Filters








575 Hits in 5.4 sec

Localization Method for Low-power Wireless Sensor Networks

Diego Francisco Larios, Julio Barbancho, Francisco Javier Molina, Carlos León
2013 Journal of Networks  
Focusing on this issue, this paper presents a localization system based on the use of Wireless Sensor Networks devices.  ...  The proposed system is a range-free localization algorithm that uses fuzzy inference to process the RSSI measurement and to estimate the position of mobile devices.  ...  The fuzzy engine evaluates the antecedent of every rule by the intersection of the fuzzy inputs, using the minimum function for the AND operator (Eq. 8), and the maximum function for the OR operator (Eq  ... 
doi:10.4304/jnw.8.1.45-58 fatcat:wwtajrlm7jcchonih6l7y66xvm

Context-Awareness for Mobile Sensing: A Survey and Future Directions

Ozgur Yurur, Chi Harold Liu, Zhengguo Sheng, Victor C. M. Leung, Wilfrido Moreno, Kin K. Leung
2016 IEEE Communications Surveys and Tutorials  
The existence and awareness of the context provides the capability of being conscious of physical environments or situations around mobile device users.  ...  This allows network services to respond proactively and intelligently based on such awareness.  ...  The future research trend should investigate mobile device based battery behavior with respect to variant sensory operations in smart devices.  ... 
doi:10.1109/comst.2014.2381246 fatcat:tzbqt6k23va3tltwxwg5jgvel4

A fuzzy rule-based system to predict energy consumption of genetic programming algorithms

Josefa Álvarez, Franciso Chávez, Pedro Castillo, Juan García, Francisco Rodriguez, Vega de
2018 Computer Science and Information Systems  
To the best of our knowledge, few attempts have been performed before for modeling their energy consumption considering different execution devices.  ...  In this work, we propose a fuzzy rulebased system to predict energy comsumption of a kind of Evolutionary Algorithm, Genetic Prohramming, given the device in wich it will be executed, its main parameters  ...  Joao Sousa for their valuable and constructive suggestions  ... 
doi:10.2298/csis180110026a fatcat:gn27ovpinnb3xci4hqtjetc75y

A Fuzzy Data Fusion Solution to Enhance the QoS and the Energy Consumption in Wireless Sensor Networks

Mario Collotta, Giovanni Pau, Alexander V. Bobovich
2017 Wireless Communications and Mobile Computing  
In this paper, a fuzzy-based solution for data fusion in WSNs is presented to provide a better QoS and to reduce the energy consumption.  ...  This purpose is accomplished thanks to a Fuzzy Logic Controller (FLC) implemented within nodes.  ...  This Fuzzy Interface System analyzes AD based on the provided fuzzy rules.  ... 
doi:10.1155/2017/3418284 fatcat:hxfhmivdz5a6lg4my6gowvzl3a

A Conceptual and Systematics for Intelligent Power Management System-Based Cloud Computing: Prospects, and Challenges

Ahmed Hadi Ali AL-Jumaili, Yousif I. Al Mashhadany, Rossilawati Sulaiman, Zaid Abdi Alkareem Alyasseri
2021 Applied Sciences  
The current study aims to introduce a conceptual and systematic structure with three main components: demand power (direct current (DC)-device), power mix between renewable energy (RE) and other power  ...  This review describes a cloud-based intelligent power management system that uses analytics as a control signal and processes balance achievement pointer, and describes operator acknowledgments that must  ...  Thus, it is a significant me for managing batteries to concentrate on developing a cloud-based battery for mana batteries based on an intelligent system that employs a machine-learning technique ble of  ... 
doi:10.3390/app11219820 fatcat:kawh4um7trdtrl3z3zouugvkya

Security Threats and Artificial Intelligence based Countermeasures for Internet of Things Networks: A Comprehensive Survey

Shakila Zaman, Khaled Alhazmi, Mohammed Aseeri, Muhammad Raisuddin Ahmed, Risala Tasin Khan, M. Shamim Kaiser, Mufti Mahmud
2021 IEEE Access  
Among various rule-based ML techniques, FL, Fuzzy Neural Network (FNN), Neuro-Fuzzy Inference System (NFIS), etc., are more popular.  ...  TABLE 4 . 4 Artificial Intelligence techniques for threat countermeasure Type Algorithm Description Rule based FL FL provides a set of rules to govern a decision for making a system based on linguistic  ...  For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/  ... 
doi:10.1109/access.2021.3089681 fatcat:fatpywnjzzfilidakyduz6qz44

Human being emotion in cognitive intelligent robotic control. Pt.I: Quantum/ soft computing approach

Alla Mamaeva, Andrey Shevchenko, Sergey Ulyanov, Maria Feng, Kazuo Yamafuji
2019 System Analysis in Science and Education  
In particular case, the aim of this part is to demonstrate the possibility of classifying the mental states in on line of a human being operator with knowledge extraction from electroencephalograms based  ...  a human being operator shown.  ...  The general approach for forming a lookup-table with GA and the fuzzy classifier system based on FNN.  ... 
doi:10.37005/2071-9612-2019-4-87-131 fatcat:swpe36e3hjdidcenqhyq5mgnii

Mobile Health in Remote Patient Monitoring for Chronic Diseases: Principles, Trends, and Challenges

