CMC-Computers, Materials & Continua

About the Journal

Computers, Materials & Continua is a peer-reviewed Open Access journal that publishes all types of academic papers in the areas of computer networks, artificial intelligence, big data, software engineering, multimedia, cyber security, internet of things, materials genome, integrated materials science, and data analysis, modeling, designing and manufacturing of modern functional and multifunctional materials. This journal is published monthly by Tech Science Press.

Indexing and Abstracting

SCI: 2020 Impact Factor 3.772; Scopus CiteScore (Impact per Publication 2020): 4.6; SNIP (Source Normalized Impact per Paper 2020): 3.089; Ei Compendex; Cambridge Scientific Abstracts; INSPEC Databases; Science Navigator; EBSCOhost; ProQuest Central; Zentralblatt für Mathematik; Portico, etc.

  • Classification of Epileptic Electroencephalograms Using Time-Frequency and Back Propagation Methods
  • Abstract Today, electroencephalography is used to measure brain activity by creating signals that are viewed on a monitor. These signals are frequently used to obtain information about brain neurons and may detect disorders that affect the brain, such as epilepsy. Electroencephalogram (EEG) signals are however prone to artefacts. These artefacts must be removed to obtain accurate and meaningful signals. Currently, computer-aided systems have been used for this purpose. These systems provide high computing power, problem-specific development, and other advantages. In this study, a new clinical decision support system was developed for individuals to detect epileptic seizures using EEG signals. Comprehensive classification… More
  •   Views:388       Downloads:220        Download PDF
  • ANN Based Novel Approach to Detect Node Failure in Wireless Sensor Network
  • Abstract A wireless sensor network (WSN) consists of several tiny sensor nodes to monitor, collect, and transmit the physical information from an environment through the wireless channel. The node failure is considered as one of the main issues in the WSN which creates higher packet drop, delay, and energy consumption during the communication. Although the node failure occurred mostly due to persistent energy exhaustion during transmission of data packets. In this paper, Artificial Neural Network (ANN) based Node Failure Detection (NFD) is developed with cognitive radio for detecting the location of the node failure. The ad hoc on-demand distance vector (AODV)… More
  •   Views:251       Downloads:134        Download PDF
  • Optimal Implementation of Photovoltaic and Battery Energy Storage in Distribution Networks
  • Abstract Recently, implementation of Battery Energy Storage (BES) with photovoltaic (PV) array in distribution networks is becoming very popular in overall the world. Integrating PV alone in distribution networks generates variable output power during 24-hours as it depends on variable natural source. PV can be able to generate constant output power during 24-hours by installing BES with it. Therefore, this paper presents a new application of a recent metaheuristic algorithm, called Slime Mould Algorithm (SMA), to determine the best size, and location of photovoltaic alone or with battery energy storage in the radial distribution system (RDS). This algorithm is modeled from… More
  •   Views:139       Downloads:107        Download PDF
  • Development of a Smart Technique for Mobile Web Services Discovery
  • Abstract Web service (WS) presents a good solution to the interoperability of different types of systems that aims to reduce the overhead of high processing in a resource-limited environment. With the increasing demand for mobile WS (MWS), the WS discovery process has become a significant challenging point in the WS lifecycle that aims to identify the relevant MWSs that best match the service requests. This discovery process is a resource-consuming task that cannot be performed efficiently in a mobile computing environment due to the limitations of mobile devices. Meanwhile, a cloud computing can provide rich computing resources for mobile environments given… More
  •   Views:118       Downloads:92        Download PDF
  • Small Object Detection via Precise Region-Based Fully Convolutional Networks
  • Abstract In the past several years, remarkable achievements have been made in the field of object detection. Although performance is generally improving, the accuracy of small object detection remains low compared with that of large object detection. In addition, localization misalignment issues are common for small objects, as seen in GoogLeNets and residual networks (ResNets). To address this problem, we propose an improved region-based fully convolutional network (R-FCN). The presented technique improves detection accuracy and eliminates localization misalignment by replacing position-sensitive region of interest (PS-RoI) pooling with position-sensitive precise region of interest (PS-Pr-RoI) pooling, which avoids coordinate quantization and directly calculates… More
  •   Views:129       Downloads:92        Download PDF
  • An Optimized English Text Watermarking Method Based on Natural Language Processing Techniques
  • Abstract In this paper, the text analysis-based approach RTADZWA (Reliable Text Analysis and Digital Zero-Watermarking Approach) has been proposed for transferring and receiving authentic English text via the internet. Second level order of alphanumeric mechanism of hidden Markov model has been used in RTADZWA approach as a natural language processing to analyze the English text and extracts the features of the interrelationship between contexts of the text and utilizes the extracted features as watermark information and then validates it later with attacked English text to detect any tampering occurred on it. Text analysis and text zero-watermarking techniques have been integrated by… More
  •   Views:96       Downloads:77        Download PDF
  • A Novel AlphaSRGAN for Underwater Image Super Resolution
  • Abstract Obtaining clear images of underwater scenes with descriptive details is an arduous task. Conventional imaging techniques fail to provide clear cut features and attributes that ultimately result in object recognition errors. Consequently, a need for a system that produces clear images for underwater image study has been necessitated. To overcome problems in resolution and to make better use of the Super-Resolution (SR) method, this paper introduces a novel method that has been derived from the Alpha Generative Adversarial Network (AlphaGAN) model, named Alpha Super Resolution Generative Adversarial Network (AlphaSRGAN). The model put forth in this paper helps in enhancing the… More
  •   Views:116       Downloads:88        Download PDF
  • An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics
  • Abstract Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things (IoT) networks. The objective of using cancelable biometrics is to save the original ones from hacking attempts. A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications. The original biometric is blurred with two co-prime operators. Hence, it can be recovered as the Greatest Common Divisor (GCD) between its two blurred versions. Minimal changes if induced in the biometric… More
  •   Views:109       Downloads:96        Download PDF
  • A Time-Domain Comparator Based Skipping-Window SAR ADC
  • Abstract This paper presents an energy efficient successive-approximation register (SAR) analog-to-digital converter (ADC) for low-power applications. To improve the overall energy-efficiency, a skipping-window technique is used to bypass corresponding conversion steps when the input falls in a window indicated by a time-domain comparator, which can provide not only the polarity of the input, but also the amount information of the input. The time-domain comparator, which is based on the edge pursing principle, consists of delay cells, two NAND gates, two D-flip-flop register-based phase detectors and a counter. The digital characteristic of the comparator makes the design more flexible, and the comparator… More
  •   Views:97       Downloads:81        Download PDF
