首页 > 最新文献

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications最新文献

英文 中文
Emotion Detection in Text: Advances in Sentiment Analysis Using Deep Learning 文本中的情感检测:使用深度学习进行情感分析的进展
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.002
Dr. Walaa Saber Ismail
In the modern era of digital communication, the analysis of sentiment has emerged as a crucial tool for understanding and inferring public sentiment as communicated through written text. This is particularly relevant in the context of social media platforms such as Twitter, Facebook and Instagram. The present study focuses on the urgent matter of public opinion regarding the practice of animal testing, employing advanced deep-learning methodologies for sentiment analysis. A dataset of 15,360 tweets about animal testing was collected using the Twitter API. The data was prepared for analysis by undergoing careful preprocessing and word embedding it through the utilization of Word2vec. To classify tweets into positive and negative sentiment categories, a Long Short-Term Memory (LSTM) model was employed, given its suitability for processing sequential data. Remarkably, an accuracy rate of 88.7 percent was achieved by the model. It was determined that around 80% of tweets expressed criticism towards animal testing, indicating the presence of a substantial negative sentiment majority. These results show the topic's continuing significance by emphasizing its highly emotional and controversial nature. It is concluded that deep learning, and in particular LSTM models, can be used to effectively analyze large amounts of social media data and yield insightful understandings of public opinion. This study underlines the significance of sentiment analysis for gaining insight into public opinion and for its applications in policymaking and discourse analysis.
在现代数字通信时代,情感分析已成为了解和推断通过书面文本传播的公众情绪的重要工具。这与 Twitter、Facebook 和 Instagram 等社交媒体平台尤其相关。本研究采用先进的深度学习方法进行情感分析,重点关注有关动物实验实践的紧急舆情问题。我们使用 Twitter API 收集了 15,360 条有关动物实验的推文数据集。数据经过仔细的预处理,并通过 Word2vec 进行了词嵌入,为分析做好了准备。为了将推文分为正面和负面情感类别,我们采用了长短期记忆(LSTM)模型,因为该模型适合处理连续数据。值得注意的是,该模型的准确率达到了 88.7%。经测定,约有 80% 的推文表达了对动物实验的批评,这表明存在着大量的负面情绪。这些结果显示了该话题的持续重要性,强调了其高度情绪化和争议性。结论是,深度学习,尤其是 LSTM 模型,可用于有效分析大量社交媒体数据,并对公众舆论产生深刻的理解。本研究强调了情感分析对于洞察民意的重要性,以及在决策和话语分析中的应用。
{"title":"Emotion Detection in Text: Advances in Sentiment Analysis Using Deep Learning","authors":"Dr. Walaa Saber Ismail","doi":"10.58346/jowua.2024.i1.002","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.002","url":null,"abstract":"In the modern era of digital communication, the analysis of sentiment has emerged as a crucial tool for understanding and inferring public sentiment as communicated through written text. This is particularly relevant in the context of social media platforms such as Twitter, Facebook and Instagram. The present study focuses on the urgent matter of public opinion regarding the practice of animal testing, employing advanced deep-learning methodologies for sentiment analysis. A dataset of 15,360 tweets about animal testing was collected using the Twitter API. The data was prepared for analysis by undergoing careful preprocessing and word embedding it through the utilization of Word2vec. To classify tweets into positive and negative sentiment categories, a Long Short-Term Memory (LSTM) model was employed, given its suitability for processing sequential data. Remarkably, an accuracy rate of 88.7 percent was achieved by the model. It was determined that around 80% of tweets expressed criticism towards animal testing, indicating the presence of a substantial negative sentiment majority. These results show the topic's continuing significance by emphasizing its highly emotional and controversial nature. It is concluded that deep learning, and in particular LSTM models, can be used to effectively analyze large amounts of social media data and yield insightful understandings of public opinion. This study underlines the significance of sentiment analysis for gaining insight into public opinion and for its applications in policymaking and discourse analysis.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"94 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140365824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Collision Avoidance for Multi-node LoRa Networks based on TDMA and CSMA Algorithm 基于 TDMA 和 CSMA 算法的多节点 LoRa 网络防碰撞性能评估
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.005
I. G. D. Nugraha, Edwiansyah Zaky Ashadi, Ardiansyah Musa Efendi
LoRa can be used as the communication technology for the intelligent monitoring system. However, LoRa is usually used for outdoor communication. The usage of LoRa as indoor communication has many challenges. One of the challenges is that collision happens when using standard LoRa devices with only one channel. The algorithms based on TDMA (Time-division Multiple Access) and CSMA (Carrier-sense Multiple Access) protocols can be used to address this challenge. These two algorithms can be modified by applying the device that is the center of the network (gateway) as a central control and the data transmitter (sensor node) as a passive device. The test was conducted on the Intelligent Laboratory Monitoring System to evaluate this design on a multi-node LoRa network. RSSI testing proves that the distance and building interference affect the signal strength or RSSI of sensor nodes, so the average RSSI value is -73.75 with an RSSI threshold of value -106. The gateway successfully collected each sensor node data with an average success of about 64.953%. The experiment results show the success rate of the CSMA-based algorithm is 10% versus 100% in TDMA-based algorithm; the delay is 4125 ms for CSMA-based and 428.3 ms for TDMA-based. This result means that the CSMA-based algorithm is more complex, takes more time to process the data than the TDMA-based algorithm, has a low success rate, and is more prone to collisions.
