Over the years, there has been a global increase in the use of technology to deliver interventions for health and wellness, such as improving people’s mental health and resilience. An example of such technology is the Q-Life app which aims to improve people’s resilience to stress and adverse life events through various coping mechanisms, including ...
 Machine learning is widely deployed in society, unleashing its power in a wide rangeof applications owing to the advent of big data.One emerging problem faced by machine learning is the discrimination from data, and such discrimination is reflected in the eventual decisions made by the algorithms. Recent study has proved that increasing the size of...
 The availability of digital technology in the hands of every citizenry worldwide makes an availableunprecedented massive amount of data. The capability to process these gigantic amounts of data in real-time with Big Data Analytics (BDA) tools and Machine Learning (ML) algorithms carries many paybacks. However, the highnumber of free BDA tools, plat...
 Stereo matching is one of the longest-standing problems in computer vision with close to 40 years of studies and research. Throughout the years the paradigm has shifted from local, pixel-level decision to various forms of discrete and continuous optimization to data-driven, learning-based methods.Recently, the rise of machine learning and the rapid...
 Even though machine learning (ML) applications are not novel, they have gained popularity partly due to the advance in computing processing.This study explores the adoption of ML methods in marketing applications through a bibliographic review of the period 2008–2022. In this period, the adoption of ML in marketing has grown significantly. This gro...
 We present the Interactive Classification System (ICS), a web-based application that supports the activity of manual text classification.The application uses machine learning to continuously fit automatic classification models that are in turn used to actively support its users with classification suggestions. The key requirement we have establishe...
  In recent months, coronavirus disease 2019 (COVID-19) has infected millions of people worldwide. In addition to the clinical tests like reverse transcription- polymerase chain reaction (RT-PCR), medical imaging techniques such as computed tomography (CT) can be used as a rapid technique to detect and evaluate patients infected by COVID...
 Machine learning has been increasingly applied in identification of fraudulent transactions. However, most application systems detect duplicitous activities after they have already occurred, not at or near real time. Since spurious transactions are far fewer than the normal ones, the highly imbalanced data makes fraud detection very challenging and...
 This study aimed to develop accurate and explainable machine learning models for three psychomotor behaviors of delirium for hospitalized adult patients.A prospective pilot study was conducted with 33 participants admitted to a long-term care facility between August 10 and 25, 2020. During the pilot study, we collected 560 cases that included 33 cl...
 The rise of machine learning has unlocked new ways of analysing structural neuroimaging data, including brain age prediction. In this state-of-the-art review, we provide an introduction to the methods and potential clinical applications of brain age prediction. Studies on brain age typically involve the creation of a regression machine learning mod...
 Quantum computing is envisaged as an evolving paradigm for solving computationally complex optimization problems with a large-number factorization and exhaustive search.Recently, there has been a proliferating growth of the size of multi-dimensional datasets, the input-output space dimensionality, and data structures. Hence, the conventional machin...
 Machine learning (ML) algorithms are nowadays widely adopted in different contexts to perform autonomous decisions and predictions. Due to the high volume of data shared in the recent years, ML algorithms are more accurate and reliable since training and testing phases are more precise. An important concept to analyze when defining ML algorithms co...
 Machine learning and its subfield deep learning techniques provide opportunities for the development of operator mental state monitoring, especially for cognitive workload recognition using electroencephalogram (EEG) signals. Although a variety of machine learning methods have been proposed for recognizing cognitive workload via EEG recently, there...
 This paper presents a comparison of conventional and modern machine (deep) learning within the framework of anomaly detection in self-organizing networks. While deep learning has gained significant traction, especially in application scenarios where large volumes of data can be collected and processed, conventional methods may yet offer strong stat...
 The availability of digital technology in the hands of every citizenry worldwide makes an availableunprecedented massive amount of data. The capability to process these gigantic amounts of data in real-time with Big Data Analytics (BDA) tools and Machine Learning (ML) algorithms carries many paybacks. However, the highnumber of free BDA tools, plat...
 Background matting is a recently developed image matting approach, with applications to image and video editing. It refers to estimating both the alpha matte and foreground from a pair of images with and without foreground objects. Recent work has applied deep learning to background matting, with very promising performance achieved. However, existi...
 ? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
 We show that the classification performance of graph convolutional networks (GCNs) is related to the alignment between features, graph, and ground truth, which we quantify using a subspace alignment measure (SAM) corresponding to the Frobenius norm of the matrix of pairwise chordal distances between three subspaces associated with features, graph, ...
 Photonic crystal fibers (PCFs) are the specialized optical waveguides that led to many interesting applications ranging from nonlinear optical signal processing to high-power fiber amplifiers. In this paper, machine learning techniques are used to compute various optical properties including effective index, effective mode area, dispersion and conf...
 Monitoringthe depth of unconsciousnessduring anesthesia is beneficial in both clinical settings and neuroscience investigations to understand brain mechanisms. Electroencephalogram(EEG) has been used as an objective means of characterizing brain altered arousal and/or cognition states induced by anesthetics in real-time. Different general anestheti...
 Deep learning is recognized to be capable of discovering deep features for representation learning and pattern recognition without requiring elegant feature engineering techniques by taking advantage of human ingenuity and prior knowledge. Thus it has triggered enormous research activities in machine learning and pattern recognition. One of the mos...
 The need for medical image encryption is increasingly pronounced, for example to safeguard the privacy of the patients’ medical imaging data. In this paper, a novel deep learningbased key generation network (DeepKeyGen) is proposed as a stream cipher generator to generate the private key, which can then be used for encrypting and decrypting of medi...
 As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
 Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
 In this article, we evaluate the performance ofcombining several model compression techniques. The techni-ques assessed were dark knowledge distillation, pruning, andquantization. We use the classification of chest x-rays as ascenario of experimentation. From this scenario, we found thatthe combination of these three techniques yielded a new modelc...
 A number of electric devices in buildings can be considered as important demand response (DR) resources, for instance, the battery energy storage system (BESS) and the heat, ventilation, and air conditioning (HVAC) systems. The conventional model-based DR methods rely on efficient ondemand computing resources. However, the current buildings suffer ...
 A number of electric devices in buildings can be considered as important demand response (DR) resources, for instance, the battery energy storage system (BESS) and the heat, ventilation, and air conditioning (HVAC) systems. The conventional model-based DR methods rely on efficient ondemand computing resources. However, the current buildings suffer ...
 ? In the last decade, researchers, practitioners and companies struggled for devising mechanisms to detect cyber-security threats. Among others, those efforts originated rule-based, signature-based or supervised Machine Learning (ML) algorithms that were proven effective for detecting those intrusions that have already been encountered and characte...
 We show that the classification performance of graph convolutional networks (GCNs) is related to the alignment between features, graph, and ground truth, which we quantify using a subspace alignment measure (SAM) corresponding to the Frobenius norm of the matrix of pairwise chordal distances between three subspaces associated with features, graph, ...
 In this article, we evaluate the performance ofcombining several model compression techniques. The techni-ques assessed were dark knowledge distillation, pruning, andquantization. We use the classification of chest x-rays as ascenario of experimentation. From this scenario, we found thatthe combination of these three techniques yielded a new modelc...
 In this article, we evaluate the performance ofcombining several model compression techniques. The techni-ques assessed were dark knowledge distillation, pruning, andquantization. We use the classification of chest x-rays as ascenario of experimentation. From this scenario, we found thatthe combination of these three techniques yielded a new modelc...
 Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
 As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
 Monitoringthe depth of unconsciousnessduring anesthesia is beneficial in both clinical settings and neuroscience investigations to understand brain mechanisms. Electroencephalogram(EEG) has been used as an objective means of characterizing brain altered arousal and/or cognition states induced by anesthetics in real-time. Different general anestheti...
 Photonic crystal fibers (PCFs) are the specialized optical waveguides that led to many interesting applications ranging from nonlinear optical signal processing to high-power fiber amplifiers. In this paper, machine learning techniques are used to compute various optical properties including effective index, effective mode area, dispersion and conf...
