International Journal of Sensors Wireless Communications and Control - Online First
Description text for Online First listing goes here...
20 results
-
-
Mahalanobis Distance-Based Supervised and Semi-Supervised Machine Learning Methods for Anomaly Detection in IoT Sensor Data
Authors: Aparna Shrivastava and P. Raghu VamsiAvailable online: 21 January 2026More LessIntroductionThe data collected in Internet of Things (IoT) applications consist of unreliable and erroneous data due to their deployment in harsh or unattended environments. Such data is considered an anomaly as it deviates from the regular data. These anomalies need to be identified correctly to enhance decision-making. For this purpose, machine learning techniques have gained significant attention due to their ability to classify the data into normal and abnormal (or anomaly). Methods: This work proposes novel adaptations to supervised and semi-supervised machine learning algorithms by integrating the Mahalanobis Distance (MD) metric. These adapted algorithms are named as Mahalanobis Binary Classification (M-BC) and Mahalanobis One Class Classification (M-OCC). The performance of these proposed algorithms was evaluated on well-known IoT sensor datasets using performance metrics such as balanced accuracy, F1-Score, and AUC-ROC score.
ResultsThe results show that the M-BC algorithm exhibits significant improvements over conventional machine learning methods across several datasets considered in this study, including SHM4, MHM1, Occupancy, and Timeseries. The M-BC achieved an average improvement of 13.03% in balanced accuracy, 10.29% in F1-Score, and 13.16% in AUC score. Similarly, the M-OCC algorithm demonstrated substantial gains in one-class classification, with an average improvement of 21.07% in balanced accuracy, 26.49% in F1-Score, and 26% in AUC score across datasets such as AnomIoT, IBRL, SHM4, MHM1, Occupancy, and Timeseries compared to OCSVM.
DiscussionThe results confirm that the proposed MD-based approaches are found to be simple, effective, and more accurate for detecting anomalies in IoT sensor data compared to their base methods. The integration of the MD metric significantly enhanced the ability of the algorithms to identify anomalous data points across various IoT domains.
ConclusionThe work presented successfully demonstrated the incorporation of the Mahalanobis distance into binary and one-class classification algorithms to improve anomaly detection performance. These M-BC and M-OCC algorithms show a robust and efficient solution to ensure data reliability in IoT sensor networks.
-
-
-
Analysis of Generalized Implicit Transmission
Authors: Dhanushki Hewawaduge and John P. FonsekaAvailable online: 05 January 2026More LessIntroductionIn a recent study, a generalized implicit transmission (GIT) technique that can transmit multiple implicit sequences while transmitting a single explicit sequence over a channel has been introduced. Instead of considering all sequences as independent, as in the previous study, this study considers the explicit sequence and all implicit sequences of a GIT collectively as a single code, referred to as a GIT coding scheme.
MethodsThe overall code rate Roverall and the inherent coding gain achieved by a GIT coding scheme due to the transmission of information implicitly, are discussed.
The overall code rate and the inherent coding gain achieved by a GIT coding scheme, due to the transmission of information, is discussed implicitly. A GIT coding scheme constructed from a rate code to function as a rate code, on average, transmits number of codewords of a rate code for every single codeword transmitted over the channel by transmitting number of codewords over all implicit sequences. A simple way to convert existing practical codes into GIT coding schemes is also discussed.
ResultsThe numerical results presented with the LDPC codes employed in the WiFi and the 5G standards demonstrate that GIT coding schemes can achieve very high coding gains over conventional codes while functioning as high-rate codes.
ConclusionDue to its ability to transmit the majority of information implicitly, which does not require any additional bandwidth or transmitted power, it is demonstrated here that GIT coding schemes can operate in the so-called unreachable region relative to the Shannon-Hartley bound.
-
-
-
An Energy-Efficient Two-Phase Intelligent BAN Routing Algorithm Utilizing Reinforcement Learning
Authors: Annwesha Banerjee Majumder and Sourav MajumderAvailable online: 31 October 2025More LessIntroductionWireless Sensor Networks (WSNs) and Body Area Networks (BANs) confront major issues with mobility, scalability, topology management, and energy consumption. Because these networks are dynamic, traditional routing techniques frequently find it difficult to adjust, which results in wasteful energy use and a shorter network lifespan.
