Browse
Subjects
Records with Subject: Information Management
Showing records 218 to 242 of 361. [First] Page: 1 6 7 8 9 10 11 12 13 14 Last
Fluid-Solid Coupling-Based Vibration Generation Mechanism of the Multiphase Vortex
Gaoan Zheng, Jilin Shi, Lin Li, Qihan Li, Zeheng Gu, Weixin Xu, Bin Lu, Chengyan Wang.
February 27, 2023 (v1)
Keywords: fluid-solid coupling, fluidic vibration, metallurgical pouring process, multiphase vortex, stochastic signal processing.
Multiphase vortices are widely present in the metallurgical pouring processes, chemical material extraction, hydroelectric power plant energy conversion, and other engineering fields. Its critical state detection is of great significance in improving product yield and resource utilization. However, the multiphase vortex is a complex dynamics problem with highly nonlinear features, and its fluid-induced vibration-generation mechanism faces significant challenges. A fluid-solid coupling-based modeling method is proposed to explore mass transfer process with the vorticity distribution and vibration-generation mechanism. A vibration-processing method is utilized to discuss the four flow-state transition features. A fluid-induced vibration experiment platform is established to verify the numerical results. It is found that the proposed modeling method can better reveal the vibration-evolution regularities of the fluid-solid coupling process. The flow field has a maximum value in the complex... [more]
Signal Processing Methods of Enhanced Magnetic Memory Testing
Xu Luo, Lihong Wang, Shufeng Cao, Qiuhan Xiao, Hongjuan Yang, Jianguo Zhao.
February 27, 2023 (v1)
Keywords: EEMD denoising, EMD-wavelet threshold denoising, enhanced metal magnetic memory testing, signal processing, wavelet threshold denoising.
As a particular kind of detection technology under weak magnetization, metal magnetic memory testing is very likely to be affected by external factors in the detecting process, which may lead to incorrect results. In order to minimize the negative influence of interrupting signals and improve the detection accuracy, this paper adopted the enhanced metal magnetic memory testing method to preliminarily increase the signal-to-noise ratio (SNR) of the detection signal and then compares the denoising effects of wavelet threshold denoising method, empirical mode decomposition (EMD) denoising method, EMD-wavelet threshold denoising method, ensemble EMD (EEMD), complementary EEMD (CEEMD), variational mode decomposition (VMD), local mean decomposition (LMD) and empirical wavelet transform (EWT) on the detection signal and the gradient signal respectively. The results show that the enhanced metal magnetic memory testing method can significantly increase the SNR of the obtained signal and cannot... [more]
Key Technologies, Applications and Trends of Internet of Things for Energy-Efficient 6G Wireless Communication in Smart Cities
M. M. Kamruzzaman.
February 27, 2023 (v1)
Keywords: 6G, energy-efficient, Internet of Things (IoT), key technologies, smart cities.
Smart cities can be made into super-smart cities through IoT devices’ implication of energy-efficient 6G. IoT devices are expected to reach fifty billion, but limited information is available regarding the energy-efficient 6G wireless communication standard. This article highlights the key technologies, applications, and trends in the Internet of Things (IoT) for energy-efficient 6G wireless communication in smart cities. The systematic review helped to achieve the aim of the study by considering the 20 articles extracted from databases and Google that fell between 2015 and 2021 and are written in English. The findings identified that quantum communication, blockchain, visible light communication (VLC), 6G brain−computer interface (BCI), symbiotic radio, and others are the key technologies. The applications of IoT technologies and energy-efficient 6G are found in 15 Minute City, Industrial Town, Intelligent Transport systems and others. Furthermore, the trend of using 6G through IoT de... [more]
A Novel Voltage Sag Detection Method Based on a Selective Harmonic Extraction Algorithm for Nonideal Grid Conditions
Zhenyu Li, Ranchen Yang, Xiao Guo, Ziming Wang, Guozhu Chen.
February 27, 2023 (v1)
Keywords: dynamic voltage restorer, modeling and optimization, nonideal grid conditions, voltage sag detection algorithm.
