Advanced Search
Displaying 1-10 on page 1 of 12570. Per Page  

Articles / Online

  • Improved U-Net-Based Novel Segmentation Algorithm for Underwater Mineral Image
  • Abstract Autonomous underwater vehicle (AUV) has many intelligent optical system, which can collect underwater signal information to make the system decision. One of them is the intelligent vision system, and it can capture the images to analyze. The performance of the particle image segmentation plays an important role in the monitoring of underwater mineral resources. In order to improve the underwater mineral image segmentation performance, some novel segmentation algorithm architectures are proposed. In this paper, an improved mineral image segmentation is proposed based on the modified U-Net. The pyramid upsampling module and residual module are bring into the U-Net model, which…
  • More
  •   Views:21       Downloads:29        Download PDF
  • Bacterial Foraging Based Algorithm Front-end to Solve Global Optimization Problems
  • Abstract The Bacterial Foraging Algorithm (BFOA) is a well-known swarm collective intelligence algorithm used to solve a variety of constraint optimization problems with wide success. Despite its universality, implementing the BFOA may be complex due to the calibration of multiple parameters. Moreover, the Two-Swim Modified Bacterial Foraging Optimization Algorithm (TS-MBFOA) is a state-of-the-art modification of the BFOA which may lead to solutions close to the optimal but with more parameters than the original BFOA. That is why in this paper we present the design using the Unified Modeling Language (UML) and the implementation in the MATLAB platform of a front-end for…
  • More
  •   Views:18       Downloads:29        Download PDF
  • Actuator Fluid Control Using Fuzzy Feedback for Soft Robotics Activities
  • Abstract Soft robotics is a new field that uses actuators that are non-standard and compatible materials. Industrial robotics is high-throughput manufacturing devices that are quick and accurate. They are built on rigid-body mechanisms. The advancement of robotic production now depends on the inclusion of staff in manufacturing processes, allowing for the completion of activities that need cognitive abilities that are now beyond the scope of artificial networks. Hydrostatic pressure is used to achieve high deflections of structures that are based on the elastomeric in Fluid Actuators (FAs). Soft actuators based on the fluid are a popular choice safe for humans and…
  • More
  •   Views:27       Downloads:17        Download PDF
  • On NSGA-II and NSGA-III in Portfolio Management
  • Abstract To solve single and multi-objective optimization problems, evolutionary algorithms have been created. We use the non-dominated sorting genetic algorithm (NSGA-II) to find the Pareto front in a two-objective portfolio query, and its extended variant NSGA-III to find the Pareto front in a three-objective portfolio problem, in this article. Furthermore, in both portfolio problems, we quantify the Karush-Kuhn-Tucker Proximity Measure (KKTPM) for each generation to determine how far we are from the effective front and to provide knowledge about the Pareto optimal solution. In the portfolio problem, looking for the optimal set of stock or assets that maximizes the mean return…
  • More
  •   Views:16       Downloads:17        Download PDF
  • Analyzing the Implications of Healthcare Data Breaches through Computational Technique
  • Abstract The contributions of the Internet of Medical Things (IoMT), cloud services, information systems, and smart devices are useful for the healthcare industry. With the help of digital healthcare, our lives have been made much more secure and effortless and provide more convenient and accessible treatment. In current, the modern healthcare sector has become more significant and convenient for the purpose of both external and internal threats. Big data breaches affect clients, stakeholders, organisations, and businesses, and they are a source of concern and complication for security professionals. This research examines the many types and categories of big data breaches that…
  • More
  •   Views:15       Downloads:19        Download PDF
  • Fuzzy Logic for Underground Mining Method Selection
  • Abstract The Selection of the mining method for underground minerals extraction is the crucial task for the mining engineers. Underground minerals extraction is a multi-criteria decision making problem due to many criteria to be considered in the selection process. There are many studies on selection of underground mining method using Multi Criteria Decision Making (MCDM) techniques or approaches. Extracting minerals from the underground involves many geological characteristics also called as input parameters. The geological characteristics of any mineral deposit vary from one location to another location. Thus only one mineral extraction method is not suitable for different deposit characteristics. There are…
  • More
  •   Views:20       Downloads:27        Download PDF
  • Quantitative Evaluation of Mental-Health in Type-2 Diabetes Patients Through Computational Model
  • Abstract A large number of people live in diabetes worldwide. Type-2 Diabetes (D2) accounts for 92% of patients with D2 and puts a huge burden on the healthcare industry. This multi-criterion medical research is based on the data collected from the hospitals of Uttar Pradesh, India. In recent times there is a need for a web-based electronic system to determine the impact of mental health in D2 patients. This study will examine the impact assessment in D2 patients. This paper used the integrated methodology of Fuzzy Analytic Hierarchy (FAHP) and Fuzzy Technique for Order Performance by Similarity to Ideal Solution (FTOPSIS).…
  • More
  •   Views:6       Downloads:2        Download PDF
  • Improved Radio Resource Allocation in 5G Network Using Fuzzy Logic Systems
  • Abstract With recent advancements in machine-to-machine (M2M), the demand for fastest communication is an utmost concern of the M2M technology. The advent of 5G telecommunication networks enables to bridge the demand on satisfying the Quality-of-Service (QoS) concerns in M2M communication. The massive number of devices in M2M communication is henceforth do not lie under limited resource allocation by embedding the 5G telecommunication network. In this paper, we address the above limitation of allocation the resource to prominent M2M devices using Adaptive Neuro Fuzzy Inference System (ANFIS). In ANFIS, the adoption of rules will imply the resource allocation with the devices of…
  • More
  •   Views:8       Downloads:4        Download PDF
  • Ontology-Based Semantic Search Framework for Disparate Datasets
  • Abstract The public sector provides open data to create new opportunities, stimulate innovation, and implement new solutions that benefit academia and society. However, open data is usually available in large quantities and often lacks quality, accuracy, and completeness. It may be difficult to find the right data to analyze a target. There are many rich open data repositories, but they are difficult to understand and use because these data can only be used with a complex set of keyword search options, and even then, irrelevant or insufficient data may eventually be retrieved. To alleviate this situation, ontology-based semantic search has been…
  • More
  •   Views:6       Downloads:3        Download PDF
  • A Cost-Efficient Radiation Monitoring System for Nuclear Sites: Designing and Implementation
  • Abstract Radiation monitoring is essential for examining and refraining the unwanted situations in the vicinity of nuclear plants as high levels of radiation are quite dangerous for human beings. Meanwhile, Wireless Sensor Networks (WSNs) are proved to be an auspicious candidate to address that issue. Actually, WSNs are pretty beneficial to monitor an area with the aim of avoiding undesirable situations. In this paper, we have designed and implemented a cost-efficient radiation and the temperature monitoring system. We have used ZigBee to develop the sensor nodes, and the sensor nodes are instilled with the radiation and the temperature sensors. In addition,…
  • More
  •   Views:13       Downloads:5        Download PDF
Displaying 1-10 on page 1 of 12570. Per Page