  • GUI-Based DL-Network Designer for KISTI’s Supercomputer Users
  • Abstract With the increase in research on AI (Artificial Intelligence), the importance of DL (Deep Learning) in various fields, such as materials, biotechnology, genomes, and new drugs, is increasing significantly, thereby increasing the number of deep-learning framework users. However, to design a deep neural network, a considerable understanding of the framework is required. To solve this problem, a GUI (Graphical User Interface)-based DNN (Deep Neural Network) design tool is being actively researched and developed. The GUI-based DNN design tool can design DNNs quickly and easily. However, the existing GUI-based DNN design tool has certain limitations such as poor usability, framework dependency,… More
  •   Views:101       Downloads:93        Download PDF
  • Enhanced Fingerprinting Based Indoor Positioning Using Machine Learning
  • Abstract Due to the inability of the Global Positioning System (GPS) signals to penetrate through surfaces like roofs, walls, and other objects in indoor environments, numerous alternative methods for user positioning have been presented. Amongst those, the Wi-Fi fingerprinting method has gained considerable interest in Indoor Positioning Systems (IPS) as the need for line-of-sight measurements is minimal, and it achieves better efficiency in even complex indoor environments. Offline and online are the two phases of the fingerprinting method. Many researchers have highlighted the problems in the offline phase as it deals with huge datasets and validation of Fingerprints without pre-processing of… More
  •   Views:99       Downloads:158        Download PDF
  • Adapted Long Short-Term Memory (LSTM) for Concurrent\\ Human Activity Recognition
  • Abstract In this era, deep learning methods offer a broad spectrum of efficient and original algorithms to recognize or predict an output when given a sequence of inputs. In current trends, deep learning methods using recent long short-term memory (LSTM) algorithms try to provide superior performance, but they still have limited effectiveness when detecting sequences of complex human activity. In this work, we adapted the LSTM algorithm into a synchronous algorithm (sync-LSTM), enabling the model to take multiple parallel input sequences to produce multiple parallel synchronized output sequences. The proposed method is implemented for simultaneous human activity recognition (HAR) using heterogeneous… More
  •   Views:90       Downloads:80        Download PDF
  • Energy Optimization in Multi-UAV-Assisted Edge Data Collection System
  • Abstract In the IoT (Internet of Things) system, the introduction of UAV (Unmanned Aerial Vehicle) as a new data collection platform can solve the problem that IoT devices are unable to transmit data over long distances due to the limitation of their battery energy. However, the unreasonable distribution of UAVs will still lead to the problem of the high total energy consumption of the system. In this work, to deal with the problem, a deployment model of a mobile edge computing (MEC) system based on multi-UAV is proposed. The goal of the model is to minimize the energy consumption of the… More
  •   Views:199       Downloads:98        Download PDF
  • Advanced Community Identification Model for Social Networks
  • Abstract Community detection in social networks is a hard problem because of the size, and the need of a deep understanding of network structure and functions. While several methods with significant effort in this direction have been devised, an outstanding open problem is the unknown number of communities, it is generally believed that the role of influential nodes that are surrounded by neighbors is very important. In addition, the similarity among nodes inside the same cluster is greater than among nodes from other clusters. Lately, the global and local methods of community detection have been getting more attention. Therefore, in this… More
  •   Views:100       Downloads:82        Download PDF
  • Automatic PV Grid Fault Detection System with IoT and LabVIEW as Data Logger
  • Abstract Fault detection of the photovoltaic (PV) grid is necessary to detect serious output power reduction to avoid PV modules’ damage. To identify the fault of the PV arrays, there is a necessity to implement an automatic system. In this IoT and LabVIEW-based automatic fault detection of 3 × 3 solar array, a PV system is proposed to control and monitor Internet connectivity remotely. Hardware component to automatically reconfigure the solar PV array from the series-parallel (SP) to the complete cross-linked array underneath partial shading conditions (PSC) is centered on the Atmega328 system to achieve maximum power. In the LabVIEW environment,… More
  •   Views:141       Downloads:83        Download PDF
  • EA-RDSP: Energy Aware Rapidly Deployable Wireless Ad hoc System for Post Disaster Management
  • Abstract In post disaster scenarios such as war zones floods and earthquakes, the cellular communication infrastructure can be lost or severely damaged. In such emergency situations, remaining in contact with other rescue response teams in order to provide inputs for both headquarters and disaster survivors becomes very necessary. Therefore, in this research work, a design, implementation and evaluation of energy aware rapidly deployable system named EA-RDSP is proposed. The proposed research work assists the early rescue workers and victims to transmit their location information towards the remotely located servers. In EA-RDSP, two algorithms are proposed i.e., Hop count Assignment (HCA) algorithm… More
  •   Views:108       Downloads:89        Download PDF
  • A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation
  • Abstract Recently, with the advancement of Information and Communications Technology (ICT), Internet of Things (IoT) has been connected to the cloud and used in industrial sectors, medical environments, and smart grids. However, if data is transmitted in plain text when collecting data in an IoT-cloud environment, it can be exposed to various security threats such as replay attacks and data forgery. Thus, digital signatures are required. Data integrity is ensured when a user (or a device) transmits data using a signature. In addition, the concept of data aggregation is important to efficiently collect data transmitted from multiple users (or a devices)… More
  •   Views:88       Downloads:82        Download PDF
  • Outlier Detection of Mixed Data Based on Neighborhood Combinatorial Entropy
  • Abstract Outlier detection is a key research area in data mining technologies, as outlier detection can identify data inconsistent within a data set. Outlier detection aims to find an abnormal data size from a large data size and has been applied in many fields including fraud detection, network intrusion detection, disaster prediction, medical diagnosis, public security, and image processing. While outlier detection has been widely applied in real systems, its effectiveness is challenged by higher dimensions and redundant data attributes, leading to detection errors and complicated calculations. The prevalence of mixed data is a current issue for outlier detection algorithms. An… More
  •   Views:90       Downloads:73        Download PDF
  • Optimization of Sentiment Analysis Using Teaching-Learning Based Algorithm
  • Abstract Feature selection and sentiment analysis are two common studies that are currently being conducted; consistent with the advancements in computing and growing the use of social media. High dimensional or large feature sets is a key issue in sentiment analysis as it can decrease the accuracy of sentiment classification and make it difficult to obtain the optimal subset of the features. Furthermore, most reviews from social media carry a lot of noise and irrelevant information. Therefore, this study proposes a new text-feature selection method that uses a combination of rough set theory (RST) and teaching-learning based optimization (TLBO), which is… More
  •   Views:101       Downloads:86        Download PDF
  • Towards Machine Learning Based Intrusion Detection in IoT Networks