LoRa 可用作智能监控系统的通信技术。不过,LoRa 通常用于室外通信。将 LoRa 用作室内通信有许多挑战。其中一个挑战是,使用只有一个信道的标准 LoRa 设备时会发生碰撞。基于 TDMA(时分多址)和 CSMA(载波侦测多址)协议的算法可用于解决这一难题。这两种算法可以通过将作为网络中心的设备(网关)用作中央控制和将数据发送器(传感器节点)用作被动设备进行修改。测试是在智能实验室监控系统上进行的,目的是在多节点 LoRa 网络上评估这一设计。RSSI 测试证明,距离和建筑物干扰会影响传感器节点的信号强度或 RSSI,因此 RSSI 平均值为 -73.75,RSSI 临界值为 -106。网关成功采集了每个传感器节点的数据,平均成功率约为 64.953%。实验结果显示,基于 CSMA 算法的成功率为 10%,而基于 TDMA 算法的成功率为 100%;基于 CSMA 算法的延迟为 4125 ms,而基于 TDMA 算法的延迟为 428.3 ms。这一结果说明,基于 CSMA 的算法比基于 TDMA 的算法更复杂,处理数据的时间更长,成功率更低,而且更容易发生碰撞。
{"title":"Performance Evaluation of Collision Avoidance for Multi-node LoRa Networks based on TDMA and CSMA Algorithm","authors":"I. G. D. Nugraha, Edwiansyah Zaky Ashadi, Ardiansyah Musa Efendi","doi":"10.58346/jowua.2024.i1.005","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.005","url":null,"abstract":"LoRa can be used as the communication technology for the intelligent monitoring system. However, LoRa is usually used for outdoor communication. The usage of LoRa as indoor communication has many challenges. One of the challenges is that collision happens when using standard LoRa devices with only one channel. The algorithms based on TDMA (Time-division Multiple Access) and CSMA (Carrier-sense Multiple Access) protocols can be used to address this challenge. These two algorithms can be modified by applying the device that is the center of the network (gateway) as a central control and the data transmitter (sensor node) as a passive device. The test was conducted on the Intelligent Laboratory Monitoring System to evaluate this design on a multi-node LoRa network. RSSI testing proves that the distance and building interference affect the signal strength or RSSI of sensor nodes, so the average RSSI value is -73.75 with an RSSI threshold of value -106. The gateway successfully collected each sensor node data with an average success of about 64.953%. The experiment results show the success rate of the CSMA-based algorithm is 10% versus 100% in TDMA-based algorithm; the delay is 4125 ms for CSMA-based and 428.3 ms for TDMA-based. This result means that the CSMA-based algorithm is more complex, takes more time to process the data than the TDMA-based algorithm, has a low success rate, and is more prone to collisions.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"62 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140364997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks 基于 VADIA-Verkle 树的机会型移动社交网络数据完整性攻击应对方法
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.011
Vimitha R Vidhya Lakshmi
Opportunistic Mobile Social Networks (OMSN) are prone to data integrity attacks that jeopardize the integrity of the routing data inside the network. Among the several techniques that cope with these attacks in OMSN, tree-based approaches have proven to be the most effective due to its ease of data verification and ensurance in data integrity. This paper evaluates two tree-based data structures, Merkle tree and Verkle tree in terms of their effectiveness in detecting and preventing such attacks. The evaluation considers tree-generation time and proof-checking time, and the results demonstrate that the Verkle tree is a bandwidth-efficient solution and have lower proof-checking time, with a reduction of 98.33% than Merkle tree. This makes Verkle tree a good choice for handling data integrity attacks in OMSN. A Verkle tree-based approach, named VADIA, is proposed to handle data integrity attacks such as packet dropping, packet modification and pollution attack in OMSN. The proposed approach is implemented in the Opportunistic Network Environment (ONE) simulator and is shown to be effective in detecting malicious nodes and paths, reducing false negative rates, and improving accuracy in detecting malicious activities. The results demonstrate a 47%, 84% and 69% improvement in malicious node, malicious path and malicious activity detection over a period of time. Furthermore, the approach achieves an 80% reduction in false negative rates.
