Advanced Search
Displaying 1-10 on page 1 of 2055. Per Page  
  • Blockchain-Based Flexible Double-Chain Architecture and Performance Optimization for Better Sustainability in Agriculture
  • Abstract Blockchain is an emerging decentralized distributed technology that can cross the boundaries and guarantee safe and trustworthy value transfers between participants. Combining the blockchain technology with the Internet of Things (IoT) technology to enhance the transparency and sustainability of agricultural supply chains, has attracted researchers from both academia and industry. This paper reviews the latest applications of the blockchain and IoT technologies in the sustainable agricultural supply chain management and explores the design and implementation of a blockchain-based sustainable solution. By placing the sustainable agricultural supply chain management at its core, a blockchain-based framework is designed. Considering the heterogeneity of…
  • More
  •   Views:199       Downloads:119        Download PDF
  • Kernel Entropy Based Extended Kalman Filter for GPS Navigation Processing
  • Abstract This paper investigates the kernel entropy based extended Kalman filter (EKF) as the navigation processor for the Global Navigation Satellite Systems (GNSS), such as the Global Positioning System (GPS). The algorithm is effective for dealing with non-Gaussian errors or heavy-tailed (or impulsive) interference errors, such as the multipath. The kernel minimum error entropy (MEE) and maximum correntropy criterion (MCC) based filtering for satellite navigation system is involved for dealing with non-Gaussian errors or heavy-tailed interference errors or outliers of the GPS. The standard EKF method is derived based on minimization of mean square error (MSE) and is optimal only under…
  • More
  •   Views:94       Downloads:90        Download PDF
  • A Link Analysis Algorithm for Identification of Key Hidden Services
  • Abstract The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical activities. The network has unfortunately become a means to perpetuate crimes like illegal drugs and firearm trafficking, violence and terrorist activities among others. The government and law enforcement agencies are working relentlessly to control the misuse of Tor network. This is a study in the similar league, with an attempt to suggest a link-based ranking technique to rank and identify the influential hidden services in the Tor dark web.…
  • More
  •   Views:134       Downloads:94        Download PDF
  • Deep Reinforcement Learning for Multi-Phase Microstructure Design
  • Abstract This paper presents a de-novo computational design method driven by deep reinforcement learning to achieve reliable predictions and optimum properties for periodic microstructures. With recent developments in 3-D printing, microstructures can have complex geometries and material phases fabricated to achieve targeted mechanical performance. These material property enhancements are promising in improving the mechanical, thermal, and dynamic performance in multiple engineering systems, ranging from energy harvesting applications to spacecraft components. The study investigates a novel and efficient computational framework that integrates deep reinforcement learning algorithms into finite element-based material simulations to quantitatively model and design 3-D printed periodic microstructures. These algorithms…
  • More
  •   Views:145       Downloads:84        Download PDF
  • Cloud-Based Diabetes Decision Support System Using Machine Learning Fusion
  • Abstract Diabetes mellitus, generally known as diabetes, is one of the most common diseases worldwide. It is a metabolic disease characterized by insulin deficiency, or glucose (blood sugar) levels that exceed 200 mg/dL (11.1 ml/L) for prolonged periods, and may lead to death if left uncontrolled by medication or insulin injections. Diabetes is categorized into two main types—type 1 and type 2—both of which feature glucose levels above “normal,” defined as 140 mg/dL. Diabetes is triggered by malfunction of the pancreas, which releases insulin, a natural hormone responsible for controlling glucose levels in blood cells. Diagnosis and comprehensive analysis of this…
  • More
  •   Views:177       Downloads:104        Download PDF
  • DeepFake Videos Detection Based on Texture Features
  • Abstract In recent years, with the rapid development of deep learning technologies, some neural network models have been applied to generate fake media. DeepFakes, a deep learning based forgery technology, can tamper with the face easily and generate fake videos that are difficult to be distinguished by human eyes. The spread of face manipulation videos is very easy to bring fake information. Therefore, it is important to develop effective detection methods to verify the authenticity of the videos. Due to that it is still challenging for current forgery technologies to generate all facial details and the blending operations are used in…
  • More
  •   Views:104       Downloads:94        Download PDF
  • Toward Optimal Cost-Energy Management Green Framework for Sustainable Future Wireless Networks
  • Abstract The design of green cellular networking according to the traffic arrivals has the capability to reduce the overall energy consumption to a cluster in a cost-effective way. The cell zooming approach has appealed much attention that adaptively offloads the BS load demands adjusting the transmit power based on the traffic intensity and green energy availability. Besides, the researchers are focused on implementing renewable energy resources, which are considered the most attractive practices in designing energy-efficient wireless networks over the long term in a cost-efficient way in the existing infrastructure. The utilization of available solar can be adapted to acquire cost-effective…
  • More
  •   Views:128       Downloads:105        Download PDF
  • Learning Unitary Transformation by Quantum Machine Learning Model
  • Abstract Quantum machine learning (QML) is a rapidly rising research field that incorporates ideas from quantum computing and machine learning to develop emerging tools for scientific research and improving data processing. How to efficiently control or manipulate the quantum system is a fundamental and vexing problem in quantum computing. It can be described as learning or approximating a unitary operator. Since the success of the hybrid-based quantum machine learning model proposed in recent years, we investigate to apply the techniques from QML to tackle this problem. Based on the Choi–Jamiołkowski isomorphism in quantum computing, we transfer the original problem of learning…
  • More
  •   Views:111       Downloads:92        Download PDF
  • Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective
  • Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process of security requirements. The consistency…
  • More
  •   Views:122       Downloads:80        Download PDF
  • Computer Vision-Control-Based CNN-PID for Mobile Robot
  • Abstract With the development of artificial intelligence technology, various sectors of industry have developed. Among them, the autonomous vehicle industry has developed considerably, and research on self-driving control systems using artificial intelligence has been extensively conducted. Studies on the use of image-based deep learning to monitor autonomous driving systems have recently been performed. In this paper, we propose an advanced control for a serving robot. A serving robot acts as an autonomous line-follower vehicle that can detect and follow the line drawn on the floor and move in specified directions. The robot should be able to follow the trajectory with speed…
  • More
  •   Views:181       Downloads:104        Download PDF
Displaying 1-10 on page 1 of 2055. Per Page