Advances in Networks最新文献

筛选
英文 中文
Image Processing Techniques and Neuro-computing Algorithms in Computer Vision 计算机视觉中的图像处理技术和神经计算算法
Advances in Networks Pub Date : 2021-10-12 DOI: 10.11648/J.NET.20210902.12
Ibrahim Goni, A. S. Ahmadu, Y. M. Malgwi
{"title":"Image Processing Techniques and Neuro-computing Algorithms in Computer Vision","authors":"Ibrahim Goni, A. S. Ahmadu, Y. M. Malgwi","doi":"10.11648/J.NET.20210902.12","DOIUrl":"https://doi.org/10.11648/J.NET.20210902.12","url":null,"abstract":"Computer vision is a multidisciplinary field that cannot be separated with image processing techniques and Neuro-Computing specifically Deep Learning (DL) algorithms, in recent time DL techniques enable computer vision to understand the content of an image, moreover, it is working hand in hand with image processing techniques because image preprocessing are essential components in digital image analysis. Therefore, the remarkable advancement recorded by computer vision today such as in remote sensing, security, medical imaging and robotics etc. The aim of this research work was to explored the technical and theoretical contributions of image processing techniques and DL algorithms to computer vision. A systematic method of literature review was adapted. Basic image processing techniques such as standardization, denoising, filtering, and segmentation are clearly explored, concept of DL algorithms are briefly discussed, recent reviewed articles (from 2018 to date) are obtained from top journals in computer vision thus; IEEE, Elsevier and ISPR and tabulated as a major source of information for this work. We have shown some of the software’s used for the implementation of deep learning researches in computer vision. Finally we concludes and give recommendations based on our findings.","PeriodicalId":293405,"journal":{"name":"Advances in Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123926455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Residue Number System Fade Mitigation Technique with Error Detection and Correction on a Satellite Communication Link 基于卫星通信链路错误检测与纠错的残数系统衰落抑制技术
Advances in Networks Pub Date : 2021-08-24 DOI: 10.11648/J.NET.20210902.11
S. Akobre, M. I. Daabo, Abdul-Mumin Salifu
{"title":"Residue Number System Fade Mitigation Technique with Error Detection and Correction on a Satellite Communication Link","authors":"S. Akobre, M. I. Daabo, Abdul-Mumin Salifu","doi":"10.11648/J.NET.20210902.11","DOIUrl":"https://doi.org/10.11648/J.NET.20210902.11","url":null,"abstract":"Rain fade is the loss of signal power at the receiver of a telecommunication system mainly due to absorption and scattering caused by rain in the transmission medium, especially at frequencies above 10 GHz. In order to combat the loss of the signal power at the receiver, there is the need to employ rain fade mitigation techniques. Consequently, researchers have been studying how rain affects the signal in different geographical locations as well as proposing some mitigation techniques. Power control is one of the mitigation techniques that have been proposed. But this technique has some associated challenges. Increasing the power will lead to an increase in cost of transmission which will eventually be passed on to the consumer thereby making satellite services expensive. It requires high power in uplink and downlink which increases the burden either on user terminal or satellite payload. Also, because of health concerns there is a limit to the amount of power that can be radiated to the ground and this is governed by international agreements. Another power management drawback in using this technique is that, uplink power control is not efficient in directing the added power to only the ground station experiencing path attenuation, because the additional power is distributed to all locations within the satellite antenna coverage area. In this paper, we address the power control challenges, by leveraging on the inherent properties of Residue Number System (RNS) and Redundant Residue Number System (RRNS) to propose an RNS architecture using the moduli set {22n+1-1, 22n -1, 22n, 24n+1 -1, 22n +1} that can mitigate rain fade in the satellite link as well as detect and correct multiple errors. In digital communication systems, the bit energy, eb, is the most important parameter in determining the communications link performance. Numerical analysis shows that the proposed scheme performs better than the traditional method as indicated in the high energy per bit value obtained in the proposed system in comparison with the traditional method, all other things being equal.","PeriodicalId":293405,"journal":{"name":"Advances in Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121831987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intent-based Networking for Connectivity and Cloud Services 连接和云服务的基于意图的网络
Advances in Networks Pub Date : 2021-03-10 DOI: 10.11648/J.NET.20210901.12
M. Toy