  • Abstract The Internet of Things (IoT) integrates billions of self-organized and heterogeneous smart nodes that communicate with each other without human intervention. In recent years, IoT based systems have been used in improving the experience in many applications including healthcare, agriculture, supply chain, education, transportation and traffic monitoring, utility services etc. However, node heterogeneity raised security concern which is one of the most complicated issues on the IoT. Implementing security measures, including encryption, access control, and authentication for the IoT devices are ineffective in achieving security. In this paper, we identified various types of IoT threats and shallow (such as decision… More
  •   Views:113       Downloads:94        Download PDF
  • Few-Shot Learning for Discovering Anomalous Behaviors in Edge Networks
  • Abstract Intrusion Detection Systems (IDSs) have a great interest these days to discover complex attack events and protect the critical infrastructures of the Internet of Things (IoT) networks. Existing IDSs based on shallow and deep network architectures demand high computational resources and high volumes of data to establish an adaptive detection engine that discovers new families of attacks from the edge of IoT networks. However, attackers exploit network gateways at the edge using new attacking scenarios (i.e., zero-day attacks), such as ransomware and Distributed Denial of Service (DDoS) attacks. This paper proposes new IDS based on Few-Shot Deep Learning, named CNN-IDS,… More
  •   Views:92       Downloads:80        Download PDF
  • A 3D Measurement Method Based on Coded Image
  • Abstract The binocular stereo vision system is often used to reconstruct 3D point clouds of an object. However, it is challenging to find effective matching points in two object images with similar color or less texture. This will lead to mismatching by using the stereo matching algorithm to calculate the disparity map. In this context, the object can’t be reconstructed precisely. As a countermeasure, this study proposes to combine the Gray code fringe projection with the binocular camera as well as to generate denser point clouds by projecting an active light source to increase the texture of the object, which greatly… More
  •   Views:86       Downloads:70        Download PDF
  • Mathematical Morphology-Based Artificial Technique for Renewable Power Application
  • Abstract This paper suggests a combined novel control strategy for DFIG based wind power systems (WPS) under both nonlinear and unbalanced load conditions. The combined control approach is designed by coordinating the machine side converter (MSC) and the load side converter (LSC) control approaches. The proposed MSC control approach is designed by using a model predictive control (MPC) approach to generate appropriate real and reactive power. The MSC controller selects an appropriate rotor voltage vector by using a minimized optimization cost function for the converter operation. It shows its superiority by eliminating the requirement of transformation, switching table, and the PWM… More
  •   Views:88       Downloads:81        Download PDF
  • AF-Net: A Medical Image Segmentation Network Based on Attention Mechanism and Feature Fusion
  • Abstract Medical image segmentation is an important application field of computer vision in medical image processing. Due to the close location and high similarity of different organs in medical images, the current segmentation algorithms have problems with mis-segmentation and poor edge segmentation. To address these challenges, we propose a medical image segmentation network (AF-Net) based on attention mechanism and feature fusion, which can effectively capture global information while focusing the network on the object area. In this approach, we add dual attention blocks (DA-block) to the backbone network, which comprises parallel channels and spatial attention branches, to adaptively calibrate and weigh… More
  •   Views:94       Downloads:73        Download PDF
  • Adaptive Error Curve Learning Ensemble Model for Improving Energy Consumption Forecasting
  • Abstract Despite the advancement within the last decades in the field of smart grids, energy consumption forecasting utilizing the metrological features is still challenging. This paper proposes a genetic algorithm-based adaptive error curve learning ensemble (GA-ECLE) model. The proposed technique copes with the stochastic variations of improving energy consumption forecasting using a machine learning-based ensembled approach. A modified ensemble model based on a utilizing error of model as a feature is used to improve the forecast accuracy. This approach combines three models, namely CatBoost (CB), Gradient Boost (GB), and Multilayer Perceptron (MLP). The ensembled CB-GB-MLP model’s inner mechanism consists of generating… More
  •   Views:100       Downloads:79        Download PDF
  • A Novel Framework for Multi-Classification of Guava Disease
  • Abstract Guava is one of the most important fruits in Pakistan, and is gradually boosting the economy of Pakistan. Guava production can be interrupted due to different diseases, such as anthracnose, algal spot, fruit fly, styler end rot and canker. These diseases are usually detected and identified by visual observation, thus automatic detection is required to assist formers. In this research, a new technique was created to detect guava plant diseases using image processing techniques and computer vision. An automated system is developed to support farmers to identify major diseases in guava. We collected healthy and unhealthy images of different guava… More
  •   Views:108       Downloads:80        Download PDF
  • Image Authenticity Detection Using DWT and Circular Block-Based LTrP Features
  • Abstract Copy-move forgery is the most common type of digital image manipulation, in which the content from the same image is used to forge it. Such manipulations are performed to hide the desired information. Therefore, forgery detection methods are required to identify forged areas. We have introduced a novel method for features computation by employing a circular block-based method through local tetra pattern (LTrP) features to detect the single and multiple copy-move attacks from the images. The proposed method is applied over the circular blocks to efficiently and effectively deal with the post-processing operations. It also uses discrete wavelet transform (DWT)… More
  •   Views:91       Downloads:77        Download PDF
  • Cluster Analysis for IR and NIR Spectroscopy: Current Practices to Future Perspectives
  • Abstract Supervised machine learning techniques have become well established in the study of spectroscopy data. However, the unsupervised learning technique of cluster analysis hasn’t reached the same level maturity in chemometric analysis. This paper surveys recent studies which apply cluster analysis to NIR and IR spectroscopy data. In addition, we summarize the current practices in cluster analysis of spectroscopy and contrast these with cluster analysis literature from the machine learning and pattern recognition domain. This includes practices in data pre-processing, feature extraction, clustering distance metrics, clustering algorithms and validation techniques. Special consideration is given to the specific characteristics of IR and… More
  •   Views:102       Downloads:88        Download PDF
  • Driving Style Recognition System Using Smartphone Sensors Based on Fuzzy Logic
  • Abstract Every 24 seconds, someone dies on the road due to road accidents and it is the 8th leading cause of death and the first among children aged 15–29 years. 1.35 million people globally die every year due to road traffic crashes. An additional 20–50 million suffer from non-fatal injuries, often resulting in long-term disabilities. This costs around 3% of Gross Domestic Product to most countries, and it is a considerable economic loss. The governments have taken various measures such as better road infrastructures and strict enforcement of motor-vehicle laws to reduce these accidents. However, there is still no remarkable reduction… More
