Locating Unknown Interference Sources With Time Difference Of Arrival Estimates,
2022
Washington University in St. Louis
Locating Unknown Interference Sources With Time Difference Of Arrival Estimates, Chia Ying Kuo
McKelvey School of Engineering Theses & Dissertations
Adaptive spectrum sharing between different systems and operators is being deployed in order to make use of the wireless spectrum more efficiently. However, when the spectrum is shared, it can create situations in which an operator is unable to determine the identity of an interferer transmitting an unknown signal. This is the situation in which the POWDER testbed found itself in, starting in late 2021. This thesis provides general-purpose tools for operators to locate an unknown signal source in real-world outdoor environments. We used cross-correlation between the signals measured at multiple time-synchronized base stations to estimate the time difference of ...
Efficient Implementation Of Mimo Fbmc/Oqam Scheme Based On Block Spreading,
2022
delta university for science and technology
Efficient Implementation Of Mimo Fbmc/Oqam Scheme Based On Block Spreading, Walid Ali Raslan, Mohamed Abdel-Azim Mohamed, Heba Mohamed Abdel-Atty
Delta University Scientific Journal
Filter bank multicarrier (FBMC) was proposed as an alternative approach to cyclic prefix - orthogonal frequency division multiplexing (CP-OFDM). FBMC is considered a promising non-orthogonal waveform due to its very low out of band radiation and high spectral efficiency. Nevertheless, the orthogonality constraint for FBMC/OQAM is relaxed being limited only to the real field which causes intrinsic interference. The presence of this interference leads to incompatibility between some well-known multiple-input and multiple-output (MIMO) schemes and FBMC/ offset quadrature amplitude modulation (OQAM). From this perspective, we proposed in this paper an efficient implementation for FBMC/OQAM based on block spreading to ...
A Low-Cost, Arduino-Based Platform For Emulating Energy Harvesting In Wireless Sensor Networks,
2022
Ohio Northern University
A Low-Cost, Arduino-Based Platform For Emulating Energy Harvesting In Wireless Sensor Networks, Braden A. Miller
ONU Student Research Colloquium
This paper presents an Arduino-based platform for emulating energy harvesting in Wireless Sensor Networks (WSNs) as a form of hardware-in-the-loop simulation. The platform makes use of a battery monitoring circuit and code implemented on the Arduino as an alternative to using significantly more expensive fully equipped energy harvesting nodes. Using embedded code to emulate the energy harvesting process allows for various energy harvesting models and processes to be tested using the same platform. The main contributions of this paper are the experimental data and analyses demonstrating the energy use characterization of the Arduino-based platform in a three-node relay network using ...
Distributed Control And Learning Of Connected And Autonomous Vehicles Approaching And Departing Signalized Intersections,
2022
Louisiana State University and Agricultural and Mechanical College
Distributed Control And Learning Of Connected And Autonomous Vehicles Approaching And Departing Signalized Intersections, Joshua Onyeka Ogbebor
LSU Master's Theses
This thesis outlines methods for achieving energy-optimal control policies for autonomous vehicles approaching and departing a signalized traffic intersection. Connected and autonomous vehicle technology has gained wide interest from both research institutions and government agencies because it offers immense promise in advancing efficient energy usage and abating hazards that beset the current transportation system. Energy minimization is itself crucial in reducing the greenhouse emissions from fossil-fuel-powered vehicles and extending the battery life of electric vehicles which are presently the major alternative to fossil-fuel-powered vehicles. Two major forms of fuel minimization are studied. First, the eco-driving problem is solved for a ...
Representing And Analyzing The Dynamics Of An Agent-Based Adaptive Social Network Model With Partial Integro-Differential Equations,
2022
Binghamton University, SUNY
Representing And Analyzing The Dynamics Of An Agent-Based Adaptive Social Network Model With Partial Integro-Differential Equations, Hiroki Sayama
Northeast Journal of Complex Systems (NEJCS)
We formulated and analyzed a set of partial integro-differential equations that capture the dynamics of our adaptive network model of social fragmentation involving behavioral diversity of agents. Previous results showed that, if the agents’ cultural tolerance levels were diversified, the social network could remain connected while maintaining cultural diversity. Here we converted the original agent-based model into a continuous equation-based one so we can gain more theoretical insight into the model dynamics. We restricted the node states to 1-D continuous values and assumed the network size was very large. As a result, we represented the whole system as a set ...
