Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct its topology and r...Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct its topology and routing table information for the exchange of data packets on the joining and leaving of each node on ad-hoc basis. This paper is based on the MANET applications and challenges. The researchers can get the overall concept of MANET as well as its applications and challenges.展开更多
Given the glut of information on the web,it is crucially important to have a system,which will parse the information appropriately and recommend users with relevant information,this class of systems is known as Recomm...Given the glut of information on the web,it is crucially important to have a system,which will parse the information appropriately and recommend users with relevant information,this class of systems is known as Recommendation Systems(RS)-it is one of the most extensively used systems on the web today.Recently,Deep Learning(DL)models are being used to generate recommendations,as it has shown state-of-the-art(SoTA)results in the field of Speech Recognition and Computer Vision in the last decade.However,the RS is a much harder problem,as the central variable in the recommendation system’s environment is the chaotic nature of the human’s purchasing/consuming behaviors and their interest.These user-item interactions cannot be fully represented in the Euclidean-Space,as it will trivialize the interaction and undermine the implicit interactions patterns.So to preserve the implicit as well as explicit interactions of user and items,we propose a new graph based recommendation framework.The fundamental idea behind this framework is not only to generate the recommendations in the unsupervised fashion but to learn the dynamics of the graph and predict the short and long term interest of the users.In this paper,we propose the first step,a heuristic multi-layer high-dimensional graph which preserves the implicit and explicit interactions between users and items using SoTA Deep Learning models such as AutoEncoders.To generate recommendation from this generated graph a new class of neural network architecture-Graph Neural Network-can be used.展开更多
The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology...The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology that is called wireless sensor networks (WSNs). WSNs use sensor nodes that placed in open areas or in public places and with a huge number that creates many problems for the researchers and network designer, for giving an appropriate design for the wireless network. The problems are security, routing of data and processing of large amount of data etc. This paper describes the types of WSNs and the possible solutions for tackling the listed problems and solution of many other problems. This paper will deliver the knowledge about the WSN and types with literature review so that a person can get more knowledge about this emerging field.展开更多
Nowadays multiple wireless communication systems operate in industrial environments side by side.In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network ha...Nowadays multiple wireless communication systems operate in industrial environments side by side.In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmission power or higher carrier sensing threshold.Unlike the previous research works which considered IEEE 802.15.4 for the Industrial Wireless communication systems(iWCS)this paper examines the coexistence of IEEE 802.11 based iWCS used for delay-stringent communication in process automation and gWLAN(general-purpose WLAN)used for non-real time communication.In this paper,we present a Markov chain-based performance model that described the transmission failure of iWCS due to geographical collision with gWLAN.The presented analytic model accurately determines throughput,packet transaction delay,and packet loss probability of iWCS when it is collocated with gWLAN.The results of the Markov model match more than 90%with our simulation results.Furthermore,we proposed an adaptive transmission power control technique for iWCS to overcome the potential interferences caused by the gWLAN transmissions.The simulation results show that the proposed technique significantly improves iWCS performance in terms of throughput,packet transaction,and cycle period reduction.Moreover,it enables the industrial network for the use of delay critical applications in the presence of gWLAN without affecting its performance.展开更多
The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This st...The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.展开更多
Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stol...Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stolen,a thief can have access to the owner’s personal information and services against the stored passwords.As a result of this potential scenario,this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors.A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features,then further optimized using a non-linear unsupervised feature selection method.The selected features create an underlying gait biometric representation able to discriminate among individuals and identify them uniquely.Different classifiers are adopted to achieve accurate legitimate user identification.Extensive experiments on a group of 16 individuals in an indoor environment show the effectiveness of the proposed solution:with 5 to 70 samples per window,KNN and bagging classifiers achieve 87–99%accuracy,82–98%for ELM,and 81–94%for SVM.The proposed pipeline achieves a 100%true positive and 0%false-negative rate for almost all classifiers.展开更多
文摘Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct its topology and routing table information for the exchange of data packets on the joining and leaving of each node on ad-hoc basis. This paper is based on the MANET applications and challenges. The researchers can get the overall concept of MANET as well as its applications and challenges.