Voltage sag detection is utilized to capture the sag occurrence moment and calculate the sag depth of power grid voltage in real time, so as to generate reference voltage for controlling voltage interactive equipment such as dynamic voltage restorers (DVRs). However, the traditional voltage sag detection methods based on synchronously rotating frames (SRFs) are unable to acquire high-precision sag information under nonideal grid conditions such as unbalance or harmonic interference. In order to enhance the immunity of the sag detection, a method based on a selective harmonic extraction algorithm (SHEA) is proposed in this paper. Firstly, the state-space model of SHEA is established using discrete orthogonal basis to decouple and separate the signal of target frequency and the signal of interference frequency. The controllability, stability and convergence of SHEA are analyzed theoretically and serve as the criteria for parameter tuning. Moreover, a gain compensator (GC) is used to impr... [more]
High-Secured Data Communication for Cloud Enabled Secure Docker Image Sharing Technique Using Blockchain-Based Homomorphic Encryption
Vishnu Kumar Kaliappan, Seungjin Yu, Rajasoundaran Soundararajan, Sangwoo Jeon, Dugki Min, Enumi Choi.
February 27, 2023 (v1)
Keywords: blockchain, cloud computing, docker image sharing, docker security, homomorphic encryption, secure communication, virtualization.
In recent years, container-based virtualization technology for edge and cloud computing has advanced dramatically. Virtualization solutions based on Docker Containers provide a more lightweight and efficient virtual environment for Edge and cloud-based applications. Because their use is growing on its own and is still in its early phases, these technologies will face a slew of security issues. Vulnerabilities and malware in Docker container images are two serious security concerns. The risk of privilege escalation is increased because Docker containers share the Linux kernel. This study presents a distributed system framework called Safe Docker Image Sharing with Homomorphic Encryption and Blockchain (SeDIS-HEB). Through homomorphic encryption, authentication, and access management, SeDIS-HEB provides secure docker image sharing. The SeDIS-HEB framework prioritizes the following three major functions: (1) secure docker image upload, (2) secure docker image sharing, and (3) secure docke... [more]
Experimental and Co-Simulation Performance Evaluation of an Earth-to-Air Heat Exchanger System Integrated into a Smart Building
Abdelhak Kharbouch, Soukayna Berrabah, Mohamed Bakhouya, Jaafar Gaber, Driss El Ouadghiri, Samir Idrissi Kaitouni.
February 27, 2023 (v1)
Keywords: BCVTB, co-simulation, EAHE, economic analysis, Energy Efficiency, internet of things, system optimization.
Building models and their connected subsystems are often simulated as standalone entities. However, in order to monitor a system′s reactions to changing parameters and to assess its energy efficiency, it must be exposed to the actual dynamic context of the building under study. Hence, frameworks assessing co-operative simulation of buildings and their subsystems should be used. In this study, the Building Control Virtual Test Bed (BCVTB) framework was used for co-simulation of a small-scale building (EEBLab) connected to an Earth-to-air heat exchanger (EAHE). The EnergyPlus tool was used to simulate the indoor air temperature variations within the EEBLab, and MATLAB was used to model the EAHE system and to calculate its performance based on various parameters. The HOLSYS internet of things platform was deployed to monitor and collect the experimental data from the sensors to validate the simulations. A favorable agreement between the experimental and simulation results was obtained, sh... [more]
Privacy and Auditability in the Local Energy Market of an Energy Community with Homomorphic Encryption
Davide Strepparava, Federico Rosato, Lorenzo Nespoli, Vasco Medici.
February 27, 2023 (v1)
Keywords: energy community, homomorphic encryption, local energy markets, smart grid.
