GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-6-7), p. 1-14
    Abstract: The extensive use of sensor technology in every sphere of life, along with the continuous digitization of society, makes it realistic to anticipate that the planet will soon be patched with small-sized devices all over the place in the not-too-distant future. These devices give monitoring and surveillance capabilities, as well as access to a vast digital universe of information, among other things. Finding data and information, as well as processing enquiries, is made much easier thanks to the seamless transmission of information over wireless media, which is based on the “anywhere, anytime, everywhere” paradigm that allows information to be sent anywhere, at any time. Sensing networks came into existence as a consequence of the downsizing of wireless devices that are capable of receiving information from a source, transferring it, and processing it. Sensor networks, although they share many of the features, uses, and limits of ad hoc networks, have their own set of capabilities that are unique to them. While performing their responsibilities, sensor networks must contend with a variety of security issues, including unsecured wireless channels, physical compromise, and reprogramming. Because of the small size and ubiquitous availability of wireless sensor networks, compromise attacks are the most severe kind of attack in this environment (WSNs). With the proliferation of wireless sensor networks (WSNs), it is becoming more difficult to rely only on machine learning techniques. We sought to tackle the security challenge by developing a key management system as well as a secure routing mechanism. We are building scalable key management approaches that are resistant to node compromise and node replication attacks, which we will demonstrate in our proposed study, by using deployment-driven localization of security information and leveraging distributed key management. Using a security-aware selection of the next hop on the route to the destination, we were able to design safe routing algorithms that were effective.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    In: Journal of Healthcare Engineering, Hindawi Limited, Vol. 2023 ( 2023-7-8), p. 1-12
    Abstract: Breast cancer is the most frequent type of cancer in women; however, early identification has reduced the mortality rate associated with the condition. Studies have demonstrated that the earlier this sickness is detected by mammography, the lower the death rate. Breast mammography is a critical technique in the early identification of breast cancer since it can detect abnormalities in the breast months or years before a patient is aware of the presence of such abnormalities. Mammography is a type of breast scanning used in medical imaging that involves using x-rays to image the breasts. It is a method that produces high-resolution digital pictures of the breasts known as mammography. Immediately following the capture of digital images and transmission of those images to a piece of high-tech digital mammography equipment, our radiologists evaluate the photos to establish the specific position and degree of the sickness in the breast. When compared to the many classifiers typically used in the literature, the suggested Multiclass Support Vector Machine (MSVM) approach produces promising results, according to the authors. This method may pave the way for developing more advanced statistical characteristics based on most cancer prognostic models shortly. It is demonstrated in this paper that the suggested 2C algorithm with MSVM outperforms a decision tree model in terms of accuracy, which follows prior findings. According to our findings, new screening mammography technologies can increase the accuracy and accessibility of screening mammography around the world.
    Type of Medium: Online Resource
    ISSN: 2040-2309 , 2040-2295
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2023
    detail.hit.zdb_id: 2545054-2
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hindawi Limited ; 2022
    In:  Scientific Programming Vol. 2022 ( 2022-2-25), p. 1-11
    In: Scientific Programming, Hindawi Limited, Vol. 2022 ( 2022-2-25), p. 1-11
    Abstract: Software reliability is the probability of failure-free operations of software in a specific environment in a given time period. Various software reliability models have been designed by the researchers, but the JM model is the first influential model. The JM model was developed with the basic assumption that the faults are independent in this model and the debugging process is perfect. But practically, all debugging processes may not be perfect, especially when the faults are dependent; in this case, the fault that is actually to have been removed may also remove more than one fault and cause it to add some new faults. To handle this behavior of faults mutual dependency, we need a new model which may be less reliable or the result accuracy of the model may be lower than that of the existing ones, but it can handle more practical situations in the fault removal process. In this paper, we proposed a new software reliability model with the same assumption that at whatever time a failure is detected, it is not completely eradicated and there is a possibility of raising some new faults because of wrong analysis or inaccurate modifications in the software or the removal of the existing fault may also remove some other faults. The proposed model is more practical than the existing ones.