Toward Suicidal Ideation Detection With Lexical Network Features And Machine Learning,
2022
Çanakkale Onsekiz Mart University
Toward Suicidal Ideation Detection With Lexical Network Features And Machine Learning, Ulya Bayram, William Lee, Daniel Santel, Ali Minai, Peggy Clark, Tracy Glauser, John Pestian
Northeast Journal of Complex Systems (NEJCS)
In this study, we introduce a new network feature for detecting suicidal ideation from clinical texts and conduct various additional experiments to enrich the state of knowledge. We evaluate statistical features with and without stopwords, use lexical networks for feature extraction and classification, and compare the results with standard machine learning methods using a logistic classifier, a neural network, and a deep learning method. We utilize three text collections. The first two contain transcriptions of interviews conducted by experts with suicidal (n=161 patients that experienced severe ideation) and control subjects (n=153). The third collection consists of interviews conducted ...
Bistability And Switching Behavior In Moving Animal Groups,
2022
Lafayette College
Bistability And Switching Behavior In Moving Animal Groups, Daniel Strömbom, Stephanie Nickerson, Catherine Futterman, Alyssa Difazio, Cameron Costello, Kolbjørn Tunstrøm
Northeast Journal of Complex Systems (NEJCS)
Moving animal groups such as schools of fish and flocks of birds frequently switch between different group structures. Standard models of collective motion have been used successfully to explain how stable groups form via local interactions between individuals, but they are typically unable to produce groups that exhibit spontaneous switching. We are only aware of one model, constructed for barred flagtail fish that are known to rely on alignment and attraction to organize their collective motion, that has been shown to generate this type of behavior in 2D (or 3D). Interestingly, another species of fish, golden shiners, do exhibit switching ...
Detecting Iot Attacks Using An Ensemble Machine Learning Model,
2022
Graphic Era Deemed to be University
Detecting Iot Attacks Using An Ensemble Machine Learning Model, Vikas Tomar, Sachin Sharma
Articles
Malicious attacks are becoming more prevalent due to the growing use of Internet of Things (IoT) devices in homes, offices, transportation, healthcare, and other locations. By incorporating fog computing into IoT, attacks can be detected in a short amount of time, as the distance between IoT devices and fog devices is smaller than the distance between IoT devices and the cloud. Machine learning is frequently used for the detection of attacks due to the huge amount of data available from IoT devices. However, the problem is that fog devices may not have enough resources, such as processing power and memory ...
An Optimized Machine Learing Framework For Extracting Suicide Factors Using K-Means++ Clustering,
2022
Kumaraguru College of Technology, Coimbatore, India
An Optimized Machine Learing Framework For Extracting Suicide Factors Using K-Means++ Clustering, Naren S R Mr., Thirumal P C Dr., Sudharson D Dr.
International Journal of Computer Science and Informatics
Suicide has emerged as one of the serious problems which should be eradicated from the society. People with suicidal thoughts restrict themselves by not expressing thoughts to the people around them. Studies have shown that people show more interest in expressing their thoughts over social media platforms. So, research has been conducted to identify people with suicidal ideation by analyzing the posts which they posted in social media platforms. Certain studies mined out new factors which influenced people to commit suicide, but those factors had certain drawbacks in it. This paper mainly focuses on overcoming those drawbacks in the factors ...
Tourism Decision Making System & Auto Guidance Technique Using Data Analytics,
2022
Dept. of Tourism & Hotel Management , Penguin School of Hotel Management, Kolkata, India
Tourism Decision Making System & Auto Guidance Technique Using Data Analytics, Asik Rahaman Jamader Mr., Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr.
