minute. These road accidents are unpredictable. There are situations where most of the accidents could not be reported properly to nearby ambulances on time. In most of the cases, there is the unavailability of emergency services which lack in providing the first aid and timely service which can lead to loss of life by some minutes. Hence, there is a need to develop a system that caters to all these problems and can effectively function to overcome the delay time caused by the medical vehicles. The purpose of this paper is to introduce a framework using IoT, which helps in detecting car accidents and notifying them immediately. This can be achieved by integrating smart sensors with a microcontroller within the car that can trigger at the time of an accident. The other modules like GPS and GSM are integrated with the system to obtain the location coordinates of the accidents and sending it to registered numbers and nearby ambulance to notify them about the accident to obtain immediate help at the location

    Deep Learning Based Anomaly Detection for Fog-Assisted IoVs Network

    Get PDF
    Internet of vehicles (IoVs) allows millions of vehicles to be connected and share information for various purposes. The main applications of IoVs are traffic management, emergency messages delivery, E-health, traffic, and temperature monitoring. On the other hand, IoVs lack in location awareness and geographic distribution, which is critical for some IoVs applications such as smart traffic lights and information sharing in vehicles. To support these topographies, fog computing was proposed as an appealing and novel term, which was integrated with IoVs to extend storage, computation, and networking. Unfortunately, it is also challenged with various security and privacy hazards, which is a serious concern of smart cities. Therefore, we can formulate that Fog-assisted IoVs (Fa-IoVs), are challenged by security threats during information dissemination among mobile nodes. These security threats of Fa-IoVs are considered as anomalies which is a serious concern that needs to be addressed for smooth Fa-IoVs network communication. Here, smooth communication refers to less risk of important data loss, delay, communication overhead, etc. This research work aims to identify research gaps in the Fa-IoVs network and present a deep learning-based dynamic scheme named CAaDet (Convolutional autoencoder Aided anomaly detection) to detect anomalies. CAaDet exploits convolutional layers with a customized autoencoder for useful feature extraction and anomaly detection. Performance evaluation of the proposed scheme is done by using the F1-score metric where experiments are carried out by exploiting a benchmark dataset named NSL-KDD. CAaDet also observes the behavior of fog nodes and hidden neurons and selects the best match to reduce false alarms and improve F1-score. The proposed scheme achieved significant improvement over existing schemes for anomaly detection. Identified research gaps in Fa-IoVs can give future directions to researchers and attract more attention to this new era

    UAV Based 5G Network: A Practical Survey Study

    Full text link
    Unmanned aerial vehicles (UAVs) are anticipated to significantly contribute to the development of new wireless networks that could handle high-speed transmissions and enable wireless broadcasts. When compared to communications that rely on permanent infrastructure, UAVs offer a number of advantages, including flexible deployment, dependable line-of-sight (LoS) connection links, and more design degrees of freedom because of controlled mobility. Unmanned aerial vehicles (UAVs) combined with 5G networks and Internet of Things (IoT) components have the potential to completely transform a variety of industries. UAVs may transfer massive volumes of data in real-time by utilizing the low latency and high-speed abilities of 5G networks, opening up a variety of applications like remote sensing, precision farming, and disaster response. This study of UAV communication with regard to 5G/B5G WLANs is presented in this research. The three UAV-assisted MEC network scenarios also include the specifics for the allocation of resources and optimization. We also concentrate on the case where a UAV does task computation in addition to serving as a MEC server to examine wind farm turbines. This paper covers the key implementation difficulties of UAV-assisted MEC, such as optimum UAV deployment, wind models, and coupled trajectory-computation performance optimization, in order to promote widespread implementations of UAV-assisted MEC in practice. The primary problem for 5G and beyond 5G (B5G) is delivering broadband access to various device kinds. Prior to discussing associated research issues faced by the developing integrated network design, we first provide a brief overview of the background information as well as the networks that integrate space, aviation, and land

    Automatic Building of a Powerful IDS for The Cloud Based on Deep Neural Network by Using a Novel Combination of Simulated Annealing Algorithm and Improved Self- Adaptive Genetic Algorithm

    Get PDF
    Cloud computing (CC) is the fastest-growing data hosting and computational technology that stands today as a satisfactory answer to the problem of data storage and computing. Thereby, most organizations are now migratingtheir services into the cloud due to its appealing features and its tangible advantages. Nevertheless, providing privacy and security to protect cloud assets and resources still a very challenging issue. To address the aboveissues, we propose a smart approach to construct automatically an efficient and effective anomaly network IDS based on Deep Neural Network, by using a novel hybrid optimization framework “ISAGASAA”. ISAGASAA framework combines our new self-adaptive heuristic search algorithm called “Improved Self-Adaptive Genetic Algorithm” (ISAGA) and Simulated Annealing Algorithm (SAA). Our approach consists of using ISAGASAA with the aim of seeking the optimal or near optimal combination of most pertinent values of the parametersincluded in building of DNN based IDS or impacting its performance, which guarantee high detection rate, high accuracy and low false alarm rate. The experimental results turn out the capability of our IDS to uncover intrusionswith high detection accuracy and low false alarm rate, and demonstrate its superiority in comparison with stateof-the-art methods

    Optimizing Energy Efficiency in UAV-Based Wireless Communication Networks: A Comparative Analysis of TAODV and DSR Protocols using the Trust Score Algorithm for Signal Processing

    Get PDF
    This study presents a comprehensive analysis of energy efficiency optimization in signal processing algorithms for UAV-based wireless communication networks. Employing a multifaceted approach that integrates mathematical modeling, game theory analysis, and an array of testing methodologies, the research aims to address the critical challenge of enhancing communication protocol performance while minimizing energy consumption. Central to our investigation is the development and application of the Trust Score Algorithm (TSA), a novel quantitative tool designed to evaluate and compare the efficacy of various signal processing algorithms across multiple dimensions, including energy efficiency, reliability, adaptability, security, and latency. Through detailed comparative analysis and data visualization techniques, the study reveals that the Proposed_TAODV protocol significantly outperforms traditional TAODV and DSR protocols in several key metrics. These include throughput efficiency, end-to-end delay, and packet delivery ratio, particularly as the number of UAV nodes scales up. Such findings underscore the Proposed_TAODV protocol's superior stability and performance, advocating for its potential in improving the sustainability and effectiveness of UAV-based communication networks. The research methodology encompasses both theoretical and empirical testing phases, ranging from simulation-based analysis, to validate the performance of the signal processing algorithms under varied operational conditions. The results not only affirm the superior performance of the Proposed_TAODV protocol but also highlight the utility of the TSA in guiding the selection and optimization of signal processing algorithms for UAV networks
    corecore