Vol.70, No.3, 2022-Table of Contents
  • Polygonal Finite Element for Two-Dimensional Lid-Driven Cavity Flow
  • Abstract This paper investigates a polygonal finite element (PFE) to solve a two-dimensional (2D) incompressible steady fluid problem in a cavity square. It is a well-known standard benchmark (i.e., lid-driven cavity flow)-to evaluate the numerical methods in solving fluid problems controlled by the Navier–Stokes (N–S) equation system. The approximation solutions provided in this research are based on our developed equal-order mixed PFE, called Pe1Pe1. It is an exciting development based on constructing the mixed scheme method of two equal-order discretisation spaces for both fluid pressure and velocity fields of flows and our proposed stabilisation technique. In this research, to handle the… More
  •   Views:584       Downloads:435        Download PDF
  • Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks
  • Abstract Detection of the wormhole attacks is a cumbersome process, particularly simplex and duplex over the wireless sensor networks (WSNs). Wormhole attacks are characterized as distributed passive attacks that can destabilize or disable WSNs. The distributed passive nature of these attacks makes them enormously challenging to detect. The main objective is to find all the possible ways in which how the wireless sensor network’s broadcasting character and transmission medium allows the attacker to interrupt network within the distributed environment. And further to detect the serious routing-disruption attack “Wormhole Attack” step by step through the different network mechanisms. In this paper, a… More
  •   Views:344       Downloads:296        Download PDF
  • Fuzzy Based Latent Dirichlet Allocation for Intrusion Detection in Cloud Using ML
  • Abstract The growth of cloud in modern technology is drastic by provisioning services to various industries where data security is considered to be common issue that influences the intrusion detection system (IDS). IDS are considered as an essential factor to fulfill security requirements. Recently, there are diverse Machine Learning (ML) approaches that are used for modeling effectual IDS. Most IDS are based on ML techniques and categorized as supervised and unsupervised. However, IDS with supervised learning is based on labeled data. This is considered as a common drawback and it fails to identify the attack patterns. Similarly, unsupervised learning fails to… More
  •   Views:339       Downloads:252        Download PDF
  • Automatic Detection and Classification of Human Knee Osteoarthritis Using Convolutional Neural Networks
  • Abstract Knee Osteoarthritis (KOA) is a degenerative knee joint disease caused by ‘wear and tear’ of ligaments between the femur and tibial bones. Clinically, KOA is classified into four grades ranging from 1 to 4 based on the degradation of the ligament in between these two bones and causes suffering from impaired movement. Identifying this space between bones through the anterior view of a knee X-ray image is solely subjective and challenging. Automatic classification of this process helps in the selection of suitable treatment processes and customized knee implants. In this research, a new automatic classification of KOA images based on… More
  •   Views:309       Downloads:263        Download PDF
  • An Efficient Proxy Blind Signcryption Scheme for IoT
  • Abstract Recent years have witnessed growing scientific research interest in the Internet of Things (IoT) technologies, which supports the development of a variety of applications such as health care, Industry 4.0, agriculture, ecological data management, and other various domains. IoT utilizes the Internet as a prime medium of communication for both single documents as well as multi-digital messages. However, due to the wide-open nature of the Internet, it is important to ensure the anonymity, untraceably, confidentiality, and unforgeability of communication with efficient computational complexity and low bandwidth. We designed a light weight and secure proxy blind signcryption for multi-digital messages based… More
  •   Views:292       Downloads:232        Download PDF
  • An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments
  • Abstract

    When the Wireless Sensor Network (WSN) is combined with the Internet of Things (IoT), it can be employed in a wide range of applications, such as agriculture, industry 4.0, health care, smart homes, among others. Accessing the big data generated by these applications in Cloud Servers (CSs), requires higher levels of authenticity and confidentiality during communication conducted through the Internet. Signcryption is one of the most promising approaches nowadays for overcoming such obstacles, due to its combined nature, i.e., signature and encryption. A number of researchers have developed schemes to address issues related to access control in the IoT literature,… More

  •   Views:294       Downloads:231        Download PDF
  • An Intent-Driven Closed-Loop Platform for 5G Network Service Orchestration
  • Abstract The scope of the 5G network is not only limited to the enhancements in the form of the quality of service (QoS), but it also includes a wide range of services with various requirements. Besides this, many approaches and platforms are under the umbrella of 5G to achieve the goals of end-to-end service provisioning. However, the management of multiple services over heterogeneous platforms is a complex task. Each platform and service have various requirements to be handled by domain experts. Still, if the next-generation network management is dependent on manual updates, it will become impossible to provide seamless service provisioning… More
  •   Views:275       Downloads:221        Download PDF
  • Simulation of Non-Isothermal Turbulent Flows Through Circular Rings of Steel
  • Abstract This article is intended to examine the fluid flow patterns and heat transfer in a rectangular channel embedded with three semi-circular cylinders comprised of steel at the boundaries. Such an organization is used to generate the heat exchangers with tube and shell because of the production of more turbulence due to zigzag path which is in favor of rapid heat transformation. Because of little maintenance, the heat exchanger of such type is extensively used. Here, we generate simulation of flow and heat transfer using non-isothermal flow interface in the Comsol multiphysics 5.4 which executes the Reynolds averaged Navier stokes equation… More
  •   Views:312       Downloads:212        Download PDF
  • Ensembles of Deep Learning Framework for Stomach Abnormalities Classification
  • Abstract

    Abnormalities of the gastrointestinal tract are widespread worldwide today. Generally, an effective way to diagnose these life-threatening diseases is based on endoscopy, which comprises a vast number of images. However, the main challenge in this area is that the process is time-consuming and fatiguing for a gastroenterologist to examine every image in the set. Thus, this led to the rise of studies on designing AI-based systems to assist physicians in the diagnosis. In several medical imaging tasks, deep learning methods, especially convolutional neural networks (CNNs), have contributed to the state-of-the-art outcomes, where the complicated nonlinear relation between target classes and… More

  •   Views:342       Downloads:242        Download PDF
  • Efficient Deep CNN Model for COVID-19 Classification
  • Abstract Coronavirus (COVID-19) infection was initially acknowledged as a global pandemic in Wuhan in China. World Health Organization (WHO) stated that the COVID-19 is an epidemic that causes a 3.4% death rate. Chest X-Ray (CXR) and Computerized Tomography (CT) screening of infected persons are essential in diagnosis applications. There are numerous ways to identify positive COVID-19 cases. One of the fundamental ways is radiology imaging through CXR, or CT images. The comparison of CT and CXR scans revealed that CT scans are more effective in the diagnosis process due to their high quality. Hence, automated classification techniques are required to facilitate… More
  •   Views:317       Downloads:237        Download PDF
  • An Efficient CNN-Based Hybrid Classification and Segmentation Approach for COVID-19 Detection
  • Abstract COVID-19 remains to proliferate precipitously in the world. It has significantly influenced public health, the world economy, and the persons’ lives. Hence, there is a need to speed up the diagnosis and precautions to deal with COVID-19 patients. With this explosion of this pandemic, there is a need for automated diagnosis tools to help specialists based on medical images. This paper presents a hybrid Convolutional Neural Network (CNN)-based classification and segmentation approach for COVID-19 detection from Computed Tomography (CT) images. The proposed approach is employed to classify and segment the COVID-19, pneumonia, and normal CT images. The classification stage is… More
  •   Views:290       Downloads:230        Download PDF
  • Prediction of Extremist Behaviour and Suicide Bombing from Terrorism Contents Using Supervised Learning
  • Abstract This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings. By linking ‘dots’ of police data comprising scattered information of people, groups, logistics, locations, communication, and spatiotemporal characters on different social media groups, the proposed architecture will spawn beneficial information. This useful information will, in turn, help the police both in predicting potential terrorist events and in investigating previous events. Furthermore, this architecture will aid in the identification of criminals and their associates and handlers. Terrorism is psychological warfare, which, in the broadest sense, can be defined as the utilisation of deliberate violence for… More
  •   Views:262       Downloads:253        Download PDF
  • A Hybrid Model for Reliability Aware and Energy-Efficiency in Multicore Systems
  • Abstract Recently, Multicore systems use Dynamic Voltage/Frequency Scaling (DV/FS) technology to allow the cores to operate with various voltage and/or frequencies than other cores to save power and enhance the performance. In this paper, an effective and reliable hybrid model to reduce the energy and makespan in multicore systems is proposed. The proposed hybrid model enhances and integrates the greedy approach with dynamic programming to achieve optimal Voltage/Frequency (Vmin/F) levels. Then, the allocation process is applied based on the available workloads. The hybrid model consists of three stages. The first stage gets the optimum safe voltage while the second stage sets… More
  •   Views:340       Downloads:230        Download PDF
  • Deep Neural Artificial Intelligence for IoT Based Tele Health Data Analytics
  • Abstract

    Tele health utilizes information and communication mechanisms to convey medical information for providing clinical and educational assistances. It makes an effort to get the better of issues of health service delivery involving time factor, space and laborious terrains, validating cost-efficiency and finer ingress in both developed and developing countries. Tele health has been categorized into either real-time electronic communication, or store-and-forward communication. In recent years, a third-class has been perceived as remote healthcare monitoring or tele health, presuming data obtained via Internet of Things (IOT). Although, tele health data analytics and machine learning have been researched in great depth, there… More

