- Home
- A-Z Publications
- International Journal of Sensors Wireless Communications and Control
- Previous Issues
- Volume 11, Issue 5, 2021
International Journal of Sensors Wireless Communications and Control - Volume 11, Issue 5, 2021
Volume 11, Issue 5, 2021
-
-
AIoT Data Management, Analytics and Decision Making (Artificial Intelligence of Things Data Management, Analytics and Decision Making)
By Ivan IzoninNowadays, the fast development of hardware for IoT-based systems creates appropriate conditions for the development of services for different application areas. As we know, the large number of multifunctional devices, which are connected to the Internet is constantly increasing. Today, most of the IoT devices just only collect and transmit data. The huge amount of data produced by these devices requires efficient and fa Read More
-
-
-
Formation of Hypercubes Based on Data Obtained from Systems of IoT Devices of Urban Resource Networks
Aim: The aim of this work is to construct a system of interrelated procedures that are used in the formation of data warehouses for information systems in smart cities. Objectives: Currently, the number of IoT devices integrated into the systems of information technology support of the processes taking place in supply networks of resources of Smart City, is constantly growing. While functioning, extensive sets of various Read More
-
-
-
Mathematical Modeling of the Availability of the Information System for Critical Use to Optimize Control of its Communication Capabilities
Authors: Oleg V. Bisikalo, Viacheslav V. Kovtun, Oksana V. Kovtun and Oksana M. DanylchukBackground: One of the communication characteristics is the availability of information system for critical use (ISCU), which provides the allocation of computational resources in a finite volume, limited by the concept of a virtual machine (VM) to the authorized person (AP) in response to his input request and access to critical data in accordance with the created control schemes, taking into account privileges of AP in the for Read More
-
-
-
The Method and Simulation Model of Element Base Selection for Protection System Synthesis and Data Transmission
Authors: Ivan Tsmots, Vasyl Teslyuk, Taras Teslyuk and Yurii LukashchukBackground: The modern stage of the development data protection and transmission systems is characterized by an extension of the application areas, most of which require encryption (decryption) and encoding (decoding) in real-time on hardware that satisfy the restrictions on the dimensions, energy, cost and development time. In this connection, the problem of choosing an elemental base for the synthesis of neu Read More
-
-
-
Recovery of Missing Sensor Data with GRNN-based Cascade Scheme
Authors: Roman Tkachenko, Ivan Izonin, Ivanna Dronyuk, Mykola Logoyda and Pavlo TkachenkoBackground: Today, IoT-based systems are widely used in various applications. Intellectual analysis of the data collected by IoT devices is an important task for the efficient and successful functioning of such systems. In particular, the reliability of such kind of analysis has greatly influenced the ability to partially or fully automate certain processes or subsystems. However, imperfect devices of data collection, trans Read More
-
-
-
Evaluation of the Effectiveness of Different Image Skeletonization Methods in Biometric Security Systems
Background: Systems of the Internet of Things are actively implementing biometric systems. For fast and high-quality recognition in sensory biometric control and management systems, skeletonization methods are used at the stage of fingerprint recognition. The analysis of the known skeletonization methods of Zhang-Suen, Hilditch, Ateb-Gabor with the wave skeletonization method has been carried out and it shows g Read More
-
-
-
Comparison of Q-Coverage P-Connectivity Sensor Node Scheduling Heuristic Between Battery Powered WSN & Energy Harvesting WSN
Authors: Sunita Gupta, Sakar Gupta and Dinesh GoyalA serious problem in Wireless Sensor Networks (WSNs) is to attain high-energy efficiency as battery powers a node, which has limited stored energy. They can not be suitably replaced or recharged. The appearance of renewable energy harvesting techniques and their combination with sensors give Energy Harvesting Wireless Sensor Networks (EH-WSNs). Therefore, the area shifts from energy preservation to the reliabili Read More
-
-
-
Telematics Healthcare Through Digital Terrestrial Television Networks: Applications and Perspectives
Authors: Konstantinos Kardaras, George I. Lambrou and Dimitrios KoutsourisBackground: The trend nowadays is the interconnection of rural health centers with a specialized monitoring medical center. Aim: The paper investigates the qualitative and quantitative characteristics that degrade the perceived video picture quality for a variety of short MPEG-4 video clips. Methods: In the present work, our approach was considered in three branches; first the customization of video quality in terms of v Read More
-
-
-
Video Steganography Using DNA and Chaotic Sequence
Authors: Munesh C. Trivedi and Ranjana JoshiBackground: Several activities or tasks which are performed with the help of digital technologies not only make life easier but also very fast. The world without digital technologies realization seems to be very hard. These activities involve the exchange of some messages, which sometimes needs security, in terms of confidentiality, integrity, and availability. Objective: To develop an algorithm which can withstand against the Read More
-
-
-
Acumen Message Drop Scheme (AMD) in Opportunistic Networks
Authors: Halikul Lenando, Aref Hassan K. Ali and Mohamad AlrfaayBackground: In traditional networks, nodes drop messages to free up enough space for buffer optimization. However, keeping messages alive until they reach their destination is crucial in Opportunistic Networks. Therefore, this paper proposes an Acumen Message Drop scheme (AMD) that considers the impact of the message drop decision on data dissemination performance. Methods: To achieve this goal, AMD drops the m Read More
-
-
-
An Iterative Power Regulation Technique in Emergency Cognitive Radio Network Based on Firefly Algorithm
Authors: Swagata R. Chatterjee, Supriya Dhabal, Swati Chakraborti and Mohuya ChakrabortyBackground: Manmade disasters like explosion, toxic wastes, chemical spills etc. have become an imperative concern for our society. Manmade disasters are not an everyday phenomenon. Thus, the allocation of separate resources is not realistic. The idea is to use existing cellular infrastructure to implement single hop cognitive radio sensor network for protecting human being from manmade disasters. Objectives: Read More
-
Most Read This Month
Article
content/journals/swcc
Journal
10
5
false
en