International Journal of Computer Science and Informatics
A unique Tourism Decision Making System TDMS) describes and evaluates the evaluation of research and developments in information technology meant for pronouncement sustain as well as examination during the sector of visiting the attractions. Individuals in the tourism sector are classified according to their decision-making technologies. The current trends and growth directions of choice help technologies were analysed for visitors from various advertising categories. The potential to provide customising, augmentation, and help for visitors at all phases of their trips by integrating modern automated approaches with GIS capabilities demonstrates the need for breakthroughs in digital advanced analytics.
Smart Hospitality And Secure Tourism Management Using Blockchain Technology: Beshostm Approach,
2022
Dept. of Tourism & Hotel Management, Penguin School of Hotel Management, Kolkata, India
Smart Hospitality And Secure Tourism Management Using Blockchain Technology: Beshostm Approach, Asik Rahaman Jamader Mr, Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr.
International Journal of Computer Science and Informatics
Throughout the age of 5G technology, the majority of contactless banking is made via software that is enabled by a wide range of financial platforms. Several alternative financing channels provide access to a variety of services. The opportunity for hackers to engage in nefarious behaviour such as payment account hacking, identity theft, and payment system assaults stages of clearances with e-tourism, monetary information is kept in a database. Payment issues can be caused by a centralised cloud server. Throughout the periods of heavy congestion, the abovementioned problems are solvable by utilising a decentralised system like blockchain, it allows for the ...
Valuation Of Software Exposures Using Visualization, Best-Worst Method And Artificial Neural Network,
2022
SRMGPC Lucknow
Valuation Of Software Exposures Using Visualization, Best-Worst Method And Artificial Neural Network, Dr.Santosh Kumar Dwivedi Dr., Dr. Rajeev Tripathi Dr.
International Journal of Computer Science and Informatics
Software is one of the most important part in today’s world, with its requirements in every industry be it automotive, avionics, telecommunication, banking, pharmaceutical and many more. Software systems are generally a bit complicated and created by distinct programmers. Usually any mistake in the code by a programmer in the developing stage of a software can lead to loopholes that cause Exposure. Exposure is a software flaw that an assaulter can exploit to conduct unlawful activities within a computer system. Despite the understanding of Exposure by the academia and industry, the amount of Exposure is growing exponentially as fresh ...
Diabetes Prediction: A Study Of Various Classification Based Data Mining Techniques,
2022
Siksha O Anusandhan Deemed to be University
Diabetes Prediction: A Study Of Various Classification Based Data Mining Techniques, Sipra Sahoo, Tushar Mitra, Arup Kumar Mohanty, Bharat Jyoti Ranjan Sahoo, Smita Rath
International Journal of Computer Science and Informatics
Data Mining is an integral part of KDD (Knowledge Discovery in Databases) process. It deals with discovering unknown patterns and knowledge hidden in data. Classification is a pivotal data mining technique with a very wide range of applications. Now a day’s diabetic has become a major disease which has almost crippled people across the globe. It is a medical condition that causes the metabolism to become dysfunctional and increases the blood sugar level in the body and it becomes a major concern for medical practitioner and people at large. An early diagnosis is the starting point for living well ...
“Fame”: Fspying & Solving Firewall Anomalies,
2022
MITS, MADANAPALLE ,A.P,India
“Fame”: Fspying & Solving Firewall Anomalies, B Lakshimibhargavi, V Maruti Prasad
International Journal of Communication Networks and Security
No abstract provided.
Comparative Analysis Of Pvm And Mpi For The Development Of Physical Applications In Parallel And Distributed Systems,
2022
Department of Computer Science and Engineering, Holy Mary Institute of Technology and Science, Hyderabad, India
Comparative Analysis Of Pvm And Mpi For The Development Of Physical Applications In Parallel And Distributed Systems, Srikanth. Bethu
International Journal of Communication Networks and Security
This research is aimed to explore each of these two Parallel Virtual Machine (PVM) and Message Passing Interface(MPI) vehicles for DPP (Distributed Parallel Processing) considering capability, ease of use, and availability, and compares their distinguishing features and also explores programmer interface and their utilization for solving real world parallel processing applications. This work recommends a potential research issue, that is, to study the feasibility of creating a programming environment that allows access to the virtual machine features of PVM and the message passing features of MPI. PVM and MPI, two systems for programming clusters, are often compared. Each system ...
