8 research outputs found

    6LoWPAN in Wireless Sensor Network with IoT in 5G Technology for Network Secure Routing and Energy Efficiency

    Get PDF
    Today, interconnection and routing protocols must discover the best solution for secure data transformation with a variety of smart devices due to the growing influence of information technology, such as Internet of Things (IoT), in human life. In order to handle routing concerns with regard to new interconnection approaches like the 6LoWPAN protocol, it is required to offer an improved solution. This research propose novel technique in 6LoWPAN network secure routing and energy efficiency (EE) for WSN in IoT application based on 5G technology. Here the energy optimization has been carried out using clustered channel aware least square support vector machine (Cl_CHLSSVM). Then the secure routing has been carried out using fuzzy based Routing Protocol for low-power and Lossy Networks with kernel-particle swarm optimization (Fuz_RPL_KPSO). To serve needs of IoT applications, proposed method is cognizant of both node priorities as well as application priorities. Applications' sending rate allocation is modeled as a constrained optimization issue.Pxperimental analysis is carried out in terms of throughput of 96%, weighted fairness index of 77%, end-to-end delay of 59%, energy consumption of 86%, and buffer dropped packets of 51%

    The Impact and Transformation of Artificial Intelligence

    Get PDF
    There is never a lack of fascinating new research in the field of artificial intelligence, and this study is by no means an exhaustive account of the advancements made in the last ten years. There are numerous fields in AI. A lot of the information covered in this study could be applied to the creation of powerful artificial intelligence. It is essential to create a computer that can understand the underlying meanings of the words since this permits more conversational and accurate translation. Exciting studies are being conducted on the use of audio and visual cues to identify human emotions. In particular, this paper provides a thorough overview of recent developments in the field of artificial intelligence and its applications. A beginner to the subject of artificial intelligence is the target audience for this paper. It also serves to remind the researchers of certain previously mentioned challenges. This review article defines artificial intelligence in general and explores its impact on both the present and the future. This review covers the fundamental concepts of artificial intelligence and machine learning

    Different Approach to Secure Data with Fog Computing

    Get PDF
    Fog computing could be a paradigm that extends cloud computing that has become a reality that made-up the method for brand new model of computing. additionally, fog provides application services to finish terminal within the age of network. The inner information stealing attacks in that a user of a system illegitimately poses because the identity of associate other legitimate user which is an arising new challenge to the service supplier wherever cloud service supplier might not be able to defend the information. therefore, to secure the important user�s sensitive data type the offender within the cloud. In this research paper I am proposing a very distinct approach with the assistance of offensive decoy data technology, that is employed for confirming whether or not the data access is permitted wherever abnormal information is detected andthereby confusing the offender with the fake data

    IOT based Security System for Auto Identifying Unlawful Activities using Biometric and Aadhar Card

    Get PDF
    In today’s era, where thefts are consecutively increasing, especially in banks, jewelry shops, stores, ATMs, etc, there is a need to either develop a new system or to improve the existing system, due to which the security in these areas can be enhanced. However, the traditional methods (CCTV cameras, alarm buttons) to handle the security issues in these areas are still available, but they have lots of limitations and drawbacks. So, in order to handle the security issues, this paper describes how the biometric and IoT (Internet of Things) techniques can greatly improve the existing traditional security system. Our proposed system uses biometric authentication using the fingerprint and iris pattern with the strength of IoT sensors, microcontroller and UIDAI aadhar server to enhance the security model and to cut the need of keeping extra employees in monitoring the security system

    Business Decision Making by Big Data Analytics

    Get PDF
    Information is the key component towards success when it comes to controlling the decision-makers performance with the quality of a decision. In the modern era, an absolute amount of data is available to organizations for analysis usage. Data is the most important component of the business in the 21st century and a significant number of devices are already equipped with the internet. Based on this the solutions should be studied in order to control and capture the knowledge value pair out of the datasets. Following this, the decision-makers should have access to insightful and valuable data based on the dynamic high volume & velocity using big data analytics. Our research focuses on how to integrate big data analytics into the decision-making process. The B-DAD (big data analytics and decision) framework was created to map the big data tools, its architecture, and analytics for the several decision-making steps by the adoption of methodology based on design science. The ideal goal and offerings of the framework are adopting big data analytics in order to intensify & aid decision making for the organization using an integration of big data analytics into the corresponding decision-making process. Thus, the experiment was carried out in the retail domain to test the framework. As an end result, the results showcased the value-added if big data analytics is integrated with corresponding decision-making activity

    Conversational AI for Natural Language Processing: An Review of ChatGPT

    Get PDF
    ChatGPT is a conversational artificial intelligence model developed by OpenAI, which was introduced in 2019. It employs a transformer-based neural mesh to produce human being responses in real-time, allowing for natural language conversations with a machine. ChatGPT is instructed on huge quantities of data captured using the internet, making it knowledgeable in an extensive span of topics, from news & entertainment to politics and sports. This allows it to generate contextually relevant responses to questions and statements, making the conversation seem more lifelike. The model can be used in various applications, including customer service, personal assistants, and virtual assistants. ChatGPT has also shown promising results in generating creative content, such as jokes and poetry, showcasing its versatility and potential for future applications.This paper provides a comprehensive review of the existing literature on ChatGPT, highlighting its key advantages, such as improved accuracy and flexibility compared to traditional NLP tools, as well as its limitations and the need for further research to address potential ethical concerns. The review also highlights the potential for ChatGPT to be used in NLP applications, including question-answering and dialogue generation, and highlights the need for further research and development in these areas

    Analysis and Improvement in Tracking & Security of Wireless Body Sensor Network with the help of Quantum Cryptography: - A Retrospective View on Literature Survey

    Get PDF
    The wireless nature of the network and the wide variety of sensors offer numerous new, practical and innovative applications to improve health care and the Quality of Life. Using a WBSN, the patient experiences a greater physical mobility and is no longer compelled to stay in the hospital. In this paper, we also present an idea to improve healthcare systems in India with the help of telecommunication and information technology by using wearable and implantable body sensor nodes which does not affect the mobility of the patients with extra security and advance feature. A WBSN should ensure the accurate sensing, tracking of the signal from the body, carry out low-level processing of the sensor signal and wirelessly transmit the processed signal to a local processing unit. In the proposed system, WBSNs, a sparse network of sensors are deployed either directly on the human body, inside the body or embedded in everyday clothes, to record and transmit health data. Body Sensors record and transmit data to a Body Central Unit which aggregates data sent by all Body Sensors and relays the aggregation to a hospital monitoring station from where healthcare professionals can remotely monitor the health parameters of patients or other individuals. This will help the authorized care giver easily diagnose the problem and make available the quick treatment to patient. The security of these devices is very important factor to make secure the personal data of any patient. Thus no other unauthorized person can get information about the patient disease etc which help to protect privacy of user and data. The primary objective of this proposed work is to propose effective security and tracking technique for sensor body wireless network with the help of new and effective technique Quantum Cryptography which provides extra security from all type of dangerous attacks and threats
    corecore