The world of electrical distribution is rapidly changing and is seeing more and more distributed production and steerable flexibilities. Energy communities are seen as an important innovation for the optimization of electrical consumption at a local level. A central need of the local energy markets inside energy communities is the exchange and circulation of production and consumption data, and therefore the problem of the potential leak of sensitive data must be addressed. In this paper, the context of the Lugaggia Innovation Community, a Self Consumption Community pilot project in southern Switzerland, is introduced together with the blockchain framework that was created for its internal market interaction and the rules designed for its local energy market. A cryptographic protocol from the literature, based on homomorphic encryption, is then proposed for the anonymous aggregation of production and consumption data of the individual households at a resolution of 15 min. The computati... [more]
I2OT-EC: A Framework for Smart Real-Time Monitoring and Controlling Crude Oil Production Exploiting IIOT and Edge Computing
Hazem Ramzey, Mahmoud Badawy, Mostafa Elhosseini, Adel A. Elbaset.
February 27, 2023 (v1)
Keywords: control, edge computing, industrial operations, Internet of Things, remote monitoring.
The oil and gas business has high operating costs and frequently has significant difficulties due to asset, process, and operational failures. Remote monitoring and management of the oil field operations are essential to ensure efficiency and safety. Oil field operations often use SCADA or wireless sensor network (WSN)-based monitoring and control systems; both have numerous drawbacks. WSN-based systems are not uniform or are incompatible. Additionally, they lack transparent communication and coordination. SCADA systems also cost a lot, are rigid, are not scalable, and deliver data slowly. Edge computing and the Industrial Internet of Things (IIoT) help to overcome SCADA’s constraints by establishing an automated monitoring and control system for oil and gas operations that is effective, secure, affordable, and transparent. The main objective of this study is to exploit the IIOT and Edge Computing (EC). This study introduces an I2OT-EC framework with flowcharts, a simulator, and system... [more]
Smart Energy Meters for Smart Grids, an Internet of Things Perspective
Yousaf Murtaza Rind, Muhammad Haseeb Raza, Muhammad Zubair, Muhammad Qasim Mehmood, Yehia Massoud.
February 27, 2023 (v1)
Keywords: 5G, IoT, metrology, sensing, smart energy, smart meters.
Smart energy has evolved over the years to include multiple domains integrated across multiple technology themes, such as electricity, smart grid, and logistics, linked through communication technology and processed in the cloud in a holistic way to deliver on global challenges. Advances in sensing, communication, and computation technologies have been made that enable better smart system implementations. In smart energy systems, sensing technologies have spanned multiple domains with newer techniques that are more accurate, have greater dynamic ranges, and are more reliable. Similarly, communication techniques have now evolved into very high-speed, flexible, and dynamic systems. Computation techniques have seen a quantum leap with greater integration, powerful computing engines, and versatile software stacks that are easily available and modifiable. Finally, the system integration has also seen advances in the form of management, automation, and analytics paradigms. Consequently, smar... [more]
Determination of Non-Zero Initial Conditions for IIR Notch Filters Using the Vector Projection Method with Minimum Delay
Sławomir Kocoń, Jacek Piskorowski.
February 27, 2023 (v1)
Keywords: digital signal processing, IIR filters, measurement, non-zero initial conditions, notch filters.
In this paper, two approaches to determining the non-zero initial conditions for the difference equation of notch filters are proposed and analyzed. The vector of non-zero initial conditions is determined to reduce the transient of the considered IIR notch filters. Both presented approaches are based on the vector projection method. The first method is based on the iterative determination of the vectors of initial conditions using samples available at a given moment. The main goal of the second approach is to reduce the computational cost compared to the first method with a slight deterioration in the quality of filtration. In order to demonstrate the suitability of the proposed methods, they have been used in simulation studies of power line interference filtering from disturbed ECG signals. The use of the proposed methods allowed for a significant reduction of the transient in the filter response with a shorter delay than in the classical vector projection method.
Anomaly Detection Algorithm for Photovoltaic Cells Based on Lightweight Multi-Channel Spatial Attention Mechanism
Aidong Chen, Xiang Li, Hongyuan Jing, Chen Hong, Minghai Li.
February 27, 2023 (v1)
Keywords: defect detection, electroluminescence, image recognition, photovoltaic cell.