Nora El-Rashidy, Shaker El-Sappagh, S. M. Riazul Islam, Hazem M. El-Bakry, Samir Abdelrazek
2021 Diagnostics  
We followed the (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) PRISMA, which is a standard methodology for systematic reviews and meta-analyses.  ...  RPM systems are based on the collection of patient vital signs extracted using invasive and noninvasive techniques, then sending them in real-time to physicians.  ...  ., rule-based classifier, non-linear classifier, instance-based classifier, tree-based classifier, etc.) to analyze patient's medical records and predict mortality among them.  ... 
doi:10.3390/diagnostics11040607 pmid:33805471 pmcid:PMC8067150 fatcat:a42vma6mlfan3cqs5z7e2bs47a

A Review of Intrusion Detection Systems and Their Evaluation in the IoT [article]

Luca Arnaboldi, Charles Morisset
2021 arXiv   pre-print
In this article, we review works on IDS specifically for these kinds of devices from 2008 to 2018, collecting a total of 51 different IDS papers.  ...  The specifics of these very constrained devices render the design of an IDS capable of dealing with the varied attacks a very challenging problem and a very active research subject.  ...  Summerville et al. (2015) [79], propose a deep packet anomaly inspection that can operate on constrained embedded devices. Their approach can run both on the network stack or at the device level.  ... 
arXiv:2105.08096v1 fatcat:5gzpin2jxnajnema34pn744gry

A comprehensive review on hybrid electric vehicles: architectures and components

Krishna Veer Singh, Hari Om Bansal, Dheerendra Singh
2019 Journal of Modern Transportation  
As a result, battery is protected and the [130]. A rule-based control algorithm was proposed to energy flow can be effectively controlled.  ...  Li J, Fu Z, Jin X (2017) Rule Based energy management strat- ultracapacitor hybrid energy storage system (HESS).  ... 
doi:10.1007/s40534-019-0184-3 fatcat:s3edgtt6fvckxo2kcnmqocei5e

Trust-based recommendation systems in Internet of Things: a systematic literature review

Venus Mohammadi, Amir Masoud Rahmani, Aso Mohammed Darwesh, Amir Sahafi
2019 Human-Centric Computing and Information Sciences  
However, as far as we know, against the centrality of trust-based recommendation mechanisms in the IoT environment, there is no ambient study for investigating its techniques.  ...  Taking into account the dynamic-heterogeneous characteristic of interconnected devices in IoT, demand for a trust model to guarantee security, authentication, authorization, and confidentiality of connected  ...  The shortcoming of this model is indispensable domain experts' assistance for adopting fuzzy rules and knowledge incorporation based on input and output parameters.  ... 
doi:10.1186/s13673-019-0183-8 fatcat:ckozm3ixungbvpc37agoxc5arm

Machine learning-based edge-computing on a multi-level architecture of WSN and IoT for real-time fall detection

Amina El Attaoui, Salma Largo, Soufiane Kaissari, Achraf Benba, Abdelilah Jilbab, Abdennaser Bourouhou
2020 IET Wireless Sensor Systems  
Also, the online classification on the Fog device reached an accuracy of 94.42% using the SVM classifier.  ...  Nevertheless, the trend of movement and the implementation of computer intelligence in intelligent devices ensure an intelligent and convenient method for continuous realtime telemonitoring of health conditions  ...  Moreover, in this work, the trained models are intended to be embedded in the Fog device for online classification.  ... 
doi:10.1049/iet-wss.2020.0091 fatcat:fpr7q6456fa2jevpchgzxy67fi

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems [article]

Aditya Sundararajan, Arif I. Sarwat, Alexander Pons
2019 arXiv   pre-print
However, prior to engaging in WBS research, how their operational dynamics and design considerations differ from those of Traditional Biometric Systems (TBS) must be understood.  ...  Biometric research is directed increasingly towards Wearable Biometric Systems (WBS) for user authentication and identification.  ...  Score-level fusion techniques namely, SVMs, likelihood ratio-based fusion, and sum rule-based method preceded by normalization, were analyzed for their performance and accuracy for multimodal biometric  ... 
arXiv:1903.02548v1 fatcat:mkl32giawnb5lgornzq4w3ec74

Overview of Technical Specifications for Grid-Connected Microgrid Battery Energy Storage Systems

Asadullah Khalid, Alexander Stevenson, Arif I. Sarwat
2021 IEEE Access  
Finally, a discussion of the islanded and black start operation results for time-based analysis and standard validation of a 3MW/9MWh BESS in a grid-connected MG at the Florida International University  ...  In addition, a comprehensive review of the control strategies for battery equalization, energy management systems, communication, control of multiple BESSs, as well as a discussion on protection blinding  ...  Although the per kW price for batteries has been on the decline, energy storage makes up about one-third of the system based MGs expenditure.  ... 
doi:10.1109/access.2021.3132223 fatcat:5qgbhufmhvb2rokxh2zvbtklim

Energy Management in Plug-in Hybrid Electric Vehicles: Recent Progress and a Connected Vehicles Perspective

Clara Marina Martinez, Xiaosong Hu, Dongpu Cao, Efstathios Velenis, Bo Gao, Matthias Wellers
2017 IEEE Transactions on Vehicular Technology  
 Abstract-Plug-in hybrid electric vehicles (PHEVs) offer an immediate solution for emissions reduction and fuel displacement within the current infrastructure.  ...  This paper presents a comprehensive analysis of EMSs evolution towards blended mode and optimal control, providing a thorough survey of the latest progress in optimization-based algorithms.  ...  This strategy is still based on pre-defined rules which are implemented in a map-based format allowing for a wider margin of improvement.  ... 
doi:10.1109/tvt.2016.2582721 fatcat:ordeiwifrzg7bbzjtimtn5p4kq
« Previous Showing results 1 — 15 out of 575 results