Pub Date : 2021-01-01DOI: 10.37421/2090-4886.2021.10.E119
M. Hadi
{"title":"Determination of Blood pH - a Sensor Controlled Device","authors":"M. Hadi","doi":"10.37421/2090-4886.2021.10.E119","DOIUrl":"https://doi.org/10.37421/2090-4886.2021.10.E119","url":null,"abstract":"","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"10 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70041706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.37421/2090-4886.21.10.163
Mohammad Baghlania
A traffic signal framework created since 1912 to control traffic at convergences, person on foot intersections and different territories. Gridlocks are expanding step by step, so we need to deal with numerous issues. Because of the huge volume of vehicles, the absence of framework and dissemination frameworks is the primary driver of gridlock. Traffic signals are red, blue and green. The green light sign is utilized in the showed course; the yellow light sign is utilized to caution vehicles of a short stop and a red light restricting development. Nowadays, numerous countries endure the evil impacts of the gridlock gives that impact the transportation framework in metropolitan networks and cause certified trouble. Regardless of overriding cops and flagmen by means of modified traffic structures, the headway of the mind-boggling blocked driving conditions is at this point an imperative issue to be gone up against, especially with various convergence centers. The fast addition in the quantity of cars and the continually rising number of road customers is not joined by cutting edge systems with satisfactory resources. Midway game plans were offered by growing new roads, executing flyovers and avoid roads, making rings, and performing roads rebuilding.
{"title":"Control of Traffic Light Utilizing AI","authors":"Mohammad Baghlania","doi":"10.37421/2090-4886.21.10.163","DOIUrl":"https://doi.org/10.37421/2090-4886.21.10.163","url":null,"abstract":"A traffic signal framework created since 1912 to control traffic at convergences, person on foot intersections and different territories. Gridlocks are expanding step by step, so we need to deal with numerous issues. Because of the huge volume of vehicles, the absence of framework and dissemination frameworks is the primary driver of gridlock. Traffic signals are red, blue and green. The green light sign is utilized in the showed course; the yellow light sign is utilized to caution vehicles of a short stop and a red light restricting development. Nowadays, numerous countries endure the evil impacts of the gridlock gives that impact the transportation framework in metropolitan networks and cause certified trouble. Regardless of overriding cops and flagmen by means of modified traffic structures, the headway of the mind-boggling blocked driving conditions is at this point an imperative issue to be gone up against, especially with various convergence centers. The fast addition in the quantity of cars and the continually rising number of road customers is not joined by cutting edge systems with satisfactory resources. Midway game plans were offered by growing new roads, executing flyovers and avoid roads, making rings, and performing roads rebuilding.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"10 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70042962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.37421/2090-4886.21.10.116
Aman Shahabi
Cardiovascular illnesses (CVDs) and stroke are at the top causing demise around the world. World Health Organization (WHO), rough demise of 17.7 million individuals because of CVDs in 2015 which addressed 31% of every worldwide passing. Among these passing’s, around 7.4 million were because of coronary illness, and 6.7 million were because of stroke. Early and speedy conclusion is critical for fruitful visualization of CVD and stroke. In such manner, numerous cardiovascular explicit biomarkers like myoglobin, B-type natriuretic peptide (BNP), heart troponin I (cTnI), C-Receptive Protein (CRP), and interleukins, interferons are distinguished which are recognized utilizing optical (colorimetric, fluorescence, radiance, Surface Plasma Reverberation (SPR) and fiber optics/bio-optrode), acoustic (CMOS Si chips), electrochemical (potentiometric, amperometric and impedimetric transducers), and attractive based biosensors. Albeit critical advances in biosensors ages have been accomplished, these face some genuine limits.