  •   Views:274       Downloads:201        Download PDF
  • Distributed Secure Storage Scheme Based on Sharding Blockchain
  • Abstract Distributed storage can store data in multiple devices or servers to improve data security. However, in today's explosive growth of network data, traditional distributed storage scheme is faced with some severe challenges such as insufficient performance, data tampering, and data lose. A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed storage. Under this scheme, the following improvements have been made in this paper. This paper first analyzes the problems faced by distributed storage. Then proposed to build a new distributed storage blockchain scheme with sharding blockchain. The proposed scheme realizes the… More
  •   Views:292       Downloads:232        Download PDF
  • A Global Training Model for Beat Classification Using Basic Electrocardiogram Morphological Features
  • Abstract

    Clinical Study and automatic diagnosis of electrocardiogram (ECG) data always remain a challenge in diagnosing cardiovascular activities. The analysis of ECG data relies on various factors like morphological features, classification techniques, methods or models used to diagnose and its performance improvement. Another crucial factor in the methodology is how to train the model for each patient. Existing approaches use standard training model which faces challenges when training data has variation due to individual patient characteristics resulting in a lower detection accuracy. This paper proposes an adaptive approach to identify performance improvement in building a training model that analyze global training… More

  •   Views:242       Downloads:267        Download PDF
  • Medical Data Clustering and Classification Using TLBO and Machine Learning Algorithms
  • Abstract This study aims to empirically analyze teaching-learning-based optimization (TLBO) and machine learning algorithms using k-means and fuzzy c-means (FCM) algorithms for their individual performance evaluation in terms of clustering and classification. In the first phase, the clustering (k-means and FCM) algorithms were employed independently and the clustering accuracy was evaluated using different computational measures. During the second phase, the non-clustered data obtained from the first phase were preprocessed with TLBO. TLBO was performed using k-means (TLBO-KM) and FCM (TLBO-FCM) (TLBO-KM/FCM) algorithms. The objective function was determined by considering both minimization and maximization criteria. Non-clustered data obtained from the first phase… More
  •   Views:280       Downloads:214        Download PDF
  • Novel Quantum Algorithms to Minimize Switching Functions Based on Graph Partitions
  • Abstract After Google reported its realization of quantum supremacy, Solving the classical problems with quantum computing is becoming a valuable research topic. Switching function minimization is an important problem in Electronic Design Automation (EDA) and logic synthesis, most of the solutions are based on heuristic algorithms with a classical computer, it is a good practice to solve this problem with a quantum processer. In this paper, we introduce a new hybrid classic quantum algorithm using Grover’s algorithm and symmetric functions to minimize small Disjoint Sum of Product (DSOP) and Sum of Product (SOP) for Boolean switching functions. Our method is based… More
  •   Views:220       Downloads:179        Download PDF
  • Convolutional Neural Network Based Intelligent Handwritten Document Recognition
  • Abstract This paper presents a handwritten document recognition system based on the convolutional neural network technique. In today’s world, handwritten document recognition is rapidly attaining the attention of researchers due to its promising behavior as assisting technology for visually impaired users. This technology is also helpful for the automatic data entry system. In the proposed system prepared a dataset of English language handwritten character images. The proposed system has been trained for the large set of sample data and tested on the sample images of user-defined handwritten documents. In this research, multiple experiments get very worthy recognition results. The proposed system… More
  •   Views:355       Downloads:231        Download PDF
  • Dual-Port Content Addressable Memory for Cache Memory Applications
  • Abstract Multicore systems oftentimes use multiple levels of cache to bridge the gap between processor and memory speed. This paper presents a new design of a dedicated pipeline cache memory for multicore processors called dual port content addressable memory (DPCAM). In addition, it proposes a new replacement algorithm based on hardware which is called a near-far access replacement algorithm (NFRA) to reduce the cost overhead of the cache controller and improve the cache access latency. The experimental results indicated that the latency for write and read operations are significantly less in comparison with a set-associative cache memory. Moreover, it was shown… More
  •   Views:289       Downloads:213        Download PDF
  • Deep Learning Based Modeling of Groundwater Storage Change
  • Abstract The understanding of water resource changes and a proper projection of their future availability are necessary elements of sustainable water planning. Monitoring GWS change and future water resource availability are crucial, especially under changing climatic conditions. Traditional methods for in situ groundwater well measurement are a significant challenge due to data unavailability. The present investigation utilized the Long Short Term Memory (LSTM) networks to monitor and forecast Terrestrial Water Storage Change (TWSC) and Ground Water Storage Change (GWSC) based on Gravity Recovery and Climate Experiment (GRACE) datasets from 2003–2025 for five basins of Saudi Arabia. An attempt has been made… More
  •   Views:501       Downloads:312        Download PDF
  • EEG-Based Neonatal Sleep Stage Classification Using Ensemble Learning
  • Abstract Sleep stage classification can provide important information regarding neonatal brain development and maturation. Visual annotation, using polysomnography (PSG), is considered as a gold standard for neonatal sleep stage classification. However, visual annotation is time consuming and needs professional neurologists. For this reason, an internet of things and ensemble-based automatic sleep stage classification has been proposed in this study. 12 EEG features, from 9 bipolar channels, were used to train and test the base classifiers including convolutional neural network, support vector machine, and multilayer perceptron. Bagging and stacking ensembles are then used to combine the outputs for final classification. The proposed… More
  •   Views:227       Downloads:188        Download PDF
  • Mechanical Properties of All MoS2 Monolayer Heterostructures: Crack Propagation and Existing Notch Study
  • Abstract The outstanding thermal, optical, electrical and mechanical properties of molybdenum disolphide (MoS2) heterostructures make them exceptional candidates for an extensive area of applications. Nevertheless, despite considerable technological and academic interest, there is presently a few information regarding the mechanical properties of these novel two-dimensional (2D) materials in the presence of the defects. In this manuscript, we performed extensive molecular dynamics simulations on pre-cracked and pre-notched all-molybdenum disolphide (MoS2) heterostructure systems using ReaxFF force field. Therefore, we study the influence of several central-crack lengths and notch diameters on the mechanical response of 2H phase, 1T phase and composite 2H /1T MoS2 More
  •   Views:207       Downloads:205        Download PDF
  • Analytic Beta-Wavelet Transform-Based Digital Image Watermarking for Secure Transmission
  • Abstract The rapid development in the information technology field has introduced digital watermark technologies as a solution to prevent unauthorized copying and redistribution of data. This article introduces a self-embedded image verification and integrity scheme. The images are firstly split into dedicated segments of the same block sizes. Then, different Analytic Beta-Wavelet (ABW) orthogonal filters are utilized for embedding a self-segment watermark for image segment using a predefined method. ABW orthogonal filter coefficients are estimated to improve image reconstruction under different block sizes. We conduct a comparative study comparing the watermarked images using three kinds of ABW filters for block sizes… More
  •   Views:207       Downloads:202        Download PDF
  • Dynamic Hand Gesture Recognition Using 3D-CNN and LSTM Networks
  • Abstract Recognition of dynamic hand gestures in real-time is a difficult task because the system can never know when or from where the gesture starts and ends in a video stream. Many researchers have been working on vision-based gesture recognition due to its various applications. This paper proposes a deep learning architecture based on the combination of a 3D Convolutional Neural Network (3D-CNN) and a Long Short-Term Memory (LSTM) network. The proposed architecture extracts spatial-temporal information from video sequences input while avoiding extensive computation. The 3D-CNN is used for the extraction of spectral and spatial features which are then given to… More
  •   Views:284       Downloads:234        Download PDF
  • Position Control of Flexible Joint Carts Using Adaptive Generalized Dynamics Inversion
  • Abstract

    This paper presents the design and implementation of Adaptive Generalized Dynamic Inversion (AGDI) to track the position of a Linear Flexible Joint Cart (LFJC) system along with vibration suppression of the flexible joint. The proposed AGDI control law will be comprised of two control elements. The baseline (continuous) control law is based on principle of conventional GDI approach and is established by prescribing the constraint dynamics of controlled state variables that reflect the control objectives. The control law is realized by inverting the prescribed dynamics using dynamically scaled Moore-Penrose generalized inversion. To boost the robust attributes against system nonlinearities, parametric… More