Extracting Accurate Data From Multiple Conflicting Information On Web Sources,
2022
Computer Science and Engineering Department, K.L.E.I.T.,India
Extracting Accurate Data From Multiple Conflicting Information On Web Sources, Akshata Angadi, Karuna Gull, Padmashri Desai
International Journal of Communication Networks and Security
For The World-Wide Web has become the most important information source for most of us. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can we automatically identify which one is likely the true fact?, In this paper our experiments show that Fact finder, a supporter for user to resolve the problem, successfully finds true facts among conflicting information, and identifies Trust worthy websites better than the popular search engines. In our paper we give ratings based on two things- popularity or the hits & number of occurrences of ...
New Dynamic Query Optimization Technique In Relational Database Management Systems,
2022
Dept CSE/IT LITS Khammam, A. P INDIA.
New Dynamic Query Optimization Technique In Relational Database Management Systems, N. Satyanarayana, Sk. Sharfuddin, Sk.Jan Bhasha
International Journal of Communication Networks and Security
Query optimizer is an important component in the architecture of relational data base management system. This component is responsible for translating user submitted query into an efficient query evolution program which can be executed against the database. The present query evolution existing algorithm tries to find the best possible plan to execute a query with a minimum amount of time using mostly semi accurate statistical information (e.g. sizes of temporary relations, selectivity factors, and availability of resources). It is a static approach for generating optimal or close to optimal execution plan. Which in turn increases the execution cost of ...
Advanced Embedded Wireless Robot With Motion Detection System And Live Video / Audio Transmission,
2022
Sarada institute of technology &science, Khammam
Advanced Embedded Wireless Robot With Motion Detection System And Live Video / Audio Transmission, Ma. Wajeed, K. Varun Kumar
International Journal of Communication Networks and Security
This paper is to design and develop an intelligence robot to detect dangerous Gas/Smoke by using an 8 bit microcontroller. In our project the robot is designed to move automatically. The robot acts according to the command given by the program. It will move all the direction like forward, reverse, right and left. The Smoke sensing unit is available in robot mechanism. If particular Smoke is detected, robot will switch ON the Alarm Unit. The video and audio are monitored at the control unit. For transmitting audio and video, RF camera has been used.
Development Of Scada Like Application Using Arduino With .Net Interface,
2022
Department of Electronics & Communication Engg., MGM’s Jawaharlal Nehru Engineering College, Dr.BAMU, Aurangabad(MS), India
Development Of Scada Like Application Using Arduino With .Net Interface, Ritika Raj, S.A. Annadate
International Journal of Communication Networks and Security
Nowadays SCADA systems are used for Home automation, Greenhouse automation, E-agriculture etc. Basically these SCADA applications include Level Monitoring, Light & Climate Control, Security & Surveillance, control and manage spatially separated utility sites and Control of Shutters & Doors and so on. With the arrival of new hardware and software technologies here a system is proposed which can perform the similar SCADA applications at lower cost and lower maintenances. This paper proposes a viable solution for SCADA like applications which include Water level monitoring, Oil level monitoring & Displacement control by using a microcontroller board and .NET interfacing. This system can not only perform ...
A Study Of Advanced Encryption Tools For Data Security,
2022
Department of computer science, Yeshwant Mahavidyalaya, Nanded, Maharashtra, India
A Study Of Advanced Encryption Tools For Data Security, Shrikant G. Jadhav, Guruprasad B. Chounste
International Journal of Communication Networks and Security
With the rapid growth and uses of internet, the task of protection of data and information is become a key challenge to the user as well as security experts. In the era of e-commerce, online shopping, online banking information security is a vital issue. Information may be hacked, stolen and misused. To overcome these issues, encryption tools can be useful. Wide range for encryption tools are available that provide the facilities to the user to secure the information. This paper highlights some of these tools with their features.