With the proposed goal of “Carbon Neutrality”, photovoltaic energy is gradually gaining the leading role in energy transformation. At present, crystalline silicon cells are still the mainstream technology in the photovoltaic industry, but due to the similarity of defect characteristics and the small scale of the defects, automatic defect detection of photovoltaic cells (PV) by electroluminescence (EL) imaging is a challenging task. In order to better meet the growing demand for high-quality photovoltaic cell products in intelligent manufacturing and use, and ensure the safe and efficient operation of photovoltaic power stations, this paper proposes an improved abnormal detection method based on Faster R-CNN for the surface defect EL imaging of photovoltaic cells, which integrates a lightweight channel and spatial convolution attention module. It can analyze the crack defects in complex scenes more efficiently. The clustering algorithm was used to obtain a more targeted anchor frame for... [more]
A Carbon Accounting and Trading Platform for the uk Construction Industry
George Blumberg, Maurizio Sibilla.
February 27, 2023 (v1)
Keywords: blockchain, carbon accounting, carbon taxation, decentralized finance (defi), life-cycle analysis.
Atmospheric carbon dioxide emanating from activities associated with the construction of buildings in the UK contributes approximately 16% of the uk’s total emissions and will need to be reduced significantly to meet international agreements. Against this scenario, this paper presents a novel perspective for carbon accounting and trading that proposes the use of a platform for the uk construction industry as a possible solution. This suggestion assumes that taxation should be synchronised with phases of the entire life cycle of the building and that tax credits (or deficits) should remain an asset of the building itself. In this regard, a strategy is in place in the uk, but with gaps in how it will be implemented. To resolve these gaps, firstly, this paper explores and integrates three socio-technical components (i.e., carbon accounting, trading, and certification) that form an essential set of tools required for the management of taxes directed at property developers and construction... [more]
Centralized and Decentralized Distributed Energy Resource Access Control Implementation Considerations
Georgios Fragkos, Jay Johnson, Eirini Eleni Tsiropoulou.
February 27, 2023 (v1)
Keywords: blockchain, distributed energy resources, Ethereum, Role-Based Access Control, web application.
A global transition to power grids with high penetrations of renewable energy generation is being driven in part by rapid installations of distributed energy resources (DER). New DER equipment includes standardized IEEE 1547-2018 communication interfaces and proprietary communications capabilities. Interoperable DER provides new monitoring and control capabilities. The existence of multiple entities with different roles and responsibilities within the DER ecosystem makes the Access Control (AC) mechanism necessary. In this paper, we introduce and compare two novel architectures, which provide a Role-Based Access Control (RBAC) service to the DER ecosystem’s entities. Selecting an appropriate RBAC technology is important for the RBAC administrator and users who request DER access authorization. The first architecture is centralized, based on the OpenLDAP, an open source implementation of the Lightweight Directory Access Protocol (LDAP). The second approach is decentralized, based on a p... [more]
Edge Computing for IoT-Enabled Smart Grid: The Future of Energy
Quy Nguyen Minh, Van-Hau Nguyen, Vu Khanh Quy, Le Anh Ngoc, Abdellah Chehri, Gwanggil Jeon.
February 27, 2023 (v1)
Keywords: edge computing, energy efficient, Internet of Things, smart grid.
The explosive development of electrical engineering in the early 19th century marked the birth of the 2nd industrial revolution, with the use of electrical energy in place of steam power, as well as changing the history of human development. The versatility of electricity allows people to apply it to a multitude of fields such as transportation, heat applications, lighting, telecommunications, and computers. Nowadays, with the breakout development of science and technology, electric energy sources are formed by many different technologies such as hydroelectricity, solar power, wind power, coal power, etc. These energy sources are connected to form grid systems to transmit electricity to cities, businesses and homes for life and work. Electrical energy today has become the backbone of all modern technologies. To ensure the safe, reliable and energy-efficient operation of the grid, a wide range of grid management applications have been proposed. However, a significant challenge for monit... [more]
Optimization of DC, AC, and Hybrid AC/DC Microgrid-Based IoT Systems: A Review
Belqasem Aljafari, Subramanian Vasantharaj, Vairavasundaram Indragandhi, Rhanganath Vaibhav.