{"title":"Intent-based Networking for Connectivity and Cloud Services","authors":"M. Toy","doi":"10.11648/J.NET.20210901.12","DOIUrl":"https://doi.org/10.11648/J.NET.20210901.12","url":null,"abstract":"Recent developments in networking and services technologies increased number of choices for users and complexity of networks and services. At the same time, there is substantial effort in the industry to enhance user experiences with services. The enhancement of user experiences is tightly coupled with mapping of user intents to services by shielding customers from the complexity and automating management processes involved in ordering and delivering services. The mapping is an iterative process. Its accuracy is expected to be improved as Service Providers gain experience with the process. Automating management processes in a management infrastructure with non-virtualized OSSs (Operating Support Systems) is lengthy and difficult. Virtualization and artificial intelligence/machine learning (AI/ML) techniques accelerate the automation greatly. The automation improves not only user experiences with services, but also the management of networks and applications by network administrators. This paper will describe user intents, a method for mapping user intents to connectivity and cloud services, and the design process, with examples. The concepts and methods described here are expected to be used by consumers and administrators of networks and applications forming services. The intents and their mappings can be expanded for each service by adding unique capabilities and attributes for connectivity and application options of a given service.","PeriodicalId":293405,"journal":{"name":"Advances in Networks","volume":"28 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113979788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security Performance of Internet of Medical Things 医疗物联网安全性能研究
Advances in Networks Pub Date : 2021-02-02 DOI: 10.11648/J.NET.20210901.11
Taiwo Adenaiye, W. Bul’ajoul, F. Olajide
{"title":"Security Performance of Internet of Medical Things","authors":"Taiwo Adenaiye, W. Bul’ajoul, F. Olajide","doi":"10.11648/J.NET.20210901.11","DOIUrl":"https://doi.org/10.11648/J.NET.20210901.11","url":null,"abstract":"Internet of Medical Things is the internet connection of medical devices to perform services and processes to support the healthcare sector. Wearable Technology in Healthcare has seen tremendous growth in recent times. This is due to a global increase in the aging population, the need for disease management, and effective patient monitoring. The prevalent technology of wearable devices is Bluetooth technology due to its low cost, low energy, and size. Despite the growth recorded in the adoption of Bluetooth Wearable IoMT, there are concerns by users and other healthcare stakeholders about security and privacy issues with its adoption. Our paper presents a simulation of passive and active attacks on 3 wearable IoMT devices, followed by analysis and evaluation of the experiment outcomes. Thereafter, countermeasures for the identified weaknesses were provided. It was discovered that some of the standard security features of Bluetooth Technology to mitigate privacy and security issues were not implemented in some of the devices, which can result in data compromise in the devices. A security assessment framework was developed to assess the security of Bluetooth IoMT devices using the Bayesian Network model. This is used to rank devices, identify their vulnerabilities, and apply security measures on the identified vulnerabilities. Our paper further provides recommendations on improving the security of Bluetooth IoMT devices.","PeriodicalId":293405,"journal":{"name":"Advances in Networks","volume":"49 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126080960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Intrusion Detection and Prevention System (IDPS) Performance in an IPv6 Environment IPv6环境下IDPS性能提升研究
Advances in Networks Pub Date : 2020-11-19 DOI: 10.11648/J.NET.20200802.12
Adeel Sadiq, W. Bul’ajoul
{"title":"Improving Intrusion Detection and Prevention System (IDPS) Performance in an IPv6 Environment","authors":"Adeel Sadiq, W. Bul’ajoul","doi":"10.11648/J.NET.20200802.12","DOIUrl":"https://doi.org/10.11648/J.NET.20200802.12","url":null,"abstract":"This paper presents a comprehensive investigation, backed up by detailed simulations, that the default settings of the software based open source Intrusion Detection and Prevention Systems (IDPs) are not enough to thwart the network attacks in a modern high-speed IPv6-only environment. It aims to solve this problem by improving the processing capabilities of an IDPS in more than one way, with each method being totally independent from the other. The proposed solution can be implemented by any user running an IDPS, without needing escalated privileges. Using and IPv6 packet generator, it is shown that with the increase in IPv6 traffic in a fixed amount of time, the IDPS fails to analyse all the packets and starts dropping them. This phenomenon compromises the core functionality of IDPS which is to stop the unwanted traffic. A hybrid solution has been proposed to increase the performance of the IDPS. Our research involves only the system running an IDPS, with little to no tweaking of the other elements within a network like routers, switches and firewalls. The paper also talks briefly about the current and the future generation of the IDPSs. The simulation with the hybrid solution concludes that the performance is improved to a staggering 200%, approximately, compared to the built-in settings of the IDPS.","PeriodicalId":293405,"journal":{"name":"Advances in Networks","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114300830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Spatial Distribution of Secondary Schools in Hebron City / Southern West Bank 希伯伦市/西岸南部中学空间分布评价
Advances in Networks Pub Date : 2020-10-30 DOI: 10.11648/j.net.20200801.12
Hassan Qaddumi