机会性移动社交网络(OMSN)容易受到数据完整性攻击,从而破坏网络内路由数据的完整性。在 OMSN 中应对这些攻击的几种技术中,基于树的方法因其易于数据验证和确保数据完整性而被证明是最有效的。本文评估了 Merkle 树和 Verkle 树这两种基于树的数据结构在检测和预防此类攻击方面的有效性。评估考虑了树的生成时间和校验时间,结果表明 Verkle 树是一种带宽效率高的解决方案,而且校验时间更短,比 Merkle 树缩短了 98.33%。这使得 Verkle 树成为处理 OMSN 中数据完整性攻击的良好选择。本文提出了一种名为 VADIA 的基于 Verkle 树的方法,用于处理 OMSN 中的数据完整性攻击,如丢包、数据包修改和污染攻击。该方法在机会网络环境(ONE)模拟器中实施,结果表明它能有效检测恶意节点和路径,降低误报率,提高检测恶意活动的准确性。结果表明,在一段时间内,恶意节点、恶意路径和恶意活动的检测率分别提高了 47%、84% 和 69%。此外,该方法还将误报率降低了 80%。
{"title":"VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks","authors":"Vimitha R Vidhya Lakshmi","doi":"10.58346/jowua.2024.i1.011","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.011","url":null,"abstract":"Opportunistic Mobile Social Networks (OMSN) are prone to data integrity attacks that jeopardize the integrity of the routing data inside the network. Among the several techniques that cope with these attacks in OMSN, tree-based approaches have proven to be the most effective due to its ease of data verification and ensurance in data integrity. This paper evaluates two tree-based data structures, Merkle tree and Verkle tree in terms of their effectiveness in detecting and preventing such attacks. The evaluation considers tree-generation time and proof-checking time, and the results demonstrate that the Verkle tree is a bandwidth-efficient solution and have lower proof-checking time, with a reduction of 98.33% than Merkle tree. This makes Verkle tree a good choice for handling data integrity attacks in OMSN. A Verkle tree-based approach, named VADIA, is proposed to handle data integrity attacks such as packet dropping, packet modification and pollution attack in OMSN. The proposed approach is implemented in the Opportunistic Network Environment (ONE) simulator and is shown to be effective in detecting malicious nodes and paths, reducing false negative rates, and improving accuracy in detecting malicious activities. The results demonstrate a 47%, 84% and 69% improvement in malicious node, malicious path and malicious activity detection over a period of time. Furthermore, the approach achieves an 80% reduction in false negative rates.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"40 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140368269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of LSTM and BiLSTM in Image Detection Processing LSTM 和 BiLSTM 在图像检测处理中的对比分析
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.017
Dr. Bob Subhan Riza, Dr. Rina Yunita, Dr. Rika Rosnelly
Tuberculosis is an infectious disease and requires serious treatment. Extrapulmonary Tuberculosis is detected using a microscope. Currently it will take a long time because the fluid preparations are viewed in a microscope one by one carefully and in the fluid preparations there are 150 fields of vision. Examination for Extra Pulmonary Tuberculosis by culture takes between 1-2 weeks or even more. Examination by biopsy will take a long time because the fluid preparations are looked at carefully under the microscope one by one. The image of Tuberculosis is expressed if in the image there is a bacillus object in red, and it turns out that apart from the bacillus object there are other objects also in red. So that examinations for tuberculosis can be more efficient, examinations using computer technology are needed. This research aims to compare the Long Short-Term Memory (LSTM) and Bidirectional Long Short-Term Memory (BiLSTM) classification methods in the detection of extra-pulmonary tuberculosis disease to obtain better accuracy results. This research carried out HSI color space transformation, segmentation using global thresholding, feature extraction using 13 features based on shape and texture using the Correlation Based Feature Selection (CFS) feature selection method. The results show that BiLSTM has the best accuracy with a value of 88.40% at the number of features = 3, namely Short Run High Gray-Level Emphasis, Run Length Nonuniformity, Minor axis length, while LSTM produces an accuracy of 63.19% at the number of features = 5. BiLSTM is capable of detecting opposite features, meaning that BiLSTM can detect opposite features in data sequences and BiLSTM's ability to understand multiple contexts, so it tends to provide more accurate results in some data classification tasks.
肺结核是一种传染病,需要认真治疗。肺外结核病是通过显微镜检测出来的。目前,这需要很长时间,因为要在显微镜下逐一仔细观察液体制剂,而液体制剂中有 150 个视野。通过培养检查肺结核需要 1-2 周甚至更长时间。活组织切片检查需要很长时间,因为要在显微镜下逐一仔细观察液体制剂。如果图像中出现红色的杆菌物体,就表示结核病,结果发现除杆菌物体外,还有其他红色物体。为了提高肺结核检查的效率,需要使用计算机技术进行检查。本研究旨在比较长短期记忆(LSTM)和双向长短期记忆(BiLSTM)分类方法在肺外结核病检测中的应用,以获得更准确的结果。该研究进行了 HSI 色彩空间转换、全局阈值分割、基于形状和纹理的 13 个特征提取以及基于相关性的特征选择(CFS)特征选择方法。结果表明,在特征数=3 时,BiLSTM 的准确率最高,达到 88.40%,这些特征包括短跑高灰度强调、跑长不均匀、小轴长度;而在特征数=5 时,LSTM 的准确率为 63.19%。BiLSTM 具有检测相反特征的能力,这意味着 BiLSTM 可以检测数据序列中的相反特征,而且 BiLSTM 具有理解多种上下文的能力,因此它在一些数据分类任务中往往能提供更准确的结果。
