2022
DOI: 10.21533/pen.v10i2.2831
|View full text |Cite
|
Sign up to set email alerts
|

Implement DNN technology by using wireless sensor network system based on IOT applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The following equation for a signal's local features (SR) in an overcomplete vocabulary. The question of local features is to find a ๐‘€1 vector vector x such that ๐‘ฆ = ๐ด๐‘ฅ and ||๐‘ฅ||0 is minimized [19], i.e. given a ๐‘ ๐‘€ matrix ๐ด comprising the items of an over full vocabulary in its rows, with ๐‘€ > ๐‘ and typically ๐‘€ >> ๐‘, and a signal ๐‘ฆ RN.…”
Section: The Proposed Methods 31 Image Encryption and Decryption 311 ...mentioning
confidence: 99%
“…The following equation for a signal's local features (SR) in an overcomplete vocabulary. The question of local features is to find a ๐‘€1 vector vector x such that ๐‘ฆ = ๐ด๐‘ฅ and ||๐‘ฅ||0 is minimized [19], i.e. given a ๐‘ ๐‘€ matrix ๐ด comprising the items of an over full vocabulary in its rows, with ๐‘€ > ๐‘ and typically ๐‘€ >> ๐‘, and a signal ๐‘ฆ RN.…”
Section: The Proposed Methods 31 Image Encryption and Decryption 311 ...mentioning
confidence: 99%
“…The authors of [ 23 ] developed a deep learning-based graph neural network and proposed a hybrid fixed-variant search method to conserve the energy of the sensors to extend the network lifespan of the WSN. In [ 24 ], the authors used DNN techniques in a WSN system for IoT-based applications, where customized deep learning techniques could detect intrusions in real time accurately. The authors of [ 25 ] introduced DNN algorithms into WSNs to promote link reliability in WSNs, where DNN algorithms were used to evaluate input parameters such as received bandwidth and delay.…”
Section: Related Workmentioning
confidence: 99%
“…IoT applications require a method in the network layer to robust the lightweight sensor layer method for data chaos to achieve secure end-to-end connections, yielding integrated security in IoT components. The Diffie Hellman hypothesis has been suggested within the umbrella of cybersecurity to avoid security attacks on the network layer [19].…”
Section: Lightweight Cryptography In Iot Architecture Layersmentioning
confidence: 99%