February 27, 2023 (v1)
Keywords: cost of electricity, hybrid renewable energy source, information and communication technology, internet of things, Optimization, smart microgrid.
Smart microgrids, as the foundations of the future smart grid, combine distinct Internet of Things (IoT) designs and technologies for applications that are designed to create, regulate, monitor, and protect the microgrid (MG), particularly as the IoT develops and evolves on a daily basis. A smart MG is a small grid that may operate individually or in tandem with the electric grid, and it is ideal for institutional, commercial, and industrial consumers, as well as urban and rural societies. A MG can operate in two methods (stand-alone and grid-connected), with the ability to transition between modes due to local grid faults, planned maintenance, expansions, deficits and failures in the host system, and other factors. Energy storage is the process of storing and converting energy that can be used for a variety of purposes, including voltage and frequency management, power backup, and cost optimization. IoT is designed to deliver solutions for optimal energy management, security protocols... [more]
Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions
Jianguo Ding, Attia Qammar, Zhimin Zhang, Ahmad Karim, Huansheng Ning.
February 27, 2023 (v1)
Keywords: Artificial Intelligence, blockchain, cyberattacks, cybersecurity, smart grids, vulnerabilities.
Smart Grids (SGs) are governed by advanced computing, control technologies, and networking infrastructure. However, compromised cybersecurity of the smart grid not only affects the security of existing energy systems but also directly impacts national security. The increasing number of cyberattacks against the smart grid urgently necessitates more robust security protection technologies to maintain the security of the grid system and its operations. The purpose of this review paper is to provide a thorough understanding of the incumbent cyberattacks’ influence on the entire smart grid ecosystem. In this paper, we review the various threats in the smart grid, which have two core domains: the intrinsic vulnerability of the system and the external cyberattacks. Similarly, we analyze the vulnerabilities of all components of the smart grid (hardware, software, and data communication), data management, services and applications, running environment, and evolving and complex smart grids. A st... [more]
Design and Implementation of Real-Time Kitchen Monitoring and Automation System Based on Internet of Things
Ch Anwar Ul Hassan, Jawaid Iqbal, Muhammad Sufyan Khan, Saddam Hussain, Adnan Akhunzada, Mudabbir Ali, Abdullah Gani, Mueen Uddin, Syed Sajid Ullah.
February 27, 2023 (v1)
Keywords: automation system, home appliances, Internet of Things, monitoring system, smart kitchen.
Automation can now be found in nearly every industry. However, home automation has yet to reach Pakistan. This paper presents an Internet of Things smart kitchen project that includes automation and monitoring. In this project, a system was developed that automatically detects the kitchen temperature. It also monitors the humidity level in the kitchen. This system includes built-in gas detection sensors that detect any gas leaks in the kitchen and notify the user if the gas pressure in the kitchen exceeds a certain level. This system also allows the user to remotely control appliances such as freezers, ovens, and air conditioners using a mobile phone. The user can control gas levels using their phone with this system. In this paper, the ESP32, DHT11 Sensor, 5 V Relay X 8, and MQ-135 gas sensors create a smart kitchen by controlling the temperature, managing humidity, and detecting gas leakage. The system was built on an Arduino board that is connected to the Internet. The hardware was... [more]
Blockchain Smart Contract-Enabled Secure Energy Trading for Electric Vehicles
Feng Xue, Kang Chang, Wei Li, Qin Wang, Haitao Zhao, Hui Zhang, Yiyang Ni, Wenchao Xia.
February 27, 2023 (v1)
Keywords: blockchain, electric vehicles, energy trading, incentive mechanism, smart contract.
In this paper, a blockchain-enabled energy trading method is proposed to deal with the inefficiency and security issues in energy trading for electric vehicles in smart grids. It includes the design of a smart contract and the excitation mechanism of energy sharing. The credit points of each vehicle as a node are considered in the design of the smart contract, which is used to supervise the process of energy trading. A strategy to estimate the credit points of each node and describe the excitation mechanism is illustrated. The connection between the credit points and the probability that a node would be accepted for energy trading has been established. To control the energy trading access, a double auction method is used to choose the part of the nodes participating in energy trading. Only selected nodes with winning bids can supply or request energy from the blockchain-based platform. Then it reaches the conclusion that the higher the credit points they have, the more trading initiati... [more]
IoT-Based Alternating Current Electrical Parameters Monitoring System
José Varela-Aldás, Steven Silva, Guillermo Palacios-Navarro.