{"title":"Comparative Analysis of LSTM and BiLSTM in Image Detection Processing","authors":"Dr. Bob Subhan Riza, Dr. Rina Yunita, Dr. Rika Rosnelly","doi":"10.58346/jowua.2024.i1.017","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.017","url":null,"abstract":"Tuberculosis is an infectious disease and requires serious treatment. Extrapulmonary Tuberculosis is detected using a microscope. Currently it will take a long time because the fluid preparations are viewed in a microscope one by one carefully and in the fluid preparations there are 150 fields of vision. Examination for Extra Pulmonary Tuberculosis by culture takes between 1-2 weeks or even more. Examination by biopsy will take a long time because the fluid preparations are looked at carefully under the microscope one by one. The image of Tuberculosis is expressed if in the image there is a bacillus object in red, and it turns out that apart from the bacillus object there are other objects also in red. So that examinations for tuberculosis can be more efficient, examinations using computer technology are needed. This research aims to compare the Long Short-Term Memory (LSTM) and Bidirectional Long Short-Term Memory (BiLSTM) classification methods in the detection of extra-pulmonary tuberculosis disease to obtain better accuracy results. This research carried out HSI color space transformation, segmentation using global thresholding, feature extraction using 13 features based on shape and texture using the Correlation Based Feature Selection (CFS) feature selection method. The results show that BiLSTM has the best accuracy with a value of 88.40% at the number of features = 3, namely Short Run High Gray-Level Emphasis, Run Length Nonuniformity, Minor axis length, while LSTM produces an accuracy of 63.19% at the number of features = 5. BiLSTM is capable of detecting opposite features, meaning that BiLSTM can detect opposite features in data sequences and BiLSTM's ability to understand multiple contexts, so it tends to provide more accurate results in some data classification tasks.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"24 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140368522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning for Early Diabetes Detection and Diagnosis 机器学习用于早期糖尿病检测和诊断
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.015
Sofiene Mansouri, Souhaila Boulares, S. Chabchoub
In this work, a machine learning (ML)-based e-diagnostic system is suggested specifically for the detection of gestational diabetes mellitus (GDM). Reviewing recent GDM data and outlining the intimate connection between GDM and prediabetic conditions, as well as the potential for future declines in insulin resistance and the emergence of overt Type 2 diabetes, were our goals. The present study explores the application of the K-nearest neighbors (KNN) algorithm to project diabetes diagnosis on the widely-used Pima Indians Diabetes database. The KNN algorithm, a non-parametric, instance-based learning method, was employed to classify individuals as either diabetic or non-diabetic, our objectives were to evaluate the algorithm’s ability to make accurate predictions and explore factors influencing its performance. The study commenced with data preprocessing, including handling missing values, feature scaling, and data splitting into training and testing sets. The KNN classifier was trained and tested using these best-fit parameters. The results of this study revealed a model with an accuracy of approximately 0.76 in predicting diabetes diagnosis. This study looked at the various machine-learning approaches for diabetes patient classification, including recall, accuracy, precision, and F1-score. The study discusses the significance of hyperparameter tuning, data preprocessing, and imbalanced data handling in achieving optimal KNN model performance. Lastly, this study shows how the KNN algorithm may be used to project diabetes using the Pima Indians Diabetes Database. The findings suggest that KNN can serve as a viable tool in the early detection of diabetes, paving the way for more extensive applications in healthcare and predictive modelling.
在这项研究中,我们提出了一种基于机器学习(ML)的电子诊断系统,专门用于检测妊娠糖尿病(GDM)。我们的目标是回顾最近的 GDM 数据,概述 GDM 与糖尿病前期症状之间的密切联系,以及未来胰岛素抵抗下降和明显 2 型糖尿病出现的可能性。本研究探索了 K 近邻(KNN)算法在广泛使用的皮马印第安人糖尿病数据库中糖尿病诊断预测中的应用。KNN 算法是一种非参数、基于实例的学习方法,用于将个体划分为糖尿病患者或非糖尿病患者,我们的目标是评估该算法做出准确预测的能力,并探索影响其性能的因素。研究从数据预处理开始,包括处理缺失值、特征缩放以及将数据分成训练集和测试集。使用这些最佳拟合参数对 KNN 分类器进行了训练和测试。研究结果表明,该模型预测糖尿病诊断的准确率约为 0.76。本研究探讨了用于糖尿病患者分类的各种机器学习方法,包括召回率、准确率、精确度和 F1 分数。研究讨论了超参数调整、数据预处理和不平衡数据处理在实现最佳 KNN 模型性能方面的重要性。最后,本研究展示了如何利用皮马印第安人糖尿病数据库将 KNN 算法用于预测糖尿病。研究结果表明,KNN 可以作为早期检测糖尿病的可行工具,为更广泛地应用于医疗保健和预测建模铺平道路。
{"title":"Machine Learning for Early Diabetes Detection and Diagnosis","authors":"Sofiene Mansouri, Souhaila Boulares, S. Chabchoub","doi":"10.58346/jowua.2024.i1.015","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.015","url":null,"abstract":"In this work, a machine learning (ML)-based e-diagnostic system is suggested specifically for the detection of gestational diabetes mellitus (GDM). Reviewing recent GDM data and outlining the intimate connection between GDM and prediabetic conditions, as well as the potential for future declines in insulin resistance and the emergence of overt Type 2 diabetes, were our goals. The present study explores the application of the K-nearest neighbors (KNN) algorithm to project diabetes diagnosis on the widely-used Pima Indians Diabetes database. The KNN algorithm, a non-parametric, instance-based learning method, was employed to classify individuals as either diabetic or non-diabetic, our objectives were to evaluate the algorithm’s ability to make accurate predictions and explore factors influencing its performance. The study commenced with data preprocessing, including handling missing values, feature scaling, and data splitting into training and testing sets. The KNN classifier was trained and tested using these best-fit parameters. The results of this study revealed a model with an accuracy of approximately 0.76 in predicting diabetes diagnosis. This study looked at the various machine-learning approaches for diabetes patient classification, including recall, accuracy, precision, and F1-score. The study discusses the significance of hyperparameter tuning, data preprocessing, and imbalanced data handling in achieving optimal KNN model performance. Lastly, this study shows how the KNN algorithm may be used to project diabetes using the Pima Indians Diabetes Database. The findings suggest that KNN can serve as a viable tool in the early detection of diabetes, paving the way for more extensive applications in healthcare and predictive modelling.