Materials and MethodsThis study introduces an energy-efficient Reinforcement Learning (RL) routing strategy for Body Area Networks (BANs). The presented approach encompasses two distinct phases. The process commences by transmitting data to a designated sink node. The subsequent phase is transmitting this data to a server for additional surveillance. In the initial phase, the optimization of data transmission from sensors affixed to the body is achieved by cycling through the ON and OFF states of each sensor. The implementation of a dynamic approach to determine the duration of the ON state, taking into account the priority of data, leads to a reduction in inefficient energy consumption. The subsequent module of the proposed model employs Q-learning, a model-free reinforcement learning technique, to determine the optimal routing policy for the transmission of dynamic data. Reinforcement Learning methods excel at adjusting to dynamic situations, making them ideal for networks with changing topologies. Reinforcement learning enables routing algorithms to adapt dynamically to node movement, improving efficiency.
ResultsBy taking node energy, computing power, and hop count into account, the RL-based routing technique greatly extends network lifetime. According to experimental results, energy usage is reduced by 60–65% when compared to conventional approaches.
DiscussionThe suggested RL-based routing method efficiently tackles the dynamic and energy-sensitive characteristics of Body Area Networks by utilising Q-learning for adaptive path selection. The technology effectively minimises superfluous energy use by dynamically regulating sensor activity according to data priority.
ConclusionThis reinforcement learning methodology improves network durability and efficiency, attaining up to 65% energy conservation compared to conventional routing techniques. Its versatility to evolving topologies renders it a promising alternative for future energy-efficient BAN applications.
-
-
-
A Review of Security Algorithms Based on Quantum Dot Cellular Automata for RISC-V SoCs
Authors: Nutan Das and Chandra Sekhar DashAvailable online: 03 October 2025More LessPost-quantum cryptography (PQC) algorithms have been developed in recent decades, substituting standard Post-Quantum (PQ) algorithms to withstand quantum attacks. The Advanced Encryption Standard (AES) is a prevalent symmetric encryption technique utilized for data security and efficiency. It guarantees the secrecy and integrity of data encryption. Crystal-Kyber is a key encapsulation mechanism (KEM) utilizing lattice-based cryptography, engineered to withstand both conventional and quantum attacks. The AES and Crystal-Kyber algorithms exemplify distinct methodologies in encryption and key management. A research gap exists in the amalgamation of AES with Crystal-Kyber to implement a hybrid encryption system that ensures security against both conventional and quantum threats. Current cutting-edge research examines quantum computing (QC) for safe advanced RISC-V SoCs, leveraging the flexibility and scalability of Post-Quantum cryptosystems. QCA (Quantum Dot Cellular Automata) is a technology that operates on quantum mechanics at high frequencies (Terahertz), offering a transistor-less architecture to minimize circuit complexity. Moreover, QCA consumes less power, operates at elevated frequencies, and exhibits greater density in comparison to traditional CMOS (Complementary Metal Oxide Semiconductor) circuits. All PQC methods, in conjunction with classical quantum cryptography algorithms, are presented to tackle the prevailing challenges. Additionally, other studies examine the hardware and software implementations of post-quantum cryptography within the RISC-V architecture. A thorough research effort on QCA-based cryptographic circuits is examined, along with an innovative method for the next generation of secure nano-communication.
-
-
-
Device Recommendation Based on Inference Using Big-Five Personality Trait
Available online: 28 August 2025More LessIntroductionA device collaboration system provides services through the cooperation of nearby sharable devices. Therefore, such a system can be applied even to small personal devices with limited resources, such as smartwatches. Previous work proposed methods for device collaboration and recommendation. It also identified two key challenges: reducing inference time for collaboration among a large number of devices, and addressing the cold-start problem when introducing new devices. This paper proposes an approach to address both of these issues.
MethodsTo reduce the time required for device recommendation, this paper proposes a preprocessing method based on the Big Five personality traits. A prototype system implementing the proposed collaboration method is developed on a mobile device and evaluated.
ResultsThe proposed method achieved faster device recommendation and higher user satisfaction compared to the previous approach.
DiscussionThis study demonstrates that personality-based preprocessing enables the implementation of real-time recommendation services, even on devices with limited computing resources.
ConclusionThe proposed method can be applied not only to device collaboration in IoT environments but also to context-aware recommendation systems. The results of this study are expected to contribute to both the fields of psychology and computer science.
