13 research outputs found

    An artificial intelligence based quorum system for the improvement of the lifespan of sensor networks.

    Get PDF
    Artificial Intelligence-based Quorum systems are used to solve the energy crisis in real-time wireless sensor networks. They tend to improve the coverage, connectivity, latency, and lifespan of the networks where millions of sensor nodes need to be deployed in a smart grid system. The reality is that sensors may consume more power and reduce the lifetime of the network. This paper proposes a quorum-based grid system where the number of sensors in the quorum is increased without actually increasing quorums themselves, leading to improvements in throughput and latency by 14.23%. The proposed artificial intelligence scheme reduces the network latency due to an increase in time slots over conventional algorithms previously proposed. Secondly, energy consumption is reduced by weighted load balancing, improving the network’s actual lifespan. Our experimental results show that the coverage rate is increased on an average of 11% over the conventional Coverage Contribution Area (CCA), Partial Coverage with Learning Automata (PCLA), and Probabilistic Coverage Protocol (PCP) protocols respectively

    Comprehensive literature review on delay tolerant network (DTN) framework for improving the efficiency of internet connection in rural regions of Malaysia

    Get PDF
    This paper brief in detail the technology reviews of current available technologies and literature reviews that starts with the history of the Internet and the understanding of the working of the Internet through a conceptual model of TCP/IP and OSI models, the numerous technologies developed to cater for different connectivity environments and recent popular topics in the field of communication technologies. Detailed review is done on the subject of Delay-Tolerant Networking (DTN), the chosen technology from which the intended framework can be proposed for improving the efficiency of internet connections. From these literatures, comparisons are made to find the best possible combinations of technologies to design a mini- mum viable product, followed by a generic DTN framework

    Editorial

    No full text
    Editorial for Special Issue on: Artificial Intelligence-Enabled Computing System Development – Part

    Editorial

    Get PDF
    Editorial for Special Issue on: Artificial Intelligence-Enabled Computing System Development – Part

    On chip network with increased performance for efficient wireless communication

    No full text
    Core systems with network transactions deployed semiconductor materials to develop wireless networks-on-chip to minimize latency with increased performance. For transmitting data from the source point towards the target point, an appropriate reconfigurable routing method has to be deployed with respect to nodes. For overhead on-chip communication that involves the linking of many cores in a single chip, congestion may occur which has to be eliminated. A marching memory arbitrator is deployed in the path that is prone to congestion which computes the port as a buffer. The static degradation of energy power utilization in the router is solved by using a Marching memory buffer. The secure communication of data can be deployed with hash, identity, and address verification blocks. The traffic is then relaxed by routing arbitrator and then data transmission is done through frequency division multiplexing in the communication channel with reconfigurable routing. The analysis of simulation results is found to have a better throughput, less latency, and reduced power consumption

    Performance of Nano-Silica Modified Self-Compacting Glass Mortar at Normal and Elevated Temperatures

    No full text
    This research aims to combine the effects of nanosilica and glass powder on the properties of self-compacting mortar at normal and at higher temperatures. The fine aggregate was replaced by waste glass powder at various percentage levels of 10%, 20%, 30%, 40% and 50%. The mechanical properties of self-compacting glass mortar (SGCM) were studied at elevated temperatures of 200, 400, 600 and 800 °C. Furthermore the effect of sudden and gradual cooling technique on the residual strength of glass mortar was also investigated In order to enhance the behavior of SCGM the nanosilica of 3% by weight of cement was added. From the results it was obtained that the glass powder replacement effectively contributed towards the thermal performance while the addition of nanosilica enhanced the mechanical performance. The enhanced physical properties were obtained mainly at the glass transition temperature thus showing the active participation of glass powders during high temperatures. Moreover the gradually cooled specimens exhibited improved strength characteristics than the suddenly cooled specimens

    Anti-PVT-Variation Low-Power Time-to-Digital Converter Design Using 90-nm CMOS Process

    No full text

    An Efficient and Unique TF/IDF Algorithmic Model-Based Data Analysis for Handling Applications with Big Data Streaming