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"80 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140368949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications 基于信任的路由选择--基于 WSN 的关键数据应用中的数据安全新方法
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.003
B. Sreevidya, Dr.M. Supriya
Wireless technology has changed the way entities communicate with one another. Wireless networks have created several opportunities in fields such as military, health care, and habitat monitoring, to name a few. However, only a few data-critical applications are built on wireless sensor networks, such as border reconnaissance, detecting infringement, and patient monitoring. These applications require the processing of a large amount of private data. Because most applications are data-sensitive, securing data transmission among wireless sensor networks is crucial. While incorporating data security, the most important requirement of wireless sensor nodes being energy optimized also need to be kept in consideration. There are various forms of assaults that are relevant in Wireless Sensor Networks (WSN). Attacks like Black Hole attacks, sink hole attacks, False data Injection attacks etc. are the most commonly seen attacks on WSNs. The common element in all these attacks is the concept of malicious / compromised node - a node which either drops / modifies the data content while forwarding it. Existing techniques for data security generally use cryptographic algorithms, but the use of cryptographic algorithms is in contrast with the energy optimization requirement of sensor nodes. An energy efficient data security scheme needs to be developed. The proposed system analyses several attacks and proposes a multi-layer data security approach to prevent change of data / dropping of data by the compromised nodes. The proposed system is a routing protocol referred as Trust Based Routing (TBR). A concept of trust value of a node is the core idea of TBR. Forwarding node is selected based on highest trust value and thus avoid malicious / compromised nodes from being involved in the routing process. The trust factor is calculated by considering the number of packets dropped, packets rejected, and the node's remaining energy. The idea of TBR is enhanced by incorporating the concept of past trust and trust of node towards a specific destination. This proposed scheme is referred as Extended Trust Based Routing (ETBR). This scheme is further enhanced by including Direct Trust, Indirect Trust and Energy Trust concepts. This scheme is referred as Consolidated Trust Estimation – Trust Based Routing (CTE-TBR). Network Simulator NS2 is used to simulate the proposed schemes. Various network factors are compared to classic Adhoc On-Demand Vector (AODV) and newly proposed schemes. The result indicates the effectiveness of the proposed data security scheme in terms of energy efficiency and Packet Delivery ratio (PDR).
无线技术改变了实体之间的通信方式。无线网络在军事、医疗保健和栖息地监测等领域创造了许多机会。然而,只有少数数据关键型应用建立在无线传感器网络上,如边境侦察、检测侵权行为和病人监测。这些应用需要处理大量私人数据。由于大多数应用都对数据敏感,因此确保无线传感器网络之间的数据传输安全至关重要。在保证数据安全的同时,还需要考虑到无线传感器节点最重要的要求是能量优化。与无线传感器网络(WSN)相关的攻击形式多种多样。黑洞攻击、沉洞攻击、虚假数据注入攻击等都是 WSN 上最常见的攻击。所有这些攻击的共同点是恶意/受损节点的概念--节点在转发数据时丢弃或修改数据内容。现有的数据安全技术通常使用加密算法,但加密算法的使用与传感器节点的能量优化要求相悖。因此需要开发一种高能效的数据安全方案。所提出的系统分析了几种攻击,并提出了一种多层数据安全方法,以防止受损节点更改数据或丢弃数据。所提议的系统是一种路由协议,被称为基于信任的路由(TBR)。节点的信任值概念是 TBR 的核心思想。转发节点根据最高信任值进行选择,从而避免恶意/受损节点参与路由过程。信任系数是通过考虑丢弃的数据包数量、拒绝的数据包数量以及节点的剩余能量计算得出的。TBR 的理念通过纳入过去信任度和节点对特定目的地的信任度的概念得到了增强。这一建议方案被称为基于信任的扩展路由(ETBR)。通过纳入直接信任、间接信任和能量信任概念,该方案得到了进一步增强。该方案被称为综合信任估计--基于信任的路由(CTE-TBR)。网络模拟器 NS2 用于模拟所提出的方案。将各种网络因素与传统的 Adhoc On-Demand Vector(AODV)和新提出的方案进行了比较。结果表明,建议的数据安全方案在能效和数据包传输率(PDR)方面非常有效。
{"title":"Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications","authors":"B. Sreevidya, Dr.M. Supriya","doi":"10.58346/jowua.2024.i1.003","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.003","url":null,"abstract":"Wireless technology has changed the way entities communicate with one another. Wireless networks have created several opportunities in fields such as military, health care, and habitat monitoring, to name a few. However, only a few data-critical applications are built on wireless sensor networks, such as border reconnaissance, detecting infringement, and patient monitoring. These applications require the processing of a large amount of private data. Because most applications are data-sensitive, securing data transmission among wireless sensor networks is crucial. While incorporating data security, the most important requirement of wireless sensor nodes being energy optimized also need to be kept in consideration. There are various forms of assaults that are relevant in Wireless