February 27, 2023 (v1)
Keywords: cloud database, electrical parameters, energy monitor, IoT, low cost, mobile application, monitoring system.
Energy monitors are indispensable for achieving efficient electrical grids and even more so in the age of the Internet of Things (IoT), where electrical system data are monitored from anywhere in the world. This paper presents the development of a two-channel electrical parameter-monitoring system based on the M5 Stack Core2 kit. The acquisition of variables is done through PZEM 004T V3.0 sensors, and the data are sent to the ThingSpeak cloud database. Local readings are done through the LCD, and data re stored on a micro SD card. Remote monitoring is done through two applications, namely a web application and a mobile application, each designed for different purposes. To validate this proposal, a commercial device with IoT features (Gen 2 Vue Energy Monitor) is used, comparing the active power and active energy readings recorded continuously for 7 days. The results indicate an accuracy of up to 1.95% in power and 0.81% in energy, obtaining a low-cost compact product with multiple feat... [more]
Proposals for Using the Advanced Tools of Communication between Autonomous Vehicles and Infrastructure in Selected Cases
Michał Zawodny, Maciej Kruszyna.
February 27, 2023 (v1)
Keywords: autonomous vehicle, Big Data, intersection, IoT, personal transporter, railroad crossing, Smart City, V2I.
The purpose of this paper is to describe solutions to yet unsolved problems of autonomous vehicles and infrastructure communication via the Internet of Things (IoT). The paper, in the form of a conceptual article, intentionally does not contain research elements, as we plan to conduct simulations in future papers. Each of the many forms of communication between vehicles and infrastructure (V2I) or vice versa offers different possibilities. Here, we describe typical situations and challenges related to the introduction of autonomous vehicles in traffic. An investment in V2I may be necessary to keep the traffic of autonomous vehicles safe, smooth, and energy efficient. Based on the review of existing solutions, we propose several ideas, key elements, algorithms, and hardware. Merely detecting the road infrastructure may not be enough. It is also necessary to consider a new form of travel called the Personal Transporter (PT). The introduction of new systems and solutions offers benefits f... [more]
A Review on Emerging Communication and Computational Technologies for Increased Use of Plug-In Electric Vehicles
Vinay Simha Reddy Tappeta, Bhargav Appasani, Suprava Patnaik, Taha Selim Ustun.
February 27, 2023 (v1)
Keywords: big data and blockchain, charging station, G2V, IoT, Machine Learning, PEVs, V2G, V2G, V2X, Zigbee.
The electric vehicle (EV) industry is quickly growing in the present scenario, and will have more demand in the future. A sharp increase in the sales of EVs by 160% in 2021 represents 26% of new sales in the worldwide automotive market. EVs are deemed to be the transportation of the future, as they offer significant cost savings and reduce carbon emissions. However, their interactions with the power grid, charging stations, and households require new communication and control techniques. EVs show unprecedented behavior during vehicle battery charging, and sending the charge from the vehicle’s battery back to the grid via a charging station during peak hours has an impact on the grid operation. Balancing the load during peak hours, i.e., managing the energy between the grid and vehicle, requires efficient communication protocols, standards, and computational technologies that are essential for improving the performance, efficiency, and security of vehicle-to-vehicle, vehicle-to-grid (V2... [more]
Mine Intelligent Receiver: MIMO-OFDM Intelligent Receiver for Mine Information Recovery
Anyi Wang, Zhiyuan Feng, Xuhong Li, Yong Pan.
February 27, 2023 (v1)
Keywords: deep learning, end-to-end signal processing, intelligent coal mine communication system, mine information recovery, mine intelligent receiver.