  •   Views:103       Downloads:81        Download PDF
  • An Optimized Design of Antenna Arrays for the Smart Antenna Systems
  • Abstract In recent years, there has been an increasing demand to improve cellular communication services in several aspects. The aspect that received the most attention is improving the quality of coverage through using smart antennas which consist of array antennas. this paper investigates the main characteristics and design of the three types of array antennas of the base station for better coverage through simulation (MATLAB) which provides field and strength patterns measured in polar and rectangular coordinates for a variety of conditions including broadsides, ordinary End-fire, and increasing directivity End-fire which is typically used in smart antennas. The method of analysis… More
  •   Views:101       Downloads:81        Download PDF
  • Analysis and Assessment of Wind Energy Potential of Al-Hodeidah in Yemen
  • Abstract Renewable energy is one of the essential elements of the social and economic development in any civilized country. The use of fossil fuels and the non-renewable form of energy has many adverse effects on the most of ecosystems. Given the high potential of renewable energy sources in Yemen and the absence of similar studies in the region, this study aimed to examine the wind energy potential of Hodeidah-Yemen Republic by analyzing wind characteristics and assessment, determining the available power density, and calculate the wind energy extracted at different heights. The average wind speed of Hodeidah was obtained only for the… More
  •   Views:95       Downloads:84        Download PDF
  • Energy Efficient Cluster Based Clinical Decision Support System in IoT Environment
  • Abstract Internet of Things (IoT) has become a major technological development which offers smart infrastructure for the cloud-edge services by the interconnection of physical devices and virtual things among mobile applications and embedded devices. The e-healthcare application solely depends on the IoT and cloud computing environment, has provided several characteristics and applications. Prior research works reported that the energy consumption for transmission process is significantly higher compared to sensing and processing, which led to quick exhaustion of energy. In this view, this paper introduces a new energy efficient cluster enabled clinical decision support system (EEC-CDSS) for embedded IoT environment. The presented… More
  •   Views:116       Downloads:93        Download PDF
  • Diagnosis of Leukemia Disease Based on Enhanced Virtual Neural Network
  • Abstract White Blood Cell (WBC) cancer or leukemia is one of the serious cancers that threaten the existence of human beings. In spite of its prevalence and serious consequences, it is mostly diagnosed through manual practices. The risks of inappropriate, sub-standard and wrong or biased diagnosis are high in manual methods. So, there is a need exists for automatic diagnosis and classification method that can replace the manual process. Leukemia is mainly classified into acute and chronic types. The current research work proposed a computer-based application to classify the disease. In the feature extraction stage, we use excellent physical properties to… More
  •   Views:106       Downloads:74        Download PDF
  • ECC: Edge Collaborative Caching Strategy for Differentiated Services Load-Balancing
  • Abstract Due to the explosion of network data traffic and IoT devices, edge servers are overloaded and slow to respond to the massive volume of online requests. A large number of studies have shown that edge caching can solve this problem effectively. This paper proposes a distributed edge collaborative caching mechanism for Internet online request services scenario. It solves the problem of large average access delay caused by unbalanced load of edge servers, meets users’ differentiated service demands and improves user experience. In particular, the edge cache node selection algorithm is optimized, and a novel edge cache replacement strategy considering the… More
  •   Views:81       Downloads:71        Download PDF
  • Diagnosis of Neem Leaf Diseases Using Fuzzy-HOBINM and ANFIS Algorithms
  • Abstract This paper proposes an approach to detecting diseases in neem leaf that uses a Fuzzy-Higher Order Biologically Inspired Neuron Model (F-HOBINM) and adaptive neuro classifier (ANFIS). India exports USD 0.28-million worth of neem leaf to the UK, USA, UAE, and Europe in the form of dried leaves and powder, both of which help reduce diabetes-related issues, cardiovascular problems, and eye disorders. Diagnosing neem leaf disease is difficult through visual interpretation, owing to similarity in their color and texture patterns. The most common diseases include bacterial blight, Colletotrichum and Alternaria leaf spot, blight, damping-off, powdery mildew, Pseudocercospora leaf spot, leaf web… More
  •   Views:99       Downloads:79        Download PDF
  • Predicting the Need for ICU Admission in COVID-19 Patients Using XGBoost
  • Abstract It is important to determine early on which patients require ICU admissions in managing COVID-19 especially when medical resources are limited. Delay in ICU admissions is associated with negative outcomes such as mortality and cost. Therefore, early identification of patients with a high risk of respiratory failure can prevent complications, enhance risk stratification, and improve the outcomes of severely-ill hospitalized patients. In this paper, we develop a model that uses the characteristics and information collected at the time of patients’ admissions and during their early period of hospitalization to accurately predict whether they will need ICU admissions. We use the… More
  •   Views:110       Downloads:93        Download PDF
  • Brain Tumour Detection by Gamma DeNoised Wavelet Segmented Entropy Classifier
  • Abstract Magnetic resonance imaging (MRI) is an essential tool for detecting brain tumours. However, identification of brain tumours in the early stages is a very complex task since MRI images are susceptible to noise and other environmental obstructions. In order to overcome these problems, a Gamma MAP denoised Strömberg wavelet segmentation based on a maximum entropy classifier (GMDSWS-MEC) model is developed for efficient tumour detection with high accuracy and low time consumption. The GMDSWS-MEC model performs three steps, namely pre-processing, segmentation, and classification. Within the GMDSWS-MEC model, the Gamma MAP filter performs the pre-processing task and achieves a significant increase in… More
  •   Views:114       Downloads:91        Download PDF
  • An Adaptive Lasso Grey Model for Regional FDI Statistics Prediction
  • Abstract To overcome the deficiency of traditional mathematical statistics methods, an adaptive Lasso grey model algorithm for regional FDI (foreign direct investment) prediction is proposed in this paper, and its validity is analyzed. Firstly, the characteristics of the FDI data in six provinces of Central China are generalized, and the mixture model's constituent variables of the Lasso grey problem as well as the grey model are defined. Next, based on the influencing factors of regional FDI statistics (mean values of regional FDI and median values of regional FDI), an adaptive Lasso grey model algorithm for regional FDI was established. Then, an… More
  •   Views:86       Downloads:76        Download PDF
  • Negotiation Based Combinatorial Double Auction Mechanism in Cloud Computing
  • Abstract Cloud computing is a demanding business platform for services related to the field of IT. The goal of cloud customers is to access resources at a sustainable price, while the goal of cloud suppliers is to maximize their services utilization. Previously, the customers would bid for every single resource type, which was a limitation of cloud resources allocation. To solve these issues, researchers have focused on a combinatorial auction in which the resources are offered by the providers in bundles so that the user bids for their required bundle. Still, in this allocation mechanism, some drawbacks need to be tackled,… More