Sensor Networks (WSN). Attacks like Black Hole attacks, sink hole attacks, False data Injection attacks etc. are the most commonly seen attacks on WSNs. The common element in all these attacks is the concept of malicious / compromised node - a node which either drops / modifies the data content while forwarding it. Existing techniques for data security generally use cryptographic algorithms, but the use of cryptographic algorithms is in contrast with the energy optimization requirement of sensor nodes. An energy efficient data security scheme needs to be developed. The proposed system analyses several attacks and proposes a multi-layer data security approach to prevent change of data / dropping of data by the compromised nodes. The proposed system is a routing protocol referred as Trust Based Routing (TBR). A concept of trust value of a node is the core idea of TBR. Forwarding node is selected based on highest trust value and thus avoid malicious / compromised nodes from being involved in the routing process. The trust factor is calculated by considering the number of packets dropped, packets rejected, and the node's remaining energy. The idea of TBR is enhanced by incorporating the concept of past trust and trust of node towards a specific destination. This proposed scheme is referred as Extended Trust Based Routing (ETBR). This scheme is further enhanced by including Direct Trust, Indirect Trust and Energy Trust concepts. This scheme is referred as Consolidated Trust Estimation – Trust Based Routing (CTE-TBR). Network Simulator NS2 is used to simulate the proposed schemes. Various network factors are compared to classic Adhoc On-Demand Vector (AODV) and newly proposed schemes. The result indicates the effectiveness of the proposed data security scheme in terms of energy efficiency and Packet Delivery ratio (PDR).","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"58 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140364922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements in Flexible Antenna Design: Enabling Tri-Band Connectivity for WLAN, WiMAX, and 5G Applications 柔性天线设计的进展:实现WLAN、WiMAX和5G应用的三频带连接
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.012
Olga Fisenko, Larisa Adonina, Heriberto Solis Sosa, Shiguay Guizado Giomar Arturo, Angélica Sánchez Castro, Fernando Willy Morillo Galarza, David Aroni Palomino
The use of flexible antennas has garnered significant interest in light of their wide-ranging applications inside contemporary wireless communication systems. The need for these antennas stems from the necessity for small, conformal, and versatile systems that can effectively function across many frequency ranges. The present study investigates designing and optimizing a universal triband antenna, focusing on meeting the distinct demands of Wireless Local Area Networks (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), and 5G applications. The current methodologies often need help attaining maximum efficiency over a wide range of frequency bands, resulting in concerns such as subpar radiation patterns and restricted bandwidth. To address the obstacles, this research proposes a novel approach known as the Triband Antenna Design using the Artificial Neural Network (3AD-ANN) method. This method utilizes machine learning techniques to devise and enhance the attributes of the antenna effectively. The 3AD-ANN approach presents several notable characteristics, such as heightened adaptability, increased radiation patterns, and a condensed physical structure. The mean values for far-field radiation gain are around -37.4 dB in simulated scenarios and -39.9 dB in actual observations. The average return loss is roughly -23.8 dB in simulations and -25.8 dB in experimental measurements. The numerical findings illustrate the effectiveness of this methodology, exhibiting exceptional return loss and gain sizes over a range of frequencies, including WLAN, WiMAX, and 5G.
鉴于柔性天线在当代无线通信系统中的广泛应用,其使用引起了人们的极大兴趣。对这些天线的需求源于对小型,共形和多功能系统的需求,这些系统可以有效地在许多频率范围内工作。本研究探讨了通用三频天线的设计和优化,重点是满足无线局域网(WLAN)、微波接入全球互操作性(WiMAX)和5G应用的独特需求。目前的方法通常需要在宽频带范围内获得最大效率的帮助,从而导致诸如低于标准的辐射模式和受限的带宽等问题。为了解决这些障碍,本研究提出了一种新的方法,即使用人工神经网络(3AD-ANN)方法进行三带天线设计。该方法利用机器学习技术有效地设计和增强天线的属性。3AD-ANN方法具有几个显著的特点,如适应性强、辐射模式增加和物理结构紧凑。远场辐射增益在模拟情景下的平均值约为-37.4 dB,在实际观测中为-39.9 dB。模拟的平均回波损耗约为-23.8 dB,实验测量的平均回波损耗为-25.8 dB。数值结果说明了该方法的有效性,在包括WLAN、WiMAX和5G在内的频率范围内显示出异常的回波损失和增益大小。
{"title":"Advancements in Flexible Antenna Design: Enabling Tri-Band Connectivity for WLAN, WiMAX, and 5G Applications","authors":"Olga Fisenko, Larisa Adonina, Heriberto Solis Sosa, Shiguay Guizado Giomar Arturo, Angélica Sánchez Castro, Fernando Willy Morillo Galarza, David Aroni Palomino","doi":"10.58346/jowua.2023.i3.012","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.012","url":null,"abstract":"The use of flexible antennas has garnered significant interest in light of their wide-ranging applications inside contemporary wireless communication systems. The need for these antennas stems from the necessity for small, conformal, and versatile systems that can effectively function across many frequency ranges. The present study investigates designing and optimizing a universal triband antenna, focusing on meeting the distinct demands of Wireless Local Area Networks (WLAN), Worldwide Interoperability for Microwave Access (WiMAX), and 5G applications. The current methodologies often