  •   Views:325       Downloads:207        Download PDF
  • Ontology Based Ocean Knowledge Representation for Semantic Information Retrieval
  • Abstract The drastic growth of coastal observation sensors results in copious data that provide weather information. The intricacies in sensor-generated big data are heterogeneity and interpretation, driving high-end Information Retrieval (IR) systems. The Semantic Web (SW) can solve this issue by integrating data into a single platform for information exchange and knowledge retrieval. This paper focuses on exploiting the SW base system to provide interoperability through ontologies by combining the data concepts with ontology classes. This paper presents a 4-phase weather data model: data processing, ontology creation, SW processing, and query engine. The developed Oceanographic Weather Ontology helps to enhance data… More
  •   Views:270       Downloads:183        Download PDF
  • Reactions’ Descriptors Selection and Yield Estimation Using Metaheuristic Algorithms and Voting Ensemble
  • Abstract Bioactive compounds in plants, which can be synthesized using N-arylation methods such as the Buchwald-Hartwig reaction, are essential in drug discovery for their pharmacological effects. Important descriptors are necessary for the estimation of yields in these reactions. This study explores ten metaheuristic algorithms for descriptor selection and model a voting ensemble for evaluation. The algorithms were evaluated based on computational time and the number of selected descriptors. Analyses show that robust performance is obtained with more descriptors, compared to cases where fewer descriptors are selected. The essential descriptor was deduced based on the frequency of occurrence within the 50 extracted… More
  •   Views:242       Downloads:207        Download PDF
  • BERT for Conversational Question Answering Systems Using Semantic Similarity Estimation
  • Abstract Most of the questions from users lack the context needed to thoroughly understand the problem at hand, thus making the questions impossible to answer. Semantic Similarity Estimation is based on relating user’s questions to the context from previous Conversational Search Systems (CSS) to provide answers without requesting the user's context. It imposes constraints on the time needed to produce an answer for the user. The proposed model enables the use of contextual data associated with previous Conversational Searches (CS). While receiving a question in a new conversational search, the model determines the question that refers to more past CS. The… More
  •   Views:265       Downloads:208        Download PDF
  • Error Detection and Pattern Prediction Through Phase II Process Monitoring
  • Abstract The continuous monitoring of the machine is beneficial in improving its process reliability through reflected power function distribution. It is substantial for identifying and removing errors at the early stages of production that ultimately benefit the firms in cost-saving and quality improvement. The current study introduces control charts that help the manufacturing concerns to keep the production process in control. It presents an exponentially weighted moving average and extended exponentially weighted moving average and then compared their performance. The percentiles estimator and the modified maximum likelihood estimator are used to constructing the control charts. The findings suggest that an extended… More
  •   Views:256       Downloads:193        Download PDF
  • IRKO: An Improved Runge-Kutta Optimization Algorithm for Global Optimization Problems
  • Abstract Optimization is a key technique for maximizing or minimizing functions and achieving optimal cost, gains, energy, mass, and so on. In order to solve optimization problems, metaheuristic algorithms are essential. Most of these techniques are influenced by collective knowledge and natural foraging. There is no such thing as the best or worst algorithm; instead, there are more effective algorithms for certain problems. Therefore, in this paper, a new improved variant of a recently proposed metaphorless Runge-Kutta Optimization (RKO) algorithm, called Improved Runge-Kutta Optimization (IRKO) algorithm, is suggested for solving optimization problems. The IRKO is formulated using the basic RKO and… More
  •   Views:425       Downloads:252        Download PDF
  • A Hybrid Neural Network and Box-Jenkins Models for Time Series Forecasting
  • Abstract

    Time series forecasting plays a significant role in numerous applications, including but not limited to, industrial planning, water consumption, medical domains, exchange rates and consumer price index. The main problem is insufficient forecasting accuracy. The present study proposes a hybrid forecasting methods to address this need. The proposed method includes three models. The first model is based on the autoregressive integrated moving average (ARIMA) statistical model; the second model is a back propagation neural network (BPNN) with adaptive slope and momentum parameters; and the third model is a hybridization between ARIMA and BPNN (ARIMA/BPNN) and artificial neural networks and ARIMA… More

  •   Views:246       Downloads:245        Download PDF
  • Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem
  • Abstract The last decade witnessed rapid increase in multimedia and other applications that require transmitting and protecting huge amount of data streams simultaneously. For such applications, a high-performance cryptosystem is compulsory to provide necessary security services. Elliptic curve cryptosystem (ECC) has been introduced as a considerable option. However, the usual sequential implementation of ECC and the standard elliptic curve (EC) form cannot achieve required performance level. Moreover, the widely used Hardware implementation of ECC is costly option and may be not affordable. This research aims to develop a high-performance parallel software implementation for ECC. To achieve this, many experiments were performed… More
  •   Views:266       Downloads:182        Download PDF
  • Defocus Blur Segmentation Using Genetic Programming and Adaptive Threshold
  • Abstract Detection and classification of the blurred and the non-blurred regions in images is a challenging task due to the limited available information about blur type, scenarios and level of blurriness. In this paper, we propose an effective method for blur detection and segmentation based on transfer learning concept. The proposed method consists of two separate steps. In the first step, genetic programming (GP) model is developed that quantify the amount of blur for each pixel in the image. The GP model method uses the multi-resolution features of the image and it provides an improved blur map. In the second phase,… More
  •   Views:214       Downloads:178        Download PDF
  • Optimal Confidential Mechanisms in Smart City Healthcare
  • Abstract Smart City Healthcare (SHC2) system is applied in monitoring the patient at home while it is also expected to react to their needs in a timely manner. The system also concedes the freedom of a patient. IoT is a part of this system and it helps in providing care to the patients. IoT-based healthcare devices are trustworthy since it almost certainly recognizes the potential intensifications at very early stage and alerts the patients and medical experts to such an extent that they are provided with immediate care. Existing methodologies exhibit few shortcomings in terms of computational complexity, cost and data… More
  •   Views:268       Downloads:202        Download PDF
  • Towards Securing Machine Learning Models Against Membership Inference Attacks
  • Abstract From fraud detection to speech recognition, including price prediction, Machine Learning (ML) applications are manifold and can significantly improve different areas. Nevertheless, machine learning models are vulnerable and are exposed to different security and privacy attacks. Hence, these issues should be addressed while using ML models to preserve the security and privacy of the data used. There is a need to secure ML models, especially in the training phase to preserve the privacy of the training datasets and to minimise the information leakage. In this paper, we present an overview of ML threats and vulnerabilities, and we highlight current progress… More
  •   Views:692       Downloads:219        Download PDF
  • Machine Learning Approaches to Detect DoS and Their Effect on WSNs Lifetime
  • Abstract Energy and security remain the main two challenges in Wireless Sensor Networks (WSNs). Therefore, protecting these WSN networks from Denial of Service (DoS) and Distributed DoS (DDoS) is one of the WSN networks security tasks. Traditional packet deep scan systems that rely on open field inspection in transport layer security packets and the open field encryption trend are making machine learning-based systems the only viable choice for these types of attacks. This paper contributes to the evaluation of the use machine learning algorithms in WSN nodes traffic and their effect on WSN network life time. We examined the performance metrics… More
  •   Views:287       Downloads:233        Download PDF
  • Personality Detection Using Context Based Emotions in Cognitive Agents
  • Abstract Detection of personality using emotions is a research domain in artificial intelligence. At present, some agents can keep the human’s profile for interaction and adapts themselves according to their preferences. However, the effective method for interaction is to detect the person’s personality by understanding the emotions and context of the subject. The idea behind adding personality in cognitive agents begins an attempt to maximize adaptability on the basis of behavior. In our daily life, humans socially interact with each other by analyzing the emotions and context of interaction from audio or visual input. This paper presents a conceptual personality model… More
  •   Views:304       Downloads:197        Download PDF
  • Hybrid Sensor Selection Technique for Lifetime Extension of Wireless Sensor Networks
  • Abstract

    Energy conservation is a crucial issue to extend the lifetime of wireless sensor networks (WSNs) where the battery capacity and energy sources are very restricted. Intelligent energy-saving techniques can help designers overcome this issue by reducing the number of selected sensors that report environmental measurements by eliminating all replicated and unrelated features. This paper suggests a Hybrid Sensor Selection (HSS) technique that combines filter-wrapper method to acquire a rich-informational subset of sensors in a reasonable time. HSS aims to increase the lifetime of WSNs by using the optimal number of sensors. At the same time, HSS maintains the desired level… More