  •   Views:102       Downloads:80        Download PDF
  • A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid
  • Abstract Distribution feeder microgrid (DFM) built based on existing distributed feeder (DF), is a promising solution for modern microgrid. DFM contains a large number of heterogeneous devices that generate heavy network traffice and require a low data delivery latency. The information-centric networking (ICN) paradigm has shown a great potential to address the communication requirements of smart grid. However, the integration of advanced information and communication technologies with DFM make it vulnerable to cyber attacks. Adequate authentication of grid devices is essential for preventing unauthorized accesses to the grid network and defending against cyber attacks. In this paper, we propose a new… More
  •   Views:93       Downloads:64        Download PDF
  • Path Planning of Quadrotors in a Dynamic Environment Using a Multicriteria Multi-Verse Optimizer
  • Abstract Paths planning of Unmanned Aerial Vehicles (UAVs) in a dynamic environment is considered a challenging task in autonomous flight control design. In this work, an efficient method based on a Multi-Objective Multi-Verse Optimization (MOMVO) algorithm is proposed and successfully applied to solve the path planning problem of quadrotors with moving obstacles. Such a path planning task is formulated as a multicriteria optimization problem under operational constraints. The proposed MOMVO-based planning approach aims to lead the drone to traverse the shortest path from the starting point and the target without collision with moving obstacles. The vehicle moves to the next position… More
  •   Views:112       Downloads:86        Download PDF
  • Toward Robust Classifiers for PDF Malware Detection
  • Abstract Malicious Portable Document Format (PDF) files represent one of the largest threats in the computer security space. Significant research has been done using handwritten signatures and machine learning based on detection via manual feature extraction. These approaches are time consuming, require substantial prior knowledge, and the list of features must be updated with each newly discovered vulnerability individually. In this study, we propose two models for PDF malware detection. The first model is a convolutional neural network (CNN) integrated into a standard deviation based regularization model to detect malicious PDF documents. The second model is a support vector machine (SVM)… More
  •   Views:127       Downloads:93        Download PDF
  • Face Age Estimation Based on CSLBP and Lightweight Convolutional Neural Network
  • Abstract As the use of facial attributes continues to expand, research into facial age estimation is also developing. Because face images are easily affected by factors including illumination and occlusion, the age estimation of faces is a challenging process. This paper proposes a face age estimation algorithm based on lightweight convolutional neural network in view of the complexity of the environment and the limitations of device computing ability. Improving face age estimation based on Soft Stagewise Regression Network (SSR-Net) and facial images, this paper employs the Center Symmetric Local Binary Pattern (CSLBP) method to obtain the feature image and then combines… More
  •   Views:120       Downloads:70        Download PDF
  • Real-Time Violent Action Recognition Using Key Frames Extraction and Deep Learning
  • Abstract Violence recognition is crucial because of its applications in activities related to security and law enforcement. Existing semi-automated systems have issues such as tedious manual surveillances, which causes human errors and makes these systems less effective. Several approaches have been proposed using trajectory-based, non-object-centric, and deep-learning-based methods. Previous studies have shown that deep learning techniques attain higher accuracy and lower error rates than those of other methods. However, the their performance must be improved. This study explores the state-of-the-art deep learning architecture of convolutional neural networks (CNNs) and inception V4 to detect and recognize violence using video data. In the… More
  •   Views:128       Downloads:81        Download PDF
  • Towards a Dynamic Virtual IoT Network Based on User Requirements
  • Abstract The data being generated by the Internet of Things needs to be stored, monitored, and analyzed for maximum IoT resource utilization. Software Defined Networking has been extensively utilized to address issues such as heterogeneity and scalability. However, for small-scale IoT application, sometimes it is considered an inefficient approach. This paper proposes an alternate lightweight mechanism to the design and implementation of a dynamic virtual network based on user requirements. The key idea is to provide users a virtual interface that enables them to reconfigure the communication flow between the sensors and actuators at runtime. The throughput of the communication flow… More
  •   Views:129       Downloads:83        Download PDF
  • An Optimal Lempel Ziv Markov Based Microarray Image Compression Algorithm
  • Abstract In the recent years, microarray technology gained attention for concurrent monitoring of numerous microarray images. It remains a major challenge to process, store and transmit such huge volumes of microarray images. So, image compression techniques are used in the reduction of number of bits so that it can be stored and the images can be shared easily. Various techniques have been proposed in the past with applications in different domains. The current research paper presents a novel image compression technique i.e., optimized Linde–Buzo–Gray (OLBG) with Lempel Ziv Markov Algorithm (LZMA) coding technique called OLBG-LZMA for compressing microarray images without any… More
  •   Views:129       Downloads:90        Download PDF
  • Design of Intelligent Mosquito Nets Based on Deep Learning Algorithms
  • Abstract An intelligent mosquito net employing deep learning has been one of the hotspots in the field of Internet of Things as it can reduce significantly the spread of pathogens carried by mosquitoes, and help people live well in mosquito-infested areas. In this study, we propose an intelligent mosquito net that can produce and transmit data through the Internet of Medical Things. In our method, decision-making is controlled by a deep learning model, and the proposed method uses infrared sensors and an array of pressure sensors to collect data. Moreover the ZigBee protocol is used to transmit the pressure map which… More
  •   Views:85       Downloads:64        Download PDF
  • Machine Learning Applied to Problem-Solving in Medical Applications
  • Abstract Physical health plays an important role in overall well-being of the human beings. It is the most observed dimension of health among others such as social, intellectual, emotional, spiritual and environmental dimensions. Due to exponential increase in the development of wireless communication techniques, Internet of Things (IoT) has effectively penetrated different aspects of human lives. Healthcare is one of the dynamic domains with ever-growing demands which can be met by IoT applications. IoT can be leveraged through several health service offerings such as remote health and monitoring services, aided living, personalized treatment, and so on. In this scenario, Deep Learning… More
  •   Views:102       Downloads:86        Download PDF
  • Lightweight Transfer Learning Models for Ultrasound-Guided Classification of COVID-19 Patients
  • Abstract Lightweight deep convolutional neural networks (CNNs) present a good solution to achieve fast and accurate image-guided diagnostic procedures of COVID-19 patients. Recently, advantages of portable Ultrasound (US) imaging such as simplicity and safe procedures have attracted many radiologists for scanning suspected COVID-19 cases. In this paper, a new framework of lightweight deep learning classifiers, namely COVID-LWNet is proposed to identify COVID-19 and pneumonia abnormalities in US images. Compared to traditional deep learning models, lightweight CNNs showed significant performance of real-time vision applications by using mobile devices with limited hardware resources. Four main lightweight deep learning models, namely MobileNets, ShuffleNets, MENet… More