{"title":"Role of Biosensor in the Field Cardiovascular Disorder","authors":"Aman Shahabi","doi":"10.37421/2090-4886.21.10.116","DOIUrl":"https://doi.org/10.37421/2090-4886.21.10.116","url":null,"abstract":"Cardiovascular illnesses (CVDs) and stroke are at the top causing demise around the world. World Health Organization (WHO), rough demise of 17.7 million individuals because of CVDs in 2015 which addressed 31% of every worldwide passing. Among these passing’s, around 7.4 million were because of coronary illness, and 6.7 million were because of stroke. Early and speedy conclusion is critical for fruitful visualization of CVD and stroke. In such manner, numerous cardiovascular explicit biomarkers like myoglobin, B-type natriuretic peptide (BNP), heart troponin I (cTnI), C-Receptive Protein (CRP), and interleukins, interferons are distinguished which are recognized utilizing optical (colorimetric, fluorescence, radiance, Surface Plasma Reverberation (SPR) and fiber optics/bio-optrode), acoustic (CMOS Si chips), electrochemical (potentiometric, amperometric and impedimetric transducers), and attractive based biosensors. Albeit critical advances in biosensors ages have been accomplished, these face some genuine limits.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"15 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70041623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-01DOI: 10.37421/2090-4886.21.10.165
R. Sawyerr
In the cutting edge worldwide conflict climate, electronic fighting, that is, electronic fighting, has become another significant front line other than ocean, land and air. Nations everywhere on the world have progressively understood the basic directing job of electronic countermeasures innovation in the achievement or disappointment of future conflicts. Whoever aces the critical innovations of electronic fighting as far as possible, and whoever has dominated the option to talk and control the conflict later on.
{"title":"Radar Signal Detection in Noise Using Machine Learning","authors":"R. Sawyerr","doi":"10.37421/2090-4886.21.10.165","DOIUrl":"https://doi.org/10.37421/2090-4886.21.10.165","url":null,"abstract":"In the cutting edge worldwide conflict climate, electronic fighting, that is, electronic fighting, has become another significant front line other than ocean, land and air. Nations everywhere on the world have progressively understood the basic directing job of electronic countermeasures innovation in the achievement or disappointment of future conflicts. Whoever aces the critical innovations of electronic fighting as far as possible, and whoever has dominated the option to talk and control the conflict later on.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"10 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70043416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The swift uptake of sensors and the increasing demand of Wireless Sensor Network (WSN) applications and services create unmatched appeals for routing data packets on WSN infrastructure. In the era of Internet of Things (IoT), an immense number of sensing devices collect numerous sensor data over time for an extensive span of fields. For IoT-enabled devices routing through WSN, sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, secured routing remains a serious issue that has to be addressed. To address this issue, in this work, a robust method using Mid Square Hash-based Bezier Authentication (MSH-BA) is designed to secure the routing for IoT-enabled WSNs. First, a Mid Square Hashing Data Collection algorithm is proposed to minimize the energy consumption through unique key generation. To minimize the running time of IoT sensor network, discrete registration is performed between user and gateway nodes. Finally, the proof of correctness of mutual authentication is performed using the Bezier Authentication method via progressive distance, therefore ensuring packet delivery ratio. The robust authentication method is analyzed comprehensively and compared against the similar authentication methods and the results showed that it is efficient and robust than earlier methods.