-
-
-
Impact of Mobile Anchor Path Patterns on Wireless Sensor Network Localization Performance
Authors: Vaishali R. Kulkarni, Raghavendra V. Kulkarni and Akash SikarwarAvailable online: 22 August 2025More LessIntroductionMobility-assisted localization remains a critical challenge in wireless sensor networks (WSNs), particularly for accurately determining sensor node positions. A localization framework that utilizes a single mobile anchor node (MAN) has been proposed in this paper to enhance localization performance in WSNs. The paper also investigates the effect of multiple MAN path-planning models on localization accuracy and computation time.
MethodsThe proposed approach integrates two error minimization techniques—trilateration and the Harmony Search Algorithm (HSA)—to estimate sensor node positions. Five distinct MAN path-planning models are investigated: Random, Scan, Double Scan, Hilbert, and Circular. These models define the MAN’s trajectory, and the resulting anchor points are used as inputs for distributed localization using both trilateration and HSA. MATLAB simulations are conducted to evaluate the framework based on localization accuracy, node coverage, and computational time.
ResultsSimulation outcomes indicate that the Hilbert path-planning model achieves the highest localization accuracy and node coverage among all trajectories. Furthermore, the HSA-based localization method surpasses trilateration in terms of precision by effectively minimizing localization error, though it requires more computational time.
DiscussionThe findings reveal a clear trade-off between localization accuracy and computational efficiency. While HSA provides enhanced precision, it incurs a higher computational cost compared to trilateration. These results underscore the importance of selecting appropriate path-planning and optimization strategies to balance performance metrics in real-world WSN deployments.
ConclusionThe study demonstrates that the combination of MAN-based mobility, Hilbert path-planning, and HSA optimization yields superior localization performance in WSNs. These insights contribute to the development of efficient and accurate localization strategies suitable for dynamic and resource-constrained wireless sensor environments.
-
-
-
Privacy-Preserving Sensing in MIMO Networks Using Federated Learning
Authors: Seema Malik, Pooja Yadav, Shreyashi Shukla, R.K. Yadav and Amit SinghalAvailable online: 30 July 2025More LessIntroductionThe rapid growth of Internet of Things (IoT) devices and advancements in wireless communication have driven the adoption of multiple-input multiple-output (MIMO) networks for intelligent sensing. However, traditional centralized data processing raises significant privacy concerns, necessitating privacy-preserving alternatives.
MethodsThis study introduces a federated learning (FL)-based distributed sensing architecture for MIMO networks. Each node locally trains a model using its received signal data and transmits only the model updates to a central server. A novel model aggregation strategy has been developed to account for spatial diversity and varying channel conditions in MIMO systems.
ResultsSimulation results reveal that the proposed FL-MIMO framework achieves sensing accuracy comparable to centralized methods while maintaining raw data privacy. The approach exhibits robustness to non-independent and identically distributed (non-IID) data and asynchronous communication, with negligible performance degradation.
DiscussionThe findings demonstrate the feasibility of applying federated learning to MIMO-based sensing, addressing key challenges such as communication overhead, model convergence, and security against adversarial threats. The method effectively mitigates privacy risks without compromising sensing performance.
ConclusionThe proposed FL-MIMO framework provides a practical and secure solution for privacy-preserving sensing in smart environments. By balancing efficiency and privacy, it facilitates scalable and trustworthy deployment of intelligent sensing applications in real-world MIMO networks.
-
-
-
Geospatial Deep Learning Model for Early Landslide Prediction Using Multispectral Remote Sensing Data
Authors: Arush Kaushal, Ashok Kumar Gupta and Vivek Kumar SehgalAvailable online: 22 July 2025More LessIntroductionEarly and precise landslide prediction remains a critical challenge for mitigating their devastating impacts. Traditional methods often struggle to integrate both spatial and temporal data effectively, leading to limited prediction accuracy. This study aims to develop a deep learning model that combines Convolutional Autoencoders (CAEs) for spatial feature extraction with Recurrent Neural Networks (RNNs) to capture temporal dynamics.
MethodsThe proposed model leverages CAEs to learn robust spatial representations from the 14-band Landslide4Sense dataset, while the RNN component captures the temporal patterns crucial for landslide detection. This integrated approach enhances the prediction capability by considering both spatial and temporal factors.
ResultsThe approach demonstrates an impressive landslide prediction accuracy of 0.988, with performance metrics of precision: 0.987, recall: 0.972, and F1-score: 0.982, highlighting its effectiveness in landslide prediction.
DiscussionThe model successfully integrates spatial and temporal dimensions, outperforming traditional prediction methods. Its deep learning design enhances robustness and adaptability across geospatial terrains.
