Advanced Search
Displaying 1-10 on page 1 of 1815. Per Page  
  • A Novel Broadband Antenna Design for 5G Applications
  • Abstract Wireless communication is one of the rapidly-growing fields of the communication industry. This continuous growth motivates the antenna community to design new radiating structures to meet the needs of the market. The 5G wireless communication has received a lot of attention from both academia and industry and significant efforts have been made to improve different aspects, such as data rate, latency, mobility, reliability and QoS. Antenna design has received renewed attention in the last decade due to its potential applications in 5G, IoT, mmWave, and massive MIMO. This paper proposes a novel design of broadband antenna for 5G mmWave and…
  • More
  •   Views:111       Downloads:107        Download PDF
  • Methodology for Detecting Strabismus through Video Analysis and Intelligent Mining Techniques
  • Abstract Strabismus is a medical condition that is defined as the lack of coordination between the eyes. When Strabismus is detected at an early age, the chances of curing it are higher. The methods used to detect strabismus and measure its degree of deviation are complex and time-consuming, and they always require the presence of a physician. In this paper, we present a method of detecting strabismus and measuring its degree of deviation using videos of the patient’s eye region under a cover test. Our method involves extracting features from a set of training videos (training corpora) and using them to…
  • More
  •   Views:106       Downloads:91        Download PDF
  • Identifying Driver Genes Mutations with Clinical Significance in Thyroid Cancer
  • Abstract Advances in technology are enabling gene mutations in papillary thyroid carcinoma (PTC) to be analyzed and clinical outcomes, such as recurrence, to be predicted. To date, the most common genetic mutation in PTC is in BRAF kinase (BRAF). However, whether mutations in other genes coincide with those in BRAF remains to be clarified. The aim of this study was to find mutations in other genes that co-exist with mutated BRAF, and to analyze their frequency and clinical relevance in PTC. Clinical and genetic data were collected from 213 PTC patients with a total of 36,572 mutation sites in 735 genes.…
  • More
  •   Views:155       Downloads:89        Download PDF
  • Generic Attribute Scoring for Information Decay in Threat Information Sharing Platform
  • Abstract Cyber Threat Intelligence (CTI) has gained massive attention to collect hidden knowledge for a better understanding of the various cyber-attacks and eventually paving the way for predicting the future of such attacks. The information exchange and collaborative sharing through different platforms have a significant contribution towards a global solution. While CTI and the information exchange can help a lot in focusing and prioritizing on the use of the large volume of complex information among different organizations, there exists a great challenge ineffective processing of large count of different Indicators of Threat (IoT) which appear regularly, and that can be solved…
  • More
  •   Views:103       Downloads:104        Download PDF
  • An Online Chronic Disease Prediction System Based on Incremental Deep Neural Network
  • Abstract Many chronic disease prediction methods have been proposed to predict or evaluate diabetes through artificial neural network. However, due to the complexity of the human body, there are still many challenges to face in that process. One of them is how to make the neural network prediction model continuously adapt and learn disease data of different patients, online. This paper presents a novel chronic disease prediction system based on an incremental deep neural network. The propensity of users suffering from chronic diseases can continuously be evaluated in an incremental manner. With time, the system can predict diabetes more and more…
  • More
  •   Views:86       Downloads:74        Download PDF
  • Tele-COVID: A Telemedicine SOA-Based Architectural Design for COVID-19 Patients
  • Abstract In Wuhan, China, a novel Corona Virus (COVID-19) was detected in December 2019; it has changed the entire world and to date, the number of diagnosed cases is 38,756,2891 and 1,095,2161 people have died. This happened because a large number of people got affected and there is a lack of hospitals for COVID-19 patients. One of the precautionary measures for COVID-19 patients is isolation. To support this, there is an urgent need for a platform that makes treatment possible from a distance. Telemedicine systems have been drastically increasing in number and size over recent years. This increasing number intensifies the…
  • More
  •   Views:133       Downloads:77        Download PDF
  • An Efficient Sound and Data Steganography Based Secure Authentication System
  • Abstract The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication or QR authentication approaches. Firstly, a random signal is encrypted, and then it is transformed into…
  • More
  •   Views:161       Downloads:69        Download PDF
  • High Order Block Method for Third Order ODEs
  • Abstract Many initial value problems are difficult to be solved using ordinary, explicit step-by-step methods because most of these problems are considered stiff. Certain implicit methods, however, are capable of solving stiff ordinary differential equations (ODEs) usually found in most applied problems. This study aims to develop a new numerical method, namely the high order variable step variable order block backward differentiation formula (VSVO-HOBBDF) for the main purpose of approximating the solutions of third order ODEs. The computational work of the VSVO-HOBBDF method was carried out using the strategy of varying the step size and order in a single code. The…
  • More
  •   Views:87       Downloads:52        Download PDF
  • Hacking Anti-Shoplifting System to Hide Data within Clothes
  • Abstract Steganography has been used to prevent unauthorized access to private information during transmission. It is the scheme of securing sensitive information by concealing it within carriers such as digital images, videos, audio, or text. Current steganography methods are working by assigning a cover file then embed the payload within it by making some modifications, creating the stego-file. However, the left traces that are caused by these modifications will make steganalysis algorithms easily detect the hidden payload. Aiming to solve this issue, a novel, highly robust steganography method based on hacking anti-shoplifting systems has proposed to hide data within clothes. The…
  • More
  •   Views:113       Downloads:51        Download PDF
  • Collision Observation-Based Optimization of Low-Power and Lossy IoT Network Using Reinforcement Learning
  • Abstract The Internet of Things (IoT) has numerous applications in every domain, e.g., smart cities to provide intelligent services to sustainable cities. The next-generation of IoT networks is expected to be densely deployed in a resource-constrained and lossy environment. The densely deployed nodes producing radically heterogeneous traffic pattern causes congestion and collision in the network. At the medium access control (MAC) layer, mitigating channel collision is still one of the main challenges of future IoT networks. Similarly, the standardized network layer uses a ranking mechanism based on hop-counts and expected transmission counts (ETX), which often does not adapt to the dynamic…
  • More
  •   Views:132       Downloads:78        Download PDF
Displaying 1-10 on page 1 of 1815. Per Page