With the advancement of an intellectual and numerical society, the coal mining industry has also begun to change to intelligence. As an important aspect of intelligent coal mine construction, coal mine communication has put forward more stringent standards for communication quality. For the complex communication environment in mines, the transmission of communication signals is always damaged by various noises and interferences, resulting in serious distortion of the communication signals received at the receiving end. Therefore, the use of traditional receivers for information recovery has the problem of high bit error rate (BER), which cannot meet the standard of intelligent coal mine construction. Based on this, the aim of this research is to combine convolutional neural networks (CNN) and multi-input multi-output orthogonal frequency division multiplexing (MIMO-OFDM) communication systems to design an intelligent receiver model for complex mine communication systems. At the receive... [more]
An Asynchronous AAA Blockchain-Based Protocol for Configuring Information Systems
Michał Bajor, Marcin Niemiec.
February 27, 2023 (v1)
Keywords: accounting, authentication, authorization, Blockchain, configuration, smart grids.
The increasing number of security breaches in centralized systems provides the necessity to introduce decentralization in more fields. The Blockchain is a widely utilized decentralization technology that is implemented in various industries. Therefore, this technology can be used to protect sensitive services, such as those associated with the configuration changing of information systems. This article proposes a new protocol operating as a decentralization layer over any configuration scheme. It uses smart contracts—programs existing on the Blockchain—to keep track of configuration proposals and authorize new configurations. The configuration change can be proposed at any time. However, only once it is authorized by appropriate parties can it be introduced to the system. The new protocol provides an additional security layer, ensuring that every action is accounted for and authenticated. Furthermore, it enforces that administrators authorize every change. The protocol was designed to... [more]
Biometric Authentication-Based Intrusion Detection Using Artificial Intelligence Internet of Things in Smart City
C. Annadurai, I. Nelson, K. Nirmala Devi, R. Manikandan, N. Z. Jhanjhi, Mehedi Masud, Abdullah Sheikh.
February 27, 2023 (v1)
Keywords: Artificial Intelligence, biometric authentication, classification, feature extraction, intrusion detection, IoT.
Nowadays, there is a growing demand for information security and security rules all across the world. Intrusion detection (ID) is a critical technique for detecting dangers in a network during data transmission. Artificial Intelligence (AI) methods support the Internet of Things (IoT) and smart cities by creating gadgets replicating intelligent behavior and enabling decision making with little or no human intervention. This research proposes novel technique for secure data transmission and detecting an intruder in a biometric authentication system by feature extraction with classification. Here, an intruder is detected by collecting the biometric database of the smart building based on the IoT. These biometric data are processed for noise removal, smoothening, and normalization. The processed data features are extracted using the kernel-based principal component analysis (KPCA). Then, the processed features are classified using the convolutional VGG−16 Net architecture. Then, the entir... [more]
Energy-Saving Routing Protocols for Smart Cities
Douglas de Farias Medeiros, Cleonilson Protasio de Souza, Fabricio Braga Soares de Carvalho, Waslon Terllizzie Araújo Lopes.
February 27, 2023 (v1)
Keywords: Cupcarbon simulator, LoRa, routing protocols, Smart Cities, Wireless Sensor Networks.
In recent decades, expansion in urban areas has faced issues such as management of public waste, noise, mobility, and air quality, among others. In this scenario, Internet of Things (IoT) and Wireless Sensor Network (WSN) scenarios are being considered for Smart Cities solutions based on the deployment of wireless remote sensor nodes to monitor large urban areas. However, as the number of nodes increases, the amount of data to be routed increases significantly as well, meaning that the choice of the data routing process has great importance in terms of the energy consumption and lifetime of the network. In this work, we describe and evaluate the energy consumption of routing protocols for WSN-based Smart Cities applications in LoRa-based mesh networks, then propose a novel energy-saving radio power adjustment (RPA) routing protocol. The Cupcarbon network simulator was used to evaluate the performance of different routing protocols in terms of their data package delivery rate, average e... [more]
Showing records 218 to 242 of 361. [First] Page: 1 6 7 8 9 10 11 12 13 14 Last
(0.45 seconds) 0 + 0
[Show All Subjects]