9 research outputs found

    Violation of Traffic Rules and Detection of Sign Boards

    Get PDF
    Today's society has seen a sharp rise in the number of accidents caused by drivers failing to pay attention to traffic signals and regulations. Road accidents are increasing daily as the number of automobiles rises. By using synthesis data for training, which are produced from photos of road traffic signs, we are able to overcome the challenges of traffic sign identification and decrease violations of traffic laws by identifying triple-riding, no-helmet, and accidents, which vary for different nations and locations. This technique is used to create a database of synthetic images that may be used in conjunction with a convolution neural network (CNN) to identify traffic signs, triple riding, no helmet use, and accidents in a variety of view lighting situations. As a result, there will be fewer accidents, and the vehicle operator will be able to concentrate more on continuing to drive but instead of checking each individual road sign. Also, simplifies the process to recognize triple driving, accidents, but also incidents when a helmet was not used

    An Adaptive Technique for Crime Rate Prediction using Machine Learning Algorithms

    Get PDF
    Any country must give the investigation and preventive of crime top priority. There are a rising amount of cases that are still pending due to the rapid increase in criminal cases in India and elsewhere. It is proving difficult to classify and address the rising number of criminal cases. Understanding a place's trends in criminal activity is essential to preventing it from occurring. Crime-solving organisations will be more effective if they have a clear awareness of the patterns of criminal behavior that are present in a particular area. Women's safety and protection are of highest importance despite the serious and persistent problem of crime against them. This study offers predictions about the kinds of crimes that might occur in a particular location using ensemble methods. This facilitates the categorization of criminal proceedings and subsequent action in a timely manner. We are applying machine learning methods like KNN, Linear regression, SVM, Lasso, Decision tree and Random forest in order to assess the highest accuracy

    A Novel Cryptography-Based Multipath Routing Protocol for Wireless Communications

    Get PDF
    Communication in a heterogeneous, dynamic, low-power, and lossy network is dependable and seamless thanks to Mobile Ad-hoc Networks (MANETs). Low power and Lossy Networks (LLN) Routing Protocol (RPL) has been designed to make MANET routing more efficient. For different types of traffic, RPL routing can experience problems with packet transmission rates and latency. RPL is an optimal routing protocol for low power lossy networks (LLN) having the capacity to establish a path between resource constraints nodes by using standard objective functions: OF0 and MRHOF. The standard objective functions lead to a decrease in the network lifetime due to increasing the computations for establishing routing between nodes in the heterogeneous network (LLN) due to poor decision problems. Currently, conventional Mobile Ad-hoc Network (MANET) is subjected to different security issues. Weathering those storms would help if you struck a good speed-memory-storage equilibrium. This article presents a security algorithm for MANET networks that employ the Rapid Packet Loss (RPL) routing protocol. The constructed network uses optimization-based deep learning reinforcement learning for MANET route creation. An improved network security algorithm is applied after a route has been set up using (ClonQlearn). The suggested method relies on a lightweight encryption scheme that can be used for both encryption and decryption. The suggested security method uses Elliptic-curve cryptography (ClonQlearn+ECC) for a random key generation based on reinforcement learning (ClonQlearn). The simulation study showed that the proposed ClonQlearn+ECC method improved network performance over the status quo. Secure data transmission is demonstrated by the proposed ClonQlearn + ECC, which also improves network speed. The proposed ClonQlearn + ECC increased network efficiency by 8-10% in terms of packet delivery ratio, 7-13% in terms of throughput, 5-10% in terms of end-to-end delay, and 3-7% in terms of power usage variation

    Design and Development IoT based Smart Energy Management Systems in Buildings through LoRa Communication Protocol

    Get PDF
    Energy management is a vital tool for reducing significant supply-side deficits and increasing the efficiency of power generation. The present energy system standard emphasizes lowering the total cost of power without limiting consumption by opting to lower electricity use during peak hours. The previous problem necessitates the development and growth of a flexible and mobile technology that meets the needs of a wide variety of customers while preserving the general energy balance. In order to replace a partial load decrease in a controlled manner, smart energy management systems are designed, according to the preferences of the user, for the situation of a full power loss in a particular region. Smart Energy Management Systems incorporate cost-optimization methods based on human satisfaction with sense input features and time of utilization. In addition to developing an Internet of Things (IoT) for data storage and analytics, reliable LoRa connectivity for residential area networks is also developed. The proposed method is named as LoRa_bidirectional gated recurrent neural network (LoRa_ BiGNN) model which achieves 0.11 and 0.13 of MAE, 0.21 and 0.23 of RMSE, 0.34 and 0.23 of MAPE for heating and cooling loads

    Secure Energy Aware Optimal Routing using Reinforcement Learning-based Decision-Making with a Hybrid Optimization Algorithm in MANET