 Background matting is a recently developed image matting approach, with applications to image and video editing. It refers to estimating both the alpha matte and foreground from a pair of images with and without foreground objects. Recent work has applied deep learning to background matting, with very promising performance achieved. However, existi...
 The fault occurred in transmission line is very much dangerous for the locality. In HV and EHV transmission line there are less fault occurrence but in locality the fault occurrence is more as compared to outer transmission line. In our prototype we design a model which is to be detect the fault in transmission line by comparing the voltage signal ...
 Deep neural Network (DNN) is becoming a focal point in Machine Learning research. Its application is penetrating into different fields and solving intricate and complex problems. DNN is now been applied in health image processing to detect various ailment such as cancer and diabetes. Another disease that is causing threat to our health is the kidne...
 In modern world, the IoT is at its peak. The world is becoming smarter, the home automation is emerging. Smart Door control system is a latest technology in home automation. The main purpose of smart Door technology is to provide a complete security to the door, ease and comfort for users. The aim of this paper is to enlarge the door automation tec...
 Offloading computation-intensive tasks (e.g., blockchain consensus processes and data processing tasks) to the edge/cloud is a promising solution for blockchain-empowered mobile edge computing. However, the traditional offloading approaches (e.g., auction-based and game-theory approaches) fail to adjust the policy according to the changing environ...
 This paper covers the design and implementation of an intelligent traffic management system for an isolated intersection. Vehicle Speed Detection is used to detect the speed of the running vehicle with the help of video and image processing techniques. We use camera to capture and analyzed the speed of the vehicle in real time. We detect the vehicl...
  One of the alarming threats to mankind and other living organisms is environmental pollution. Worldwide, textile industry is one of the main air and water pollutants. Its environmental effect is critical because it consumes considerable water for processing and discharges major polluted water. If the quality of those discharged water exceeds th...
 Environmental monitoring is must for all industries as its conditions majorly affect our prosperity, solace and efficiency. Because it is such an essential aspect that have an immense effect on health of operating personnel & other parameters like fire, smoke, dust and intruder detection along with weather forecasting in industries. But the systems...
 Building Energy Management System (BEMS) has been a substantial topic nowadays due to its importance in reducing energy wastage. However, the performance of one of BEMS applications which is energy consumption prediction has been stagnant due to problems such as low prediction accuracy. Thus, this research aims to address the problems by developing...
 This study aims at establishing an attendance system which can facilitate the administration data collection related to employee attendance effectively and efficiently. The method used descriptive scheme, interview and document analysis related to employee attendance to create an effective and efficient attendance system. The results obtained from ...
 Deep learning (DL) has proved successful in medical imaging and, in the wake of the recent COVID-19 pandemic, some works have started to investigate DL-based solutions for the assisted diagnosis of lung diseases. While existing works focus on CT scans, this paper studies the application of DL techniques for the analysis of lung ultra sonography (LU...
 Twitter is among the most used microblogging and online social networking services. In Twitter, a name, phrase, or topic that is mentioned at a greater rate than others is called a "trending topic" or simply “trend”. Twitter trends has shown their powerful ability in many public events, elections and market changes. Nevertheless, there has been ver...
 Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the...
 Offloading computation-intensive tasks (e.g., block chain agreement cycles and information handling undertakings) to the edge/cloud is a promising answer for block chain-enabled versatile edge figuring. Nonetheless, the conventional offloading approaches (e.g., sell off based and game-hypothesis draws near) neglect to change the strategy as per the...
 Image processing has been a crucial tool for refining the image or to boost the image. With the improvement of machine learning tools, the image processing task has been simplified to great range. Generating a semantic and photographic face image, from a sketch image or text description has always been an extremely important issue. Sketch images ba...
 Existing liquefied petroleum gas (LPG) detection systems are ad hoc and designed as stand-alone nodes. This article, however, presents an integrated end-to-end wireless sensor network (WSN) system that integrates hardware and software for early warning gas leakage detection and monitoring applications, fully utilizing the Internet of Things (IoT) f...
 Since stroke disease often causes death or serious disability, active primary prevention and early detection of prognostic symptoms are very important. Stroke diseases can be divided into ischemic stroke and hemorrhagic stroke, and they should be minimized by emergency treatment such as thrombolytic or coagulant administration by type. First, it is...
 Sun drying is perhaps one of the oldest methods of food preservation that has been practiced for centuries. The direct usage of solar radiation which is renewable and abundant favours farmers that harvest and process at small quantity. As technology advances, an alternative to sun drying evolves to maximize the potential of solar radiation and this...
 This Waste management is one of the serious challenges of the cities, the system now used in cities, we continue to use an old and outmoded paradigm that no longer serves the entail of municipalities, Still find over spilled waste containers giving off irritating smells causing serious health issues and atmosphere impairment. The Smart Waste Manage...
 Plastics have remained the material of choice, and after serving their intended purpose, a large proportion ends up in the environment where they persist for centuries. The packaging industry is the largest and growing consumer of synthetic plastics derived from fossil fuels. Food packaging plastics account for the bulk of plastic waste that are po...
 The Initial Strategy on reduction of greenhouse gas (GHG) emissions from ships adopted by the International Maritime Organization (IMO) in 2018 commits the IMO to reduce total GHG emissions of shipping by at least 50% by 2050. Though the direction of the Strategy is clear, the path to implementation remains uncertain. The ambitious IMO’s target cal...
 This study reviews the scientific literature for business models contributing to sustainable plastic management and suggests avenues for future research. We define sustainable plastic management (SPM) as any technique along the waste hierarchy seeking to minimize the environmental damage of plastic material. Limited cases were found during the lite...
 Food wastage and its accumulation are becoming a critical problem around the globe due to continuous increase of the world population. The exponential growth in food waste is imposing serious threats to our society like environmental pollution, health risk, and scarcity of dumping land. There is an urgent need to take appropriate measures to reduce...
 There is something that we still don’t see: food wasted by restaurants, shops or industries. There is also something we can see: food wasted by ourselves. This is the range focus of communities, through the management of wasted products of catering firms. Now a days people are aware of importance of food but there are no platform to share informati...
 The rapidly growing biofuel industry poses considerable challenges to its supply chain network design and operations. In this chapter, we introduce key characteristics of the biofuel supply chain that comprises of feedstock production, biomass logistics, biofuel production and distribution. We then discuss the recent literature on biofuel supply ch...
 The main purpose of the Smart Pill Box System project is helping patients with bipolar disorder or other illnesses to create their motivation to take medicine. Moreover, caregivers can take care of the patients more conveniently. Patients can use the application to setup the notification time for medication. Then the application will send the prese...
 The main purpose of the Smart Pill Box System project is helping patients with bipolar disorder or other illnesses to create their motivation to take medicine. Moreover, caregivers can take care of the patients more conveniently. Patients can use the application to setup the notification time for medication. Then the application will send the prese...
 Monitoring various parameters of the patient using internet of things. In the patient monitoring system based on Internet of things project, the real-time parameters of patient’s health are sent to cloud using Internet connectivity. These parameters are sent to a remote Internet location so that user can view these details from anywhere in the worl...
 Eventually a day's a consequence of a general temperature alteration and atmosphere changes there are attempting conditions in field of coal mine. To decrease the cost and improve the productivity close by thing quality the atomization in the field of coal mine is irrefutably essential, which will in addition reduce the mine laborers endeavors. Thi...
 There are many countries enforcing a regulation that requires the bike rider to wear a helmet when riding on their bike. With this reason, this project is specially developed as to improve the safety of the bike rider. The impact when bike involves in a high speed accident without wearing a helmet is very dangerous and can cause fatality. Wearing a...
 This paper reviewed literature from 1999 to 2014 inclusively on how Speech-to-Text Recognition (STR) technology has been applied to enhance learning. The first aim of this review is to understand how STR technology has been used to support learning over the past fifteen years, and the second is to analyze all research evidence to understand how Spe...