ConclusionThis work paves the way for the application of advanced deep learning models in real-world landslide prediction. By integrating spatial and temporal data, the model offers a promising solution for mitigating landslide-related risks, potentially saving lives and infrastructure.
-
-
-
Next-Gen Health Informatics- Artificial Intelligence Powered Diagnostics and Blockchain Enabled Data Integrity For Radiological Image Analysis
Authors: Virendra S. Gomase, Arjun P. Ghatule, Rupali Sharma, Satish Sardana and Suchita P. DhamaneAvailable online: 25 April 2025More LessThe revolutionary effects of blockchain technology and artificial intelligence (AI) on the radiology department of healthcare administration are examined in this article. AI has become a vital tool in boosting image analysis precision, streamlining workflows, and improving patient outcomes as the need for prompt and accurate medical diagnosis increases. Concurrently, the incorporation of blockchain technology tackles important issues with patient privacy, interoperability, and data security. This paper presents the basic concepts of blockchain and artificial intelligence, with an emphasis on how they could cooperate in radiology. The primary objectives of integrating AI and blockchain in radiology are to increase diagnostic accuracy, safeguard the privacy and integrity of medical data, and facilitate seamless data sharing between healthcare providers. This essay demonstrates the effective use of AI-driven diagnostic tools in conjunction with blockchain's secure data management capabilities through a thorough literature research and analysis of recent deployments. According to research, combining these technologies can increase radiological practice efficiency, lower diagnostic error rates, and boost patient confidence in the healthcare system. Significant results could come from this integration, including improved data transparency, more efficient workflows, and more individualized patient care. To fully reap the benefits, however, issues like technological constraints, legal restrictions, and moral worries about algorithmic bias and data privacy must be resolved. In the end, this paper emphasizes how crucial it is to carry out more research and development in order to fully utilize blockchain and artificial intelligence (AI) to transform healthcare administration in radiology and beyond.
-
-
-
5G-Based Wireless Sensor Networks: Performance Insights and Application Optimization
Available online: 07 April 2025More LessIntroductionThe introduction of 5G technology has revolutionized Wireless Sensor Networks (WSNs) by significantly enhancing connectivity, reducing latency, and improving scalability.
MethodsThis paper presents a performance analysis framework for 5G-based WSNs, focusing on key parameters such as numerology, deployment strategies (e.g., Multi-Access Edge Computing and centralized models), traffic loads, and link capacity allocations. The framework evaluates their impact on critical performance metrics, including latency, throughput, energy efficiency, and reliability.
ResultsSimulation results reveal that deploying edge computing significantly reduces latency (e.g., 5.325 ms compared to 26.725 ms in centralized architectures), while optimized link capacity allocation and numerology configurations enhance overall network efficiency.
ConclusionThese findings demonstrate how 5G parameters can be fine-tuned to optimize WSN performance for diverse applications such as industrial automation, smart cities, and healthcare. The study provides practical insights into achieving real-time, scalable, and energy-efficient operations in 5G-enabled WSNs.
-
-
-
Firmware Over the Air for Securely Updating ECUs of the Vehicle
Authors: Bhavesh Raju Mudhivarthi, Prabhat Thakur, Alok Kumar, Sagar Anturkar and G. SinghAvailable online: 24 January 2025More LessIntroductionAn automobile is a software-defined machine on top of the wheels including more than 100 electronic control units (ECU) with million lines of code. The integration of ECU in the automobile ensures the customer’s needs by providing safety, security, entertainment, and comfort features.
MethodsThe firmware integrated into the ECU should be updated to avoid latency in operation and bugs, and to add new features. The traditional update process of ECU holds loopholes like more waiting time, unavailability of service centers, and security threats. To overcome this, over-the-air (OTA) updates are introduced in the vehicle, but security is the major concern while transmitting firmware over the air.
ResultsThe proposed system ensures the wireless firmware update with the uptane framework with background Timestamp Update Framework (TUF) ensures the security. The timestamp generated is valid for 86400 seconds to validate the freshness. In addition, security assessment and reverse engineering are performed on the designed system to check for security breaches.
ConclusionThe system secures the firmware over arbitrary and replay attacks on the Original Equipment Manufacturer (OEM) server.