基金This work is supported by The National Natural Science Foundation of China[61502082].
文摘Given the glut of information on the web,it is crucially important to have a system,which will parse the information appropriately and recommend users with relevant information,this class of systems is known as Recommendation Systems(RS)-it is one of the most extensively used systems on the web today.Recently,Deep Learning(DL)models are being used to generate recommendations,as it has shown state-of-the-art(SoTA)results in the field of Speech Recognition and Computer Vision in the last decade.However,the RS is a much harder problem,as the central variable in the recommendation system’s environment is the chaotic nature of the human’s purchasing/consuming behaviors and their interest.These user-item interactions cannot be fully represented in the Euclidean-Space,as it will trivialize the interaction and undermine the implicit interactions patterns.So to preserve the implicit as well as explicit interactions of user and items,we propose a new graph based recommendation framework.The fundamental idea behind this framework is not only to generate the recommendations in the unsupervised fashion but to learn the dynamics of the graph and predict the short and long term interest of the users.In this paper,we propose the first step,a heuristic multi-layer high-dimensional graph which preserves the implicit and explicit interactions between users and items using SoTA Deep Learning models such as AutoEncoders.To generate recommendation from this generated graph a new class of neural network architecture-Graph Neural Network-can be used.
文摘The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology that is called wireless sensor networks (WSNs). WSNs use sensor nodes that placed in open areas or in public places and with a huge number that creates many problems for the researchers and network designer, for giving an appropriate design for the wireless network. The problems are security, routing of data and processing of large amount of data etc. This paper describes the types of WSNs and the possible solutions for tackling the listed problems and solution of many other problems. This paper will deliver the knowledge about the WSN and types with literature review so that a person can get more knowledge about this emerging field.
基金This research was supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(No.2018R1D1A1B07049758).
文摘Nowadays multiple wireless communication systems operate in industrial environments side by side.In such an environment performance of one wireless network can be degraded by the collocated hostile wireless network having higher transmission power or higher carrier sensing threshold.Unlike the previous research works which considered IEEE 802.15.4 for the Industrial Wireless communication systems(iWCS)this paper examines the coexistence of IEEE 802.11 based iWCS used for delay-stringent communication in process automation and gWLAN(general-purpose WLAN)used for non-real time communication.In this paper,we present a Markov chain-based performance model that described the transmission failure of iWCS due to geographical collision with gWLAN.The presented analytic model accurately determines throughput,packet transaction delay,and packet loss probability of iWCS when it is collocated with gWLAN.The results of the Markov model match more than 90%with our simulation results.Furthermore,we proposed an adaptive transmission power control technique for iWCS to overcome the potential interferences caused by the gWLAN transmissions.The simulation results show that the proposed technique significantly improves iWCS performance in terms of throughput,packet transaction,and cycle period reduction.Moreover,it enables the industrial network for the use of delay critical applications in the presence of gWLAN without affecting its performance.
文摘The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset.
文摘Smartphones have ubiquitously integrated into our home and work environments,however,users normally rely on explicit but inefficient identification processes in a controlled environment.Therefore,when a device is stolen,a thief can have access to the owner’s personal information and services against the stored passwords.As a result of this potential scenario,this work proposes an automatic legitimate user identification system based on gait biometrics extracted from user walking patterns captured by smartphone sensors.A set of preprocessing schemes are applied to calibrate noisy and invalid samples and augment the gait-induced time and frequency domain features,then further optimized using a non-linear unsupervised feature selection method.The selected features create an underlying gait biometric representation able to discriminate among individuals and identify them uniquely.Different classifiers are adopted to achieve accurate legitimate user identification.Extensive experiments on a group of 16 individuals in an indoor environment show the effectiveness of the proposed solution:with 5 to 70 samples per window,KNN and bagging classifiers achieve 87–99%accuracy,82–98%for ELM,and 81–94%for SVM.The proposed pipeline achieves a 100%true positive and 0%false-negative rate for almost all classifiers.