{"title":"Mid Square Hash Bezier Secured Routing for IoT Enabled Wireless Sensor Networks","authors":"R. Mohanraj","doi":"10.37421/INT","DOIUrl":"https://doi.org/10.37421/INT","url":null,"abstract":"The swift uptake of sensors and the increasing demand of Wireless Sensor Network (WSN) applications and services create unmatched appeals for routing data packets on WSN infrastructure. In the era of Internet of Things (IoT), an immense number of sensing devices collect numerous sensor data over time for an extensive span of fields. For IoT-enabled devices routing through WSN, sensor nodes transmit confidential data to the gateway nodes via public channels. In such an environment, secured routing remains a serious issue that has to be addressed. To address this issue, in this work, a robust method using Mid Square Hash-based Bezier Authentication (MSH-BA) is designed to secure the routing for IoT-enabled WSNs. First, a Mid Square Hashing Data Collection algorithm is proposed to minimize the energy consumption through unique key generation. To minimize the running time of IoT sensor network, discrete registration is performed between user and gateway nodes. Finally, the proof of correctness of mutual authentication is performed using the Bezier Authentication method via progressive distance, therefore ensuring packet delivery ratio. The robust authentication method is analyzed comprehensively and compared against the similar authentication methods and the results showed that it is efficient and robust than earlier methods.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"9 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70053931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-25DOI: 10.4172/2090-4886-C1-011
pMagdy Mohamed Hafez Abdelmaguidp
In a transition to automated digital management of broadband networks, communica- tion service providers must look for new metrics to monitor these networks. Complete metrics frameworks are already emerging whereas majority of the new metrics are being proposed in technical papers. Considering common metrics for broadband networks and related technologies, this chapter offers insights into what metrics are available, and also suggests active areas of research. The broadband networks being a key component of the digital ecosystems are also an enabler to many other digital technologies and services. Reviewing first the metrics for computing systems, websites and digital platforms, the chapter focus then shifts to the most important technical and business metrics which are used for broadband networks. The demand-side and supply-side metrics including the key metrics of broadband speed and broadband availability are touched on. After outlin- ing the broadband metrics which have been standardized and the metrics for measuring Internet traffic, the most commonly used metrics for broadband networks are surveyed in five categories: energy and power metrics, quality of service, quality of experience, security metrics, and robustness and resilience metrics. The chapter concludes with a discussion on machine learning, big data and the associated metrics.
{"title":"Wireless of Egypt","authors":"pMagdy Mohamed Hafez Abdelmaguidp","doi":"10.4172/2090-4886-C1-011","DOIUrl":"https://doi.org/10.4172/2090-4886-C1-011","url":null,"abstract":"In a transition to automated digital management of broadband networks, communica- tion service providers must look for new metrics to monitor these networks. Complete metrics frameworks are already emerging whereas majority of the new metrics are being proposed in technical papers. Considering common metrics for broadband networks and related technologies, this chapter offers insights into what metrics are available, and also suggests active areas of research. The broadband networks being a key component of the digital ecosystems are also an enabler to many other digital technologies and services. Reviewing first the metrics for computing systems, websites and digital platforms, the chapter focus then shifts to the most important technical and business metrics which are used for broadband networks. The demand-side and supply-side metrics including the key metrics of broadband speed and broadband availability are touched on. After outlin- ing the broadband metrics which have been standardized and the metrics for measuring Internet traffic, the most commonly used metrics for broadband networks are surveyed in five categories: energy and power metrics, quality of service, quality of experience, security metrics, and robustness and resilience metrics. The chapter concludes with a discussion on machine learning, big data and the associated metrics.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70970099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-25DOI: 10.4172/2090-4886-C1-012
P. C. Campbell, Chris Housep
Atmospheric propagation is very effective on the performance of the wireless, mobile, radar, and communication systems. In this paper different atmospheric models are constructed under different atmospheric conditions. The performance of a GSM mobile communication is tested under different atmospheric models. From the obtained results, it is noticed that the coverage of the mobile system antenna is changed highly if the refractive index model of certain country is changed. It is concluded that the atmospheric propagation is very essential parameter to be taken into account when the siting of a mobile GSM network is to be evaluated and designed. This study will be very useful in order to predict the performance of ground radio and airborne systems.
