Sensors,
Journal Year:
2022,
Volume and Issue:
23(1), P. 350 - 350
Published: Dec. 29, 2022
For
the
area
coverage
(e.g.,
using
a
WSN),
despite
comprehensive
research
works
on
full-plane
multi-node
team
equipped
with
ideal
constant
model,
only
very
few
have
discussed
of
practical
models
varying
intensity.
This
paper
analyzes
properties
effective
teams
consisting
given
numbers
nodes.
Each
node
is
radial
attenuation
disk
model
as
its
individual
coverage,
which
conforms
to
natural
characteristics
devices
in
real
world.
Based
our
previous
analysis
2-node
teams,
3-node
and
n-node
(n≥4)
regular
geometric
formations
are
analyzed
generalized
cases.
Numerical
simulations
for
conducted
separately.
cases,
relations
between
side
lengths
equilateral
triangle
formation
two
different
types
respectively
inspected.
cases
(n≥4),
three
formations,
namely
polygon,
star,
triangular
tessellation
(for
n=6),
investigated.
The
results
can
be
applied
many
scenarios,
either
dynamic
robots
sensors)
or
static,
where
multiple
nodes
cooperate
produce
larger
coverage.
Sustainability,
Journal Year:
2022,
Volume and Issue:
14(13), P. 8117 - 8117
Published: July 2, 2022
Infrastructure,
such
as
buildings,
bridges,
pavement,
etc.,
needs
to
be
examined
periodically
maintain
its
reliability
and
structural
health.
Visual
signs
of
cracks
depressions
indicate
stress
wear
tear
over
time,
leading
failure/collapse
if
these
are
located
at
critical
locations,
in
load-bearing
joints.
Manual
inspection
is
carried
out
by
experienced
inspectors
who
require
long
times
rely
on
their
empirical
subjective
knowledge.
This
lengthy
process
results
delays
that
further
compromise
the
infrastructure’s
integrity.
To
address
this
limitation,
study
proposes
a
deep
learning
(DL)-based
autonomous
crack
detection
method
using
convolutional
neural
network
(CNN)
technique.
improve
CNN
classification
performance
for
enhanced
pixel
segmentation,
40,000
RGB
images
were
processed
before
training
pretrained
VGG16
architecture
create
different
models.
The
chosen
methods
(grayscale,
thresholding,
edge
detection)
have
been
used
image
processing
(IP)
detection,
but
not
DL.
found
grayscale
models
(F1
score
10
epochs:
99.331%,
20
99.549%)
had
similar
99.432%,
99.533%),
with
increasing
greater
rate
more
(grayscale:
+2
TP,
+11
TN
images;
RGB:
+4
images).
thresholding
edge-detection
reduced
compared
(20-epoch
F1
−0.723%,
−0.402%).
suggests
DL
does
colour.
Hence,
model
has
implications
automated
concrete
infrastructures
gathered
information.
Journal of Sensor and Actuator Networks,
Journal Year:
2022,
Volume and Issue:
11(4), P. 67 - 67
Published: Oct. 18, 2022
Wireless
body
area
networks
(WBANs)
are
a
new
advance
utilized
in
recent
years
to
increase
the
quality
of
human
life
by
monitoring
conditions
patients
inside
and
outside
hospitals,
activities
athletes,
military
applications,
multimedia.
WBANs
consist
intelligent
micro-
or
nano-sensors
capable
processing
sending
information
base
station
(BS).
Sensors
embedded
bodies
individuals
can
enable
vital
exchange
over
wireless
communication.
Network
forming
these
sensors
envisages
long-term
medical
care
without
restricting
patients’
normal
daily
as
part
diagnosing
caring
for
patient
with
chronic
illness
after
surgery
manage
emergencies.
This
paper
reviews
WBAN,
its
security
challenges,
sensor
network
architecture
functions,
communication
technologies.
The
work
reported
this
investigates
significant
security-level
challenge
existing
WBAN.
Lastly,
it
highlights
various
mechanisms
increasing
decreasing
energy
consumption.
IEEE Transactions on Green Communications and Networking,
Journal Year:
2024,
Volume and Issue:
8(3), P. 1061 - 1075
Published: May 21, 2024
We
introduce
"TMIoDT,"
a
pioneering
framework
aimed
at
bolstering
communication
security
in
the
Internet
of
Drone
Things
(IoDT)
integrated
with
Open
Radio
Access
Networks
(Open
RAN),
specific
focus
on
bushfire
monitoring
applications.
Our
novel
contributions
include
seamless
integration
digital
twin
technology
blockchain
to
establish
robust
trust
management
system
IoDT
context.
This
approach
addresses
critical
vulnerabilities
associated
unsecured
wireless
networks
IoDT,
such
as
data
integrity
issues
and
susceptibility
cyber
threats.
The
TMIoDT
encompasses
mutual
authentication
mechanism
secure
interactions
key
exchanges
among
entities,
including
drones
Unmanned
Ground
Vehicles
(UGVs).
Furthermore,
it
leverages
for
credible
employs
twins
model
UGV
servers
accurately,
enhancing
relationship
modeling.
An
advanced
Intrusion
Detection
System
(IDS),
utilizing
Stacked
Variational
Autoencoder
(SVA)
Attention-based
Bidirectional
LSTM
(ABL),
is
implemented
anomaly
detection,
complemented
by
blockchain-based
transaction
writing
scheme
verification.
comprehensive
evaluation,
ToN-IoT
ICIDS-2017
network
intrusion
datasets,
confirms
TMIoDT's
effectiveness
significantly
improving
reliability
IoDT.