-
-
-
RSSI Enabled Routing in Fiber Wireless Access Network
Authors: Sangita Solanki, Raksha Upadhyay, Uma Rathore Bhatt and Vijay BhatAvailable online: 07 January 2025More LessIntroductionThere are various concerns in Fiber wireless access networks, such as ONU placement, survivability, network planning andand its cost, architectural developments, etc. In this paper, we have focused on front end survivability of the network, which mainly depends on the routing algorithms employed at the front end of the network.
MethodThe effectiveness of the proposed scheme lies in finding the next alternate path in case of link/component failure with minimum delay. Hence, delay is the appropriate parameter to evaluate the efficacy of the proposed technique. In this paper, RSSI-based routing (RBRA) is proposed for various cases of link failures. Delay performance for each of the cases has been compared with two previous approaches maximum protection minimum link cost (MPMLC) andand minimum hop routing algorithm (MHRA).
ResultIt is found that RBRA performs better than MPMLC andand MHRA. For single link failure and two source destination pairs in the network with 50 wireless routers delay decreases by 58% andand 37% in RBRA as compared to MHRA andand MPMLC, respectively.
ConclusionHence, these algorithms can be integrated with RSSI-based route selection. This could be an attractive future direction for research.
-
-
-
Web-based Vulnerability Analysis and Detection
Authors: Narendra Singh Yadav, Ritek Rounak and Prakash Chandra SharmaAvailable online: 26 December 2024More LessIntroduction: In today’s digital world, protecting organizations from breaches, hacking, data theft, and unauthorized access is key. Web-based vulnerability analysis and detection is a big part of that. Method: This research introduces a new approach to web-based vulnerability assessment by combining advanced automated tools with human expertise, a complete way to identify, rank, and fix critical vulnerabilities in web applications and websites. Our research presents a new automated scanner built with Python and Selenium which can detect a wide range of vulnerabilities including SQL injection, cross-site scripting (XSS), and emerging threats. The tool’s modular architecture and regular expression-based detection methods allow for flexibility and speed in detecting common and uncommon vulnerabilities. We propose a framework for vulnerability ranking so organizations can prioritize their fix efforts. Our approach considers exploiting potential, severity, and patch availability to give a more accurate risk assessment. Through real-world web application testing we demonstrate the effectiveness of our approach in detecting and fixing vulnerabilities. Result: Our results show significant improvement in detection accuracy and speed compared to traditional methods, especially for complex and dynamic web applications. This research adds to the body of knowledge in web security and vulnerability management by combining advanced automated scanning with human expertise. Conclusion: Our findings provide practical advice for organizations looking to improve their cybersecurity in the ever-changing digital world.
-
-
-
Convolutional Neural Network-based Smart Disaster Management Framework for Real-time Detection and Management of Forest Fires
Authors: Kuldeep Singh, Eshaan Sharma, Puneet Kaur Baath, Kiranbir Kaur and Harminder SinghAvailable online: 13 December 2024More LessIntroductionTimely detection of catastrophic natural disasters, such as forest fires, is critical to minimizing losses and ensuring rapid response. Artificial intelligence is increasingly being recognized as a valuable tool in enhancing various stages of disaster management.
MethodThis paper presents the development of a smart framework utilizing machine learning techniques for real-time detection and monitoring of natural disasters, specifically forest fires. The proposed approach employs a 10-layer convolutional neural network (CNN) that classifies aerial images into Fire, Non-Fire, and Smoke categories with high precision and speed. In addition to this, a CNN-based feature extraction process is performed and integrated with various ML classifiers, including support vector machine, k-nearest neighbor, decision tree, random forest, and extra trees.
ResultsExtensive performance analysis reveals that the proposed 10-layer CNN model outperforms other classifiers, achieving an accuracy of 97.64% in the binary classification of fire vs. non-fire and 95.61% in the three-class classification of Fire, Non-Fire and Smoke classes. Furthermore, a comparative study with existing state-of-the-art methods demonstrates the proposed model's superior performance in both accuracy and computational complexity.
ConclusionThese results demonstrate the potential of the proposed CNN-based framework to serve as a reliable and effective tool for real-time disaster management across various applications, providing valuable support to emergency response teams in mitigating the impact of natural disasters.
