14 research outputs found

    Minimizing energy consumption for NOMA multi-drone communications in automotive-industry 5.0

    No full text
    The forthcoming era of the automotive industry, known as Automotive-Industry 5.0, will leverage the latest advancements in 6G communications technology to enable reliable, computationally advanced, and energy-efficient exchange of data between diverse onboard sensors, drones and other vehicles. We propose a non-orthogonal multiple access (NOMA) multi-drone communications network in order to address the requirements of enormous connections, various quality of services (QoS), ultra-reliability, and low latency in upcoming sixth-generation (6G) drone communications. Through the use of a power optimization framework, one of our goals is to evaluate the energy efficiency of the system. In particular, we define a non-convex power optimization problem while considering the possibility of imperfect successive interference cancellation (SIC) detection. Therefore, the goal is to reduce the total energy consumption of NOMA drone communications while guaranteeing the lowest possible rate for wireless devices. We use a novel method based on iterative sequential quadratic programming (SQP) to get the best possible solution to the non-convex optimization problem so that we may move on to the next step and solve it. The standard OMA framework, the Karush–Kuhn–Tucker (KKT)-based NOMA framework, and the average power NOMA framework are compared with the newly proposed optimization framework. The results of the Monte Carlo simulation demonstrate the accuracy of our derivations. The results that have been presented also demonstrate that the optimization framework that has been proposed is superior to previous benchmark frameworks in terms of system-achievable energy efficiency

    Voice Pathology Detection Using a Two-Level Classifier Based on Combined CNN–RNN Architecture

    No full text
    The construction of an automatic voice pathology detection system employing machine learning algorithms to study voice abnormalities is crucial for the early detection of voice pathologies and identifying the specific type of pathology from which patients suffer. This paper’s primary objective is to construct a deep learning model for accurate speech pathology identification. Manual audio feature extraction was employed as a foundation for the categorization process. Incorporating an additional piece of information, i.e., voice gender, via a two-level classifier model was the most critical aspect of this work. The first level determines whether the audio input is a male or female voice, and the second level determines whether the agent is pathological or healthy. Similar to the bulk of earlier efforts, the current study analyzed the audio signal by focusing solely on a single vowel, such as /a/, and ignoring phrases and other vowels. The analysis was performed on the Saarbruecken Voice Database,. The two-level cascaded model attained an accuracy and F1 score of 88.84% and 87.39%, respectively, which was superior to earlier attempts on the same dataset and provides a steppingstone towards a more precise early diagnosis of voice complications

    Detecting the Presence of Malware and Identifying the Type of Cyber Attack Using Deep Learning and VGG-16 Techniques

    No full text
    malware is malicious software (harmful program files) that targets and damage computers, devices, networks, and servers. Many types of malware exist, including worms, viruses, trojan horses, etc. With the increase in technology and devices every day, malware is significantly propagating more and more on a daily basis. The rapid growth in the number of devices and computers and the rise in technology is directly proportional to the number of malicious attacks—most of these attacks target organizations, customers, companies, etc. The main goal of these attacks is to steal critical data and passwords, blackmail, etc. The propagation of this malware may be performed through emails, infected files, connected peripherals such as flash drives and external disks, and malicious websites. Many types of research in artificial intelligence and machine learning fields have recently been released for malware detection. In this research work, we will focus on detecting malware using deep learning. We worked on a dataset that consisted of 8970 malware and 1000 non-malware (benign) executable files. The malware files were divided into five types in the dataset: Locker, Mediyes, Winwebsec, Zeroaccess, and Zbot. Those executable files were pre-processed and converted from raw data into images of size 224 * 224 * 3. This paper proposes a multi-stage architecture consisting of two modified VGG-19 models. The first model objective is to identify whether the input file is malicious or not, while the second model objective is to identify the type of malware if the file is detected as malware by the first model. The two models were trained on 80% of the data and tested on the remaining 20%. The first stage of the VGG-19 model achieved 99% accuracy on the testing set. The second stage using the VGG-19 model was responsible for detecting the type of malware (five different types in our dataset) and achieved an accuracy of 98.2% on the testing set