Sensors,
Journal Year:
2022,
Volume and Issue:
22(6), P. 2129 - 2129
Published: March 9, 2022
Nowadays,
the
rapid
deployment
of
Wireless
Sensor
Networks
(WSNs)
and
integration
Internet
Things
(IoT)
technology
has
enabled
their
application
to
grow
in
various
industrial
fields
our
country.
Various
factors
influence
success
WSN
development,
particularly
improvements
Medium
Access
Control
(MAC)
protocols,
for
which
WSNs-IoT
are
deemed
vital.
Several
aspects
should
be
considered,
such
as
energy
consumption
reduction,
performance,
scalability
a
large
nodes,
clustering
intelligence.
However,
many
protocols
address
this
aspect
constrained
view
handling
medium
access.
This
work
presents
state-of-the-art
review
recently
proposed
MAC
protocols.
Different
methods
approaches
enhance
main
performance
factors.
issue
considered
attribute
that
protocol
support.
A
comparison
table
is
given
provide
further
details
about
using
these
algorithms
improve
issues,
network
throughput,
end-to-end
delay,
packet
drop,
translated
into
consumption.
Biomimetics,
Journal Year:
2023,
Volume and Issue:
8(2), P. 231 - 231
Published: June 2, 2023
The
Internet
of
Things
technology
provides
convenience
for
data
acquisition
in
environmental
monitoring
and
protection
can
also
avoid
invasive
damage
caused
by
traditional
methods.
An
adaptive
cooperative
optimization
seagull
algorithm
optimal
coverage
heterogeneous
sensor
networks
is
proposed
order
to
address
the
issue
blind
zone
redundancy
initial
random
deployment
network
nodes
sensing
layer
Things.
Calculate
individual
fitness
value
according
total
number
nodes,
radius,
area
edge
length,
select
population,
aim
at
maximum
rate
determine
position
current
solution.
After
continuous
updating,
when
iterations
maximum,
global
output
output.
solution
node's
mobile
position.
A
scaling
factor
introduced
dynamically
adjust
relative
displacement
between
individual,
which
improves
exploration
development
ability
algorithm.
Finally,
fine-tuned
opposite
learning,
leading
whole
move
correct
given
search
space,
improving
jump
out
local
optimum,
further
increasing
accuracy.
experimental
simulation
results
demonstrate
that,
compared
with
energy
consumption
PSO
algorithm,
GWO
basic
SOA
PSO-SOA
this
paper
6.1%,
4.8%,
1.2%
higher
than
them,
respectively,
reduced
86.8%,
68.4%,
52.6%,
respectively.
method
based
on
improve
reduce
cost,
effectively
network.
IEEE Transactions on Consumer Electronics,
Journal Year:
2024,
Volume and Issue:
70(1), P. 4287 - 4298
Published: Feb. 1, 2024
In
this
study,
we
introduce
a
pioneering
framework,
DroneSSL,
that
integrates
the
concept
of
spatial
crowdsourcing
with
TinyML
to
enhance
anomaly
detection
in
Internet
Drone
Things
(IoDT).
This
innovative
approach
leverages
drones
and
unmanned
ground
vehicles
(UGVs)
for
expansive
data
collection
environments
are
typically
inaccessible
or
hazardous,
such
as
during
Australian
bushfire
incidents.
By
employing
lightweight
machine
learning
models
alongside
advanced
communication
technologies,
DroneSSL
transcends
traditional
spatial-temporal
analysis
methods.
It
efficiently
processes
multimodal
from
diverse
Points-of-Interest
(PoIs),
significantly
improving
quality
speed
analysis.
The
framework's
integration
temporal
feature
extraction
module
Graph
Neural
Network
(GNN)
its
adaptable,
scalable
GNN
architecture
tailor
real-time
operations
resource-constrained
IoDT
environments.
Achieving
an
89.6%
F1
score,
marks
substantial
4.9%
improvement
over
existing
approaches,
highlighting
effectiveness
critical
applications
environmental
surveillance
emergency
response.
advancement
not
only
showcases
potential
combining
but
also
sets
new
standard
efficient,
detection,
paving
way
future
innovations
IoT
edge
devices
monitoring
systems.
We
leverage
blockchain
technology
for
drone
node
authentication
in
internet
of
things
(IoDT).
During
the
procedure,
credentials
nodes
are
examined
to
remove
malicious
from
system.
In
IoDT,
drones
responsible
gathering
data
and
transmitting
it
cluster
heads
(CHs)
further
processing.
The
CH
collects
organizes
data.
Due
computational
load,
their
energy
levels
rapidly
deplete.
To
overcome
this
problem,
we
present
a
low-energy
adaptive
clustering
hierarchy
(R2D)
protocol
based
on
distance,
degree,
residual
energy.
R2D
is
used
replace
CHs
with
normal
biggest
energy,
shortest
distance
BS.
cost
keeping
big
volume
high.
employ
Interplanetary
File
System
(IPFS),
address
issue.
Moreover,
IPFS
protects
user
using
industry-standard
encryption
technique
AES-128.
This
standard
compares
well
other
current
methods.
Using
consensus
mechanism
proof
work
requires
high
amount
computing
resources
transaction
verification.
suggested
approach
leverages
known
as
authority
(PoA)
problem.
results
simulations
indicate
that
system
model
functions
effectively
efficiently.
A
formal
security
analysis
conducted
assess
smart
contract's
resistance
attacks.