Advanced Search
Displaying 1-10 on page 1 of 3056. Per Page  

Articles / Online

  • Optimizing Energy Conservation in V2X Communications for 5G Networks
  • Abstract The smart vehicles are one of critical enablers for automated services in smart cities to provide intelligent transportation means without human intervention. In order to fulfil requirements, Vehicle-to-Anything(V2X) communications aims to manage massive connectivity and high traffic load on base stations and extend the range over multiple hops in 5G networks. However, V2X networking faces several challenges from dynamic topology caused by high velocity of nodes and routing overhead that degrades the network performance and increases energy consumption. The existing routing scheme for V2X networking lacks energy efficiency and scalability for high velocity nodes with dense distribution. In order to…
  • More
  •   Views:67       Downloads:111        Download PDF
  • Empathic Responses of Behavioral-Synchronization in Human-Agent Interaction
  • Abstract Artificial entities, such as virtual agents, have become more pervasive. Their long-term presence among humans requires the virtual agent's ability to express appropriate emotions to elicit the necessary empathy from the users. Affective empathy involves behavioral mimicry, a synchronized co-movement between dyadic pairs. However, the characteristics of such synchrony between humans and virtual agents remain unclear in empathic interactions. Our study evaluates the participant's behavioral synchronization when a virtual agent exhibits an emotional expression congruent with the emotional context through facial expressions, behavioral gestures, and voice. Participants viewed an emotion-eliciting video stimulus (negative or positive) with a virtual agent. The…
  • More
  •   Views:102       Downloads:123        Download PDF
  • Prediction of Changed Faces with HSCNN
  • Abstract Convolutional Neural Networks (CNN) have been successfully employed in the field of image classification. However, CNN trained using images from several years ago may be unable to identify how such images have changed over time. Cross-age face recognition is, therefore, a substantial challenge. Several efforts have been made to resolve facial changes over time utilizing recurrent neural networks (RNN) with CNN. The structure of RNN contains hidden contextual information in a hidden state to transfer a state in the previous step to the next step. This paper proposes a novel model called Hidden State-CNN (HSCNN). This adds to CNN a…
  • More
  •   Views:66       Downloads:136        Download PDF
  • Design of QoS Aware Routing Protocol for IoT Assisted Clustered WSN
  • Abstract In current days, the domain of Internet of Things (IoT) and Wireless Sensor Networks (WSN) are combined for enhancing the sensor related data transmission in the forthcoming networking applications. Clustering and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT networks. In this view, this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing (EMO-QoSCMR) Protocol for IoT assisted WSN. The proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy, throughput, delay, and lifetime. The proposed model involves…
  • More
  •   Views:71       Downloads:73        Download PDF
  • Distance Matrix and Markov Chain Based Sensor Localization in WSN
  • Abstract Applications based on Wireless Sensor Networks (WSN) have shown to be quite useful in monitoring a particular geographic area of interest. Relevant geometries of the surrounding environment are essential to establish a successful WSN topology. But it is literally hard because constructing a localization algorithm that tracks the exact location of Sensor Nodes (SN) in a WSN is always a challenging task. In this research paper, Distance Matrix and Markov Chain (DM-MC) model is presented as node localization technique in which Distance Matrix and Estimation Matrix are used to identify the position of the node. The method further employs a…
  • More
  •   Views:49       Downloads:118        Download PDF
  • Interpretable and Adaptable Early Warning Learning Analytics Model
  • Abstract Major issues currently restricting the use of learning analytics are the lack of interpretability and adaptability of the machine learning models used in this domain. Interpretability makes it easy for the stakeholders to understand the working of these models and adaptability makes it easy to use the same model for multiple cohorts and courses in educational institutions. Recently, some models in learning analytics are constructed with the consideration of interpretability but their interpretability is not quantified. However, adaptability is not specifically considered in this domain. This paper presents a new framework based on hybrid statistical fuzzy theory to overcome these…
  • More
  •   Views:44       Downloads:73        Download PDF
  • A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications
  • Abstract User's data is considered as a vital asset of several organizations. Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns. Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment. The data stored on the public cloud will be vulnerable to outside and inside attacks. This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud. Different access control policies are applied for verifying users on the cloud. A security mechanism is…
  • More
  •   Views:27       Downloads:26        Download PDF
  • Intelligent Model for Predicting the Quality of Services Violation
  • Abstract Cloud computing is providing IT services to its customer based on Service level agreements (SLAs). It is important for cloud service providers to provide reliable Quality of service (QoS) and to maintain SLAs accountability. Cloud service providers need to predict possible service violations before the emergence of an issue to perform remedial actions for it. Cloud users’ major concerns; the factors for service reliability are based on response time, accessibility, availability, and speed. In this paper, we, therefore, experiment with the parallel mutant-Particle swarm optimization (PSO) for the detection and predictions of QoS violations in terms of response time, speed,…
  • More
  •   Views:39       Downloads:33        Download PDF
  • An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks
  • Abstract Applications of Wireless Sensor devices are widely used by various monitoring sections such as environmental monitoring, industrial sensing, habitat modeling, healthcare and enemy movement detection systems. Researchers were found that 16 bytes packet size (payload) requires Media Access Control (MAC) and globally unique network addresses overheads as more as the payload itself which is not reasonable in most situations. The approach of using a unique address isn't preferable for most Wireless Sensor Networks (WSNs) applications as well. Based on the mentioned drawbacks, the current work aims to fill the existing gap in the field area by providing two strategies. First,…
  • More
  •   Views:30       Downloads:24        Download PDF
  • An Enhanced Privacy Preserving, Secure and Efficient Authentication Protocol for VANET
  • Abstract Vehicular ad hoc networks (VANETs) have attracted growing interest in both academia and industry because they can provide a viable solution that improves road safety and comfort for travelers on roads. However, wireless communications over open-access environments face many security and privacy issues that may affect deployment of large-scale VANETs. Researchers have proposed different protocols to address security and privacy issues in a VANET, and in this study we cryptanalyze some of the privacy preserving protocols to show that all existing protocols are vulnerable to the Sybil attack. The Sybil attack can be used by malicious actors to create fake…
  • More
  •   Views:36       Downloads:28        Download PDF
Displaying 1-10 on page 1 of 3056. Per Page