Tiny ML-based reconfigurable IoT platform design for brackish water aquaculture monitoring
An important sector of India's fishing industry is prawn farming. Gross prawn exports came to 5,90,275 MT (metric tonnes) and were worth $4,426.19 million. White-leg prawn exports decreased from 5,12,204 MT to 4,92,271 MT in 2020–21. To show the ...
An efficient algorithm for optimal route node sensing in smart tourism Urban traffic based on priority constraints
The public transportation system is now dealing with a number of problems brought on by the sharp increase in automobile ownership in cities as well as the buildup of vehicles as a result of events and accidents. However, the city’s limited road ...
Enhancing IOT based software defect prediction in analytical data management using war strategy optimization and Kernel ELM
- Islam Zada,
- Abdullah Alshammari,
- Ahmad A. Mazhar,
- Abdullah Aldaeej,
- Sultan Noman Qasem,
- Kashif Amjad,
- Jawad H. Alkhateeb
The existence of software problems in IoT applications caused by insufficient source code, poor design, mistakes, and insufficient testing poses a serious risk to functioning and user expectations. Prior to software deployment, thorough testing ...
Clustering routing algorithm of wireless sensor network based on swarm intelligence
This study aims to explore the clustering routing algorithm of a wireless sensor network (WSN) based on swarm intelligence (SI) and improve the energy efficiency and transmission efficiency of WSN, thus optimizing the network performance. To ...
An advanced actor critic deep reinforcement learning technique for gamification of WiFi environment
The Open System Interconnection Model’s physical layer implementation contains several networks including the wireless networks working system over radio waves. Since any device with wireless capabilities enabled can access the wireless network, ...
Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm
- Riyadh Rahef Nuiaa Al Ogaili,
- Esraa Saleh Alomari,
- Manar Bashar Mortatha Alkorani,
- Zaid Abdi Alkareem Alyasseri,
- Mazin Abed Mohammed,
- Rajesh Kumar Dhanaraj,
- Selvakumar Manickam,
- Seifedine Kadry,
- Mohammed Anbar,
- Shankar Karuppayah
Malware cyberattacks have increased rapidly with the rise of Internet users, IoT devices, smart cities, etc. Attackers are constantly trying to evolve their methods and attack techniques to exploit human vulnerabilities and non-existing system ...
Deep reinforcement learning based computation offloading for xURLLC services with UAV-assisted IoT-based multi-access edge computing system
New Internet of Things (IoT) based applications with stricter key performance indicators (KPI) such as round-trip delay, network availability, energy efficiency, spectral efficiency, security, age of information, throughput, and jitter present ...
ImprovedRain removal network clarity and object detection performance in heavy rain images using complementary structure
In heavy rain situations, the clarity of both human vision and computer vision is significantly reduced. Rain removal GAN-based networks have been proposed as a means of resolving this problem. However, such methods have only a limited ...
Accuracy-enhanced E-commerce recommendation based on deep learning and locality-sensitive hashing
Recommender systems facilitate the discovery of relevant content in several online communities by analyzing users' past interactions and preferences. With the expansion of data-intensive online activities and online content, cybersecurity risks ...
Empowered edge intelligent aquaculture with lightweight Kubernetes and GPU-embedded
Edge computing is a new paradigm for processing data at the edge of networks. There are a variety of edge computing scenarios, depending on the situation. In this paper, we investigate an architecture with heterogenous devices for intelligence ...
A positioning method based on map and single base station towards 6G networks
Positioning based on wireless communication networks has great application potential. In this paper, we propose a positioning method for the 5G-Advanced (5GA) or 6G network. Firstly, we establish the communication link and generate the map-based ...
Energy efficient multi-carrier NOMA and power controlled resource allocation for B5G/6G networks
Unmanned aerial vehicles, sometimes known as drones, are becoming increasingly common in communications networks, drawing interest from both business and academia. Their adaptable capacities and characteristics, which may enable various ...
Genetic electro-search optimization for optimum energy consumption in edge computing-based internet of healthcare things
- Utku Köse,
- Jose Antonio Marmolejo-Saucedo,
- Roman Rodriguez-Aguilar,
- Liliana Marmolejo-Saucedo,
- Miriam Rodriguez-Aguilar
Energy consumption is a vital issue when optimum usage and carbon footprint are all considered in today’s Internet of Things (IoT) environments. Considering edge computing, that becomes too critical in terms of wireless devices with limited ...
Packing stretched convex polygons in an optimized rectangle
A nonstandard optimized packing convex polygons in a rectangular container is considered. The shapes of the polygons are not fixed: the polygons can be compressed/stretched in certain limits along the principal axes, but their areas remain ...