{"title":"Evaluation of Spatial Distribution of Secondary Schools in Hebron City / Southern West Bank","authors":"Hassan Qaddumi","doi":"10.11648/j.net.20200801.12","DOIUrl":"https://doi.org/10.11648/j.net.20200801.12","url":null,"abstract":"This research dealt with the study and evaluation of the reality of secondary schools in the city of Hebron, and compared with the planning standards, and this is one of the important foundations through which to draw the current picture of the reality of these schools, to form a basis on which to support the current and future planning proposals necessary for the development of the reality of those Therefore, this research relied on the quantitative analytical approach as the most appropriate method for expressing statistical analyzes, as well as using it in conducting some of the analyzes available in the GIS program. Therefore, the research has come up with a set of results, including the results of statistical analysis that indicate that the characteristics of the majority of the secondary teacher was incompatible with their planning standards, due to the prevalence of random pattern in the signing of these schools, as well as not to rely on the foundations and planning criteria for the distribution of uses shown And pitches in them.","PeriodicalId":293405,"journal":{"name":"Advances in Networks","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge Computing: Applications, State-of-the-Art and Challenges 边缘计算:应用、最新技术和挑战
Advances in Networks Pub Date : 2019-11-15 DOI: 10.11648/J.NET.20190701.12
Shufen Wang
{"title":"Edge Computing: Applications, State-of-the-Art and Challenges","authors":"Shufen Wang","doi":"10.11648/J.NET.20190701.12","DOIUrl":"https://doi.org/10.11648/J.NET.20190701.12","url":null,"abstract":"The Internet of Things (IoT) is now infiltrating into our daily lives, providing important measurement and collection tools to inform us of every decision. Millions of sensors and devices continue to generate data and exchange important information through complex networks that support machine-to-machine communication and monitor and control critical smart world infrastructure. As a strategy to alleviate resource congestion escalation, edge computing has become a new paradigm for addressing the needs of the Internet of Things and localization computing. Compared to well-known cloud computing, edge computing migrates data calculations or storage to the edge of the network near the end-user. Thus, multiple compute nodes distributed across the network can offload computational pressure from a centralized data center and can significantly reduce latency in message exchanges. Besides, the distributed architecture balances network traffic and avoids spikes in traffic in the IoT network, reduces latency between edge/cloud servers and end-users, and reduces response time for real-time IoT applications compared to traditional cloud services. In this article, we conducted a comprehensive survey to analyze how edge computing can improve the performance of IoT networks. We classify edge calculations into different groups based on the architecture and study their performance by comparing network latency, bandwidth usage, power consumption, and overhead. Through the systematic introduction of the concept of edge computing, typical application scenarios, research status, and key technologies, it is considered that the development of edge computing is still in the initial stage. There are still many problems in practical applications that need to be solved, including optimizing edge computing performance, security, interoperability, and intelligent edge operations management services.","PeriodicalId":293405,"journal":{"name":"Advances in Networks","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124932371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The Industrial Temperature Measurement System Based on the Uncooled IRFPA Detector 基于非制冷 IRFPA 探测器的工业温度测量系统
Advances in Networks Pub Date : 2019-01-19 DOI: 10.11648/J.NET.20190701.11
Chen Mingwu, Wu Haibin
{"title":"The Industrial Temperature Measurement System Based on the Uncooled IRFPA Detector","authors":"Chen Mingwu, Wu Haibin","doi":"10.11648/J.NET.20190701.11","DOIUrl":"https://doi.org/10.11648/J.NET.20190701.11","url":null,"abstract":"Most of the non-contact temperature measuring devices in the market are mainly based on dot infrared thermometers. The single machine operated instruments can only meet the requirements of temperature measurement for local temperature points, and can not feedback the temperature information and temperature direction of the whole temperature field in real time. Under the condition of low temperature, for the Commonly non-contact temperature measurement system, the reaction is not sensitive, can not keep up with the temperature change, Continuous calibration and debugging are needed in the case of changing ambient temperature, resulting in a great waste of personnel and time. In the aspect of infrared detector, the operating wavelength of the traditional infrared CCD is 0.4-1.1μm, affected by the cut-off wavelength, the error of infrared CCD is very large in industrial low temperature measurement. The operating wavelength of uncooled focal plane array infrared camera is generally between 8-14μm, which temperature measurement accuracy can reach 0.01°C under the optimum working environment. The UL01011 is most commonly used as the core photo detector in the uncooled focal plane uncooled micro-bolometer array infrared camera, we used it as the experimental photoelectric detector, Experiments showed that this method could achieve better results in practice.","PeriodicalId":293405,"journal":{"name":"Advances in Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130111757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信