Security of lives and properties is highly important for enhanced quality living. Smart home automation and its application have received much progress towards convenience, comfort, safety, and home security. With the advances in technology and the Internet of Things (IoT), the home environment has witnessed an improved remote control of appliances, monitoring, and home security over the internet. Several home automation systems have been developed to monitor movements in the home and report to the user. Existing home automation systems detect motion and have surveillance for home security. However, the logical aspect of averting unnecessary or fake notifications is still a major area of challenge. Intelligent response and monitoring make smart home automation efficient. This work presents an intelligent home automation system for controlling home appliances, monitoring environmental factors, and detecting movement in the home and its surroundings. A deep learning model is proposed for motion recognition and classification based on the detected movement patterns. Using a deep learning model, an algorithm is developed to enhance the smart home automation system for intruder detection and forestall the occurrence of false alarms. A human detected by the surveillance camera is classified as an intruder or home occupant based on his walking pattern. The proposed method’s prototype was implemented using an ESP32 camera for surveillance, a PIR motion sensor, an ESP8266 development board, a 5 V four-channel relay module, and a DHT11 temperature and humidity sensor. The environmental conditions measured were evaluated using a mathematical model for the response time to effectively show the accuracy of the DHT sensor for weather monitoring and future prediction. An experimental analysis of human motion patterns was performed using the CNN model to evaluate the classification for the detection of humans. The CNN classification model gave an accuracy of 99.8%.
With the growing need of technology into varied fields, dependency is getting directly proportional to ease of user-friendly smart systems. The advent of artificial intelligence in these smart systems has made our lives easier. Several Internet of Things- (IoT-) based smart refrigerator systems are emerging which support self-monitoring of contents, but the systems lack to achieve the optimized run time and data security. Therefore, in this research, a novel design is implemented with the hardware level of integration of equipment with a more sophisticated software design. It was attempted to design a new smart refrigerator system, which has the capability of automatic self-checking and self-purchasing, by integrating smart mobile device applications and IoT technology with minimal human intervention carried through Blynk application on a mobile phone. The proposed system automatically makes periodic checks and then waits for the owner’s decision to either allow the system to repurchase these products via Ethernet or reject the purchase option. The paper also discussed the machine level integration with artificial intelligence by considering several features and implemented state-of-the-art machine learning classifiers to give automatic decisions. The blockchain technology is cohesively combined to store and propagate data for the sake of data security and privacy concerns. In combination with IoT devices, machine learning, and blockchain technology, the proposed model of the paper can provide a more comprehensive and valuable feedback-driven system. The experiments have been performed and evaluated using several information retrieval metrics using visualization tools. Therefore, our proposed intelligent system will save effort, time, and money which helps us to have an easier, faster, and healthier lifestyle.
In wireless sensor network (WSN), the energy of sensor nodes is limited. Designing efficient routing method for reducing energy consumption and extending the WSN’s lifetime is important. This paper proposes a novel energy-efficient, static scenario-oriented routing method of WSN based on edge computing named the NEER, in which WSN is divided into several areas according to the coverage of gateway (or base station), and each of the areas is regarded as an edge area network (EAN). Each edge area network is abstracted into a weighted undirected graph model combined with the residual energy of the sensor nodes. The base station (or a gateway) calculates the optimal energy consumption path for all sensor nodes within its coverage, and the nodes then perform data transmission through their suggested optimal paths. The proposed method is verified by the simulations, and the results show that the proposed method may consume about 37% less energy compared with the conventional WSN routing protocol and can also effectively extend the lifetime of WSN.
At present, many companies have many problems such as high financial costs, low financial management capabilities, and redundant frameworks; at the same time, the SASAC requires that the enterprise’s financial strategy transfer from “profit-driven” to “value-driven”, finance separate from accounting to improve the operational efficiency of the company. Under this background, more and more enterprise respond to the call of the SASAC; in order to achieve the goals of corporate financial cost savings and financial management efficiency improved, we began to provide services through financial sharing. The research of information fusion theory involves many basic theories, which can be roughly divided into two large categories from the algorithmic point of view: probabilistic statistical method and artificial intelligence method. The main task of artificial intelligence is to realize the computer for some learning, thinking process, and wisdom formation of simulation, and an important goal of information integration is the human brain comprehensive processing ability simulation, so artificial intelligence method will have broad application prospects in the field of information fusion; the common methods have D-S evidence reasoning, fuzzy theory, neural network, genetic algorithm, rough set, and other information fusion methods. The purpose of this paper is to proceed from the internal financial situation of the enterprise, analyze data security issues in the operation of financial shared services, and find a breakthrough in solving problems. But, with constantly expanding of enterprise group financial sharing service scale, the urgent problem to be solved is how to ensure the financial sharing services provided by enterprises in the cloud computing environment. This paper combines financial sharing service theory and information security theory and provides reference for building financial sharing information security for similar enterprises. For some enterprise that have not established a financial shared service center yet, they can learn from the establishment of the financial sharing information security system in this paper and provide a reference for enterprise to avoid the same types of risks and problems. For enterprise that has established and has begun to practice a financial shared information security system, appropriate risk aversion measures combined with actual situation of the enterprise with four dimensions related to information security system optimization was formulated and described in this paper. In summary, in the background of cloud computing, financial sharing services have highly simplified operational applications, and data storage capabilities and computational analysis capabilities have been improved greatly. Not only can it improve the quality of accounting information but also provide technical support for the financial sharing service center of the enterprise group, perform financial functions better, and enhance decision support and strategic driving force, with dual practical significance and theoretical significance.