On the use of MiniCPS for conducting rigorous security experiments in Software-Defined Industrial Control Systems
Software-Defined Networking (SDN) offers a global view over the network and the ability of centrally and dynamically managing network flows, making them ideal for creating security threat detection and mitigation solutions. Industrial networks ...
Impact of neural cyberattacks on a realistic neuronal topology from the primary visual cortex of mice
- Victoria Magdalena López Madejska,
- Sergio López Bernal,
- Gregorio Martínez Pérez,
- Alberto Huertas Celdrán
Brain-computer interfaces (BCIs) are widely used in medical scenarios to treat neurological conditions, such as Parkinson’s disease or epilepsy, when a pharmacological approach is ineffective. Despite their advantages, these BCIs target relatively ...
Mitigating communications threats in decentralized federated learning through moving target defense
- Enrique Tomás Martínez Beltrán,
- Pedro Miguel Sánchez Sánchez,
- Sergio López Bernal,
- Gérôme Bovet,
- Manuel Gil Pérez,
- Gregorio Martínez Pérez,
- Alberto Huertas Celdrán
The rise of Decentralized Federated Learning (DFL) has enabled the training of machine learning models across federated participants, fostering decentralized model aggregation and reducing dependence on a server. However, this approach introduces ...
Transfer and online learning for IP maliciousness prediction in a concept drift scenario
Determining the maliciousness of a cybersecurity incident is essential to establish effective measures against it. To process large volumes of data in an automated way, machine learning techniques are commonly applied to the problem. One of the ...
Novel energy consumption and reduces number of transmission attempts (ECRTA) model for heterogeneous wireless muti-hop network
Energy utilization is increasingly significant for heterogeneous wireless multi-hop systems. Energy utilization models are progressively powerful in giving the usefulness of convention. The ECRTA model offers the chance to look at the effect of ...
A machine learning-based analytical intelligence system for forecasting demand of new products based on chlorophyll: a hybrid approach
- Roman Rodriguez-Aguilar,
- Jose Antonio Marmolejo-Saucedo,
- Eduardo Garcia-Llamas,
- Miriam Rodríguez-Aguilar,
- Liliana Marmolejo-Saucedo
This manuscript addresses the problem of forecasting the demand for innovative products with limited and inhomogeneous sales data over time. The main objective of the study is to use the information available from a group of innovative chlorophyll-...
A high-capacity slicing PBFT protocol based on reputation evaluation model
Consortium blockchains, characterized by regulated blockchain technologies with limited authorization management, have gained popularity in various domains, including supply chain, Internet of Things (IoT), justice, and education, and have now ...
Edge-enabled anomaly detection and information completion for social network knowledge graphs
In the rapidly advancing information era, various human behaviors are being precisely recorded in the form of data, including identity information, criminal records, and communication data. Law enforcement agencies can effectively maintain social ...
MF-Informer for long-term QoS prediction in edge-cloud collaboration environments
In Service-Oriented Architecture (SOA) systems, continuously stabilizing web services’ quality of service (QoS) is critical to maintaining system performance. Dynamic changes in edge-cloud collaborative computing environments lead to fluctuations ...
Beam prediction and tracking mechanism with enhanced LSTM for mmWave aerial base station
By combining millimeter wave (mmWave) with abundant spectral resources and advanced directional beamforming technology, mmWave aerial base stations (mAeBSs) can provide high-speed services to users on the ground while reducing interference to ...
Updated exploration of the Tor network: advertising, availability and protocols of onion services
The Tor network is known for its opaque characteristics and involvement in illicit activities, motivating to shed light on the exposure, lifetime, and functionalities of onion services. This study focuses on the appearance of Tor links in online ...
Detection of malicious URLs using machine learning
The detection of fraudulent URLs that lead to malicious websites using addresses similar to those of legitimate websites is a key form of defense against phishing attacks. Currently, in the case of Internet of Things devices is especially relevant,...
Infrared and visible image fusion in a rolling guided filtering framework based on deep feature extraction
To preserve rich detail information and high contrast, a novel image fusion algorithm is proposed based on rolling-guided filtering combined with deep feature extraction. Firstly, input images are filtered to acquire various scales decomposed ...
Bag of tricks for backdoor learning
Deep learning models are vulnerable to backdoor attacks, where an adversary aims to fool the model via data poisoning, such that the victim models perform well on clean samples but behave wrongly on poisoned samples. While researchers have studied ...
Genetically optimized TD3 algorithm for efficient access control in the internet of vehicles
The Internet of Vehicles (IoV) is currently experiencing significant development, which has involved the introduction of an efficient Access Control Mechanism (ACM). Reliable access control is evolving into mandatory in order to provide security ...