  •   Views:134       Downloads:92        Download PDF
  • Multi-Criteria Prediction Mechanism for Vehicular Wi-Fi Offloading
  • Abstract The growing demands of vehicular network applications, which have diverse networking and multimedia capabilities that passengers use while traveling, cause an overload of cellular networks. This scenario affects the quality of service (QoS) of vehicle and non-vehicle users. Nowadays, wireless fidelity access points Wi-Fi access point (AP) and fourth generation long-term evolution advanced (4G LTE-A) networks are broadly accessible. Wi-Fi APs can be utilized by vehicle users to stabilize 4G LTE-A networks. However, utilizing the opportunistic Wi-Fi APs to offload the 4G LTE-A networks in a vehicular ad hoc network environment is a relatively difficult task. This condition is due… More
  •   Views:101       Downloads:93        Download PDF
  • A Multi-Category Brain Tumor Classification Method Bases on Improved ResNet50
  • Abstract Brain tumor is one of the most common tumors with high mortality. Early detection is of great significance for the treatment and rehabilitation of patients. The single channel convolution layer and pool layer of traditional convolutional neural network (CNN) structure can only accept limited local context information. And most of the current methods only focus on the classification of benign and malignant brain tumors, multi classification of brain tumors is not common. In response to these shortcomings, considering that convolution kernels of different sizes can extract more comprehensive features, we put forward the multi-size convolutional kernel module. And considering that… More
  •   Views:101       Downloads:104        Download PDF
  • Neutrosophic Rule-Based Identity Verification System Based on Handwritten Dynamic Signature Analysis
  • Abstract Identity verification using authenticity evaluation of handwritten signatures is an important issue. There have been several approaches for the verification of signatures using dynamics of the signing process. Most of these approaches extract only global characteristics. With the aim of capturing both dynamic global and local features, this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system (NRVS) and Genetic NRVS (GNRVS) models. The neutrosophic Logic is structured to reflect multiple types of knowledge and relations among all features using three values: truth, indeterminacy, and falsity. These three values are determined by neutrosophic membership… More
  •   Views:88       Downloads:80        Download PDF
  • GPS Vector Tracking Receivers with Rate Detector for Integrity Monitoring
  • Abstract In this paper, the integrity monitoring algorithm based on a Kalman filter (KF) based rate detector is employed in the vector tracking loop (VTL) of the Global Positioning System (GPS) receiver. In the VTL approach, the extended Kalman filter (EKF) simultaneously tracks the received signals and estimates the receiver’s position, velocity, etc. In contrast to the scalar tracking loop (STL) that uses the independent parallel tracking loop approach, the VTL technique uses the correlation of each satellite signal and user dynamics and thus reduces the risk of loss lock of signals. Although the VTL scheme provides several important advantages, the… More
  •   Views:81       Downloads:76        Download PDF
  • Design and Implementation of a Low-Cost Portable Water Quality Monitoring System
  • Abstract Water is one of the needs with remarkable significance to man and other living things. Water quality management is a concept based on the continuous monitoring of water quality. The monitoring scheme aims to accumulate data to make decisions on water resource descriptions, identify real and emergent issues involving water pollution, formulate priorities, and plan for water quality management. The regularly considered parameters when conducting water quality monitoring are turbidity, pH, temperature, conductivity, dissolved oxygen, chemical oxygen demand, biochemical oxygen demand, ammonia, and metal ions. The usual method employed in capturing these water parameters is the manual collection and sending… More
  •   Views:124       Downloads:73        Download PDF
  • An Attention Based Neural Architecture for Arrhythmia Detection and Classification from ECG Signals
  • Abstract Arrhythmia is ubiquitous worldwide and cardiologists tend to provide solutions from the recent advancements in medicine. Detecting arrhythmia from ECG signals is considered a standard approach and hence, automating this process would aid the diagnosis by providing fast, cost-efficient, and accurate solutions at scale. This is executed by extracting the definite properties from the individual patterns collected from Electrocardiography (ECG) signals causing arrhythmia. In this era of applied intelligence, automated detection and diagnostic solutions are widely used for their spontaneous and robust solutions. In this research, our contributions are two-fold. Firstly, the Dual-Tree Complex Wavelet Transform (DT-CWT) method is implied… More
  •   Views:81       Downloads:68        Download PDF
  • A Mixture Model Parameters Estimation Algorithm for Inter-Contact Times in Internet of Vehicles
  • Abstract Communication opportunities among vehicles are important for data transmission over the Internet of Vehicles (IoV). Mixture models are appropriate to describe complex spatial-temporal data. By calculating the expectation of hidden variables in vehicle communication, Expectation Maximization (EM) algorithm solves the maximum likelihood estimation of parameters, and then obtains the mixture model of vehicle communication opportunities. However, the EM algorithm requires multiple iterations and each iteration needs to process all the data. Thus its computational complexity is high. A parameter estimation algorithm with low computational complexity based on Bin Count (BC) and Differential Evolution (DE) (PEBCDE) is proposed. It overcomes the… More
  •   Views:81       Downloads:75        Download PDF
  • A Novel Hybrid Clustering Based Transmission Protocol for Wireless Body Area Networks
  • Abstract Wireless sensor networks are a collection of intelligent sensor devices that are connected to one another and have the capability to exchange information packets amongst themselves. In recent years, this field of research has become increasingly popular due to the host of useful applications it can potentially serve. A deep analysis of the concepts associated with this domain reveals that the two main problems that are to be tackled here are throughput enhancement and network security improvement. The present article takes on one of these two issues namely the throughput enhancement. For the purpose of improving network productivity, a hybrid… More
  •   Views:84       Downloads:76        Download PDF
  • An Efficient Method for Covid-19 Detection Using Light Weight Convolutional Neural Network
  • Abstract The COVID-19 pandemic is a significant milestone in the modern history of civilization with a catastrophic effect on global wellbeing and monetary. The situation is very complex as the COVID-19 test kits are limited, therefore, more diagnostic methods must be developed urgently. A significant initial step towards the successful diagnosis of the COVID-19 is the chest X-ray or Computed Tomography (CT), where any chest anomalies (e.g., lung inflammation) can be easily identified. Most hospitals possess X-ray or CT imaging equipments that can be used for early detection of COVID-19. Motivated by this, various artificial intelligence (AI) techniques have been developed… More
  •   Views:114       Downloads:98        Download PDF
  • Leader-Follower UAV Formation Model Based on R5DOS-Intersection Model