{"title":"A smart classroom environment - utilizing sensor networks and Internet of things","authors":"P. C. Campbell, Chris Housep","doi":"10.4172/2090-4886-C1-012","DOIUrl":"https://doi.org/10.4172/2090-4886-C1-012","url":null,"abstract":"Atmospheric propagation is very effective on the performance of the wireless, mobile, radar, and communication systems. In this paper different atmospheric models are constructed under different atmospheric conditions. The performance of a GSM mobile communication is tested under different atmospheric models. From the obtained results, it is noticed that the coverage of the mobile system antenna is changed highly if the refractive index model of certain country is changed. It is concluded that the atmospheric propagation is very essential parameter to be taken into account when the siting of a mobile GSM network is to be evaluated and designed. This study will be very useful in order to predict the performance of ground radio and airborne systems.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70970242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-13DOI: 10.4172/2090-4886-C1-010
pTetsuya Shimamurap
{"title":"Spectrum efficient PAPR reduction techniques for OFDM systems","authors":"pTetsuya Shimamurap","doi":"10.4172/2090-4886-C1-010","DOIUrl":"https://doi.org/10.4172/2090-4886-C1-010","url":null,"abstract":"","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70969669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-19DOI: 10.4172/2090-4886.1000157
A. Alenezi, A. Abdi
Many symmetric encryption algorithms have been proposed since long time back. They are used to protect the data either during transmission, storage or both. All symmetric algorithms are using a single key used for encryption and decryption same data. In this paper, we have designed a new approach of symmetric algorithm "UR8". It is fiestel network and able to encrypt and decrypt 128 bits block cipher. Further, UR8 algorithm uses 64 bits key size and 8 rounds to encrypt and decrypt the data. Thereafter, we have evaluated UR8 algorithm based on the time required for encryption and decryption, throughput, memory utilization and average data rate. As well, the evaluation result has been compared to DES algorithm.
{"title":"Strain Sensor and Accelerometer Communication Channels in Drill Pipes of Oil Wells: Delay Spreads and Eigenvalues","authors":"A. Alenezi, A. Abdi","doi":"10.4172/2090-4886.1000157","DOIUrl":"https://doi.org/10.4172/2090-4886.1000157","url":null,"abstract":"Many symmetric encryption algorithms have been proposed since long time back. They are used to protect the data either during transmission, storage or both. All symmetric algorithms are using a single key used for encryption and decryption same data. In this paper, we have designed a new approach of symmetric algorithm \"UR8\". It is fiestel network and able to encrypt and decrypt 128 bits block cipher. Further, UR8 algorithm uses 64 bits key size and 8 rounds to encrypt and decrypt the data. Thereafter, we have evaluated UR8 algorithm based on the time required for encryption and decryption, throughput, memory utilization and average data rate. As well, the evaluation result has been compared to DES algorithm.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"2018 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000157","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42343415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-13DOI: 10.4172/2090-4886.1000153
Koné Chaka, Nhan Le-Thanh, Rémi Flamary, C. Belleudy
Emotica (EMOTIon CApture) system is a multimodal emotion recognition system that uses physiological signals. A DLF (Decision Level Fusion) approach with a voting method is used in this system to merge monomodal decisions for a multimodal detection. In this document, on the one hand, we describe how from a physiological signal Emotica can detect an emotional activity and distinguish one emotional activity from others. On the other hand, we present a study about two classification algorithms, KNN and SVM. These algorithms have been implemented on the Emotica system in order to see which one is the best. The experiments show that KNN and SVM allow a high accuracy in emotion recognition, but SVM is more accurate than KNN on the data that was used. Indeed, we obtain a recognition rate of 81.69% and 84% respectively with KNN and SVM algorithms under certain conditions.
{"title":"Performance Comparison of the KNN and SVM Classification Algorithms in the Emotion Detection System EMOTICA","authors":"Koné Chaka, Nhan Le-Thanh, Rémi Flamary, C. Belleudy","doi":"10.4172/2090-4886.1000153","DOIUrl":"https://doi.org/10.4172/2090-4886.1000153","url":null,"abstract":"Emotica (EMOTIon CApture) system is a multimodal emotion recognition system that uses physiological signals. A DLF (Decision Level Fusion) approach with a voting method is used in this system to merge monomodal decisions for a multimodal detection. In this document, on the one hand, we describe how from a physiological signal Emotica can detect an emotional activity and distinguish one emotional activity from others. On the other hand, we present a study about two classification algorithms, KNN and SVM. These algorithms have been implemented on the Emotica system in order to see which one is the best. The experiments show that KNN and SVM allow a high accuracy in emotion recognition, but SVM is more accurate than KNN on the data that was used. Indeed, we obtain a recognition rate of 81.69% and 84% respectively with KNN and SVM algorithms under certain conditions.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"7 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2018-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000153","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43267770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}