  •   Views:234       Downloads:221        Download PDF
  • A Novel Auto-Annotation Technique for Aspect Level Sentiment Analysis
  • Abstract In machine learning, sentiment analysis is a technique to find and analyze the sentiments hidden in the text. For sentiment analysis, annotated data is a basic requirement. Generally, this data is manually annotated. Manual annotation is time consuming, costly and laborious process. To overcome these resource constraints this research has proposed a fully automated annotation technique for aspect level sentiment analysis. Dataset is created from the reviews of ten most popular songs on YouTube. Reviews of five aspects—voice, video, music, lyrics and song, are extracted. An N-Gram based technique is proposed. Complete dataset consists of 369436 reviews that took 173.53… More
  •   Views:254       Downloads:581        Download PDF
  • Alzheimer Disease Detection Empowered with Transfer Learning
  • Abstract Alzheimer's disease is a severe neuron disease that damages brain cells which leads to permanent loss of memory also called dementia. Many people die due to this disease every year because this is not curable but early detection of this disease can help restrain the spread. Alzheimer's is most common in elderly people in the age bracket of 65 and above. An automated system is required for early detection of disease that can detect and classify the disease into multiple Alzheimer classes. Deep learning and machine learning techniques are used to solve many medical problems like this. The proposed system… More
  •   Views:358       Downloads:214        Download PDF
  • Semantic Information Extraction from Multi-Corpora Using Deep Learning
  • Abstract Information extraction plays a vital role in natural language processing, to extract named entities and events from unstructured data. Due to the exponential data growth in the agricultural sector, extracting significant information has become a challenging task. Though existing deep learning-based techniques have been applied in smart agriculture for crop cultivation, crop disease detection, weed removal, and yield production, still it is difficult to find the semantics between extracted information due to unswerving effects of weather, soil, pest, and fertilizer data. This paper consists of two parts. An initial phase, which proposes a data preprocessing technique for removal of ambiguity… More
  •   Views:255       Downloads:202        Download PDF
  • Local-Tetra-Patterns for Face Recognition Encoded on Spatial Pyramid Matching
  • Abstract Face recognition is a big challenge in the research field with a lot of problems like misalignment, illumination changes, pose variations, occlusion, and expressions. Providing a single solution to solve all these problems at a time is a challenging task. We have put some effort to provide a solution to solving all these issues by introducing a face recognition model based on local tetra patterns and spatial pyramid matching. The technique is based on a procedure where the input image is passed through an algorithm that extracts local features by using spatial pyramid matching and max-pooling. Finally, the input image… More
  •   Views:406       Downloads:189        Download PDF
  • Convolutional Neural Network-Based Regression for Predicting the Chloride Ion Diffusion Coefficient of Concrete
  • Abstract The durability performance of reinforced concrete (RC) building structures is significantly affected by the corrosion of the steel reinforcement due to chloride penetration, thus, the chloride ion diffusion coefficient should be investigated through experiments or theoretical equations to assess the durability of an RC structure. This study aims to predict the chloride ion diffusion coefficient of concrete, a heterogeneous material. A convolutional neural network (CNN)-based regression model that learns the condition of the concrete surface through deep learning, is developed to efficiently obtain the chloride ion diffusion coefficient. For the model implementation to determine the chloride ion diffusion coefficient, concrete… More
  •   Views:252       Downloads:207        Download PDF
  • Controller Placement in Software Defined Internet of Things Using Optimization Algorithm
  • Abstract The current and future status of the internet is represented by the upcoming Internet of Things (IoT). The internet can connect the huge amount of data, which contains lot of processing operations and efforts to transfer the pieces of information. The emerging IoT technology in which the smart ecosystem is enabled by the physical object fixed with software electronics, sensors and network connectivity. Nowadays, there are two trending technologies that take the platform i.e., Software Defined Network (SDN) and IoT (SD-IoT). The main aim of the IoT network is to connect and organize different objects with the internet, which is… More
  •   Views:326       Downloads:398        Download PDF
  • Multi-View Multi-Modal Head-Gaze Estimation for Advanced Indoor User Interaction
  • Abstract Gaze estimation is one of the most promising technologies for supporting indoor monitoring and interaction systems. However, previous gaze estimation techniques generally work only in a controlled laboratory environment because they require a number of high-resolution eye images. This makes them unsuitable for welfare and healthcare facilities with the following challenging characteristics: 1) users’ continuous movements, 2) various lighting conditions, and 3) a limited amount of available data. To address these issues, we introduce a multi-view multi-modal head-gaze estimation system that translates the user’s head orientation into the gaze direction. The proposed system captures the user using multiple cameras with… More
  •   Views:217       Downloads:230        Download PDF
  • Fractional Order Linear Active Disturbance Rejection Control for Linear Flexible Joint System
  • Abstract A linear flexible joint system using fractional order linear active disturbance rejection control is studied in this paper. With this control scheme, the performance against disturbances, uncertainties, and attenuation is enhanced. Linear active disturbance rejection control (LADRC) is mainly based on an extended state observer (ESO) technology. A fractional integral (FOI) action is combined with the LADRC technique which proposes a hybrid control scheme like FO-LADRC. Incorporating this FOI action improves the robustness of the standard LADRC. The set-point tracking of the proposed FO-LADRC scheme is designed by Bode's ideal transfer function (BITF) based robust closed-loop concept, an appropriate pole… More
  •   Views:286       Downloads:188        Download PDF
  • Accurate Multi-Site Daily-Ahead Multi-Step PM2.5 Concentrations Forecasting Using Space-Shared CNN-LSTM
  • Abstract

    Accurate multi-step PM2.5 (particulate matter with diameters 2.5um) concentration prediction is critical for humankinds’ health and air population management because it could provide strong evidence for decision-making. However, it is very challenging due to its randomness and variability. This paper proposed a novel method based on convolutional neural network (CNN) and long-short-term memory (LSTM) with a space-shared mechanism, named space-shared CNN-LSTM (SCNN-LSTM) for multi-site daily-ahead multi-step PM2.5 forecasting with self-historical series. The proposed SCNN-LSTM contains multi-channel inputs, each channel corresponding to one-site historical PM2.5 concentration series. In which, CNN and LSTM are used to extract each… More