    Short-Term Load Forecasting in Smart Grids Using Hybrid Deep Learning

    No full text
    Load forecasting in Smart Grids (SG) is a major module of current energy management systems, that play a vital role in optimizing resource allocation, improving grid stability, and assisting the combination of renewable energy sources (RES). It contains the predictive of electricity consumption forms over certain time intervals. Load Forecasting remains a stimulating task as load data has exhibited changing patterns because of factors such as weather change and shifts in energy usage behaviour. The beginning of advanced data analytics and machine learning (ML) approaches; particularly deep learning (DL) has mostly enhanced load forecasting accuracy. Deep neural networks (DNNs) namely Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNN) have achieved popularity for their capability to capture difficult temporal dependencies in load data. This study designs a Short-Load Forecasting scheme using a Hybrid Deep Learning and Beluga Whale Optimization (LFS-HDLBWO) approach. The major intention of the LFS-HDLBWO technique is to predict the load in the SG environment. To accomplish this, the LFS-HDLBWO technique initially uses a Z-score normalization approach for scaling the input dataset. Besides, the LFS-HDLBWO technique makes use of convolutional bidirectional long short-term memory with an autoencoder (CBLSTM-AE) model for load prediction purposes. Finally, the BWO algorithm could be used for optimal hyperparameter selection of the CBLSTM-AE algorithm, which helps to enhance the overall prediction results. A wide-ranging experimental analysis was made to illustrate the better predictive results of the LFS-HDLBWO method. The obtained value demonstrates the outstanding performance of the LFS-HDLBWO system over other existing DL algorithms with a minimum average error rate of 3.43 and 2.26 under FE and Dayton grid datasets, respectively

    Detecting the Presence of Malware and Identifying the Type of Cyber Attack Using Deep Learning and VGG-16 Techniques

    No full text
    malware is malicious software (harmful program files) that targets and damage computers, devices, networks, and servers. Many types of malware exist, including worms, viruses, trojan horses, etc. With the increase in technology and devices every day, malware is significantly propagating more and more on a daily basis. The rapid growth in the number of devices and computers and the rise in technology is directly proportional to the number of malicious attacks—most of these attacks target organizations, customers, companies, etc. The main goal of these attacks is to steal critical data and passwords, blackmail, etc. The propagation of this malware may be performed through emails, infected files, connected peripherals such as flash drives and external disks, and malicious websites. Many types of research in artificial intelligence and machine learning fields have recently been released for malware detection. In this research work, we will focus on detecting malware using deep learning. We worked on a dataset that consisted of 8970 malware and 1000 non-malware (benign) executable files. The malware files were divided into five types in the dataset: Locker, Mediyes, Winwebsec, Zeroaccess, and Zbot. Those executable files were pre-processed and converted from raw data into images of size 224 * 224 * 3. This paper proposes a multi-stage architecture consisting of two modified VGG-19 models. The first model objective is to identify whether the input file is malicious or not, while the second model objective is to identify the type of malware if the file is detected as malware by the first model. The two models were trained on 80% of the data and tested on the remaining 20%. The first stage of the VGG-19 model achieved 99% accuracy on the testing set. The second stage using the VGG-19 model was responsible for detecting the type of malware (five different types in our dataset) and achieved an accuracy of 98.2% on the testing set

    Tuna Swarm Algorithm With Deep Learning Enabled Violence Detection in Smart Video Surveillance Systems

    No full text
    In smart video surveillance systems, violence detection becomes challenging to ensure public safety and security. With the proliferation of surveillance cameras in public areas, there is an increasing need for automated algorithms that can accurately and efficiently detect violent behavior in real time. This article presents a Tuna Swarm Optimization with Deep Learning Enabled Violence Detection (TSODL-VD) technique to classify violent actions in surveillance videos. The TSODL-VD technique enables the recognition of violence and can be a measure to avoid chaotic situations. In the presented TSODL-VD technique, the residual-DenseNet model is applied for feature vector generation from the input video frames and then passed into the stacked autoencoder (SAE) classifier. The SAE model is enforced to recognize the events into violence and non-violence events. To improve the violence detection effectiveness of the TSODL-VD procedure, the TSO protocol is utilized as a hyperparameter optimizer for the residual-DenseNet model. The performance validation of the TSODL-VD procedure has experimented on a benchmark violence dataset. The experimental results demonstrate that the TSODL-VD technique accomplishes precise and rapid detection outcomes over the recent state-of-the-art approaches

    Anomaly Detection in Fog Computing Architectures Using Custom Tab Transformer for Internet of Things

    No full text
    Devices which are part of the Internet of Things (IoT) have strong connections; they generate and consume data, which necessitates data transfer among various devices. Smart gadgets collect sensitive information, perform critical tasks, make decisions based on indicator information, and connect and interact with one another quickly. Securing this sensitive data is one of the most vital challenges. A Network Intrusion Detection System (IDS) is often used to identify and eliminate malicious packets before they can enter a network. This operation must be done at the fog node because the Internet of Things devices are naturally low-power and do not require significant computational resources. In this same context, we offer a novel intrusion detection model capable of deployment at the fog nodes to detect the undesired traffic towards the IoT devices by leveraging features from the UNSW-NB15 dataset. Before continuing with the training of the models, correlation-based feature extraction is done to weed out the extra information contained within the data. This helps in the development of a model that has a low overall computational load. The Tab transformer model is proposed to perform well on the existing dataset and outperforms the traditional Machine Learning ML models developed as well as the previous efforts made on the same dataset. The Tab transformer model was designed only to be capable of handling continuous data. As a result, the proposed model obtained a performance of 98.35% when it came to classifying normal traffic data from abnormal traffic data. However, the model’s performance for predicting attacks involving multiple classes achieved an accuracy of 97.22%. The problem with imbalanced data appears to cause issues with the performance of the underrepresented classes. However, the evaluation results that were given indicated that the proposed model opened new avenues of research on detecting anomalies in fog nodes