need help attaining maximum efficiency over a wide range of frequency bands, resulting in concerns such as subpar radiation patterns and restricted bandwidth. To address the obstacles, this research proposes a novel approach known as the Triband Antenna Design using the Artificial Neural Network (3AD-ANN) method. This method utilizes machine learning techniques to devise and enhance the attributes of the antenna effectively. The 3AD-ANN approach presents several notable characteristics, such as heightened adaptability, increased radiation patterns, and a condensed physical structure. The mean values for far-field radiation gain are around -37.4 dB in simulated scenarios and -39.9 dB in actual observations. The average return loss is roughly -23.8 dB in simulations and -25.8 dB in experimental measurements. The numerical findings illustrate the effectiveness of this methodology, exhibiting exceptional return loss and gain sizes over a range of frequencies, including WLAN, WiMAX, and 5G.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stock Market Trend Analysis and Machine Learning-based Predictive Evaluation 股票市场趋势分析和基于机器学习的预测评估
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.020
Ratih Hurriyati, Ana A., Sulastri Sulastri, Lisnawati Lisnawati, Thosporn Sawangsang
Financial experts may make successful selections thanks to the stock market's research and forecasting capabilities, which is exciting. This study examines the stock market forecast outcomes through a simple feed-forward neural network (FFNN) model. Then, we contrast those outcomes with those produced using more sophisticated Elman, fuzzy logic, and radial basis function networks. Any problem with finite input-output mapping may be solved using the FFNN as long as it has at least one hidden layer and a sufficient number of neurons. An ANN in which RBFs are used as activation functions is called a radial basis function network (RBFN). Utilizing the Levenberg-Marquardt Back Propagation technique, the FFNN and Elman networks are trained in this study. A Fuzzy Inference System (FIS) of Sugeno type is employed to replicate the predictive procedure within the realm of fuzzy logic. We choose the optimal RBF values using several clustering techniques. The approaches were validated using public stock market data on the National Stock Exchange of Indonesia.
由于股市的研究和预测能力,金融专家可能会做出成功的选择,这是令人兴奋的。本研究透过简单前馈神经网路(FFNN)模型检验股市预测结果。然后,我们将这些结果与使用更复杂的Elman、模糊逻辑和径向基函数网络产生的结果进行对比。任何具有有限输入输出映射的问题都可以使用FFNN来解决,只要它至少有一个隐藏层和足够数量的神经元。将径向基函数作为激活函数的神经网络称为径向基函数网络(RBFN)。利用Levenberg-Marquardt反向传播技术,对FFNN和Elman网络进行了训练。采用Sugeno型模糊推理系统(FIS)在模糊逻辑领域内复制预测过程。我们使用几种聚类技术选择最优RBF值。这些方法使用印度尼西亚国家证券交易所的公开股票市场数据进行了验证。
{"title":"Stock Market Trend Analysis and Machine Learning-based Predictive Evaluation","authors":"Ratih Hurriyati, Ana A., Sulastri Sulastri, Lisnawati Lisnawati, Thosporn Sawangsang","doi":"10.58346/jowua.2023.i3.020","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.020","url":null,"abstract":"Financial experts may make successful selections thanks to the stock market's research and forecasting capabilities, which is exciting. This study examines the stock market forecast outcomes through a simple feed-forward neural network (FFNN) model. Then, we contrast those outcomes with those produced using more sophisticated Elman, fuzzy logic, and radial basis function networks. Any problem with finite input-output mapping may be solved using the FFNN as long as it has at least one hidden layer and a sufficient number of neurons. An ANN in which RBFs are used as activation functions is called a radial basis function network (RBFN). Utilizing the Levenberg-Marquardt Back Propagation technique, the FFNN and Elman networks are trained in this study. A Fuzzy Inference System (FIS) of Sugeno type is employed to replicate the predictive procedure within the realm of fuzzy logic. We choose the optimal RBF values using several clustering techniques. The approaches were validated using public stock market data on the National Stock Exchange of Indonesia.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Distribution of Packet Round-Trip Times using Fast Fourier Transformation 用快速傅里叶变换分析分组往返时间分布
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.009
Dr. Lixin Wang, Dr. Jianhua Yang, Maochang Qin
Hackers usually send attacking commands through compromised hosts, called stepping-stones, for the purpose of decreasing the chance of being discovered. An effective approach for stepping-stone intrusion detection (SSID) is to estimate the length of a connection chain. This type of detection method is referred to as the network-based SSID (NSSID). All the existing NSSID approaches use the distribution of packet round-trip times (RTTs) to estimate the length of a connection chain. In this paper, we explore a novel approach – Fast Fourier Transformation (FFT) to analyze the distribution of packet RTTs. We first capture network packets from different stepping-stones in a connection chain, identify and match the Send and Echo packets in each stepping-stone. Packet RTTs can be obtained from matched pairs of packets. We then apply the FFT interpolation method to obtain a RTT time function and finally conduct FFT transformation to the RTT function in each stepping-stone host. Finally, we conduct a complete FFT analysis for the distribution of packet RTTs and present the FFT analysis results in this paper.
