Sleep is a vital physiological process for human health, and accurately detecting various sleep states is crucial for diagnosing sleep disorders. This study presents a novel algorithm for identifying sleep stages using EEG signals, which is more efficient and accurate than the state-of-the-art methods. The key innovation lies in employing a piecewise linear data reduction technique called the Halfwave method in the time domain.
View Article and Find Full Text PDFNetwork slicing is crucial to the 5G architecture because it enables the virtualization of network resources into a logical network. Network slices are created, isolated, and managed using software-defined networking (SDN) and network function virtualization (NFV). The virtual network function (VNF) manager must devise strategies for all stages of network slicing to ensure optimal allocation of physical infrastructure (PI) resources to high-acceptance virtual service requests (VSRs).
View Article and Find Full Text PDFNetwork slicing shows promise as a means to endow 5G networks with flexible and dynamic features. Network function virtualization (NFV) and software-defined networking (SDN) are the key methods for deploying network slicing, which will enable end-to-end (E2E) isolation services permitting each slice to be customized depending on service requirements. The goal of this investigation is to construct network slices through a machine learning algorithm and allocate resources for the newly created slices using dynamic programming in an efficient manner.
View Article and Find Full Text PDFBackground: According to the World Health Organization (WHO), dementia is the seventh leading reason of death among all illnesses and one of the leading causes of disability among the world's elderly people. Day by day the number of Alzheimer's patients is rising. Considering the increasing rate and the dangers, Alzheimer's disease should be diagnosed carefully.
View Article and Find Full Text PDFMajor depressive disorder (MDD) is characterized by impairments in mood and cognitive functioning, and it is a prominent source of global disability and stress. A functional magnetic resonance imaging (fMRI) can aid clinicians in their assessments of individuals for the identification of MDD. Herein, we employ a deep learning approach to the issue of MDD classification.
View Article and Find Full Text PDFThe network slicing of physical infrastructure is required for fifth-generation mobile networks to make significant changes in how service providers deliver and defend services in the face of evolving end-user performance requirements. To perform this, a fast and secure slicing technique is employed for node allocation and connection establishment, which necessitates the usage of a large number of domain applications across the network. PROMETHEE-II and SLE algorithms were used in this study's approach to network design for node allocation and link construction, respectively.
View Article and Find Full Text PDFFifth-generation (5G) technology is anticipated to allow a slew of novel applications across a variety of industries. The wireless communication of the 5G and Beyond-5G (B5G) networks will accommodate a wide variety of services and user expectations, including intense end-user connectivity, sub-1 ms delay, and a transmission rate of 100 Gbps. Network slicing is envisioned as an appropriate technique that can meet these disparate requirements.
View Article and Find Full Text PDFThe unprecedented Corona Virus Disease (COVID-19) pandemic has put the world in peril and shifted global landscape in unanticipated ways. The SARSCoV2 virus, which caused the COVID-19 outbreak, first appeared in Wuhan, Hubei Province, China, in December 2019 and quickly spread around the world. This pandemic is not only a global health crisis, but it has caused the major global economic depression.
View Article and Find Full Text PDFThe spectrum allocation in any auctioned wireless service primarily depends upon the necessity and the usage of licensed primary users (PUs) of a certain band of frequencies. These frequencies are utilized by the PUs as per their needs and requirements. When the allocated spectrum is not being utilized in the full efficient manner, the unused spectrum is treated by the PUs as white space without believing much in the concept of spectrum scarcity.
View Article and Find Full Text PDFSensors (Basel)
September 2017
Due to nonuniform node distribution, the energy consumption of nodes are imbalanced in clustering-based wireless sensor networks (WSNs). It might have more impact when nodes are deployed in a three-dimensional (3D) environment. In this regard, we propose the eccentricity based data routing (EDR) protocol in a 3D WSN with uniform node distribution.
View Article and Find Full Text PDFIn this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) "downward-IDS (D-IDS)" to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) "upward-IDS (U-IDS)" to detect the abnormal behavior of the cluster heads. By using analytical calculations, the optimum parameters for the D-IDS (number of maximum hops) and U-IDS (monitoring group size) of the framework are evaluated and presented.
View Article and Find Full Text PDF