-
-
-
BLE-IOT-PID: Bluetooth Low Energy (BLE) Based IOT Controlled PID Controller for Multi-loop Pilot Plant with Quantum Firefly PSO Optimization
Authors: Jotiram Deshmukh, Ritesh Tirole and Anand BhaskarAvailable online: 13 December 2024More LessIntroductionConventional Proportional–integral–derivative (PID) controls for multi-loop pilot plants are constrained by wired connections, outdated control techniques, and inefficient real-time data sensing and acquisition. As a result, inefficiencies arise, where control loops for parameters like temperature, level, and flow require continuous dynamic adjustments and precise regulation. To overcome this issue, a full wireless solution is proposed which is the need of today’s era.
MethodThis study presents a novel PID controller for a multi-loop pilot plant, utilizing a Bluetooth Low Energy (BLE) based Internet of Thing (IoT) system for wireless, real-time data sensing and control. The system gathers data through sensors and sends it to cloud storage via a BLE access point, which is then monitored using a mobile app called BIP. In addition to monitoring, the BIP app serves as a control interface, allowing PID parameters to be adjusted through a Quantum Firefly-Particle Swarm Optimization (QFPSO) algorithm integrated with the ThingSpeak cloud. This enables the control module to function in three distinct modes for the plant’s loops. Users can manually configure PID parameters, as well as temperature and level set-points, while the system automatically regulates the flow set-point based on real-time data. The BLE-based IoT system comprises five modules using Arduino Nano 33 BLE: a Flow Sensor, a Temperature Sensor, a Level Sensor, IoT communication, and an access point. These modules provide more accurate data than traditional sensing systems.
ResultKey benefits of the proposed system include wireless accessibility, user-friendliness, a simplified design, ease of upgrades, and consistent control across multiple loops. The proposed system can be easily adapted for various types of industrial control systems with minimal effort.
ConclusionAdditionally, the developed wireless sensor node can replace wired sensor nodes in any electronic system.
-
-
-
An Enhanced Lightweight Secure Authentication and Privacy-Preserving Approach for VANETs
Available online: 13 December 2024More LessAims and BackgroundVehicular-Adhoc-Networks (VANETs) have gained a lot of attention in the past ten years. Used extensively in intelligent transport systems (ITS), it facilitates the sharing of traffic data between vehicles and their immediate surroundings, resulting in a more pleasant driving experience. When it comes to VANET security, privacy and security are the two biggest obstacles. To improve security in VANET, authentication and privacy-preserving methods are required because any specific disclosure of vehicle specifics, including route data, might have devastating consequences.
Objectives & MethodologyIn light of this need, this research introduces a novel framework for VANETs called enhanced timed efficient stream loss-tolerant authentication (ETESLTA), which enables a new kind of lightweight authentication while simultaneously protecting users' privacy. Initialisation, registration, mutual authentication, broadcasting and verification, and vehicle revocation are all parts of the suggested model. Furthermore, the ETESLTA method requires very little memory while yet providing excellent broadcast authentication, just like TESLTA. In addition, the ETESLTA method incorporates a cuckoo filter to record the real details of cars inside the RSU's detection range.
ResultsThe suggested approach provides strong anonymity to achieve privacy and resists common assaults, and it features lightweight mutual authentication between the parties. A wide scale of experiments are conducted and the outcomes are evaluated in terms of numerous metrics to ensure the ETESLTA technique performs well.
ConclusionThe experimental results demonstrated that the ETESLTA method was superior to the most current state-of-the-art approaches.
-
-
-
60-GHz Millimeter-Wave over Visible Light Communications for Downlink Wireless Networks
Authors: Bouthaina Hamami and Leila GrainiAvailable online: 07 November 2024More LessBackground and ObjectiveIn this paper, we address potential solution for downlink wireless communications by integrating visible light communications (VLC) with the broadband radio frequency (RF) networks operating at 60 GHz-millimeter wave (mmWave) band. For this hybrid design, the outdoor 60 GHz-mmWave based RF link is utilized to ensure backhaul connectivity for VLC indoor system, while the VLC exploiting the lighting infrastructure that essentially used LEDs as optical source to provide low-cost and high-speed data access.
MethodsThe hybrid 60 GHz-mmWave/VLC system is analyzed by using 16-QAM OFDM signal, and its performance is investigated by evaluating the signal to noise ratio (SNR) and the received signal power distributions, for regular placement of LEDs and random location of receivers within the room. The impact of the transmitter-receiver parameters, and their orientations and directivities are also considered.
ResultsNumerical results show the efficiency of the proposed system, which can retransmit RF signals at 60 GHz-mmWave band using visible optical carriers in the indoor environment.