 Aerial security means performing security-aimed monitoring and surveillance operations with the help of airborne vehicles. This kind of activities suggest that human officers (security organizations, law enforcement, police etc.) would be able to remotely monitor and view video and data acquired from Drones while planning and evaluating their opera...
 Traffic big data has brought many opportunities for traffic management applications. However several challenges like heterogeneity, storage, management, processing and analysis of traffic big data may hinder their efficient and real-time applications. All these challenges call for well-adapted distributed framework for smart traffic management that...
 The Rural Banking introduced in villages to give good and better services to the people for the development of their agriculture sector or to help for their small-scale business. The banking sector in India has witnessed a complete transformation both in its functioning and delivery of services to their customers.The banking services in rural areas...
 This project was developed in a way that the robot is controlled by voice commands. An android application with a microcontroller is used for required tasks. The connection between the android app and the vehicle is facilitated with Bluetooth technology. The robot is controlled by buttons on the application or by spoken commands of the user. The mo...
 Stress is one of the factors that affect human health in many aspects. It is considered as one of the culprits in increasing the risk of getting sick that could probably lead to critical physical or mental illnesses. Stress can be experienced everywhere and in different circumstances. Hence, stress should be controlled and managed by monitoring its...
 During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires block...
 This paper covers the design and implementation of an intelligent traffic management system for an isolated intersection. The vehicular traffic management system employs Field Programmable Gate Array (FPGA) as the central decision-making unit and combines its speed and high number of I/O with other system components such as the ESP8266 Wi-Fi module...
 In today's technical era, every startup or a company attempt to establish a better sort of communication between their Plants and the users, and for that purpose, they require a type of mechanism which can promote their plant effectively, and here the recommender system serves this motive. It is basically a filtering system that tries to predict an...
 This paper is intended to monitor Heart beat with android application which is used to measure the heart beat of different persons. It is built using Android Studio. It may also include the different modules based on the software specification, system requirement, hardware requirement and disk space....
 Medical Surveillance Solutions are the most important in the brief developing country populace enhances demands for caretaking. Covid-19 is as a substitute contagious it is very important to quarantine covid-19 humans but at the equal time medical examiners need to check fitness of covid-19 sufferers moreover. With the boosting kind of instances it...
 Identity-based remote data auditing schemes can verify data integrity and provide a simple identity authentication and management for multiple users. However, prior works on identity-based remote data auditing lack the support of dynamic operations. In these schemes, tag generation is linked to the index of data block, which is related to update op...
 Manual inspection of textiles is a long, tedious, and costly method. Technology has solved this problem by developing automatic systems for textile inspection. However, Jacquard fabrics present a challenge because patterns can be complex and seemingly random to systems. Only a few in-depth studies have been conducted on jacquard fabrics despite the...
 Motorcycle accidents have been rapidly growing through the years in many countries. In India more than 37 million people use two wheelers. Therefore, it is necessary to develop a system for automatic detection of helmet and triples wearing for road safety. Therefore, a custom object detection model is created using a Machine learning based algorith...
  Over the past decades, fire cannot be prevented in our homes and society. Hence, the author came up with an idea to create a robot that will serve as first responder to fire and hazardous chemicals. Problems were identified and objectives were formulated as guides in the establishment “Automated Hazardous Gas Detecting Robot using Wireless Sens...
 The city’s district attraction ranking plays an essential role in the city’s government because it can be used to reveal the city’s district attraction and thus help government make decisions for urban planning in terms of the smart city. The traditional methods for urban planning mainly rely on the district’s GDP, employment rate, population densi...
 Mobile ad-hoc networks (MANET) is a network mode that does not depend on network infrastructure and central access. The fast and flexible networking mode of MANET renders its wide applications in specific scenarios. However, rapidly changing topology and open channels bring potential security problems. In this paper, we proposed an active-routing a...
 Hotspot mapping is a popular analytical technique that is used to help identify where to target police and crime reduction resources. In essence, hotspot mapping is used as a basic form of crime prediction, relying on retrospective data to identify the areas of high concentrations of crime and where policing and other crime reduction resources shou...
 Typical approaches to visual vehicle tracking across large area require several cameras and complex algorithms to detect, identify and track the vehicle route. Due to memory requirements, computational complexity and hardware constrains, the video images are transmitted to a dedicated workstation equipped with powerful graphic processing units. How...
 Currently, the development of mobile applications heavily relies on using conventional computers as development platform. MobiDev enables people in emerging countries without access to a computer but to a cell phone to develop their own locally relevant applications. The goal of the MobiDev project is to simplify development and deployment of appli...
 This article deals with multimedia data, which combines basic functions with high quality graphics, sound, video and animation and definitions of multimedia. Also deals with multimedia characteristics, network technology – Ethernet, Provisioning and ATM, bandwidth needs and multimedia networking along with data transfers protocols. Right issues for...
 In present industry, communication is the key element to progress. Passing on information, to the right person, and in the right manner is very important, not just on a corporate level, but also on a personal level. The world is moving towards digitization, so are the means of communication. Phone calls, emails, text messages etc. have become an in...
 This paper investigates the applicability of machine-driven Speech Emotion Recognition (SER) towards the augmentation of theatrical performances and interactions (e.g. controlling stage color /light, stimulating active audience engagement, actors’ interactive training, etc.). For the needs of the classification experiments, the Acted Emotional Spee...
 In this paper, we describe a surveillance program which is to be designed that can automatically detect the gestures or signs of aggression and brutality on real time. A single CCTV human operator can handle very limited set of operations, so as the number of CCTV camera increases the need of the human intervention also increases which can also cau...
 This conceptual paper exclusively focused on how artificial intelligence (AI) serves as a means to identify a target audience. Focusing on the marketing context, a structured discussion of how AI can identify the target customers precisely despite their different behaviors was presented in this paper. The applications of AI in customer targeting an...
 Recently, automatic vehicle location (AVL) has become more widely used, affordable and popular than ever before. AVL is used for different tracking purposes, especially for those related to tracking one vehicle or a fleet of vehicles. Tracking system technology was made possible by the integration of three new technologies: navigational technologie...
 Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such t...
 Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere an...
 Student’s attendance tracking is a vital issue in order to monitor students’ performance in the classroom as well as in their studies. It becomes a key concern because the university authority maintains a rule that one student can only attend in the exam if his/her attendance is higher or equal to several percentages (60%,70% or 80% etc.) otherwise...
 Due to Increase in the amount of data in the field of genomics, meteorology, biology, environmental research and many others, it has become difficult to find, analyse patterns, associations within such large data. Interesting association is to be found in the large data sets to draw the pattern and for knowledge purpose. The benefit of analysing th...
 Bus provides eco-friendly, cheap, convenient, time-effective means of transportation. Bus lack regularization and management, due to which they increased the burden on public transportation system. Unusual and unexpected conditions on the roads affect the smooth operation of the bus system and the movement of vehicles. Problems faced by passengers ...
 Networking, which is one of the most significant aspects of information technology revolution, is developing increasingly day after day. This is because it offers a huge amount of knowledge, resources and human experiences. On the one hand, it contains a considerable amount of harmful content, because of misusing. On the other hand, sitting for a l...
 Changes in consumer preference for safe food have led to innovations in packaging technologies. This article reviews about different smart packaging systems and their applications in food packaging, packaging research with latest innovations. Active and intelligent packing are such packaging technologies which offer to deliver safer and quality pro...
 The agriculture sector faces many challenges such as crop diseases, pest infestation, water shortage, weeds and many more. These problems lead to substantial crop loss, economic loss and also causes severe environmental hazards due to the current agriculture practices. The AI and Robotics technologies have the potential to solve these problems effi...
 The primary driver for innovations in the formal sector is credited to the institution of patenting. Intellectual property rights (IPRs) as the extrinsic motivational factor have supported innovations by firms and industries which have a large market and resources to commercialise their products. Grassroots innovations, on the other hand, represent...
