In recent years, the usage and applications of Internet of Things (IoT) have increased exponentially. IoT connects multiple heterogeneous devices like sensors, micro controllers, actuators, smart devices like mobiles, watches, etc. IoT contributes the data produced in the context of data collection, including the domains like military, agriculture, healthcare, etc. The diversity of possible applications at the intersection of the IoT and the web semantics has prompted many research teams to work at the interface between these two disciplines. This makes it possible to collect data and control various objects in transparent way. The challenge lies in the use of this data. Ontologies address this challenge to meet specific data needs in the IoT field. This paper presents the implementation of a dynamic agriculture ontology-building tool that parses the ontology files to extract full data and update it based on the user needs. The technology is used to create the angular library for parsing the OWL files. The proposed ontology framework would accept user-defined ontologies and provide an interface for an online updating of the owl files to ensure the interoperability in the agriculture IoT. 相似文献
With the increased advancements of smart industries, cybersecurity has become a vital growth factor in the success of industrial transformation. The Industrial Internet of Things (IIoT) or Industry 4.0 has revolutionized the concepts of manufacturing and production altogether. In industry 4.0, powerful Intrusion Detection Systems (IDS) play a significant role in ensuring network security. Though various intrusion detection techniques have been developed so far, it is challenging to protect the intricate data of networks. This is because conventional Machine Learning (ML) approaches are inadequate and insufficient to address the demands of dynamic IIoT networks. Further, the existing Deep Learning (DL) can be employed to identify anonymous intrusions. Therefore, the current study proposes a Hunger Games Search Optimization with Deep Learning-Driven Intrusion Detection (HGSODL-ID) model for the IIoT environment. The presented HGSODL-ID model exploits the linear normalization approach to transform the input data into a useful format. The HGSO algorithm is employed for Feature Selection (HGSO-FS) to reduce the curse of dimensionality. Moreover, Sparrow Search Optimization (SSO) is utilized with a Graph Convolutional Network (GCN) to classify and identify intrusions in the network. Finally, the SSO technique is exploited to fine-tune the hyper-parameters involved in the GCN model. The proposed HGSODL-ID model was experimentally validated using a benchmark dataset, and the results confirmed the superiority of the proposed HGSODL-ID method over recent approaches. 相似文献
Wireless Personal Communications - The development of Smart Home Controllers has seen rapid growth in recent years, especially for smart devices, that can utilize the Internet of Things (IoT).... 相似文献
This paper proposes, for the first time, a new radiation pattern synthesis for fractal antenna array that combines the unique multi-band characteristics of fractal arrays with the adaptive beamforming requirements in wireless environment with high-jamming power. In this work, a new adaptive beamforming method based on discrete cbKalman filter is proposed for linear Cantor fractal array with high performance and low computational requirements. The proposed Kalman filter-based beamformer is compared with the Least Mean Squares (LMS) and the Recursive Least Squares (RLS) techniques under various parameter regimes, and the results reveal the superior performance of the proposed approach in terms of beamforming stability, Half-Power Beam Width (HPBW), maximum Side-Lobe Level (SLL), null depth at the direction of interference signals, and convergence rate for different Signal to Interference (SIR) values. Also, the results demonstrate that the suggested approach not only achieves perfect adaptation of the radiation pattern synthesis at high jamming power, but also keep the same SLL at different operating frequencies. This shows the usefulness of the proposed approach in multi-band smart antenna technology for mobile communications and other wireless systems.
Wireless Networks - This paper proposes a quadruple band stacked oval patch antenna with sunlight-shaped slots supporting L1/L2/L5 GNSS bands and the 2.3 Ghz WiMAX band. The antenna produces... 相似文献
The Journal of Supercomputing - Power consumption is likely to remain a significant concern for exascale performance in the foreseeable future. In addition, graphics processing units (GPUs) have... 相似文献
Deep learning (DL) has shown great success in many human-related tasks, which has led to its adoption in many computer vision based applications, such as security surveillance systems, autonomous vehicles and healthcare. Such safety-critical applications have to draw their path to success deployment once they have the capability to overcome safety-critical challenges. Among these challenges are the defense against or/and the detection of the adversarial examples (AEs). Adversaries can carefully craft small, often imperceptible, noise called perturbations to be added to the clean image to generate the AE. The aim of AE is to fool the DL model which makes it a potential risk for DL applications. Many test-time evasion attacks and countermeasures, i.e., defense or detection methods, are proposed in the literature. Moreover, few reviews and surveys were published and theoretically showed the taxonomy of the threats and the countermeasure methods with little focus in AE detection methods. In this paper, we focus on image classification task and attempt to provide a survey for detection methods of test-time evasion attacks on neural network classifiers. A detailed discussion for such methods is provided with experimental results for eight state-of-the-art detectors under different scenarios on four datasets. We also provide potential challenges and future perspectives for this research direction.
Using Monte Carlo simulations, we are studying the magnetic properties of Fe-doped CuO thin films. The total magnetizations and the susceptibilities are studied as a function of the effect doping, external magnetic field, and exchange coupling. The critical temperature is discussed as a function of the effect of iron concentration. On the other hand, we investigate the effect of increasing temperatures on the coercive field for a constant value of exchange coupling and a fixed concentration. The coercive magnetic field is found to decrease with increasing temperature values until reaching its null value. The effect of increasing the exchange coupling amount on the saturation magnetic field Hs is illustrated. A linear growth of the saturation magnetic field is found as a function of the exchange coupling interaction. To complete this study, we presented and discussed the magnetic hysteresis cycle loops. 相似文献