    Joint optimization of UAV-IRS placement and resource allocation for wireless powered mobile edge computing networks

    No full text
    The rapid evolution of communication systems towards the next generation has led to an increased deployment of Internet of Things (IoT) devices for various real-time applications. However, these devices often face limitations in terms of processing power and battery life, which can hinder overall system performance. Additionally, applications such as augmented reality and surveillance require intensive computations within tight timeframes. This research focuses on investigating a mobile edge computing (MEC) network empowered by unmanned aerial vehicle intelligent reflecting surfaces (UAV-IRS) to enhance the computational energy efficiency of the system through optimized resource allocation. The MEC infrastructure incorporates the energy transfer circuit (ETC) and edge server (ES), co-located with the intelligent access point (AP). To eliminate interference between energy transfer and data transmission, a time-division multiple access method is utilized. In the first phase, the ETC wirelessly transfers power to low-power IoT devices, which efficiently harvest and store the received energy in their batteries. In the second phase, IoT devices employ the stored energy for local computing or offloading tasks. Furthermore, the presence of tall buildings may obstruct communication routes, impacting system functionality. To address these challenges, we propose an optimization framework that simultaneously considers time, power, phase shift design, and local computational resources. This joint optimization problem is non-convex and non-linear, making it NP-hard. To tackle this complexity, we decompose the problem into subproblems and solve them iteratively using a convex optimization toolbox like CVX. Through simulations, we demonstrate that our proposed optimization framework significantly improves 40.7% system performance compared to alternative approaches

    Joint optimization of UAV-IRS placement and resource allocation for wireless powered mobile edge computing networks

    No full text
    The rapid evolution of communication systems towards the next generation has led to an increased deployment of Internet of Things (IoT) devices for various real-time applications. However, these devices often face limitations in terms of processing power and battery life, which can hinder overall system performance. Additionally, applications such as augmented reality and surveillance require intensive computations within tight timeframes. This research focuses on investigating a mobile edge computing (MEC) network empowered by unmanned aerial vehicle intelligent reflecting surfaces (UAV-IRS) to enhance the computational energy efficiency of the system through optimized resource allocation. The MEC infrastructure incorporates the energy transfer circuit (ETC) and edge server (ES), co-located with the intelligent access point (AP). To eliminate interference between energy transfer and data transmission, a time-division multiple access method is utilized. In the first phase, the ETC wirelessly transfers power to low-power IoT devices, which efficiently harvest and store the received energy in their batteries. In the second phase, IoT devices employ the stored energy for local computing or offloading tasks. Furthermore, the presence of tall buildings may obstruct communication routes, impacting system functionality. To address these challenges, we propose an optimization framework that simultaneously considers time, power, phase shift design, and local computational resources. This joint optimization problem is non-convex and non-linear, making it NP-hard. To tackle this complexity, we decompose the problem into subproblems and solve them iteratively using a convex optimization toolbox like CVX. Through simulations, we demonstrate that our proposed optimization framework significantly improves 40.7% system performance compared to alternative approaches

    Optimal Multikey Homomorphic Encryption with Steganography Approach for Multimedia Security in Internet of Everything Environment

    No full text
    Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of Things (IoT) which finds helpful in several applications namely smart city, smart home, precise agriculture, healthcare, logistics, etc. Despite the benefits of IoE, it is limited to processing and storage abilities, resulting in the degradation of device safety, privacy, and efficiency. Security and privacy become major concerns in the transmission of multimedia data over the IoE network. Encryption and image steganography is considered effective solutions to accomplish secure data transmission in the IoE environment. For resolving the limitations of the existing works, this article proposes an optimal multikey homomorphic encryption with steganography approach for multimedia security (OMKHES-MS) technique in the IoE environment. Primarily, singular value decomposition (SVD) model is applied for the separation of cover images into RGB elements. Besides, optimum pixel selection process is carried out using coyote optimization algorithm (COA). At the same time, the encryption of secret images is performed using poor and rich optimization (PRO) with multikey homomorphic encryption (MKHE) technique. Finally, the cipher image is embedded into the chosen pixel values of the cover image to generate stego image. For assessing the better outcomes of the OMKHES-MS model, a wide range of experiments were carried out. The extensive comparative analysis reported the supremacy of the proposed model over the rennet approaches interms of different measures
    corecore