36 research outputs found

    Spreading Code Identification of Legal Drones in IoT Environment

    Get PDF
    The widespread use of drones has become very common today with large-scale civil and military applications. In the next few coming years, the outlook is expected that the number of drones will reach millions. So, these need to be well organised and managed in order to achieve the benefits of IoT with this accelerated environment. Drones or Unmanned Aerial Vehicles (UAVs) must achieved a level of communications to authenticate a legal working. The proposed approach concentrated on preparing each drone with identification key based on the combination of its international sim number with the date of the first action and the local country code. This approach is called Drone IDentification (DID) that generate a unique code for each drone via spreading technique. In this case any drone not apply this regulation is considered as unauthenticated drone and does not allowed to fly. This approach is very important to establish drone regulation via IoT

    Speaker identification based on hybrid feature extraction techniques

    Get PDF
    One of the most exciting areas of signal processing is speech processing; speech contains many features or characteristics that can discriminate the identity of the person. The human voice is considered one of the important biometric characteristics that can be used for person identification. This work is concerned with studying the effect of appropriate extracted features from various levels of discrete wavelet transformation (DWT) and the concatenation of two techniques (discrete wavelet and curvelet transform) and study the effect of reducing the number of features by using principal component analysis (PCA) on speaker identification. Backpropagation (BP) neural network was also introduced as a classifier

    The Mechanism of Monitoring and Tracking of Healthcare Systems

    Get PDF
    This work concerned with e-healthcare that transmit digital medical data through healthcare system. Online monitoring is concentrated on the process of monitoring and tracking of people at home, car, office, and any other location. e-healthcare deals with patients that they are located far from doctor jurisdiction. Healthcare monitoring including measurements of temperature, blood pressure / pulse monitors and ECG, etc. This works deals with the development of monitoring system via adding intelligent system to distinguish the emergency cases. This work try to keep patient data privacy, reduce attack or penetration of data, reduce processing time and at the same time increasing the efficiency of the overall system. The privacy of patient data is critical so this must maintain the confidentiality of information from intrusion

    COVID-19 Diagnosis Using Spectral and Statistical Analysis of Cough Recordings Based on the Combination of SVD and DWT

    Get PDF
    تستخدم الإشارات الصوتية التي يولدها جسم الإنسان بشكل روتيني من قبل التخصصين في البحوث والتطبيقات الصحية  للمساعدة في تشخيص بعض  الامراض أو تقييم تقدم المرض. وبالنظر إلى التقنيات الجديدة ، من الممكن في الوقت الحاضر جمع الأصوات التي يولدها الإنسان ، مثل السعال. ويمكن بعد ذلك اعتماد تقنيات التعلم الآلي المستندة إلى الصوت من أجل التحليل التلقائي للبيانات التي تم جمعها مما يوفر معلومات قيمة غنية من إشارة السعال واستخراج الميزات الفعالة من فترة زمنية محدودة الطول تتغير كدالة للوقت. في هذا البحث يتم اقتراح وتقديم خوارزمية  للكشف عن COVID-19 وتشخيصه من خلال معالجة السعال الذي يتم جمعه من المرضى الذين يعانون من الأعراض الأكثر شيوعًا لهذا الوباء. تعتمد الطريقة المقترحة على اعتماد مزيج من تحليل القيمة المفردة (SVD) وتحويل المويجات المنفصل (DWT).  وقد أدى الجمع بين هاتين التقنيتين لمعالجة الإشارات إلى اتباع نهج جيد للتعرف على السعال ، حيث يولد ويستخدم الحد الأدنى من الميزات الفعالة. وفي هذه الخوارزمية المقترحة يتم تطبيق الترددات المتوسطة (mean and median)، والمعروفة بأنها أكثر الميزات المفيدة في مجال التردد ، لإنشاء مقياس إحصائي فعال لمقارنة النتائج. بالإضافة إلى الحصول على معدل كشف وتمييز عاليين ، تتميز الخوارزمية المقترحة بكفاءتها حيث يتم تحقيق تخفيض 200 مرة، من حيث عدد العمليات. على الرغم من حقيقة أن أعراض الأشخاص المصابين وغير المصابين في الدراسة بها الكثير من أوجه التشابه ، فإن نتائج التشخيص التي تم الحصول عليها من تطبيق نهجنا تُظهر معدل تشخيص مرتفعًا، والذي تم إثباته من خلال مطابقتها مع اختبارات PCR ذات الصلة. نعتقد أنه يمكن تحقيق أداء أفضل من خلال توسيع مجموعة البيانات ، مع تضمين الأشخاص الأصحاء.Healthcare professionals routinely use audio signals, generated by the human body, to help diagnose disease or assess its progression. With new technologies, it is now possible to collect human-generated sounds, such as coughing. Audio-based machine learning technologies can be adopted for automatic analysis of collected data. Valuable and rich information can be obtained from the cough signal and extracting effective characteristics from a finite duration time interval that changes as a function of time. This article presents a proposed approach to the detection and diagnosis of COVID-19 through the processing of cough collected from patients suffering from the most common symptoms of this pandemic. The proposed method is based on adopting a combination of Singular Value Decomposition (SVD), and Discrete Wavelet Transform (DWT). The combination of these two signal processing techniques is gaining lots of interest in the field of speaker and speech recognition. As a cough recognition approach, we found it well-performing, as it generates and utilizes an efficient minimum number of features. Mean and median frequencies, which are known to be the most useful features in the frequency domain, are applied to generate an effective statistical measure to compare the results. The hybrid structure of DWT and SVD, adopted in this approach adds to its efficiency, where a 200 times reduction, in terms of the number of operations, is achieved. Despite the fact that symptoms of the infected and non-infected people used in the study are having lots of similarities, diagnosis results obtained from the application of the proposed approach show high diagnosis rate, which is proved through the matching with relevant PCR tests.  The proposed approach is open for more improvements with its performance further assured by enlarging the dataset, while including healthy people

    A hierarchical detection method in external communication for self-driving vehicles based on TDMA

    Get PDF
    Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms

    Next Generation Digital Commerce Technologies

    Get PDF
    This paper deals with the demonstration of commerce technologies and concentration on the next generation technologies. The development of high advance technologies in telecommunications such as internet and mobile telephony leads to massive support for digital commerce. The main feature of the third generation mobile internet protocol addressing introduced an access to the internet through mobile. The trends of next generation digital commerce try to overcome all the commercial problems and to develop a fast secure and intelligent commerce depending on the high performance next generation technologies

    Simulation and Proposed Handover Alert Algorithm for Mobile Communication System

    No full text
    this paper deals with the simulation and presentation of a novel approach to design and implementation of algorithm to realize hand over process for a mobile communication system during mobile network. This algorithm performs the ability of the system to extract important information features about the received signal. When the strength of the received signal is dropped below a certain threshold value then an alert process is activated to achieve the continuity of the transmission due to a ready scan which is existed on time
    corecore