 They exist as an integral form of rural development that offers a valuable framework for GIs. These are unique expression of local agro-ecological and cultural characteristics that have come to be evaluated and protected in many countries throughout the world. A GI is a unique and important form of collective intellectual and cultural property, wit...
 Decision support tools, usually considered to be software-based, may be an important part of the quest for evidence-based decision-making in agriculture to improve productivity and environmental outputs. These tools can lead users through clear steps and suggest optimal decision paths or may act more as information sources to improve the evidence b...
 The Telkomsel's RAFI/NARU dashboard problem in Sumbagsel Regional that was built with the LAMP web platform model caused a lag when page loading in the web browser, and blinking when the page refreshed and lacks support for the mobile roadmap. Therefore, this paper will design an alternative real time dashboard for monitoring the Telkomsel's RAFI/N...
 The technology based modern agriculture industries are today’s requirement in every part of agriculture in Bangladesh. In this technology, the disease of plants is precisely controlled. Due to the variable atmospheric circumstances these conditions sometimes the farmer doesn’t know what type of disease on the plant and which type of medicine provid...
 This study provides a broad perspective on the main trends regarding the use of pesticides in developing countries and their impacts on human health and food security. Information is provided on the challenges of controlling these hazardous substances, along with the extent to which pesticides banned within the European Union (EU) are exported to t...
 In recent years, our insight into these shifts and their impact on water availability has increased. However, a similar detailed understanding of the seasonal pattern in water demand is surprisingly absent. This hampers a proper assessment of water stress and ways to cope and adapt. In this study, the seasonal pattern of irrigation-water demand res...
 Management of groundwater systems requires realistic conceptual hydrogeological models as a framework for numerical simulation modelling, but also for system understanding and communicatin g this to stakeholders and the broader community. To help overcome these challenges we developed GVS (Groundwater Visualisation System), a stand-alone desktop so...
 Integrating advanced simulation techniques and data analysis tools in a freeware Geographic Information System (GIS) provides a valuable contribution to the management of conjunctive use of groundwater (the world's largest freshwater resource) and surface-water. To this aim, we describe here the FREEWAT (FREE and open source software tools for WATe...
 This study has been undertaken to develop Sustainable Waste Water treatment. Most of the river basins in India and elsewhere are closing or closed and experiencing moderate to severe water shortages, brought on by the simultaneous effects of agricultural growth, industrialization and urbanization. Current and future fresh water demand could be met ...
 Attendance management is the act of managing attendance or presence in a work setting, which maximizes and motivates employee attendance thereby minimizing loss. Not only does it affect productivity, it can cost the company profits or even additional contracts. For the industrial sector attendance management system can develop alacrity among the wo...
 The availability of new technologies far the measurement of surface elevation has addressed the lack of high-resolution elevation data, which has led to an increase in the attraction of automated procedures based on digital elevation models (DEMs) far hydrological applications, including the delineation of floodplains. In particular, the exposure t...
 The building permission process is to a large extent an analogue process where much information is handled in paper format or as pdf files. With the ongoing digitalisation in society, there is a potential to automate this process by integrating Building Information Models (BIM) of planned buildings and geospatial data to check if a building conform...
  Computer as a medium for language learning has been acknowledged by many educators in the past years. Using computers for language learning has proved not only interesting but also positive and stimulating for many language teachers and learners. The present paper tries to show the impact/s of computers in the field of second and foreign langua...
 Mobile crowd-sensing (MCS) has appeared as a prospective solution for large-scale data collection, leveraging built-in sensors and social applications in mobile devices that enables a variety of Internet of Things (IoT) services. However, the human involvement in MCS results in a high possibility for unintentionally contributing corrupted and falsi...
 Covid 19 Patients are facing a many problem of daily checkup like travelling, waiting in the queue. so we are developing this project. In this system a patient will be carrying hardware having sensors and android phone application, the sensors will sense the body temperature, Blood Pressure, Respiration rate and heart pulse rate of patient and thes...
 Covid 19 Patients are facing a many problem of daily checkup like travelling, waiting in the queue. so we are developing this project. In this system a patient will be carrying hardware having sensors and android phone application, the sensors will sense the body temperature, Blood Pressure, Respiration rate and heart pulse rate of patient and thes...
 The term Web 2.0 describes web-based applications such as social networking sites, wikis, and blogs that facilitate collaboration, creativity, and sharing among users. Web 2.0 applications are often enabled by reusing content from other web-based applications or web services. This trend is largely parallel to the principles of service-oriented arch...
 There is a need for automatic systems that can reliably detect, track and classify fish and other marine species in underwater videos without human intervention. Conventional computer vision techniques do not perform well in underwater conditions where the background is complex and the shape and textural features of fish are subtle. Data-driven cla...
 The aim of the study is to identify the opportunities and challenges a local government public asset manager is most likely to deal with when adopting the appropriate Public Asset Management Framework especially in developing countries. In order to achieve its aim, this study employs a Case Study in Indonesia for collecting all data i.e. interviews...
  In the paper, GSM Modem SMS Alert aims to build a system that monitors voltage and provides a breakpoint based low and high voltage tripping mechanism that avoids any damage to the load and sends a text message (SMS) to alert the user whenever the condition of under-voltage or overvoltage occurs. There is a chance of damaging electro...
 The primary objective is to detect the vitals of the body by using non invasive measures. It will filled with multiple sensors which will measure body temperature, heart rate, Accelerometer to health condition and upload in database. When the device senses a level of heart rate , it will alert the player who will be able to take measures to prevent...
 Coal mining has always been a necessary evil. We need the coal for various operations, especially electrical power generation. However mining the coal has proven to be very dangerous and has caused many accidental deaths over the years. Keeping this in mind we have designed an intelligent system which can be used on helmets of these underground coa...
 This paper presents the design and implementation of Modular Multilevel Inverter (MMI) to control the Induction Motor (IM) drive using intelligent techniques towards marine water pumping applications. The proposed inverter is of eleven levels and has the ability to control the speed of an IM drive which is fed from solar photovoltaics. It is estima...
 Objective of the project is to fabricate a motorized high speed 4-way hacksaw machine and to automate and to modify the conventional power hacksaw machine in order to achieve high productivity of work-pieces than the power hacksaw machine using cam mechanism. The operator need not measure the length of the work-piece that is to be cut and to load a...
 This paper describes the design and practical application of a dual-stage H-Bridge (DSHBR) circuit to reduce the rectification losses and mitigate ripples in piezoelectric energy harvesting. The proposed DSHBR circuit integrates both AC-DC and DC-DC conversion processes using bidirectional switches and a step-up DC-DC converter, which applies to bo...
 This brief describes a critical signal processing circuit without any automatic signal processing or ultra-wideband (UWB) pulse-based radar algorithm for simultaneous dc/near-dc exclusion and out-of-band interference removal. As a secure and balanced pseudo resistor applied under a servo feedback mechanism in a critical signal receiver of the sensi...
 This paper proposes an improved three-stages cascading passivity-based control (PBC) for a grid -connected LCL converter in unbalanced weak grid condition. In general, the traditional double-loop control based on positive and negative sequence transformations is used in grid-connected converter control in unbalanced weak grid condition. However, it...
 A poly-phase based interpolation filter computation involves an input-matrix and coefficient-matrix of size (P×M) each, where P is the up-sampling factor and M=N/P, N is the filter length. The input-matrix and the coefficient-matrix resizes when P changes. An analysis of interpolation filter computation for different up-sampling factors is made in ...
 This paper presents a fully pipelined color demosaicking design. To improve the quality of reconstructed images, a linear deviation compensation scheme was created to increase the correlation between the interpolated and neighboring pixels. Furthermore, immediately interpolated green color pixels are first to be used in hardware-oriented color demo...
 The reliability of NAND Flash memory deteriorates due to multi-level cell technique and advanced manufacturing technology. To deal with more errors, LDPC codes show superior performance to conventional BCH codes as ECC of NAND Flash memory systems. However, LDPC codec for NAND Flash memory systems faces problems of high redesign effort, high on-chi...