    Type of Medium: Online Resource
    ISSN: 1875-919X , 1058-9244
    RVK:
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2070004-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-4-14), p. 1-10
    Abstract: Absorption and scattering of propagated microwave radio signals by atmospheric variables, particularly rainfall, remained a major cause of propagation attenuation losses and service quality degradation over terrestrial communication links. The International Telecommunications Union Radio (ITU-R) reports and other related works in the literature provided information on attenuation due to rain and microwave propagation data. Such propagation attenuation information in the tropical region of Nigeria is destitute, especially at lower radio waves transmission frequencies. Therefore, this study addresses this problem by employing 12-year rainfall datasets to conduct realistic prognostic modeling of rain rate intensity levels. A classification of the rainfall data into three subgroups based on the depth of rainfall in the region is presented. Additionally, an in-depth estimation of specific rain attenuation intensities based on the 12-year rainfall data at 3.5 GHz is demonstrated. On average, the three rainfall classes produced rain rates of about 29.27 mm/hr, 73.71 mm/hr, and 105.39 mm/hr. The respective attenuation values are 0.89 dB, 1.71 dB, and 2.13 dB for the vertical polarisation and 1.09 dB, 1.20 dB, and 2.78 dB for the horizontal polarisation at 0.01% time percentage computation. Generally, results indicate that higher rain attenuation of 12% is observed for the horizontal polarisation compared to the vertical polarisation. These results can provide valuable first-hand information for microwave radio frequency planning in making appropriate decisions on attenuation levels due to different rainfall depths, especially for lower frequency arrays.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2023 ( 2023-2-11), p. 1-9
    Abstract: Cellular mobile communication network planning and optimization involve a complex engineering process that deals with network fundamentals, radio resource elements, and critical decision variables. The continuous evolution of radio access technologies provides new challenges that necessitate efficient radio planning and optimization. Therefore, the planning and optimization algorithms should be highly efficient, advanced, and robust. An important component of 4G LTE network planning is the proper placement of evolved node base stations (eNodeBs) and the configuration of their antenna elements. This contribution proposes a multiobjective genetic algorithm that integrates network coverage, capacity, and power consumption for optimal eNodeB placement in an operational 4G LTE network. The multi-objective-based genetic algorithm optimization has been achieved using the optimization toolbox in MATLAB. By leveraging the proposed method, the effect of different population sizes on the cost of placing the eNodeBs and the percentage coverage of the eNodeBs in a given cell is determined. As a result, the optimal selection technique that minimizes the total network cost without compromising the desired coverage and capacity benchmarks is achieved. The proposed automatic eNodeB antenna placement method can be explored to optimize 4G LTE cellular network planning in related wireless propagation environments.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2023
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    In: Wireless Communications and Mobile Computing, Hindawi Limited, Vol. 2022 ( 2022-8-8), p. 1-11
    Abstract: This is a topic that receives a lot of interest since many applications of computer vision focus on the detection of objects in visually appealing environments. Information about an object’s appearance and information regarding the object’s motion are both used as crucial signals in the process of identifying and recognising any given item. This information is used to characterise and recognise the item. The identification of objects based solely on their outward appearance has been the subject of a substantial amount of research. However, motion information in the recognition task has received only a marginal amount of attention, despite the fact that motion plays an essential role in the process of recognition. In order to analyze a moving picture in a way that is both fast and accurate, it is required to make use of motion information in conjunction with surface appearance in a strategy that has been designed. Dynamic texture is a kind of visual phenomenon that may be characterised as a type of visual phenomenon that shows spatially repeated features as well as some stationary properties during the course of time by using methodologies that are associated with machine learning. The design of modern VLSI systems takes into consideration a larger chip density, which results in a processor architecture with several cores that are capable of performing a wide range of functions (multicore processor architecture). It is becoming more challenging to run such complicated systems without the use of electric power. In order to increase the effectiveness of power optimization strategies while maintaining system performance for text data extraction, it has been developed and put into practice power optimization strategies that are based on scheduling algorithms. Over the last twenty years, texture analysis has been an increasingly busy and profitable field of study. Today, texture interpretation plays a vital role in various activities ranging from remote sensing to medical picture analysis. The absence of tools to newline analyze the many properties of texture pictures was the primary challenge faced by the texture analysis approach. Texture analysis may be roughly categorised as texture classification, texture segmentation, texture synthesis, and texture synthesis. Texture categorization is useful in numerous applications, such as the retrieval of picture databases, industrial agriculture applications, and biomedical applications. Texture categorization relies on three distinct methods, namely, statistical, spectral, and structural methods. Statistical methods are based on the statistical characteristics of the image’s grey level. Features are collected using second order statistical order, autocorrelation function, and grey level co-occurrence matrix function.
    Type of Medium: Online Resource
    ISSN: 1530-8677 , 1530-8669
    Language: English
    Publisher: Hindawi Limited
    Publication Date: 2022
    detail.hit.zdb_id: 2045240-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Springer Science and Business Media LLC ; 2023
    In:  Wireless Personal Communications Vol. 129, No. 3 ( 2023-04), p. 1921-1938
    In: Wireless Personal Communications, Springer Science and Business Media LLC, Vol. 129, No. 3 ( 2023-04), p. 1921-1938
    Type of Medium: Online Resource
    ISSN: 0929-6212 , 1572-834X
    Language: English
    Publisher: Springer Science and Business Media LLC
    Publication Date: 2023
    detail.hit.zdb_id: 1479327-1
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...