  • Abstract This paper proposes a formation of multiple unmanned aerial vehicles (UAVs) based on the R5DOS (RCC-5 and orientation direction) intersection model. After improving the R5DOS-intersection model, we evenly arranged 16 UAVs in 16 spatial regions. Compared with those of the rectangular formation model and the grid formation model, the communication costs, time costs, and energy costs of the R5DOS model formation were effectively reduced. At the same time, the operation time of UAV formation was significantly enhanced. The leader-follower method can enhance the robustness of the UAV formation and ensure the integrity of communication during UAV formation operation. Finally, we… More
  •   Views:92       Downloads:64        Download PDF
  • Intelligent Microservice Based on Blockchain for Healthcare Applications
  • Abstract Nowadays, the blockchain, Internet of Things, and artificial intelligence technology revolutionize the traditional way of data mining with the enhanced data preprocessing, and analytics approaches, including improved service platforms. Nevertheless, one of the main challenges is designing a combined approach that provides the analytics functionality for diverse data and sustains IoT applications with robust and modular blockchain-enabled services in a diverse environment. Improved data analytics model not only provides support insights in IoT data but also fosters process productivity. Designing a robust IoT-based secure analytic model is challenging for several purposes, such as data from diverse sources, increasing data size,… More
  •   Views:118       Downloads:89        Download PDF
  • Automated Disassembly Sequence Prediction for Industry 4.0 Using Enhanced Genetic Algorithm
  • Abstract The evolution of Industry 4.0 made it essential to adopt the Internet of Things (IoT) and Cloud Computing (CC) technologies to perform activities in the new age of manufacturing. These technologies enable collecting, storing, and retrieving essential information from the manufacturing stage. Data collected at sites are shared with others where execution automatedly occurs. The obtained information must be validated at manufacturing to avoid undesirable data losses during the de-manufacturing process. However, information sharing from the assembly level at the manufacturing stage to disassembly at the product end-of-life state is a major concern. The current research validates the information optimally… More
  •   Views:9172       Downloads:1062        Download PDF
  • Design and Implementation of T-Shaped Planar Antenna for MIMO Applications
  • Abstract This paper proposes, demonstrates, and describes a basic T-shaped Multi-Input and Multi-Output (MIMO) antenna with a resonant frequency of 3.1 to 10.6 GHz. Compared with the U-shaped antenna, the mutual coupling is minimized by using a T-shaped patch antenna. The T-shaped patch antenna shapes filter properties are tested to achieve separation over the 3.1 to 10.6 GHz frequency range. The parametric analysis, including width, duration, and spacing, is designed in the MIMO applications for good isolation. On the FR4 substratum, the configuration of MIMO is simulated. The appropriate dielectric material ɛr = 4.4 is introduced using this contribution and application… More
  •   Views:126       Downloads:97        Download PDF
  • An Optimized Framework for Surgical Team Selection
  • Abstract In the healthcare system, a surgical team is a unit of experienced personnel who provide medical care to surgical patients during surgery. Selecting a surgical team is challenging for a multispecialty hospital as the performance of its members affects the efficiency and reliability of the hospital’s patient care. The effectiveness of a surgical team depends not only on its individual members but also on the coordination among them. In this paper, we addressed the challenges of surgical team selection faced by a multispecialty hospital and proposed a decision-making framework for selecting the optimal list of surgical teams for a given… More
  •   Views:104       Downloads:85        Download PDF
  • Risk Prediction of Aortic Dissection Operation Based on Boosting Trees
  • Abstract During the COVID-19 pandemic, the treatment of aortic dissection has faced additional challenges. The necessary medical resources are in serious shortage, and the preoperative waiting time has been significantly prolonged due to the requirement to test for COVID-19 infection. In this work, we focus on the risk prediction of aortic dissection surgery under the influence of the COVID-19 pandemic. A general scheme of medical data processing is proposed, which includes five modules, namely problem definition, data preprocessing, data mining, result analysis, and knowledge application. Based on effective data preprocessing, feature analysis and boosting trees, our proposed fusion decision model can… More
  •   Views:80       Downloads:76        Download PDF
  • Deep Neural Networks Based Approach for Battery Life Prediction
  • Abstract The Internet of Things (IoT) and related applications have witnessed enormous growth since its inception. The diversity of connecting devices and relevant applications have enabled the use of IoT devices in every domain. Although the applicability of these applications are predominant, battery life remains to be a major challenge for IoT devices, wherein unreliability and shortened life would make an IoT application completely useless. In this work, an optimized deep neural networks based model is used to predict the battery life of the IoT systems. The present study uses the Chicago Park Beach dataset collected from the publicly available data… More
  •   Views:99       Downloads:80        Download PDF
  • Packet Optimization of Software Defined Network Using Lion Optimization
  • Abstract There has been an explosion of cloud services as organizations take advantage of their continuity, predictability, as well as quality of service and it raises the concern about latency, energy-efficiency, and security. This increase in demand requires new configurations of networks, products, and service operators. For this purpose, the software-defined network is an efficient technology that enables to support the future network functions along with the intelligent applications and packet optimization. This work analyzes the offline cloud scenario in which machines are efficiently deployed and scheduled for user processing requests. Performance is evaluated in terms of reducing bandwidth, task execution… More
  •   Views:170       Downloads:80        Download PDF
  • Computer Geometries for Finding All Real Zeros of Polynomial Equations Simultaneously
  • Abstract In this research article, we construct a family of derivative free simultaneous numerical schemes to approximate all real zero of non-linear polynomial equation. We make a comparative analysis of the newly constructed numerical schemes with a well-known existing simultaneous method for determining all the distinct real zeros of polynomial equations using computer algebra system Mat Lab. Lower bound of convergence of simultaneous schemes is calculated using Mathematica. Global convergence property of the numerical schemes is presented by taking random starting initial approximation and their convergence history are graphically presented. Some real life engineering applications along with some higher degree polynomials… More
  •   Views:126       Downloads:109        Download PDF
  • An Ensemble of Optimal Deep Learning Features for Brain Tumor Classification
  • Abstract Owing to technological developments, Medical image analysis has received considerable attention in the rapid detection and classification of diseases. The brain is an essential organ in humans. Brain tumors cause loss of memory, vision, and name. In 2020, approximately 18,020 deaths occurred due to brain tumors. These cases can be minimized if a brain tumor is diagnosed at a very early stage. Computer vision researchers have introduced several techniques for brain tumor detection and classification. However, owing to many factors, this is still a challenging task. These challenges relate to the tumor size, the shape of a tumor, location of… More
  •   Views:108       Downloads:84        Download PDF
  • Conveyor-Belt Detection of Conditional Deep Convolutional Generative Adversarial Network