 Digital multipliers are among the most critical arithmetic functional units. The overall performance of these systems depends on the throughput of the multiplier. Meanwhile, the negative bias temperature instability effect occurs when a pMOS transistor is under negative bias (Vgs = -Vdd), increasing the threshold voltage of the pMOS transistor, and...
 This paper presents a novel low-complexity cross parity code, with a wide range of multiple bit error correction capability at a lower overhead, for improving the reliability in circuits over GF(2m). For an m input circuit, the proposed scheme can correct m = Dw = 3m/2 -1 multiple error combinations out of all the possible 2m - 1 errors, which is s...
 In this brief, the implementation of residue number system reverse converters based on well-known regular and modular parallelprefix adders is analyzed. The VLSI implementation results show a significant delay reduction and area × time2 improvements, all this at the cost of higher power consumption, which is the main reason preventing the use of pa...
 Interconnections are increasingly the dominant contributor to delay, area and energy consumption in CMOS digital circuits. Multiple-valued logic can decrease the average power required for level transitions and reduces the number of required interconnections, hence also reducing the impact of interconnections on overall energy consumption. In this ...
 Behavior of adiabatic logic circuits in weak inversion or subthreshold regime is analyzed in depth for the first time in the literature to make great improvement in ultralowpower circuit design. This novel approach is efficacious in low-speed operations where power consumption and longevity are the pivotal concerns instead of performance. The schem...
 This paper proposes an efficient constant multiplier architecture based on vertical-horizontal binary common sub-expression elimination (VHBCSE) algorithm for designing a reconfigurable finite impulse response (FIR) filter whose coeffi- cients can dynamically change in real time. To design an efficient reconfigurable FIR filter, according to the pr...
 Due to the channel achieving property, the polar code has become one of the most favorable error-correcting codes. As the polar code achieves the property asymptotically, however, it should be long enough to have a good error-correcting performance. Although the previous fully parallel encoder is intuitive and easy to implement, it is not suitable ...
 This paper presents a novel approach to design obfuscated circuits for digital signal processing (DSP) applications using high-level transformations, a key-based obfuscating finite-state machine (FSM), and a reconfigurator. The goal is to design DSP circuits that are harder to reverse engineer. Highlevel transformations of iterative data-flow graph...
 This paper proposes a low-power and area-efficient shift register using pulsed latches. The area and power consumption are reduced by replacing flip-flops with pulsed latches. This method solves the timing problem between pulsed latches through the use of multiple non-overlap delayed pulsed clock signals instead of the conventional single pulsed cl...
 The dedicated short-range communication (DSRC) is an emerging technique to push the intelligent transportation system into our daily life. The DSRC standards generally adopt FM0 and Manchester codes to reach dcbalance, enhancing the signal reliability. Nevertheless, the coding-diversity between the FM0 and Manchester codes seriously limits the pote...
 Iterative methods are basic building blocks of communication systems and often represent a dominating part of the system, and therefore, they necessitate careful design and implementation for optimal performance. In this brief, we propose a novel field programmable gate arrays design of matrix–vector multiplier that can be used to efficiently imple...
 Iterative methods are basic building blocks of communication systems and often represent a dominating part of the system, and therefore, they necessitate careful design and implementation for optimal performance. In this brief, we propose a novel field programmable gate arrays design of matrix–vector multiplier that can be used to efficiently imple...
 In this paper, we introduce an architecture of pre-encoded multipliers for Digital Signal Processing applications based on off-line encoding of coefficients. To this extend, the Non-Redundant radix-4 Signed-Digit (NR4SD) encoding technique, which uses the digit values {-1, 0, +1, +2} or {-2, -1, 0, +1}, is proposed leading to a multiplier design wi...
 As the circuit complexity increases, the number of internal nodes increases proportionally, and individual internal nodes are less accessible due to the limited number of available I/O pins. To address the problem, we proposed power line communications (PLCs) at the IC level, specifically the dual use of power pins and power distribution networks f...
 For multiplier dominated applications such as digital signal processing, wireless communications, and computer applications, high speed multiplier designs has always been a primary requisite. In this paper a high performance 64x64 bit redundant binary (RB) multiplier have been designed by using recently proposed redundant binary encoding approach t...
 The field of approximate computing has received significant attention from the research community in the past few years, especially in the context of various signal processing applications. Image and video compression algorithms, such as JPEG, MPEG, and so on, are particularly attractive candidates for approximate computing, since they are tolerant...
 The application of residue number system (RNS) to digital signal processing lies in the ability to operate on signed numbers. However, the available RNS-to-binary (reverse) converters have been designed for unsigned numbers, which means that they do not produce signed outputs. Usually, some additional circuits are introduced at the output of the re...
 In this paper, we describe a new approach to reduce dynamic power, leakage, and area of application-specified integrated circuits, without sacrificing performance. The approach is based on a design of threshold logic gates (TLGs) and their seamless integration with conventional standard-cell design flow. We first describe a new robust, standard-cel...
 Field-programmable gate arrays (FPGAs) are increasingly used as the computing platform for fast and energyefficient execution of recognition, mining, and search applications. Approximate computing is one promising method for achieving energy efficiency. Compared with most prior works on approximate computing, which target approximate processors and...
 This brief presents the key concept, design strategy, and implementation of reconfigurable coordinate rotation digital computer (CORDIC) architectures that can be configured to operate either for circular or for hyperbolic trajectories in rotation as well as vectoring-modes. It can, therefore, be used to perform all the functions of both circular a...
 Single error correction (SEC) codes are widely used to protect data stored in memories and registers. In some applications, such as networking, a few control bits are added to the data to facilitate their processing. For example, flags to mark the start or the end of a packet are widely used. Therefore, it is important to have SEC codes that protec...
 This brief presents a fast and power-efficient voltage levelshifting circuit capable of converting extremely low levels of input voltages into high output voltage levels. The efficiency of the proposed circuit is due to the fact that not only the strength of the pull-up device is significantly reduced when the pull-down device is pulling down the o...
 This paper presents the design of a fully integrated electrocardiogram (ECG) signal processor (ESP) for the prediction of ventricular arrhythmia using a unique set of ECG features and a naive Bayes classifier. Real-time and adaptive techniques for the detection and the delineation of the P-QRS-T waves were investigated to extract the fiducial point...
 Hardware acceleration has been proved an extremely promising implementation strategy for the digital signal processing (DSP) domain. Rather than adopting a monolithic application-specific integrated circuit design approach, in this brief, we present a novel accelerator architecture comprising flexible computational units that support the execution ...
 This paper presents a fixed-point reconfigurable parallel VLSI hardware architecture for real-time Electrical Capacitance Tomography (ECT). It is modular and consists of a front-end module which performs precise capacitance measurements in a time multiplexed manner using Capacitance to Digital Converter (CDC) technique. Another FPGA module performs...
 Transpose-form finite impulse response (FIR) structures are inherently pipelined and support multiple constant multiplication (MCM) results in significant saving of computation. However, transpose-form configuration does not directly support the block processing unlike direct-form configuration. In this paper, we explore the possibility of realizat...
 Content-addressable memory (CAM) is the hardware for parallel lookup/search. The parallel search scheme promises a high-speed search operation but at the cost of high power consumption. Parallel NOR- and NAND-type matchline (ML) CAMs are suitable for high-search-speed and low-power-consumption applications, respectively. The NOR-type ML CAM require...
 A high-speed, low-power, and highly reliable frequency multiplier is proposed for a delay-locked loop-based clock generator to generate a multiplied clock with a high frequency and wide frequency range. The proposed edge combiner achieves a high-speed and highly reliable operation using a hierarchical structure and an overlap canceller. In addition...
 A ternary content addressable memory (TCAM) speeds up the search process in the memory by searching through prestored contents rather than addresses. The additional don’t care (X) state makes the TCAM suitable for many network applications but the large amount of cell requirement for storage consumes high power and takes a large design area. This p...
