Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 7 de 7
Filter
Add more filters










Database
Language
Publication year range
1.
Sensors (Basel) ; 22(20)2022 Oct 21.
Article in English | MEDLINE | ID: mdl-36298399

ABSTRACT

The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies provide expected and predictable practices against channel attackers. These security policies can be easily breached by any intelligent attacks or malicious actions. The proposed Wireless Interleaved Honeypot-Framing Model (WIHFM) newly implements distributed honeypot-based security mechanisms in each sensor node to act reactively against various attackers. The proposed WIHFM creates an optimal Wireless Sensor Network (WSN) channel model, Wireless Interleaved Honeypot Frames (WIHFs), secure hash-based random frame-interleaving principles, node-centric honeypot engines, and channel-covering techniques. Compared to various existing MAC security policies, the proposed model transforms unpredictable IHFs into legitimate frame sequences against channel attackers. Additionally, introducing WIHFs is a new-fangled approach for distributed WSNs. The successful development of the proposed WIHFM ensures resilient security standards and neighbor-based intrusion alert procedures for protecting MAC frames. Particularly, the proposed wireless honeypot methodology creates a novel idea of using honeypot frame traps against open wireless channel attacks. The development of a novel wireless honeypot traps deals with various challenges such as distributed honeypot management principles (node-centric honeypot, secretly interleaved-framing principles, and interleaving/de-interleaving procedures), dynamic network backbone management principles (On Demand Acyclic Connectivity model), and distributed attack isolation policies. This effort provides an effective wireless attack-trapping solution in dynamic WSNs. The simulation results show the advantage of the proposed WIHFM over the existing techniques such as Secure Zebra MAC (SZ-MAC), Blockchain-Assisted Secure-Routing Mechanism (BASR), and the Trust-Based Node Evaluation (TBNE) procedure. The experimental section confirms the proposed model attains a 10% to 14% superior performance compared to the existing techniques.


Subject(s)
Computer Communication Networks , Wireless Technology , Algorithms , Computer Simulation , Policy
2.
Environ Sci Pollut Res Int ; 29(2): 1917-1936, 2022 Jan.
Article in English | MEDLINE | ID: mdl-34363157

ABSTRACT

The proposed research study aims to improve the productivity of solar still (SS) by using low-cost and eco-friendly materials. The aforementioned objective was achieved by enhancing the evaporation rate of seawater in the absorber basin and the condensation rate over the glass cover of the solar still. In this study, the low-cost and eco-friendly materials used for enhancing the evaporation rate in the solar still were molasses powder (MP), sawdust (SD) and rice husk (RH). In addition to these materials, bamboo straw (BS), banana leaf stem (BL) and rice straw (RS) were used as absorbing materials over the glass cover for enhancing the condensation rate. The experiments were carried out under similar meteorological conditions, and the results of the modified solar still were compared with the conventional solar still (CSS). The productivities of CSS, SSMP, SSRH, SSSD, SSBS, SSBL and SSRS were about 2250 mL/m2, 2383 mL/m2, 2467 mL/m2, 3033 mL/m2, 2700 mL/m2, 2683 mL/m2 and 3367 mL/m2, respectively. The results of the experimental investigation highlighted that the SSSD had a comparatively better evaporation rate and 34.81% higher yield than CSS. Besides, SSRS had a comparatively better condensation rate and a 51.88% higher yield than CSS. Furthermore, the combination of sawdust (SD) and rice straw (RS) was investigated for the combined enhancement of evaporation and condensation. The solar still with sawdust and rice straw (SSSDRS) showed a 62.88% improvement in productivity with 3633 mL/m2 when compared to CSS. Also, the economic analysis showed that the cost per litre (CPL) of freshwater obtained from SSSDRS was about ₹ 1.9 ($ 0.025) with a payback period of 4.4 months which was the least when compared to all the considered cases.


Subject(s)
Water Purification , Water , Cost-Benefit Analysis , Fresh Water , Sunlight
3.
Biomed Phys Eng Express ; 8(1)2021 12 09.
Article in English | MEDLINE | ID: mdl-34852330

ABSTRACT

Steady-state Visually Evoked Potential (SSVEP) based Electroencephalogram (EEG) signal is utilized in brain-computer interface paradigms, diagnosis of brain diseases, and measurement of the cognitive status of the human brain. However, various artifacts such as the Electrocardiogram (ECG), Electrooculogram (EOG), and Electromyogram (EMG) are present in the raw EEG signal, which adversely affect the EEG-based appliances. In this research, Adaptive Neuro-fuzzy Interface Systems (ANFIS) and Hilbert-Huang Transform (HHT) are primarily employed to remove the artifacts from EEG signals. This work proposes Adaptive Noise Cancellation (ANC) and ANFIS based methods for canceling EEG artifacts. A mathematical model of EEG with the aforementioned artifacts is determined to accomplish the research goal, and then those artifacts are eliminated based on their mathematical characteristics. ANC, ANFIS, and HHT algorithms are simulated on the MATLAB platform, and their performances are also justified by various error estimation criteria using hardware implementation.