    Get PDF
    Mobile ad hoc networks (MANETs) are wireless networks that are perfect for applications such as special outdoor events, communications in areas without wireless infrastructure, crises and natural disasters, and military activities because they do not require any preexisting network infrastructure and can be deployed quickly. Mobile ad hoc networks can be made to last longer through the use of clustering, which is one of the most effective uses of energy. Security is a key issue in the development of ad hoc networks. Many studies have been conducted on how to reduce the energy expenditure of the nodes in this network. The majority of these approaches might conserve energy and extend the life of the nodes. The major goal of this research is to develop an energy-aware, secure mechanism for MANETs. Secure Energy Aware Reinforcement Learning based Decision Making with Hybrid Optimization Algorithm (RL-DMHOA) is proposed for detecting the malicious node in the network. With the assistance of the optimization algorithm, data can be transferred more efficiently by choosing aggregation points that allow individual nodes to conserve power The optimum path is chosen by combining the Particle Swarm Optimization (PSO) and the Bat Algorithm (BA) to create a fitness function that maximizes across-cluster distance, delay, and node energy. Three state-of-the-art methods are compared to the suggested method on a variety of metrics. Throughput of 94.8 percent, average latency of 28.1 percent, malicious detection rate of 91.4 percent, packet delivery ratio of 92.4 percent, and network lifetime of 85.2 percent are all attained with the suggested RL-DMHOA approach

    Decentralized Machine Learning based Energy Efficient Routing and Intrusion Detection in Unmanned Aerial Network (UAV)

    Get PDF
    Decentralized machine learning (FL) is a system that uses federated learning (FL). Without disclosing locally stored sensitive information, FL enables multiple clients to work together to solve conventional distributed ML problems coordinated by a central server. In order to classify FLs, this research relies heavily on machine learning and deep learning techniques. The next generation of wireless networks is anticipated to incorporate unmanned aerial vehicles (UAVs) like drones into both civilian and military applications. The use of artificial intelligence (AI), and more specifically machine learning (ML) methods, to enhance the intelligence of UAV networks is desirable and necessary for the aforementioned uses. Unfortunately, most existing FL paradigms are still centralized, with a singular entity accountable for network-wide ML model aggregation and fusion. This is inappropriate for UAV networks, which frequently feature unreliable nodes and connections, and provides a possible single point of failure. There are many challenges by using high mobility of UAVs, of loss of packet frequent and difficulties in the UAV between the weak links, which affect the reliability while delivering data. An earlier UAV failure is happened by the unbalanced conception of energy and lifetime of the network is decreased; this will accelerate consequently in the overall network. In this paper, we focused mainly on the technique of security while maintaining UAV network in surveillance context, all information collected from different kinds of sources. The trust policies are based on peer-to-peer information which is confirmed by UAV network. A pre-shared UAV list or used by asymmetric encryption security in the proposal system. The wrong information can be identified when the UAV the network is hijacked physically by using this proposed technique. To provide secure routing path by using Secure Location with Intrusion Detection System (SLIDS) and conservation of energy-based prediction of link breakage done by location-based energy efficient routing (LEER) for discovering path of degree connectivity.  Thus, the proposed novel architecture is named as Decentralized Federate Learning- Secure Location with Intrusion Detection System (DFL-SLIDS), which achieves 98% of routing overhead, 93% of end-to-end delay, 92% of energy efficiency, 86.4% of PDR and 97% of throughput

    Secure Communication Using Two Party Authenticated Quantum key Distribution Protocols

    No full text
    Abstract This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, efficiency is improved as the proposed protocols contain the fewest number of communication rounds and two parties can share and use a long-term secret Key. Quantum cryptography is basically based on a trusted channel in communication between two parties compared to classical channel. Recently, Quantum Key Distribution (QKD) has become more secure transmission method used to transmit secret key between two legitimate parties. This paper discusses the implementation of (QKD) protocol with the existence of an eavesdropper. The implementation simulates the communication of two parties who wish to share a secret key with the existing of eavesdropper. The existing of eavesdropper is simulated with two kinds of attacks, which is used as parameter to measure the length of final key agreed by both authenticated parties at the end of the communication

    A Gradient Boosted Decision Tree with Binary Spotted Hyena Optimizer for cardiovascular disease detection and classification

    No full text
    Cardiovascular disease (CVD) is a common disorder frequently resulting in death. An increase in the death rate among adults is attributed to several factors, including smoking, high blood pressure, obesity, and cholesterol. Early diagnosis of CVDs can lower mortality rates. Algorithms that use machine learning and data mining offer the potential for finding risk variables and predicting CVD. Developing countries often need more CVD experts, and a high percentage of misdiagnosis. These concerns could be alleviated using an accurate and effective early-stage heart disease prediction system. This study explores the effectiveness of machine learning classifiers for diagnosing and detecting CVD. Several supervised machine-learning algorithms are investigated, and their performance and accuracy are compared. The Gradient Boosted Decision Tree (GBDT) with Binary Spotted Hyena Optimizer (BSHO) suggested in this work was used to rank and classify all attributes. Discrete optimization problems can be resolved using the binary form of SHO. The recommended method compresses the continuous location using a hyperbolic tangent function. The updated spotted hyena positions on the relevance score are utilized to find those with high heart disease predictions. The efficiency of the suggested model is then confirmed using the UCI dataset. The proposed GBDT-BSHO approach, with an accuracy of 97.89%, was significantly more effective than the comparative methods
    corecore