黑客通常通过被入侵的主机(称为踏脚石)发送攻击命令,目的是降低被发现的几率。一种有效的入侵检测方法是估计连接链的长度。这种类型的检测方法被称为基于网络的SSID (NSSID)。现有的所有NSSID方法都使用分组往返时间(rtt)分布来估计连接链的长度。在本文中,我们探索了一种新的方法-快速傅立叶变换(FFT)来分析分组rtt的分布。我们首先捕获来自连接链中不同踏脚石的网络数据包,识别并匹配每个踏脚石中的Send和Echo数据包。报文rtt可以从匹配的报文对中获得。然后应用FFT插值方法得到RTT时间函数,最后对每个踏脚石主机中的RTT函数进行FFT变换。最后,我们对分组rtt的分布进行了完整的FFT分析,并在本文中给出了FFT分析结果。
{"title":"Analyzing Distribution of Packet Round-Trip Times using Fast Fourier Transformation","authors":"Dr. Lixin Wang, Dr. Jianhua Yang, Maochang Qin","doi":"10.58346/jowua.2023.i3.009","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.009","url":null,"abstract":"Hackers usually send attacking commands through compromised hosts, called stepping-stones, for the purpose of decreasing the chance of being discovered. An effective approach for stepping-stone intrusion detection (SSID) is to estimate the length of a connection chain. This type of detection method is referred to as the network-based SSID (NSSID). All the existing NSSID approaches use the distribution of packet round-trip times (RTTs) to estimate the length of a connection chain. In this paper, we explore a novel approach – Fast Fourier Transformation (FFT) to analyze the distribution of packet RTTs. We first capture network packets from different stepping-stones in a connection chain, identify and match the Send and Echo packets in each stepping-stone. Packet RTTs can be obtained from matched pairs of packets. We then apply the FFT interpolation method to obtain a RTT time function and finally conduct FFT transformation to the RTT function in each stepping-stone host. Finally, we conduct a complete FFT analysis for the distribution of packet RTTs and present the FFT analysis results in this paper.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavioural Analysis of Deaf and Mute People Using Gesture Detection 基于手势检测的聋哑人行为分析
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.010
Nirmala M.S.
Deaf and mute people have unique communication and social challenges that make it hard to express their thoughts, needs, and ideas. Understanding people's behavior is more important to protect them and help them integrate into society. This study discusses the critical need for behavioral analysis on deaf and mute people and introduces the Automatic Behavioral Analysis Employing Gesture Detection Framework (ABA-GDF). Gesture detection technology has gained popularity recently. This emphasis may be due to its ability to overcome communication hurdles and illuminate nonverbal communication. Current methods have various challenges, including limited accuracy and adaptability. The ABA-GDF architecture comprises three phases: dataset collection, modeling, and deployment. The data collection technique includes hand signals used by deaf and quiet people. The material is then processed to partition and normalize the hand area for consistent analysis. During Modelling, feature descriptor attributes are developed to extract relevant motion information. A classifier learns and predicts using the feature vectors, enabling the framework to recognize and interpret motions and actions. Large-scale simulations of ABA-GDF showed promising results. The ABA-GDF framework achieved 92% gesture recognition accuracy on the dataset. The system's robustness is demonstrated by its capacity to understand non-verbal messages. The research showed a 15% reduction in false positives compared to earlier methods, demonstrating its real-world usefulness.
聋哑人有独特的沟通和社交挑战,这使得他们很难表达自己的想法、需求和想法。了解人们的行为对保护他们、帮助他们融入社会更为重要。本研究讨论了聋哑人行为分析的必要性,并介绍了基于手势检测框架的自动行为分析(ABA-GDF)。手势检测技术最近得到了普及。这种强调可能是由于其克服沟通障碍和阐明非语言沟通的能力。目前的方法存在各种挑战,包括准确性和适应性有限。ABA-GDF架构包括三个阶段:数据集收集、建模和部署。数据收集技术包括聋哑人和安静的人使用的手势。然后对材料进行处理,以划分和规范化手部区域,以进行一致的分析。在建模过程中,开发特征描述符属性来提取相关的运动信息。分类器使用特征向量学习和预测,使框架能够识别和解释运动和动作。ABA-GDF的大规模模拟显示了令人满意的结果。ABA-GDF框架在数据集上的手势识别准确率达到92%。该系统的健壮性体现在其理解非语言信息的能力上。研究表明,与早期的方法相比,误报率降低了15%,证明了它在现实世界中的实用性。
{"title":"Behavioural Analysis of Deaf and Mute People Using Gesture Detection","authors":"Nirmala M.S.","doi":"10.58346/jowua.2023.i3.010","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.010","url":null,"abstract":"Deaf and mute people have unique communication and social challenges that make it hard to express their thoughts, needs, and ideas. Understanding people's behavior is more important to protect them and help them integrate into society. This study discusses the critical need for behavioral analysis on deaf and mute people and introduces the Automatic Behavioral Analysis Employing Gesture Detection Framework (ABA-GDF). Gesture detection technology has gained popularity recently. This emphasis may be due to its ability to overcome communication hurdles and illuminate nonverbal communication. Current methods have various challenges, including limited accuracy and adaptability. The ABA-GDF architecture comprises three phases: dataset collection, modeling, and deployment. The data collection technique includes hand signals used by deaf and quiet people. The material is then processed to partition and normalize the hand area for consistent analysis. During Modelling, feature descriptor attributes are developed to extract relevant motion information. A classifier learns and predicts using the feature vectors, enabling the framework to recognize and interpret motions and actions. Large-scale simulations of ABA-GDF showed promising results. The ABA-GDF framework achieved 92% gesture recognition accuracy on the dataset. The system's robustness is demonstrated by its capacity to understand non-verbal messages. The research showed a 15% reduction in false positives compared to earlier methods, demonstrating its real-world usefulness.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1