 Single-stage regulator topologies are often preferred in embedded applications due to their low power consumption with a single-pole behavior, resulting in easy frequency compensation. Since the achievable differential gain from a single stage is low, the dc load regulation is poor over a wide dynamic range. This paper presents a single-stage, adap...
 Inverter-based implementation of operational transconductance amplifiers is an attractive approach for low voltage realization of analog subsystems. However, the high sensitivity of inverter like amplifiers’ performance to process and temperature variations limit the achievable performance of the whole system across process and temperature corners....
 Continuous transistor scaling, coupled with the growing demand for low-voltage, low-power applications, increases the susceptibility of VLSI circuits to soft-errors, especially when exposed to extreme environmental conditions, such as those encountered by space applications. The most vulnerable of these circuits are memory arrays that cover large a...
 Data-driven clock gated (DDCG) and multibit flip-flops (MBFFs) are two low-power design techniques that are usually treated separately. Combining these techniques into a single grouping algorithm and design flow enables further power savings. We study MBFF multiplicity and its synergy with FF data-to-clock toggling probabilities. A probabilistic mo...
 Ring oscillators (ROs) are popular due to their small area, modest power, wide tuning range, and ease of scaling with process technology. However, their use in many applications is limited due to poor phase noise and jitter performance. Thermal noise and flicker noise contribute jitter that decreases inversely with oscillation frequency. This paper...
 Ultralow-power subthreshold logic circuits are becoming prominent in embedded applications with limited energy budgets. Minimum energy consumption of digital logic circuits can be obtained by operating in the subthreshold regime. However, in this regime process variations can result in up to an order of magnitude variations in ION/IOFF ratios leadi...
  This paper presents a wide-voltage-range, fast-transient all-digital buck converter using a high-resolution digital pulsewidth modulator (DPWM). The converter employs the multithreshold-voltage band-control technique to shorten its transient response. The DPWM uses an all-digital delay-locked loop (ADDLL) to control its cycle. The usage of ADDL...
 In this paper, a new design procedure has been proposed for realization of logarithmic function via three phases: 1) differentiation; 2) division; and 3) integration for any arbitrary analog signal. All the basic building blocks, i.e., differentiator, divider, and integrator, are realized by operational transconductance amplifier, a current mode de...
 The previously proposed average-8T static random access memory (SRAM) has a competitive area and does not require a write-back scheme. In the case of an average-8T SRAM architecture, a full-swing local bitline (BL) that is connected to the gate of the read buffer can be achieved with a boosted wordline (WL) voltage. However, in the case of an avera...
 In practical CCTV applications, there are problems of the camera with low resolution, camera fields of view, and lighting environments. These could degrade the image quality and it is difficult to extract useful information for further processing. Super-resolution techniques have been proposed widely by the researchers. However, many approaches are...
 A novel 8-transistor (8T) static random access memory cell with improved data stability in subthreshold operation is designed. The proposed single-ended with dynamic feedback control 8T static RAM (SRAM) cell enhances the static noise margin (SNM) for ultralow power supply. It achieves write SNM of 1.4× and 1.28× as that of isoarea 6T and read-deco...
 In this paper, a closed-form expression for estimating the minimum operating voltage (VDDmin) of D flip-flops (FFs) is proposed. VDDmin is defined as the minimum supply voltage at which the FFs are functional without errors. The proposed expression indicates that VDDmin of FFs is a linear function of the square root of logarithm of the number of FF...
 In this brief, we propose a low-complexity methodology to compute a complex square root using only a circular coordinate rotation digital computer (CORDIC) as opposed to the state-of-the-art techniques that need both circular as well as hyperbolic CORDICs. Subsequently, an architecture has been designed based on the proposed methodology and impleme...
 Approximate arithmetic has recently emerged as a promising paradigm for many imprecision-tolerant applications. It can offer substantial reductions in circuit complexity, delay and energy consumption by relaxing accuracy requirements. In this paper, we propose a novel energy-efficient approximate multiplier design using a significance-driven logic ...
 Designing reliable systems, while eschewing the high overheads of conventional fault tolerance techniques, is a critical challenge in the deeply scaled CMOS and post-CMOS era. To address this challenge, we leverage the intrinsic resilience of application domains such as multimedia, recognition, mining, search, and analytics where acceptable outputs...
 Parallel matrix processing is a typical operation in many systems, and in particular matrix–vector multiplication (MVM) is one of the most common operations in the modern digital signal processing and digital communication systems. This paper proposes a faulttolerant design for integer parallel MVMs. The scheme combines ideas from error correction ...
 This paper proposes an all-digital phase-locked loop (ADPLL) used as the phase-shift keying (PSK) receiver for very high bit rate (VHBR) of 13.56 MHz smartcards. A detailed implementation from system to circuit level is presented. This ADPLL-based PSK demodulator mainly consists of a high dynamic range time to digital converter (TDC) without pulse ...
 Split-radix fast Fourier transform (SRFFT) is an ideal candidate for the implementation of a low-power FFT processor, because it has the lowest number of arithmetic operations among all the FFT algorithms. In the design of such processors, an efficient addressing scheme for FFT data as well as twiddle factors is required. The signal flow graph of S...
 Approximate computing can decrease the design complexity with an increase in performance and power efficiency for error resilient applications. This brief deals with a new design approach for approximation of multipliers. The partial products of the multiplier are altered to introduce varying probability terms. Logic complexity of approximation is ...
 Stochastic computing (SC) is a digital computation approach that operates on random bit streams to perform complex tasks with much smaller hardware footprints compared with conventional binary radix approaches. SC works based on the assumption that input bit streams are independent random sequences of 1s and 0s. Previous SC efforts have avoided imp...
 In this paper, we propose an approximate multiplier that is high speed yet energy efficient. The approach is to round the operands to the nearest exponent of two. This way the computational intensive part of the multiplication is omitted improving speed and energy consumption at the price of a small error. The proposed approach is applicable to bot...
 In this paper, we propose four 4:2 compressors, which have the flexibility of switching between the exact and approximate operating modes. In the approximate mode, these dual-quality compressors provide higher speeds and lower power consumptions at the cost of lower accuracy. Each of these compressors has its own level of accuracy in the approximat...
 A floating-point fused dot-product unit is presented that performs single-precision floating-point multiplication and addition operations on two pairs of data in a time that is only 150% the time required for a conventional floating-point multiplication. When placed and routed in a 45nm process, the fused dot-product unit occupied about 70% of the ...
 Reversible logic is a computing paradigm that has attracted significant attention in recent years due to its properties that lead to ultra-low power and reliable circuits. Reversible circuits are fundamental, for example, for quantum computing. Since addition is a fundamental operation, designing efficient adders is a cornerstone in the research of...
 The paper introduces structure characteristics and the basic principles of the finite impulse response (FIR) digital filter, and gives an efficient FIR filter design based on FPGA. Use MATLAB FDATool to determine filter coefficients, and designed a 16-order constant coefficient FIR filter by VHDL language, take use of QuartuslI to simulate filters,...
 In this brief, based on upset physical mechanism together with reasonable transistor size, a robust 10T memory cell is first proposed to enhance the reliability level in aerospace radiation environment, while keeping the main advantages of small area, low power, and high stability. Using Taiwan Semiconductor Manufacturing Company 65-nm CMOS commerc...
 The modern real time applications related to image processing and etc., demand high performance discrete wavelet transform (DWT). This paper proposes the floating point multiply accumulate circuit (MAC) based 1D/2D-DWT, where the MAC is used to find the outputs of high/low pass FIR filters. The proposed technique is implemented with 45 nm CMOS tech...
 In this paper, novel circuits for XOR/XNOR and simultaneous XOR–XNOR functions are proposed. The proposed circuits are highly optimized in terms of the power consumption and delay, which are due to low output capacitance and low short-circuit power dissipation. We also propose six new hybrid 1-bit full-adder (FA) circuits based on the novel full-sw...