  •   Views:344       Downloads:181        Download PDF
  • IoT-Cloud Empowered Aerial Scene Classification for Unmanned Aerial Vehicles
  • Abstract Recent trends in communication technologies and unmanned aerial vehicles (UAVs) find its application in several areas such as healthcare, surveillance, transportation, etc. Besides, the integration of Internet of things (IoT) with cloud computing environment offers several benefits for the UAV communication. At the same time, aerial scene classification is one of the major research areas in UAV-enabled MEC systems. In UAV aerial imagery, efficient image representation is crucial for the purpose of scene classification. The existing scene classification techniques generate mid-level image features with limited representation capabilities that often end up in producing average results. Therefore, the current research work… More
  •   Views:249       Downloads:190        Download PDF
  • Leveraging Active Decremental TTL Measuring for Flexible and Efficient NAT identification
  • Abstract Malicious attacks can be launched by misusing the network address translation technique as a camouflage. To mitigate such threats, network address translation identification is investigated to identify network address translation devices and detect abnormal behaviors. However, existing methods in this field are mainly developed for relatively small-scale networks and work in an offline manner, which cannot adapt to the real-time inference requirements in high-speed network scenarios. In this paper, we propose a flexible and efficient network address translation identification scheme based on actively measuring the distance of a round trip to a target with decremental time-to-live values. The basic intuition… More
  •   Views:183       Downloads:169        Download PDF
  • Predicting Resource Availability in Local Mobile Crowd Computing Using Convolutional GRU
  • Abstract In mobile crowd computing (MCC), people’s smart mobile devices (SMDs) are utilized as computing resources. Considering the ever-growing computing capabilities of today’s SMDs, a collection of them can offer significantly high-performance computing services. In a local MCC, the SMDs are typically connected to a local Wi-Fi network. Organizations and institutions can leverage the SMDs available within the campus to form local MCCs to cater to their computing needs without any financial and operational burden. Though it offers an economical and sustainable computing solution, users’ mobility poses a serious issue in the QoS of MCC. To address this, before submitting a… More
  •   Views:225       Downloads:188        Download PDF
  • Wi-Fi Positioning Dataset with Multiusers and Multidevices Considering Spatio-Temporal Variations
  • Abstract Precise information on indoor positioning provides a foundation for position-related customer services. Despite the emergence of several indoor positioning technologies such as ultrawideband, infrared, radio frequency identification, Bluetooth beacons, pedestrian dead reckoning, and magnetic field, Wi-Fi is one of the most widely used technologies. Predominantly, Wi-Fi fingerprinting is the most popular method and has been researched over the past two decades. Wi-Fi positioning faces three core problems: device heterogeneity, robustness to signal changes caused by human mobility, and device attitude, i.e., varying orientations. The existing methods do not cover these aspects owing to the unavailability of publicly available datasets. This… More
  •   Views:230       Downloads:219        Download PDF
  • Deep Neural Network Driven Automated Underwater Object Detection
  • Abstract Object recognition and computer vision techniques for automated object identification are attracting marine biologist's interest as a quicker and easier tool for estimating the fish abundance in marine environments. However, the biggest problem posed by unrestricted aquatic imaging is low luminance, turbidity, background ambiguity, and context camouflage, which make traditional approaches rely on their efficiency due to inaccurate detection or elevated false-positive rates. To address these challenges, we suggest a systemic approach to merge visual features and Gaussian mixture models with You Only Look Once (YOLOv3) deep network, a coherent strategy for recognizing fish in challenging underwater images. As an… More
  •   Views:272       Downloads:196        Download PDF
  • Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node
  • Abstract Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while performing the clone detection procedure.… More
  •   Views:277       Downloads:189        Download PDF
  • An Auction-Based Recommender System for Over-The-Top Platform
  • Abstract In this era of digital domination, it is fit to say that individuals are more inclined towards viewership on online platforms due to the wide variety and the scope of individual preferences it provides. In the past few years, there has been a massive growth in the popularity of Over-The-Top platforms, with an increasing number of consumers adapting to them. The Covid-19 pandemic has also caused the proliferation of these services as people are restricted to their homes. Consumers are often in a dilemma about which subscription plan to choose, and this is where a recommendation system makes their task… More
  •   Views:254       Downloads:199        Download PDF
  • Disease Diagnosis System Using IoT Empowered with Fuzzy Inference System
  • Abstract Disease diagnosis is a challenging task due to a large number of associated factors. Uncertainty in the diagnosis process arises from inaccuracy in patient attributes, missing data, and limitation in the medical expert's ability to define cause and effect relationships when there are multiple interrelated variables. This paper aims to demonstrate an integrated view of deploying smart disease diagnosis using the Internet of Things (IoT) empowered by the fuzzy inference system (FIS) to diagnose various diseases. The Fuzzy System is one of the best systems to diagnose medical conditions because every disease diagnosis involves many uncertainties, and fuzzy logic is… More
  •   Views:305       Downloads:250        Download PDF
  • Automatic Detection of Nephrops Norvegicus Burrows from Underwater Imagery Using Deep Learning
  • Abstract The Norway lobster, Nephrops norvegicus, is one of the main commercial crustacean fisheries in Europe. The abundance of Nephrops norvegicus stocks is assessed based on identifying and counting the burrows where they live from underwater videos collected by camera systems mounted on sledges. The Spanish Oceanographic Institute (IEO) and Marine Institute Ireland (MI-Ireland) conducts annual underwater television surveys (UWTV) to estimate the total abundance of Nephrops within the specified area, with a coefficient of variation (CV) or relative standard error of less than 20%. Currently, the identification and counting of the Nephrops burrows are carried out manually by the marine… More
  •   Views:236       Downloads:205        Download PDF
  • Using Capsule Networks for Android Malware Detection Through Orientation-Based Features
  • Abstract Mobile phones are an essential part of modern life. The two popular mobile phone platforms, Android and iPhone Operating System (iOS), have an immense impact on the lives of millions of people. Among these two, Android currently boasts more than 84% market share. Thus, any personal data put on it are at great risk if not properly protected. On the other hand, more than a million pieces of malware have been reported on Android in just 2021 till date. Detecting and mitigating all this malware is extremely difficult for any set of human experts. Due to this reason, machine learning–and… More
  •   Views:262       Downloads:223        Download PDF
  • A Hybrid Deep Learning-Based Unsupervised Anomaly Detection in High Dimensional Data
  • Abstract Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. Many issues in this field still unsolved, so several modern anomaly detection methods struggle to maintain adequate accuracy due to the highly descriptive nature of big data. Such a phenomenon is referred to as the “curse of dimensionality” that affects traditional techniques in terms of both accuracy and performance. Thus, this research proposed a hybrid model based on Deep Autoencoder Neural Network (DANN) with five layers to reduce the difference between the input and output. The proposed model was applied to a… More
  •   Views:275       Downloads:227        Download PDF
  • Beamforming Performance Analysis of Millimeter-Wave 5G Wireless Networks
  • Abstract With the rapid growth in the number of mobile devices and user connectivity, the demand for higher system capacity and improved quality-of-service is required. As the demand for high-speed wireless communication grows, numerous modulation techniques in the frequency, temporal, and spatial domains, such as orthogonal frequency division multiplexing (OFDM), time division multiple access (TDMA), space division multiple access (SDMA), and multiple-input multiple-output (MIMO), are being developed. Along with those approaches, electromagnetic waves’ orbital angular momentum (OAM) is attracting attention because it has the potential to boost the wireless communication capacity. Antenna electromagnetic radiation can be described by a sum of… More
  •   Views:351       Downloads:255        Download PDF
  • Emerging Applications of Artificial Intelligence, Machine learning and Data Science
  • Abstract There are various intense forces causing customers to use evaluated data when using social media platforms and microblogging sites. Today, customers throughout the world share their points of view on all kinds of topics through these sources. The massive volume of data created by these customers makes it impossible to analyze such data manually. Therefore, an efficient and intelligent method for evaluating social media data and their divergence needs to be developed. Today, various types of equipment and techniques are available for automatically estimating the classification of sentiments. Sentiment analysis involves determining people's emotions using facial expressions. Sentiment analysis can… More
  •   Views:266       Downloads:222        Download PDF
  • Indoor Electromagnetic Radiation Intensity Relationship to Total Energy of Household Appliances
  • Abstract The rapid technological developments in the modern era have led to increased electrical equipment in our daily lives, work, and homes. From this standpoint, the main objective of this study is to evaluate the potential relationship between the intensity of electromagnetic radiation and the total energy of household appliances in the living environment within the building by measuring and analyzing the strength of the electric field and the entire electromagnetic radiation flux density of electrical devices operating at frequencies (5 Hz to 1 kHz). The living room was chosen as a center for measurement at 15 homes in three different… More
  •   Views:273       Downloads:200        Download PDF
  • RSS-Based Indoor Localization System with Single Base Station
  • Abstract The paper proposes an Indoor Localization System (ILS) which uses only one fixed Base Station (BS) with simple non-reconfigurable antennas. The proposed algorithm measures Received Signal Strength (RSS) and maps it to the location in the room by estimating signal strength of a direct line of sight (LOS) signal and signal of the first order reflection from the wall. The algorithm is evaluated through both simulations and empirical measurements in a furnished open space office, sampling 21 different locations in the room. It is demonstrated the system can identify user’s real-time location with a maximum estimation error below 0.7 m… More
  •   Views:285       Downloads:221        Download PDF
  • Suggestion of Maintenance Criteria for Electric Railroad Facilities Based on Fuzzy TOPSIS
  • Abstract This paper is on the suggestion of maintenance items for electric railway facility systems. With the recent increase in the use of electric locomotives, the utilization and importance of railroad electrical facility systems are also increasing, but the railroad electrical facility system in Korea is rapidly aging. To solve this problem, various methodologies are applied to ensure operational reliability and stability for railroad electrical facility systems, but there is a lack of detailed evaluation criteria for railroad electrical facility system maintenance. Also, maintenance items must be selected in a scientific and systematic method. Therefore, railroad electrical facility systems are selected… More
  •   Views:207       Downloads:195        Download PDF
  • Deep Stacked Ensemble Learning Model for COVID-19 Classification
  • Abstract COVID-19 is a growing problem worldwide with a high mortality rate. As a result, the World Health Organization (WHO) declared it a pandemic. In order to limit the spread of the disease, a fast and accurate diagnosis is required. A reverse transcript polymerase chain reaction (RT-PCR) test is often used to detect the disease. However, since this test is time-consuming, a chest computed tomography (CT) or plain chest X-ray (CXR) is sometimes indicated. The value of automated diagnosis is that it saves time and money by minimizing human effort. Three significant contributions are made by our research. Its initial purpose… More
  •   Views:329       Downloads:237        Download PDF
  • Two-Mode Biomedical Sensor Build-up: Characterization of Optical Amplifier
  • Abstract Intracavity absorption spectroscopy is a strikingly sensitive technique that has been integrated with a two-wavelength setup to develop a sensor for human breath. Various factors are considered in such a scenario, out of which Relative Intensity Noise (RIN) has been exploited as an important parameter to characterize and calibrate the said setup. During the performance of an electrical based assessment arrangement which has been developed in the laboratory as an alternative to the expensive Agilent setup, the optical amplifier plays a pivotal role in its development and operation, along with other components and their significance. Therefore, the investigation and technical… More
  •   Views:268       Downloads:243        Download PDF
  • Fusion of Infrared and Visible Images Using Fuzzy Based Siamese Convolutional Network
  • Abstract Traditional techniques based on image fusion are arduous in integrating complementary or heterogeneous infrared (IR)/visible (VS) images. Dissimilarities in various kind of features in these images are vital to preserve in the single fused image. Hence, simultaneous preservation of both the aspects at the same time is a challenging task. However, most of the existing methods utilize the manual extraction of features; and manual complicated designing of fusion rules resulted in a blurry artifact in the fused image. Therefore, this study has proposed a hybrid algorithm for the integration of multi-features among two heterogeneous images. Firstly, fuzzification of two IR/VS… More
  •   Views:306       Downloads:234        Download PDF
  • Robust Length of Stay Prediction Model for Indoor Patients
  • Abstract Due to unforeseen climate change, complicated chronic diseases, and mutation of viruses’ hospital administration’s top challenge is to know about the Length of stay (LOS) of different diseased patients in the hospitals. Hospital management does not exactly know when the existing patient leaves the hospital; this information could be crucial for hospital management. It could allow them to take more patients for admission. As a result, hospitals face many problems managing available resources and new patients in getting entries for their prompt treatment. Therefore, a robust model needs to be designed to help hospital administration predict patients’ LOS to resolve… More
  •   Views:373       Downloads:194        Download PDF
  • An OWL-Based Specification of Database Management Systems
  • Abstract In the context of a proliferation of Database Management Systems (DBMSs), we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain. This conceptualization aims to facilitate a proper execution of various software engineering processes and database-focused administration tasks. Also, it can be used to improve the decision-making process for determining/selecting the appropriate DBMS, subject to specific requirements. The proposed model describes the most important features and aspects regarding the DBMS domain, including the support for various paradigms (relational, graph-based, key-value, tree-like, etc.), query languages, platforms (servers), plus running environments (desktop,… More
  •   Views:271       Downloads:193        Download PDF
  • Preserving Privacy of User Identity Based on Pseudonym Variable in 5G
  • Abstract

    The fifth generation (5G) system is the forthcoming generation of the mobile communication system. It has numerous additional features and offers an extensively high data rate, more capacity, and low latency. However, these features and applications have many problems and issues in terms of security, which has become a great challenge in the telecommunication industry. This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity, which randomly changes and does not use the permanent identity between the user equipment and home network.… More