With the progress of society and the development of economy, people pay more and more attention to education, and traditional teaching methods are gradually unable to meet the modern teaching system. As a leader in modern information technology, virtual reality technology has developed rapidly in recent years, and virtual reality technology has also been introduced into many fields, such as teaching. Based on the immersive and extended characteristics of virtual reality, this paper proposes a virtual reality active visual interaction method based on the visual sensor. Based on virtual teaching, after 3 months of learning, the average, standard deviation, and average standard error of the experimental group’s performance are higher than those of the control group. Compared with the control group, the experimental group’s performance has increased by 8.25%. The difference is statistically significant. Learning significance (
), immersive virtual reality teaching has played a significant role in the effect, which can greatly improve the cognitive experience of students and achieve a good learning experience and effect.
In the digitized era, life has become simpler with the increased information technology. The Education Department in the whole world is facing a tremendous revolution with the development. The traditional classroom study is converted to a modernized and digitized classroom with visualization. This modernization has increased the learning capability of the students with an increase in student and teacher interaction. From this teaching and learning process, most colleges and universities have improved performance in preparing course materials, effective teaching, and independent learning among the students in the theoretical courses. Ideological and political education (IPE) is a theoretical subject that is taught and understood at higher education institutions, such as colleges and universities. A hybrid hierarchical
-means clustering for optimizing clustering with unsupervised machine learning is proposed to analyze the student performance and concluded that the proposed algorithm shows improved performance than the
Designing an efficient, reliable, and stable algorithm for underwater acoustic wireless sensor networks (UA-WSNs) needs immense attention. It is due to their notable and distinctive challenges. To address the difficulties and challenges, the article introduces two algorithms: the multilayer sink (MuLSi) algorithm and its reliable version MuLSi-Co using the cooperation technique. The first algorithm proposes a multilayered network structure instead of a solid single structure and sinks placement at the optimal position, which reduces multiple hops communication. Moreover, the best forwarder selection amongst the nodes based on nodes’ closeness to the sink is a good choice. As a result, it makes the network perform better. Unlike the traditional algorithms, the proposed scheme does not need location information about nodes. However, the MuLSi algorithm does not fulfill the requirement of reliable operation due to a single link. Therefore, the MuLSi-Co algorithm utilizes nodes’collaborative behavior for reliable information. In cooperation, the receiver has multiple copies of the same data. Then, it combines these packets for the purpose of correct data reception. The data forwarding by the relay without any latency eliminates the synchronization problem. Moreover, the overhearing of the data gets rid of duplicate transmissions. The proposed schemes are superior in energy cost and reliable exchanging of data and have more alive and less dead nodes.
Sports can cause the consumption of energy materials in the body. The rational use of nutritional supplements can maintain the homeostasis of the organism, which plays a very important role in improving the competitive performance of sports athletes. The purpose of this study is to explore the effect of nutritional supplements on basketball sports fatigue. The method of this study is as follows: first of all, 15 basketball players in our city were selected as the experimental objects, and they were randomly divided into the experimental group and the control group. The members of the experimental group took nutrients. After the training, 6 days a week, 3 hours in the morning and 3 hours in the afternoon, and the rest was adjusted on Sunday. Before training, four weeks and eight weeks of training, the blood routine indexes and body functions of athletes were tested. The results showed that the number of red blood cells, hemoglobin concentration, and average hemoglobin concentration of ligustilide supplement of the athletes were at the level of 0.05 after 4 weeks and 8 weeks, and the difference was significant (
). The nutritional supplements were used in sprint (3.4 s less), long-distance running (12.8 s less), and weight lifting (6.2 kg more) to a certain extent. Nutritional supplements are used as an auxiliary means of diet to supplement the amino acids, trace elements, vitamins, minerals, etc. required by the human body. The conclusion is that nutrition supplement can effectively improve the indexes of athletes’ body in about four weeks, but the effect is not obvious after a long time. This study provides a certain method for the research of nutritional supplements in the field of sports.
Today, with increasing information technology such as the Internet of Things (IoT) in human life, interconnection and routing protocols need to find optimal solution for safe data transformation with various smart devices. Therefore, it is necessary to provide an enhanced solution to address routing issues with respect to new interconnection methodologies such as the 6LoWPAN protocol. The artificial neural network (ANN) is based on the structure of intelligent systems as a branch of machine interference, has shown magnificent results in previous studies to optimize security-aware routing protocols. In addition, IoT devices generate large amounts of data with variety and accuracy. Therefore, higher performance and better data handling can be achieved when this technology incorporates data for sending and receiving nodes in the environment. Therefore, this study presents a security-aware routing mechanism for IoT technologies. In addition, a comparative analysis of the relationship between previous approaches discusses with quality of service (QoS) factors such as throughput and accuracy for improving routing mechanism. Experimental results show that the use of time-division multiple access (TDMA) method to schedule the sending and receiving of data and the use of the 6LoWPAN protocol when routing the sending and receiving of data can carry out attacks with high accuracy.
Autonomous driving has become a prevalent research topic in recent years, arousing the attention of many academic universities and commercial companies. As human drivers rely on visual information to discern road conditions and make driving decisions, autonomous driving calls for vision systems such as vehicle detection models. These vision models require a large amount of labeled data while collecting and annotating the real traffic data are time-consuming and costly. Therefore, we present a novel vehicle detection framework based on the parallel vision to tackle the above issue, using the specially designed virtual data to help train the vehicle detection model. We also propose a method to construct large-scale artificial scenes and generate the virtual data for the vision-based autonomous driving schemes. Experimental results verify the effectiveness of our proposed framework, demonstrating that the combination of virtual and real data has better performance for training the vehicle detection model than the only use of real data.