Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicious attacks. In this manuscript, a correspondence model is designed to discuss the algorithm in the environment of wireless communication systems and distributed computing by adopting the protocol data enhancement to the network using structured construction and diversity algorithm to improve the effectiveness of the intrusion detection system. Next, a multi-label convolutional neural network model is used to detect business transactions. An CNN was trained on the WSN-DS dataset using 5-Fold in CV technique with three hidden layers. The highest Precision values 0.951 of Grayhole attack for multi-classification.
The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show MoreEnergy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit
... Show MoreElectromyography (EMG) is being explored for evaluating muscle activity. For gait analysis, EMG needs to be small, lightweight, portable device, and with low power consumption. The proposed superficial EMG (sEMG) system is aimed to be used in rehabilitation centers and biomechanics laboratories for gait analysis in Iraq.
The system is built using MyoWare, which is controlled by using STM32F100 microcontroller. The sEMG signal is transferred via Bluetooth to the computer (about 30m range) for further processing. MATLAB is used for sEMG signal conditioning. The overall system cost (without computer) is about $80. The proposed system is validated using wired NORAXON EMG using the mean root mean squared metho
... Show MoreThis abstract focuses on the significance of wireless body area networks (WBANs) as a cutting-edge and self-governing technology, which has garnered substantial attention from researchers. The central challenge faced by WBANs revolves around upholding quality of service (QoS) within rapidly evolving sectors like healthcare. The intricate task of managing diverse traffic types with limited resources further compounds this challenge. Particularly in medical WBANs, the prioritization of vital data is crucial to ensure prompt delivery of critical information. Given the stringent requirements of these systems, any data loss or delays are untenable, necessitating the implementation of intelligent algorithms. These algorithms play a pivota
... Show MoreExisting literature suggests that construction worker safety could be optimized using emerging technologies. However, the application of safety technologies in the construction industry is limited. One reason for the constrained adoption of safety technologies is the lack of empirical information for mitigating the risk of a failed adoption. The purpose of this paper is to fill the research gap through identifying key factors that predict successful adoption of safety technologies.
In total, 26 key technology adoption predictors