  •   Views:338       Downloads:367        Download PDF
  • Aeroelastic Optimization of the High Aspect Ratio Wing with Aileron
  • Abstract In aircraft wings, aileron mass parameter presents a tremendous effect on the velocity and frequency of the flutter problem. For that purpose, we present the optimization of a composite design wing with an aileron, using machine-learning approach. Mass properties and its distribution have a great influence on the multi-variate optimization procedure, based on speed and frequency of flutter. First, flutter speed was obtained to estimate aileron impact. Additionally mass-equilibrated and other features were investigated. It can deduced that changing the position and mass properties of the aileron are tangible following the speed and frequency of the wing flutter. Based on… More
  •   Views:209       Downloads:180        Download PDF
  • An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks
  • Abstract Due to the rapid increase in the exchange of text information via internet networks, the security and authenticity of digital content have become a major research issue. The main challenges faced by researchers are how to hide the information within the text to use it later for authentication and attacks tampering detection without effects on the meaning and size of the given digital text. In this paper, an efficient text-based watermarking method has been proposed for detecting the illegal tampering attacks on the Arabic text transmitted online via an Internet network. Towards this purpose, the accuracy of tampering detection and… More
  •   Views:206       Downloads:164        Download PDF
  • Fuzzy-Based Automatic Epileptic Seizure Detection Framework
  • Abstract Detection of epileptic seizures on the basis of Electroencephalogram (EEG) recordings is a challenging task due to the complex, non-stationary and non-linear nature of these biomedical signals. In the existing literature, a number of automatic epileptic seizure detection methods have been proposed that extract useful features from EEG segments and classify them using machine learning algorithms. Some characterizing features of epileptic and non-epileptic EEG signals overlap; therefore, it requires that analysis of signals must be performed from diverse perspectives. Few studies analyzed these signals in diverse domains to identify distinguishing characteristics of epileptic EEG signals. To pose the challenge mentioned… More
  •   Views:345       Downloads:207        Download PDF
  • MLA: A New Mutated Leader Algorithm for Solving Optimization Problems
  • Abstract Optimization plays an effective role in various disciplines of science and engineering. Optimization problems should either be optimized using the appropriate method (i.e., minimization or maximization). Optimization algorithms are one of the efficient and effective methods in providing quasi-optimal solutions for these type of problems. In this study, a new algorithm called the Mutated Leader Algorithm (MLA) is presented. The main idea in the proposed MLA is to update the members of the algorithm population in the search space based on the guidance of a mutated leader. In addition to information about the best member of the population, the mutated… More
  •   Views:279       Downloads:223        Download PDF
  • SDN Based DDos Mitigating Approach Using Traffic Entropy for IoT Network
  • Abstract The Internet of Things (IoT) has been widely adopted in various domains including smart cities, healthcare, smart factories, etc. In the last few years, the fitness industry has been reshaped by the introduction of smart fitness solutions for individuals as well as fitness gyms. The IoT fitness devices collect trainee data that is being used for various decision-making. However, it will face numerous security and privacy issues towards its realization. This work focuses on IoT security, especially DoS/DDoS attacks. In this paper, we have proposed a novel blockchain-enabled protocol (BEP) that uses the notion of a self-exposing node (SEN) approach… More
  •   Views:279       Downloads:255        Download PDF
  • Intelligent Deep Learning Based Disease Diagnosis Using Biomedical Tongue Images
  • Abstract The rapid development of biomedical imaging modalities led to its wide application in disease diagnosis. Tongue-based diagnostic procedures are proficient and non-invasive in nature to carry out secondary diagnostic processes ubiquitously. Traditionally, physicians examine the characteristics of tongue prior to decision-making. In this scenario, to get rid of qualitative aspects, tongue images can be quantitatively inspected for which a new disease diagnosis model is proposed. This model can reduce the physical harm made to the patients. Several tongue image analytical methodologies have been proposed earlier. However, there is a need exists to design an intelligent Deep Learning (DL) based disease… More
  •   Views:241       Downloads:273        Download PDF
  • Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique
  • Abstract The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to… More
  •   Views:277       Downloads:204        Download PDF
  • Graph Transformer for Communities Detection in Social Networks
  • Abstract Graphs are used in various disciplines such as telecommunication, biological networks, as well as social networks. In large-scale networks, it is challenging to detect the communities by learning the distinct properties of the graph. As deep learning has made contributions in a variety of domains, we try to use deep learning techniques to mine the knowledge from large-scale graph networks. In this paper, we aim to provide a strategy for detecting communities using deep autoencoders and obtain generic neural attention to graphs. The advantages of neural attention are widely seen in the field of NLP and computer vision, which has… More
  •   Views:257       Downloads:273        Download PDF
  • Handover Mechanism Based on Underwater Hybrid Software-Defined Modem in Advanced Diver Networks
  • Abstract For the past few decades, the internet of underwater things (IoUT) obtained a lot of attention in mobile aquatic applications such as oceanography, diver network monitoring, unmanned underwater exploration, underwater surveillance, location tracking system, etc. Most of the IoUT applications rely on acoustic medium. The current IoUT applications face difficulty in delivering a reliable communication system due to the various technical limitations of IoUT environment such as low data rate, attenuation, limited bandwidth, limited battery, limited memory, connectivity problem, etc. One of the significant applications of IoUT include monitoring underwater diver networks. In order to perform a reliable and energy-efficient… More
  •   Views:358       Downloads:231        Download PDF
  • 2D Finite Element Analysis of Asynchronous Machine Influenced Under Power Quality Perturbations
  • Abstract

    Asynchronous machines are predominantly preferred in industrial sectors for its reliability. Power quality perturbations have a greater impact on industries; among the different power quality events, voltage fluctuations are the most common and that may cause adverse effect on machine's operation since they are longer enduring. The article discusses a numerical technique for evaluating asynchronous motors while taking into account magnetic saturation, losses, leakage flux, and voltage drop. A 2D linear analysis involving a multi-slice time stepping finite element model is used to predict the end effects. As an outcome, the magnetic saturation and losses are estimated using a modified… More

  •   Views:200       Downloads:238        Download PDF
  • Deep Q-Learning Based Optimal Query Routing Approach for Unstructured P2P Network
  • Abstract Deep Reinforcement Learning (DRL) is a class of Machine Learning (ML) that combines Deep Learning with Reinforcement Learning and provides a framework by which a system can learn from its previous actions in an environment to select its efforts in the future efficiently. DRL has been used in many application fields, including games, robots, networks, etc. for creating autonomous systems that improve themselves with experience. It is well acknowledged that DRL is well suited to solve optimization problems in distributed systems in general and network routing especially. Therefore, a novel query routing approach called Deep Reinforcement Learning based Route Selection… More
  •   Views:363       Downloads:392        Download PDF
  • Machine Learning Based Depression, Anxiety, and Stress Predictive Model During COVID-19 Crisis
  • Abstract Corona Virus Disease-2019 (COVID-19) was reported at first in Wuhan city, China by December 2019. World Health Organization (WHO) declared COVID-19 as a pandemic i.e., global health crisis on March 11, 2020. The outbreak of COVID-19 pandemic and subsequent lockdowns to curb the spread, not only affected the economic status of a number of countries, but it also resulted in increased levels of Depression, Anxiety, and Stress (DAS) among people. Therefore, there is a need exists to comprehend the relationship among psycho-social factors in a country that is hypothetically affected by high levels of stress and fear; with tremendously-limiting measures… More
  •   Views:337       Downloads:217        Download PDF
  • Artificial Intelligence Based Clustering with Routing Protocol for Internet of Vehicles
  • Abstract With recent advances made in Internet of Vehicles (IoV) and Cloud Computing (CC), the Intelligent Transportation Systems (ITS) find it advantageous in terms of improvement in quality and interactivity of urban transportation service, mitigation of costs incurred, reduction in resource utilization, and improvement in traffic management capabilities. Many traffic-related problems in future smart cities can be sorted out with the incorporation of IoV in transportation. IoV communication enables the collection and distribution of real-time essential data regarding road network condition. In this scenario, energy-efficient and reliable intercommunication routes are essential among vehicular nodes in sustainable urban computing. With this motivation,… More
  •   Views:269       Downloads:225        Download PDF
  • Ontology Driven Testing Strategies for IoT Applications
  • Abstract Internet-of-Things (IoT) has attained a major share in embedded software development. The new era of specialized intelligent systems requires adaptation of customized software engineering approaches. Currently, software engineering has merged the development phases with the technologies provided by industrial automation. The improvements are still required in testing phase for the software developed to IoT solutions. This research aims to assist in developing the testing strategies for IoT applications, therein ontology has been adopted as a knowledge representation technique to different software engineering processes. The proposed ontological model renders 101 methodology by using Protégé. After completion, the ontology was evaluated in… More
  •   Views:263       Downloads:244        Download PDF
  • Intelligent Deep Learning Based Automated Fish Detection Model for UWSN
  • Abstract An exponential growth in advanced technologies has resulted in the exploration of Ocean spaces. It has paved the way for new opportunities that can address questions relevant to diversity, uniqueness, and difficulty of marine life. Underwater Wireless Sensor Networks (UWSNs) are widely used to leverage such opportunities while these networks include a set of vehicles and sensors to monitor the environmental conditions. In this scenario, it is fascinating to design an automated fish detection technique with the help of underwater videos and computer vision techniques so as to estimate and monitor fish biomass in water bodies. Several models have been… More
  •   Views:270       Downloads:195        Download PDF
  • Energy Efficiency Trade-off with Spectral Efficiency in MIMO Systems
  • Abstract 5G technology can greatly improve spectral efficiency (SE) and throughput of wireless communications. In this regard, multiple input multiple output (MIMO) technology has become the most influential technology using huge antennas and user equipment (UE). However, the use of MIMO in 5G wireless technology will increase circuit power consumption and reduce energy efficiency (EE). In this regard, this article proposes an optimal solution for weighing SE and throughput tradeoff with energy efficiency. The research work is based on the Wyner model of uplink (UL) and downlink (DL) transmission under the multi-cell model scenario. The SE-EE trade-off is carried out by… More
  •   Views:286       Downloads:202        Download PDF
  • An Improved Convolutional Neural Network Model for DNA Classification
  • Abstract

