4,575 research outputs found

    Automated identification of river hydromorphological features using UAV high resolution aerial imagery

    Get PDF
    European legislation is driving the development of methods for river ecosystem protection in light of concerns over water quality and ecology. Key to their success is the accurate and rapid characterisation of physical features (i.e., hydromorphology) along the river. Image pattern recognition techniques have been successfully used for this purpose. The reliability of the methodology depends on both the quality of the aerial imagery and the pattern recognition technique used. Recent studies have proved the potential of Unmanned Aerial Vehicles (UAVs) to increase the quality of the imagery by capturing high resolution photography. Similarly, Artificial Neural Networks (ANN) have been shown to be a high precision tool for automated recognition of environmental patterns. This paper presents a UAV based framework for the identification of hydromorphological features from high resolution RGB aerial imagery using a novel classification technique based on ANNs. The framework is developed for a 1.4 km river reach along the river Dee in Wales, United Kingdom. For this purpose, a Falcon 8 octocopter was used to gather 2.5 cm resolution imagery. The results show that the accuracy of the framework is above 81%, performing particularly well at recognising vegetation. These results leverage the use of UAVs for environmental policy implementation and demonstrate the potential of ANNs and RGB imagery for high precision river monitoring and river management

    Security and Privacy in Wireless Sensor Networks

    Get PDF

    RLIS: resource limited improved security beyond fifth generation networks using deep learning algorithms.

    Get PDF
    This study explores the feasibility of allocating finite resources beyond fifth generation networks for extended reality applications through the implementation of enhanced security measures via offloading analysis (RLIS). The quantification of resources is facilitated through the utilization of parameters, namely energy, capacity, and power, which are equipped with proximity constraints. These constraints are then integrated with activation functions in both multilayer perceptron and long short term memory models. Furthermore, the system model has been developed using vision-based computing, which involves managing data queues in terms of waiting periods to minimize congestion for data transmission with limited resources. The major significance of the proposed method is to utilize allocated spectrums for future generation networks by allocating necessary resources and therefore high usage of resources by all users can be avoided. In addition the advantage of the proposed method is secure the networks that operate beyond 5G where more number of users will try to share the allocated resources that needs to be provided with high security conditions

    IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

    Full text link
    With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network. In this paper, we present IOT SENTINEL, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that IOT SENTINEL is effective in identifying device types and has minimal performance overhead
    • …
    corecore