 Currently, faults suffered by SRAM memory systems have increased due to the aggressive CMOS integration density. Thus, the probability of occurrence of single-cell upsets (SCUs) or multiple-cell upsets (MCUs) augments. One of the main causes of MCUs in space applications is cosmic radiation. A common solution is the use of error correction codes (E...
 Globalization of microchip fabrication opens the possibility for an attacker to insert hardware Trojans into a chip during the manufacturing process. While most defensive methods focus on detection or prevention, a recent method, called Randomized Encoding of Combinational Logic for Resistance to Data Leakage (RECORD), uses data randomization to pr...
 Approximate circuits provide high performance and require low power. Sum-of-products (SOP) units are key elements in many digital signal processing applications. In this brief, three approximate SOP (ASOP) models which are based on the distributed arithmetic are proposed. They are designed for different levels of accuracy. First model of ASOP achie...
 A scalable approximate multiplier, called truncation- and rounding-based scalable approximate multiplier (TOSAM) is presented, which reduces the number of partial products by truncating each of the input operands based on their leading one-bit position. In the proposed design, multiplication is performed by shift, add, and small fixed-width multipl...
 Approximate addition is a technique to trade off energy consumption and output quality in error-tolerant applications. In prior art, bit truncation has been explored as a lever to dynamically trade off energy and quality. In this brief, an innovative bit truncation strategy is proposed to achieve more graceful quality degradation compared to stateo...
 In this paper, a new pseudorandom number generator (PRNG) based on the logistic map has been proposed. To prevent the system to fall into short period orbits as well as increasing the randomness of the generated sequences, the proposed algorithm dynamically changes the parameters of the chaotic system. This PRNG has been implemented in a Virtex 7 f...
 We present a novel generalization of quadrature oscillators (QVCO) which we call “arbitrary phase oscillator” or APO for short. In contrast to a QVCO which generates only quadrature phases, the APO is capable of continuously generating any desired phase at its output. The proposed structure employs a novel coupling mechanism to generate arbitrary p...
 The conventional six-transistor static random access memory (SRAM) cell allows high density and fast differential sensing but suffers from half-select and read-disturb issues. Although the conventional eight-transistor SRAM cell solves the read-disturb issue, it still suffers from low array efficiency due to deterioration of read bit-line (RBL) swi...
 A nanopower CMOS 4 th -order lowpass filter suitable for biomedical applications is presented. The filter is formed by cascading two types of subthreshold current-reuse biquadratic cell. Each proposed cell is capable of neutralizing the bulk effect that induces the passband attenuation. The nearly 0 dB passband gain can thus be maintained while the...
 This paper proposes a time-to-digital converter (TDC) that achieves wide input range and fine time resolution at the same time. The proposed TDC utilizes pulse-shrinking (PS) scheme in the second stage for a fine resolution and two-step (TS) architecture for a wide range. The proposed PS TDC prevents an undesirable nonuniform shrinking rate issue i...
 In this paper, a novel radiation-hardened 14-transistor SRAM bitcell with speed and power optimized [radiation-hardened with speed and power optimized (RSP)-14T] for space application is proposed. By circuit- and layout-level optimization design in a 65-nm CMOS technology, the 3-D TCAD mixed-mode simulation results show that the novel structure is ...
 Approximate circuits have been considered for applications that can tolerate some loss of accuracy with improved performance and/or energy efficiency. Multipliers are key arithmetic circuits in many of these applications including digital signal processing (DSP). In this paper, a novel approximate multiplier with a low power consumption and a short...
 Conventionally, fixed-width adder-tree (AT) design is obtained from the full-width AT design by employing direct or post-truncation. In direct-truncation, one lower order bit of each adder output of full-width AT is post-truncated, and in case of post-truncation, {p} lower order-bits of final-stage adder output are truncated, where p = dlog2 Ne and...
 A CMOS fully integrated all-pass filter with an extremely low pole frequency of 2 Hz is introduced in this paper. It has 0.08-dB passband ripple and 0.029-mm2Si area. It has 0.38-mW power consumption in strong inversion with ±0.6-V power supplies. In subthreshold, it has 0.64-µW quiescent power and operates with ±200-mV dc supplies. Miller multipli...
 As the device dimension is shrinking day by day the conventional transistor based CMOS technology encounters serious hindrances due to the physical barriers of the technology such as ultra-thin gate oxides, short channel effects, leakage currents & excessive power dissipation at nano scale regimes. Quantum Dot Cellular Automata is an alternate chal...
 Multiply–accumulate (MAC) computations account for a large part of machine learning accelerator operations. The pipelined structure is usually adopted to improve the performance by reducing the length of critical paths. An increase in the number of flip-flops due to pipelining, however, generally results in significant area and power increase. A la...
 Due to limited frequency resources, new services are being applied to the existing frequencies, and service providers are allocating some of the existing frequencies for newly enhanced mobile communications. Because of this frequency environment, repeater and base station systems for mobile communications are becoming more complicated, and frequenc...
 In recent times the concept of smart cities have gained grate popularity. The ever increasing population has led to chaotic city traffic. As a result of the process of searching a parking lot becomes tedious. It is time consuming task leading to discomfort. The fuel consumption is on an increasing side due to such scenarios. The increase in vehicul...
  This paper aims to develop a tool for predicting accurate and timely traffic flow Information. Traffic Environment involves everything that can affect the traffic flowing on the road, whether it’s traffic signals, accidents, rallies, even repairing of roads that can cause a jam. If we have prior information which is very near approximate about a...
 We consider the problem of forecasting high frequency sampled mobile cellular traffic starting from a lower frequency sampled time series. We use a dataset of real downlink/uplink traffic traces obtained from a mobile cellular network and apply different methodologies for performing forecasts at different sampling frequencies. Through extensive eva...
 Stress is one of the factors that affect human health in many aspects. It is considered as one of the culprits in increasing the risk of getting sick that could probably lead to critical physical or mental illnesses. Stress can be experienced everywhere and in different circumstances. Hence, stress should be controlled and managed by monitoring its...
 Solar energy is a promising alternative energy source for a sustainable pollution-free future. But certain factors such as solar irradiation, lack of sunlight during night hours etc. degrade or diminish the scope of solar power. To address with this problem MPPT technique is used here. Due to the requirements of high efficiency, reliability, power ...
  In recent times, with the increase of Artificial Neural Network (ANN), deep learning has brought a dramatic twist in the field of machine learning by making it more artificially intelligent. Deep learning is remarkably used in vast ranges of fields because of its diverse range of applications such as surveillance, health, medicine, sports, robo...
 Subsequent to the introduction of Bit coin, the field of cryptocurrency has seen unprecedented growth. Mobile applications known as wallets often facilitate user interaction to these crypto currencies. With a perceived real world value these wallets are a target for attackers. Unlike mainstream financial services applications, cryptocurrency wallet...
 As getting the information from various research papers and other sources we analysis that many peoples want to buy a plants and they directly concerned to nursery but sometimes people doesn’t know specific information about particular plant items as well seller is not technically skilled. Customer doesn’t compare plants pricing with different shop...
 Internet is speeding up and modifying the manner in which daily tasks such as online shopping, paying utility bills, watching new movies, communicating, etc., are accomplished. As an example, in older shopping methods, products were mass produced for a single market and audience but that approach is no longer viable. Markets based on long product a...
 As object recognition technology has developed recently, various technologies have been applied to autonomous vehicles, robots, and industrial facilities. However, the benefits of these technologies are not reaching the visually impaired, who need it the most. In this paper, we proposed an object detection system for the blind using deep learning t...
 Hemoglobin can be measured normally after the analysis of the blood sample taken from the body and this measurement is named as invasive. Hemoglobin must continuously be measured to control the disease and its progression in people who go through hemodialysis and have diseases such as oligocythemia and anemia. This gives a perpetual feeling of pain...
 One common interest in radiography is producing radiographs with as low as possible radiation exposures to patients. In clinical practices, radiation exposure factors are preset for optimal image qualities to avoid underexposures which will lead to repeating examinations hence increasing radiation exposures to patients. Underexposed radiographs mai...