    Recently, deep learning (DL) became one of the essential tools in bioinformatics. A modified convolutional neural network (CNN) is employed in this paper for building an integrated model for deoxyribonucleic acid (DNA) classification. In any CNN model, convolutional layers are used to extract features followed by max-pooling layers to reduce the dimensionality of features. A novel method based on downsampling and CNNs is introduced for feature reduction. The downsampling is an improved form of the existing pooling layer to obtain better classification accuracy. The two-dimensional discrete transform (2D DT) and two-dimensional random projection (2D RP) methods are applied for downsampling.… More

  •   Views:367       Downloads:178        Download PDF
  • An Energy-Efficient Mobile Agent-Based Data Aggregation Scheme for Wireless Body Area Networks
  • Abstract Due to the advancement in wireless technology and miniaturization, Wireless Body Area Networks (WBANs) have gained enormous popularity, having various applications, especially in the healthcare sector. WBANs are intrinsically resource-constrained; therefore, they have specific design and development requirements. One such highly desirable requirement is an energy-efficient and reliable Data Aggregation (DA) mechanism for WBANs. The efficient and reliable DA may ultimately push the network to operate without much human intervention and further extend the network lifetime. The conventional client-server DA paradigm becomes unsuitable and inefficient for WBANs when a large amount of data is generated in the network. Similarly, in… More
  •   Views:406       Downloads:207        Download PDF
  • Improved Dragonfly Optimizer for Intrusion Detection Using Deep Clustering CNN-PSO Classifier
  • Abstract With the rapid growth of internet based services and the data generated on these services are attracted by the attackers to intrude the networking services and information. Based on the characteristics of these intruders, many researchers attempted to aim to detect the intrusion with the help of automating process. Since, the large volume of data is generated and transferred through network, the security and performance are remained an issue. IDS (Intrusion Detection System) was developed to detect and prevent the intruders and secure the network systems. The performance and loss are still an issue because of the features space grows… More
  •   Views:269       Downloads:199        Download PDF
  • Laboratory Evaluation of Fiber-Modified Asphalt Mixtures Incorporating Steel Slag Aggregates
  • Abstract Vigorous and continued efforts by researchers and engineers have contributed towards maintaining environmental sustainability through the utilization of waste materials in civil engineering applications as an alternative to natural sources. In this study, granite aggregates in asphaltic mixes were replaced by electric arc furnace (EAF) steel slag aggregates with different proportions to identify the best combination in terms of superior performance. Asphalt mixtures showing the best performance were further reinforced with polyvinyl alcohol (PVA), acrylic, and polyester fibers at the dosages of 0.05%, 0.15%, and 0.3% by weight of the aggregates. The performance tests of this study were resilient modulus,… More
  •   Views:248       Downloads:216        Download PDF
  • Primary User-Awareness-Based Energy-Efficient Duty-Cycle Scheme in Cognitive Radio Networks
  • Abstract

    Cognitive radio devices can utilize the licensed channels in an opportunistic manner to solve the spectrum scarcity issue occurring in the unlicensed spectrum. However, these cognitive radio devices (secondary users) are greatly affected by the original users (primary users) of licensed channels. Cognitive users have to adjust operation parameters frequently to adapt to the dynamic network environment, which causes extra energy consumption. Energy consumption can be reduced by predicting the future activity of primary users. However, the traditional prediction-based algorithms require large historical data to achieve a satisfying precision accuracy which will consume a lot of time and memory space.… More

  •   Views:233       Downloads:174        Download PDF
  • Malaria Parasite Detection Using a Quantum-Convolutional Network
  • Abstract

    Malaria is a severe illness triggered by parasites that spreads via mosquito bites. In underdeveloped nations, malaria is one of the top causes of mortality, and it is mainly diagnosed through microscopy. Computer-assisted malaria diagnosis is difficult owing to the fine-grained differences throughout the presentation of some uninfected and infected groups. Therefore, in this study, we present a new idea based on the ensemble quantum-classical framework for malaria classification. The methods comprise three core steps: localization, segmentation, and classification. In the first core step, an improved FRCNN model is proposed for the localization of the infected malaria cells. Then, the… More