  • Abstract In underground mining, the belt is a critical component, as its state directly affects the safe and stable operation of the conveyor. Most of the existing non-contact detection methods based on machine vision can only detect a single type of damage and they require pre-processing operations. This tends to cause a large amount of calculation and low detection precision. To solve these problems, in the work described in this paper a belt tear detection method based on a multi-class conditional deep convolutional generative adversarial network (CDCGAN) was designed. In the traditional DCGAN, the image generated by the generator has a… More
  •   Views:80       Downloads:74        Download PDF
  • A Lightweight Blockchain for IoT in Smart City (IoT-SmartChain)
  • Abstract The smart city is a technological framework that connects the city’s different components to create new opportunities. This connection is possible with the help of the Internet of Things (IoT), which provides a digital personality to physical objects. Some studies have proposed integrating Blockchain technology with IoT in different use cases as access, orchestration, or replicated storage layer. The majority of connected objects’ capacity limitation makes the use of Blockchain inadequate due to its redundancy and its conventional processing-intensive consensus like PoW. This paper addresses these challenges by proposing a NOVEL model of a lightweight Blockchain framework (IoT-SmartChain), with a… More
  •   Views:110       Downloads:99        Download PDF
  • Microphone Array Speech Separation Algorithm Based on TC-ResNet
  • Abstract Traditional separation methods have limited ability to handle the speech separation problem in high reverberant and low signal-to-noise ratio (SNR) environments, and thus achieve unsatisfactory results. In this study, a convolutional neural network with temporal convolution and residual network (TC-ResNet) is proposed to realize speech separation in a complex acoustic environment. A simplified steered-response power phase transform, denoted as GSRP-PHAT, is employed to reduce the computational cost. The extracted features are reshaped to a special tensor as the system inputs and implements temporal convolution, which not only enlarges the receptive field of the convolution layer but also significantly reduces the… More
  •   Views:93       Downloads:78        Download PDF
  • Data and Machine Learning Fusion Architecture for Cardiovascular Disease Prediction
  • Abstract Heart disease, which is also known as cardiovascular disease, includes various conditions that affect the heart and has been considered a major cause of death over the past decades. Accurate and timely detection of heart disease is the single key factor for appropriate investigation, treatment, and prescription of medication. Emerging technologies such as fog, cloud, and mobile computing provide substantial support for the diagnosis and prediction of fatal diseases such as diabetes, cancer, and cardiovascular disease. Cloud computing provides a cost-efficient infrastructure for data processing, storage, and retrieval, with much of the extant research recommending machine learning (ML) algorithms for… More
  •   Views:195       Downloads:116        Download PDF
  • Generating Cartoon Images from Face Photos with Cycle-Consistent Adversarial Networks
  • Abstract The generative adversarial network (GAN) is first proposed in 2014, and this kind of network model is machine learning systems that can learn to measure a given distribution of data, one of the most important applications is style transfer. Style transfer is a class of vision and graphics problems where the goal is to learn the mapping between an input image and an output image. CYCLE-GAN is a classic GAN model, which has a wide range of scenarios in style transfer. Considering its unsupervised learning characteristics, the mapping is easy to be learned between an input image and an output… More
  •   Views:105       Downloads:105        Download PDF
  • Energy-Efficient Routing Algorithm Based on Small-World Characteristics
  • Abstract Water quality sensor networks are widely used in water resource monitoring. However, due to the fact that the energy of these networks cannot be supplemented in time, it is necessary to study effective routing protocols to extend their lifecycle. To address the problem of limited resources, a routing optimization algorithm based on a small-world network model is proposed. In this paper, a small-world network model is introduced for water quality sensor networks, in which the short average path and large clustering coefficient of the model are used to construct a super link. A short average path can reduce the network’s… More
  •   Views:90       Downloads:81        Download PDF
  • Safest Route Detection via Danger Index Calculation and K-Means Clustering
  • Abstract The study aims to formulate a solution for identifying the safest route between any two inputted Geographical locations. Using the New York City dataset, which provides us with location tagged crime statistics; we are implementing different clustering algorithms and analysed the results comparatively to discover the best-suited one. The results unveil the fact that the K-Means algorithm best suits for our needs and delivered the best results. Moreover, a comparative analysis has been performed among various clustering techniques to obtain best results. we compared all the achieved results and using the conclusions we have developed a user-friendly application to provide… More
  •   Views:90       Downloads:77        Download PDF
  • Video Recognition for Analyzing the Characteristics of Vehicle–Bicycle Conflict
  • Abstract Vehicle–bicycle conflict incurs a higher risk of traffic accidents, particularly as it frequently takes place at intersections. Mastering the traffic characteristics of vehicle–bicycle conflict and optimizing the design of intersections can effectively reduce such conflict. In this paper, the conflict between right-turning motor vehicles and straight-riding bicycles was taken as the research object, and T-Analyst video recognition technology was used to obtain data on riding (driving) behavior and vehicle–bicycle conflict at seven intersections in Changsha, China. Herein, eight typical traffic characteristics of vehicle–bicycle conflict are summarized, the causes of vehicle–bicycle conflict are analyzed using 18 factors in three dimensions, the… More
  •   Views:106       Downloads:75        Download PDF
  • Sleep Apnea Monitoring System Based on Commodity WiFi Devices
  • Abstract To address the limitations of traditional sleep monitoring methods that highly rely on sleeping posture without considering sleep apnea, an intelligent apnea monitoring system is designed based on commodity WiFi in this paper. By utilizing linear fitting and wavelet transform, the phase error of channel state information (CSI) of the receiving antenna is eliminated, and the noise of the signal amplitude is removed. Moreover, the short-time Fourier transform (STFT) and sliding window method are combined to segment received wireless signals. Finally, several important statistical characteristics are extracted, and a back propagation (BP) neural network model is built to identify apnea… More
  •   Views:113       Downloads:76        Download PDF
  • Robust and Efficient Reliability Estimation for Exponential Distribution
  • Abstract In modeling reliability data, the exponential distribution is commonly used due to its simplicity. For estimating the parameter of the exponential distribution, classical estimators including maximum likelihood estimator represent the most commonly used method and are well known to be efficient. However, the maximum likelihood estimator is highly sensitive in the presence of contamination or outliers. In this study, a robust and efficient estimator of the exponential distribution parameter was proposed based on the probability integral transform statistic. To examine the robustness of this new estimator, asymptotic variance, breakdown point, and gross error sensitivity were derived. This new estimator offers… More
  •   Views:315       Downloads:155        Download PDF