ConclusionThe results suggest that the hybrid 60 GHz-mmWave/VLC system is able to provide reliable wireless data transmission, making it an attractive solution for downlink indoor communications.
-
-
-
Enhancing Image Dehazing Efficiency with Dual Colour Space Attentional Deep Networks
Authors: Ashwini A M, Anne Gowda A B, Sridevi N, Nanditha Krishna, Babu N V and Anil Kumar DAvailable online: 07 November 2024More LessAims and BackgroundImage dehazing is an essential task in computer-vision, aimed at enhancing the clarity and visibility of images degraded by fog and haze. Traditional methods often struggle with handling the complex scattering effects of haze and maintaining the natural colours of the scene.
Objectives and MethodologyTo address these challenges, we propose a novel approach termed Dual Colour Space Attentional Deep Network (DCSADN) for efficient image dehazing. Our method leverages the advantages of two-colour spaces: RGB and YCbCr, to boost the network's skill to capture both the luminance and chrominance information, thereby improving the dehazing performance. We employ a multi-stage training strategy to optimize the performance of the DCSADN. This multi-stage approach ensures that the network generalizes well across different types of haze conditions. Extensive experiments demonstrate the superiority of our method over state-of-the-art dehazing techniques.
ResultsThe results indicate that our approach not only achieves higher quantitative scores in terms of Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) but also produces dehazed images with more natural colours and details.
ConclusionThe findings reveal that the dual colour space processing and attentional modules are crucial for the enhanced performance of our method and providing a valuable tool for improving image quality in hazy conditions.
-
-
-
Multiple Criteria-Based Intelligent Techniques for Efficient Handover in Next-Generation Networks
Authors: Sudesh Pahal, Priyanka Nandal, Nidhi Gupta and Neetu SehrawatAvailable online: 14 October 2024More LessBackgroundSeveral wireless technologies are assumed to be operating in cooperation for next-generation networks. These networks offer various services to mobile users; however, efficient handover between different networks is the most challenging task in high mobility scenarios. The traditional signal strength-based handover algorithms are not able to cope with mobile users' high-quality requirements.
MethodsIn this paper, multiple criteria-based intelligent techniques are proposed to deal with inefficiencies related to handover. This technique makes use of artificial neural networks that take multiple parameters as inputs in order to predict the degradation of parameters. These predictions are further used to design rules for initiating handover procedures prior to service quality degradation.
ResultsBased on the prediction results obtained by deep neural networks, the handover decisions are recommended according to the type of application: conversational or streaming.
ConclusionThe simulation results demonstrate the efficacy of the proposed method as there is an improvement of up to 40% and 25% in terms of handover rate and service disruption time, respectively, with an acceptable prediction error of 0.05.
-
-
-
Detection of Intrusions in Internet of Things Based Deep Auto Encoder Using Deepnets
Authors: L. Godlin Atlas, K.V. Shiny, K.P. Arjun, N.M. Sreenarayanan and J. Lethisia NithiyaAvailable online: 26 September 2024More LessAims and backgroundAs a communication paradigm that bridges the gap between virtual and physical spaces, the Internet of Things (IoT) has quickly gained popularity in recent years. In order to supplement the provisions made by security protocols, a network-based intrusion detection system (IDS) has emerged as a standard component of network architecture. IDSs monitor and detect cyber threats continuously throughout the network lifetime.
Objectives and MethodsThe main contribution is the development of a two-level neural network model that optimizes the number of neurons and features in the hidden layers, achieving superior accuracy in anomaly detection. Its include the utilization of deep anomaly detection (DAD) to protect networks from unknown threats without requiring rule modifications. The research also emphasizes the importance of feature extraction and selection, employing parallel deep models for segmenting attacks. The proposed supervised technique enables simultaneous feature selection using parallel models, enhancing the accuracy of IDS designs. A novel hybrid technique combining Deep Auto Encoders (DAEs) and DeepNets is proposed for intrusion detection.
ResultsThe research present a data preprocessing stage, converting symbolic and quantitative data into real-valued vectors and normalizing them. Feature extraction involves utilizing DAEs to learn concise representations of datasets. The deep network architecture, including multilayer perceptrons and activation functions, is employed for feature extraction and classification. The proposed approach utilizes a DeepNets in the final stage in order to improve the rate of 97% accurate outputs and make it possible to achieve greatly accelerated execution durations.
ConclusionWhen measured against the performances of other approaches to the extraction of features, the performance of the deep network platform is superior.
-