  •   Views:267       Downloads:191        Download PDF
  • An Intelligent Forecasting Model for Disease Prediction Using Stack Ensembling Approach
  • Abstract This research work proposes a new stack-based generalization ensemble model to forecast the number of incidences of conjunctivitis disease. In addition to forecasting the occurrences of conjunctivitis incidences, the proposed model also improves performance by using the ensemble model. Weekly rate of acute Conjunctivitis per 1000 for Hong Kong is collected for the duration of the first week of January 2010 to the last week of December 2019. Pre-processing techniques such as imputation of missing values and logarithmic transformation are applied to pre-process the data sets. A stacked generalization ensemble model based on Auto-ARIMA (Autoregressive Integrated Moving Average), NNAR (Neural… More
  •   Views:324       Downloads:215        Download PDF
  • Design of Latency-Aware IoT Modules in Heterogeneous Fog-Cloud Computing Networks
  • Abstract The modern paradigm of the Internet of Things (IoT) has led to a significant increase in demand for latency-sensitive applications in Fog-based cloud computing. However, such applications cannot meet strict quality of service (QoS) requirements. The large-scale deployment of IoT requires more effective use of network infrastructure to ensure QoS when processing big data. Generally, cloud-centric IoT application deployment involves different modules running on terminal devices and cloud servers. Fog devices with different computing capabilities must process the data generated by the end device, so deploying latency-sensitive applications in a heterogeneous fog computing environment is a difficult task. In addition,… More
  •   Views:430       Downloads:220        Download PDF
  • Analysis of Pneumonia Model via Efficient Computing Techniques
  • Abstract Pneumonia is a highly transmissible disease in children. According to the World Health Organization (WHO), the most affected regions include south Asia and sub-Saharan Africa. Worldwide, 15% of pediatric deaths can be attributed to pneumonia. Computing techniques have a significant role in science, engineering, and many other fields. In this study, we focused on the efficiency of numerical techniques via computer programs. We studied the dynamics of the pneumonia-like infections of epidemic models using numerical techniques. We discuss two types of analysis: dynamical and numerical. The dynamical analysis included positivity, boundedness, local stability, reproduction number, and equilibria of the model.… More
  •   Views:356       Downloads:183        Download PDF
  • Incentive-Driven Approach for Misbehavior Avoidance in Vehicular Networks
  • Abstract For efficient and robust information exchange in the vehicular ad-hoc network, a secure and trusted incentive reward is needed to avoid and reduce the intensity of misbehaving nodes and congestion especially in the case where the periodic beacons exploit the channel. In addition, we cannot be sure that all vehicular nodes eagerly share their communication assets to the system for message dissemination without any rewards. Unfortunately, there may be some misbehaving nodes and due to their selfish and greedy approach, these nodes may not help others on the network. To deal with this challenge, trust-based misbehavior avoidance schemes are generally… More
  •   Views:247       Downloads:203        Download PDF
  • Efficient Deep-Learning-Based Autoencoder Denoising Approach for Medical Image Diagnosis
  • Abstract Effective medical diagnosis is dramatically expensive, especially in third-world countries. One of the common diseases is pneumonia, and because of the remarkable similarity between its types and the limited number of medical images for recent diseases related to pneumonia, the medical diagnosis of these diseases is a significant challenge. Hence, transfer learning represents a promising solution in transferring knowledge from generic tasks to specific tasks. Unfortunately, experimentation and utilization of different models of transfer learning do not achieve satisfactory results. In this study, we suggest the implementation of an automatic detection model, namely CADTra, to efficiently diagnose pneumonia-related diseases. This… More
  •   Views:300       Downloads:201        Download PDF
  • Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network
  • Abstract Routing is a key function in Wireless Sensor Networks (WSNs) since it facilitates data transfer to base stations. Routing attacks have the potential to destroy and degrade the functionality of WSNs. A trustworthy routing system is essential for routing security and WSN efficiency. Numerous methods have been implemented to build trust between routing nodes, including the use of cryptographic methods and centralized routing. Nonetheless, the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities. At the moment, there is no effective way to avoid malicious node attacks. As a consequence… More
  •   Views:236       Downloads:186        Download PDF
  • A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
  • Abstract Unmanned aerial vehicles (UAVs) have recently attracted widespread attention in civil and commercial applications. For example, UAVs (or drone) technology is increasingly used in crowd monitoring solutions due to its wider air footprint and the ability to capture data in real time. However, due to the open atmosphere, drones can easily be lost or captured by attackers when reporting information to the crowd management center. In addition, the attackers may initiate malicious detection to disrupt the crowd-sensing communication network. Therefore, security and privacy are one of the most significant challenges faced by drones or the Internet of Drones (IoD) that… More
  •   Views:233       Downloads:194        Download PDF
  • Data Wipe-Off Technique for Tracking Weak GPS Signals
  • Abstract In this paper, the data wipe-off (DWO) algorithm is incorporated into the vector tracking loop of the Global Positioning System (GPS) receiver for improving signal tracking performance. The navigation data, which contains information that is necessary to perform navigation computations, are binary phase-shift keying (BPSK) modulated onto the GPS carrier phase with the bit duration of 20 ms (i.e., 50 bits per second). To continuously track the satellite’s signal in weak signal environment, the DWO algorithm on the basis of pre-detection method is adopted to detect data bit sign reversal every 20 ms. Tracking accuracy of a weak GPS signal… More
  •   Views:216       Downloads:178        Download PDF
  • Ultra-wideband Frequency Selective Surface for Communication Applications
  • Abstract A low-profile ultra-wideband (UWB) band-stop frequency selective surface (FSS) is designed for S-, C-, X- and Ku-bands communication applications. The FSS is constructed by using square and circular loop elements printed on the top and bottom sides of the RO3210 substrate. The FSS has been designed to reduce the electromagnetic interference (EMI) as well as to mitigate the harmful effects of electromagnetic radiation on the human body caused by different radio devices. The dimension and size of the UWB FSS have been reduced to 0.12 λ × 0.12 λ and 90%, respectively, as compared to the reported literature. The other… More
  •   Views:258       Downloads:210        Download PDF
  • Estimating Fuel-Efficient Air Plane Trajectories Using Machine Learning
  • Abstract Airline industry has witnessed a tremendous growth in the recent past. Percentage of people choosing air travel as first choice to commute is continuously increasing. Highly demanding and congested air routes are resulting in inadvertent delays, additional fuel consumption and high emission of greenhouse gases. Trajectory planning involves creation identification of cost-effective flight plans for optimal utilization of fuel and time. This situation warrants the need of an intelligent system for dynamic planning of optimized flight trajectories with least human intervention required. In this paper, an algorithm for dynamic planning of optimized flight trajectories has been proposed. The proposed algorithm… More
  •   Views:339       Downloads:218        Download PDF
  • Educational Videos Subtitles’ Summarization Using Latent Dirichlet Allocation and Length Enhancement
  • Abstract Nowadays, people use online resources such as educational videos and courses. However, such videos and courses are mostly long and thus, summarizing them will be valuable. The video contents (visual, audio, and subtitles) could be analyzed to generate textual summaries, i.e., notes. Videos’ subtitles contain significant information. Therefore, summarizing subtitles is effective to concentrate on the necessary details. Most of the existing studies used Term Frequency–Inverse Document Frequency (TF-IDF) and Latent Semantic Analysis (LSA) models to create lectures’ summaries. This study takes another approach and applies Latent Dirichlet Allocation (LDA), which proved its effectiveness in document summarization. Specifically, the proposed… More
  •   Views:399       Downloads:428        Download PDF
  • Artificial Intelligence Enabled Apple Leaf Disease Classification for Precision Agriculture
  • Abstract Precision agriculture enables the recent technological advancements in farming sector to observe, measure, and analyze the requirements of individual fields and crops. The recent developments of computer vision and artificial intelligence (AI) techniques find a way for effective detection of plants, diseases, weeds, pests, etc. On the other hand, the detection of plant diseases, particularly apple leaf diseases using AI techniques can improve productivity and reduce crop loss. Besides, earlier and precise apple leaf disease detection can minimize the spread of the disease. Earlier works make use of traditional image processing techniques which cannot assure high detection rate on apple… More
  •   Views:346       Downloads:241        Download PDF
  • A Novel Binary Emperor Penguin Optimizer for Feature Selection Tasks
  • Abstract Nowadays, due to the increase in information resources, the number of parameters and complexity of feature vectors increases. Optimization methods offer more practical solutions instead of exact solutions for the solution of this problem. The Emperor Penguin Optimizer (EPO) is one of the highest performing meta-heuristic algorithms of recent times that imposed the gathering behavior of emperor penguins. It shows the superiority of its performance over a wide range of optimization problems thanks to its equal chance to each penguin and its fast convergence features. Although traditional EPO overcomes the optimization problems in continuous search space, many problems today shift… More
  •   Views:223       Downloads:173        Download PDF
  • Deep Learning Empowered Cybersecurity Spam Bot Detection for Online Social Networks
  • Abstract Cybersecurity encompasses various elements such as strategies, policies, processes, and techniques to accomplish availability, confidentiality, and integrity of resource processing, network, software, and data from attacks. In this scenario, the rising popularity of Online Social Networks (OSN) is under threat from spammers for which effective spam bot detection approaches should be developed. Earlier studies have developed different approaches for the detection of spam bots in OSN. But those techniques primarily concentrated on hand-crafted features to capture the features of malicious users while the application of Deep Learning (DL) models needs to be explored. With this motivation, the current research article… More
  •   Views:293       Downloads:197        Download PDF
  • ATS: A Novel Time-Sharing CPU Scheduling Algorithm Based on Features Similarities
  • Abstract Minimizing time cost in time-shared operating systems is considered basic and essential task, and it is the most significant goal for the researchers who interested in CPU scheduling algorithms. Waiting time, turnaround time, and number of context switches are the most time cost criteria used to compare between CPU scheduling algorithms. CPU scheduling algorithms are divided into non-preemptive and preemptive. Round Robin (RR) algorithm is the most famous as it is the basis for all the algorithms used in time-sharing. In this paper, the authors proposed a novel CPU scheduling algorithm based on RR. The proposed algorithm is called Adjustable… More
  •   Views:351       Downloads:427        Download PDF
  • Artificial Intelligence Based Optimal Functional Link Neural Network for Financial Data Science
  • Abstract In present digital era, data science techniques exploit artificial intelligence (AI) techniques who start and run small and medium-sized enterprises (SMEs) to have an impact and develop their businesses. Data science integrates the conventions of econometrics with the technological elements of data science. It make use of machine learning (ML), predictive and prescriptive analytics to effectively understand financial data and solve related problems. Smart technologies for SMEs enable allows the firm to get smarter with their processes and offers efficient operations. At the same time, it is needed to develop an effective tool which can assist small to medium sized… More
  •   Views:311       Downloads:201        Download PDF
  • Extremal Coalitions for Influence Games Through Swarm Intelligence-Based Methods
  • Abstract An influence game is a simple game represented over an influence graph (i.e., a labeled, weighted graph) on which the influence spread phenomenon is exerted. Influence games allow applying different properties and parameters coming from cooperative game theory to the contexts of social network analysis, decision-systems, voting systems, and collective behavior. The exact calculation of several of these properties and parameters is computationally hard, even for a small number of players. Two examples of these parameters are the length and the width of a game. The length of a game is the size of its smaller winning coalition, while the… More
  •   Views:321       Downloads:374        Download PDF
  • Deep Learning Based Intelligent Industrial Fault Diagnosis Model
  • Abstract In the present industrial revolution era, the industrial mechanical system becomes incessantly highly intelligent and composite. So, it is necessary to develop data-driven and monitoring approaches for achieving quick, trustable, and high-quality analysis in an automated way. Fault diagnosis is an essential process to verify the safety and reliability operations of rotating machinery. The advent of deep learning (DL) methods employed to diagnose faults in rotating machinery by extracting a set of feature vectors from the vibration signals. This paper presents an Intelligent Industrial Fault Diagnosis using Sailfish Optimized Inception with Residual Network (IIFD-SOIR) Model. The proposed model operates on… More
  •   Views:339       Downloads:213        Download PDF
  • Swarm-Based Extreme Learning Machine Models for Global Optimization
  • Abstract Extreme Learning Machine (ELM) is popular in batch learning, sequential learning, and progressive learning, due to its speed, easy integration, and generalization ability. While, Traditional ELM cannot train massive data rapidly and efficiently due to its memory residence, high time and space complexity. In ELM, the hidden layer typically necessitates a huge number of nodes. Furthermore, there is no certainty that the arrangement of weights and biases within the hidden layer is optimal. To solve this problem, the traditional ELM has been hybridized with swarm intelligence optimization techniques. This paper displays five proposed hybrid Algorithms “Salp Swarm Algorithm (SSA-ELM), Grasshopper… More
  •   Views:257       Downloads:184        Download PDF
  • An Optimized Deep Learning Model for Emotion Classification in Tweets
  • Abstract The task of automatically analyzing sentiments from a tweet has more use now than ever due to the spectrum of emotions expressed from national leaders to the average man. Analyzing this data can be critical for any organization. Sentiments are often expressed with different intensity and topics which can provide great insight into how something affects society. Sentiment analysis in Twitter mitigates the various issues of analyzing the tweets in terms of views expressed and several approaches have already been proposed for sentiment analysis in twitter. Resources used for analyzing tweet emotions are also briefly presented in literature survey section.… More
  •   Views:350       Downloads:206        Download PDF
  • Spark Spectrum Allocation for D2D Communication in Cellular Networks
  • Abstract The device-to-device (D2D) technology performs explicit communication between the terminal and the base station (BS) terminal, so there is no need to transmit data through the BS system. The establishment of a short-distance D2D communication link can greatly reduce the burden on the BS server. At present, D2D is one of the key technologies in 5G technology and has been studied in depth. D2D communication reuses the resources of cellular users to improve system key parameters like utilization and throughput. However, repeated use of the spectrum and coexistence of cellular users can cause co-channel interference. Aiming at the interference problem… More
  •   Views:321       Downloads:164        Download PDF