Subject(s)
Artifacts , Brain-Computer Interfaces , Electroencephalography/methods , Humans , Machine Learning , Signal Processing, Computer-Assisted
4.
Results Phys ; 21: 103817, 2021 Feb.
Article in English | MEDLINE | ID: mdl-33462560

ABSTRACT

The ongoing outbreak of the COVID-19 pandemic prevails as an ultimatum to the global economic growth and henceforth, all of society since neither a curing drug nor a preventing vaccine is discovered. The spread of COVID-19 is increasing day by day, imposing human lives and economy at risk. Due to the increased enormity of the number of COVID-19 cases, the role of Artificial Intelligence (AI) is imperative in the current scenario. AI would be a powerful tool to fight against this pandemic outbreak by predicting the number of cases in advance. Deep learning-based time series techniques are considered to predict world-wide COVID-19 cases in advance for short-term and medium-term dependencies with adaptive learning. Initially, the data pre-processing and feature extraction is made with the real world COVID-19 dataset. Subsequently, the prediction of cumulative confirmed, death and recovered global cases are modelled with Auto-Regressive Integrated Moving Average (ARIMA), Long Short-Term Memory (LSTM), Stacked Long Short-Term Memory (SLSTM) and Prophet approaches. For long-term forecasting of COVID-19 cases, multivariate LSTM models is employed. The performance metrics are computed for all the models and the prediction results are subjected to comparative analysis to identify the most reliable model. From the results, it is evident that the Stacked LSTM algorithm yields higher accuracy with an error of less than 2% as compared to the other considered algorithms for the studied performance metrics. Country-specific analysis and city-specific analysis of COVID-19 cases for India and Chennai, respectively, are predicted and analyzed in detail. Also, statistical hypothesis analysis and correlation analysis are done on the COVID-19 datasets by including the features like temperature, rainfall, population, total infected cases, area and population density during the months of May, June, July and August to find out the best suitable model. Further, practical significance of predicting COVID-19 cases is elucidated in terms of assessing pandemic characteristics, scenario planning, optimization of models and supporting Sustainable Development Goals (SDGs).

5.
Sensors (Basel) ; 20(13)2020 Jun 27.
Article in English | MEDLINE | ID: mdl-32605077

ABSTRACT

A Brain-Computer Interface (BCI) acts as a communication mechanism using brain signals to control external devices. The generation of such signals is sometimes independent of the nervous system, such as in Passive BCI. This is majorly beneficial for those who have severe motor disabilities. Traditional BCI systems have been dependent only on brain signals recorded using Electroencephalography (EEG) and have used a rule-based translation algorithm to generate control commands. However, the recent use of multi-sensor data fusion and machine learning-based translation algorithms has improved the accuracy of such systems. This paper discusses various BCI applications such as tele-presence, grasping of objects, navigation, etc. that use multi-sensor fusion and machine learning to control a humanoid robot to perform a desired task. The paper also includes a review of the methods and system design used in the discussed applications.


Subject(s)
Brain-Computer Interfaces , Machine Learning , Algorithms , Brain/physiology , Electroencephalography , Humans , Robotics
6.
Sensors (Basel) ; 20(11)2020 Jun 01.
Article in English | MEDLINE | ID: mdl-32492971

ABSTRACT

Over the past few years, unmanned aerial vehicles (UAV) or drones have been used for many applications. In certain applications like surveillance and emergency rescue operations, multiple drones work as a network to achieve the target in which any one of the drones will act as the master or coordinator to communicate, monitor, and control other drones. Hence, drones are energy-constrained; there is a need for effective coordination among them in terms of decision making and communication between drones and base stations during these critical situations. This paper focuses on providing an efficient approach for the election of the cluster head dynamically, which heads the other drones in the network. The main objective of the paper is to provide an effective solution to elect the cluster head among multi drones at different periods based on the various physical constraints of drones. The elected cluster head acts as the decision-maker and assigns tasks to other drones. In a case where the cluster head fails, then the next eligible drone is re-elected as the leader. Hence, an optimally distributed solution proposed is called Bio-Inspired Optimized Leader Election for Multiple Drones (BOLD), which is based on two AI-based optimization techniques. The simulation results of BOLD compared with the existing Particle Swarm Optimization-Cluster head election (PSO-C) in terms of network lifetime and energy consumption, and from the results, it has been proven that the lifetime of drones with the BOLD algorithm is 15% higher than the drones with PSO-C algorithm.

7.
Sensors (Basel) ; 19(20)2019 Oct 14.
Article in English | MEDLINE | ID: mdl-31615014

ABSTRACT

Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user's are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offline guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust.

SELECTION OF CITATIONS
SEARCH DETAIL
...