    No full text
    As the field of data science grows, document analytics has become a more challenging task for rough classification, response analysis, and text summarization. These tasks are used for the analysis of text data from various intelligent sensing systems. The conventional approach for data analytics and text processing is not useful for big data coming from intelligent systems. This work proposes a novel TF/IDF algorithm with the temporal Louvain approach to solve the above problem. Such an approach is supposed to help the categorization of documents into hierarchical structures showing the relationship between variables, which is a boon to analysts making essential decisions. This paper used public corpora, such as Reuters-21578 and 20 Newsgroups for massive-data analytic experimentation. The result shows the efficacy of the proposed algorithm in terms of accuracy and execution time across six datasets. The proposed approach is validated to bring value to big text data analysis. Big data handling with map-reduce has led to tremendous growth and support for tasks like categorization, sentiment analysis, and higher-quality accuracy from the input data. Outperforming the state-of-the-art approach in terms of accuracy and execution time for six datasets ensures proper validation

    Enhanced disruption tolerant network (DTN) framework for improving network efficiency in rural areas

    Get PDF
    elecommunication is a problem in certain rural regions and deep rural regions in Malaysia because the absence of the standard communication infrastructure due to geographical and socio-economic limitations. The dense forest, mountainous regions and streams along the rural regions contributes to the main factor of the limitation of erecting a communication infrastructure. With the absence of infrastructure, communication capability is limited and this causes some villages to be disconnected. This condi- tion is also known as intermittent connectivity whereby not even cellular networks can reach the villages prohibiting them from calling, texting and surfing the Internet. Addi- tionally, the low-income status of the rural population and the lack of interest in technologies while having lower population and sparse village placement also adds into the factor of not erecting a communication infrastructure. This in turn, inhibits the development of IT sector in rural regions and hence causes the digital divide in Malaysia. To solve the intermittent connectivity issue while catering to the absence of infrastructure and socio-economic status of the rural populace, an enhanced delay/disruption tolerant network framework (DTN) is proposed in this research study. The aim of this paper is to explore the current trend and state-of-the-art of DTN by conducting initial experi- ments to design the DTN framework for improving the efficiency of internet connection in rural sites. In this paper, specific focus is provided for ION-DTN technology developed by NASA for conducting experiments and to develop optimized prototypes for designed DTN framework

    Cybercrime issues in smart cities networks and prevention using ethical hacking

    No full text
    Today, the need for security and data protection has increased because of the increase in Internet use. In today’s era, all industries have digitally moved their data to cloud platforms that bring new data protection issues and challenges especially in IoT and Smart cities networks. Internet of Things (IoT) is a growing field in today’s world that offers reliable and consistent communication via wireless and wired connections and generate a huge amount of data. Therefore, it is essential to ensure the security and reliability of generated data. IoT systems and networks should have strong security mechanism to protect users’ private data and processed information. Internet development and usability have brought numerous challenges in term of online frauds, hacking, and phishing activities, spamming and many others. According to Cybersecurity Ventures survey, cybercrime damages could cost the world $6 trillion per annum by 2021. This information shows growing number of Internet frauds, the finances losses and cybercrime in the coming era for every industry. Without adequate awareness and comprehensive knowledge, it has become difficult to defend against such practices. Ethical Hacking allows users and businesses to scrutinize their systems and networks vulnerabilities, take proper measures to protect their network and systems against unlawful and malicious attacks. It also strengthens network and systems by identifying common vulnerabilities, scrutinize, and taking proper security measures. Kali Linux Operating System (OS) is known as the most sophisticated penetration testing tool to perform Ethical Hacking. In this chapter, we addressed latest information regarding IoT and Smart City networks worldwide in terms of financial and data losses. We have also discussed the Ethical Hacking terminologies along with various kinds of social engineering and phishing attacks could occur on IoT and smart cities networks. We have performed several social engineering experiments using Kali Tools to demonstrate identification of common mistakes in web-based applications and smart networks for the apprentices. In the end, we have proposed some appropriate solutions to strengthen against hackers
    corecore