 Mobility for blind and elderly people is a problem as they have to face many difficulties in their day to day life. Most commonly, stick is use by blind and elderly people as a support for their body to stand and walk. The most common disadvantage of walking stick is user should have to be in close proximity of obstacle so that he can sense the loc...
 Wireless sensor networks (WSN) are integral part of Industrial Internet of Things (IIOT), the said networks comprise of elements possessing low power processors. WSNs are used for gathering data in the monitoring region, using which vital information about the sensor and the monitoring region can be attained (placement of the sensor node is critica...
 Nowadays, we are facing security issues in every aspect. So we have to resolve these issues by using updated technology. In this project, we are using the Face recognition module to capture human images and to compare with stored database images. The most important of feature of any home security system is to detect the people who enter or leave th...
 Hospital patients can have catheters and lines inserted during the course of their admission and serious complications can arise if they are positioned incorrectly. Early recognition of malpositioned tubes is the key to preventing risky complications (even death), even more so now that millions of COVID-19 patients are in the need of these tubes an...
 The grid-connected electric vehicle charging stations are being integrated into renewable energy for preserving the conventional energy resources as well as to ensure sustainable development of the society. In addition to the effortless charging, the sudden demand variations in the grid can be met by the renewable energy storage system in the charg...
 A detailed accumulation of the methods of wireless power transfer (WPT) including short range as well as mid range transmission . The technology and the science behind WPT and the future scope is discussed in detail. While a lot of research has been done on this topic in the previous decade, a large part of it is yet to be explored. The topics furt...
 With the rapid development of wireless communication technology, people's life has undergone great changes. In recent years, the comfort and safety of the building environment have become a universal concern. However, building fire is the greatest threat to building safety. In consideration of the current issues on building security, the design app...
  In this paper, we design a home outlet and a LED array lamp controlled by hand gesture recognition with a smart phone that has a system composed of two parts: a smart phone's application and a wireless remote control unit (WRCU). The application can read the accelerometer and gyroscope in a smart phone by means of hand gesture recognition and s...
 This paper aims at realization of the Automated Teller Machine network all around the globe using IPv6, thereby reducing the complexity and total number of transactions involved in the entire process of cash withdrawal. But the major challenge involved in connecting ATM network to public domain is the security. A Near-Field Communication (NFC) is p...
 Active safety is an important feature of a modern vehicle to provide precaution warning or compensatory control before the pre-crash stage of vehicle safety. All vehicle signals and information are acquired by several in-vehicle sensors on ECUs or surrounding vehicles, and integrated in vehicle gateway throu...
 This paper gives the design and implementation of embedded voice controlled system using ARM cortex A7 for visually impaired and physically challenged people. ARM cortex A7 has features such as low power consuming than its predecessor and based on ARM v7 architecture, also it is a quad core processor. The system uses Google’s speech ...
 The proposed work is focused on automatic speed control of vehicles by detecting the accident prone zone. In this work we are using RF for indicating the speed limit areas. The RF receiver is placed inside the vehicle. The speed is calculated by the help of vehicle speedometer in the vehicle. The controller compares the speed with standard speed li...
 In the present day scenario all the members of family are busy with their work and are not getting proper time to clean the house. The cleaning robot helps to clean and mop the floor. This is done by simply pressing a switch and the robot does the work. This also cuts down the labor used in factories for cleaning floor. Above being the case, motiva...
 The application of embedded web technology in the remote monitoring system has given rise to the technological change in the field of industrial control. Nowadays the management of the domestic laboratories in the research institute and universities has issues of poor real time, high cost and low precision. This paper comes up...
 In 1930's, Mr. Luther G. Simijian initiated building first of kind and not so successful version of Tellering machine. He did register related patents. He initially came up with an idea of machine fixed in a wall called as "Hole in the wall machine." It would allow customer to make financial transaction without entering the bank. John S. Barron had...
 One of the alarming threats to mankind and other living organisms is environmental pollution. Worldwide, textile industry is one of the main air and water pollutants. Its environmental effect is critical because it consumes considerable water for processing and discharges major polluted water. If the quality of those discharged water exceeds the pr...
 Due to advancement in technology, elevators are used in order to reduce human efforts for climbing steps of large buildings. The elevator being electrical equipment has a possibility to stop working during its operation resulting in entrapment of passenger. To rescue the entrapper an escalation has to be done to concern department or person or an i...
 The main objective is to design a monitoring system for storage atmosphere. Controlled storage atmosphere means constant monitoring of storage environment and adjust accordingly to maintain the atmospheric parameter such as temperature, relative humidity etc. Several actuators are used for controlling the above parameters. The design and implementa...
 The motivation for this project came from the countries where economy is based on agriculture and the climatic conditions lead to lack of rains & scarcity of water . Irrigation is moreover the backbone of Agricultural industry .Due to inadequate knowledge of proper utilization of water resource, lots of water is wastage in the application of irriga...
 In automobile field, the security and theft prevention are one of the main areas in current scenario. The security goals are achieved by the GSM, GPS technology. But it is commonly used for the four wheeler and not in the two wheeler. Using these technologies, we can only track and monitor the vehicle. Previously, GPS is used to get the current pos...
 This paper presents the extensions added to the measurement and monitoring tool TestelDroid, to support remote control and instrumentation of Android devices. The extensions include support for Standard Commands for Programmable Instruments (SCPI), cOntrol and Management Framework (OMF) and OMF Measurement Library (OML). SCPI is the most widespread...
 This paper presents a proposal for integration of Android into vehicle infotainment systems. The proposed system offers infotainment functionality, while enabling users to use the device as a regular Android device. The proposal includes a specification of a Java API that should be used to access in-vehicle related content from Android applications...
 A prototype of pulse measurement and data management system is built on Arduino platform and Android device. It is provided with functions of pulse measurement, data storage and share in local device and online cloud server. Among the system, first a smart pulse sensing module with a Bluetooth interface is designed to measure pulse rate and peak va...
 The purpose of this study is to design a prototype of a mobile robot equipped with a robotic arm which can be controlled by wireless technology. In this scheme, the mobile robot in the form of 6 Wheel Drive Robot equipped with robotic arm 6 Degree of Freedom and is controlled wirelessly through remote control based on XBee Pro Series 1. Data on the...
 The increasing importance in ubiquitous computing and context-dependent information has led in the last years to a growing interest in location-based applications and services. A considerable market demand concentrates on indoor localization tasks. In this setting, WiFi fingerprinting is currently one of the most popular and widespread techniques a...
  The main aim of the paper is the development of an overall routing system which accepts input from common users via a simple android application and as a result directs the nearest vacant Cab towards the passenger. In this project two algorithms for the implementation of our project have been developed. The first algorithm is an autonomous route...
 Health monitoring systems have rapidly evolved recently, and smart systems have been proposed to monitor patient current health conditions, in our proposed and implemented system, we focus on monitoring the patient’s blood pressure, and his body temperature. Based on last decade statistics of medical records, death rates due to hypertensive heart d...
 This paper presents a smart home management system in which a community broker role is used for integrating community services, thereby reducing the workload of community management staff, providing electronic information services, and deepening the community’s integration with the surrounding environment. At the home end, a home intranet was creat...
 This paper presents a low cost and flexible home control and monitoring system using an embedded micro-web server, with IP connectivity for accessing and controlling devices and appliances remotely using Android based Smart phone app. The proposed system does not require a dedicated server PCwith respect to similar systems and offer...
 Nowadays, Robots are used in many industries for various purposes. Inspection is the one of the field in which robot used as the inspector. One application is monitoring the inside of the pipe, Recognizing and solving problem through interior of the pipe. So, Inspection of pipe can be achieved by using wheel operated robot. Various p...
 Home automation technology is becoming as synonymous with sustainability as it is with convenience. Incorporating smart home technology into a new or existing structure makes it easier to reduce energy consumption by WSN. The main role of the sensor network that senses physical parameters estimating user behavior for future period...
 Shopping mall is a place where people get their daily necessities. There has been an emerging demand for quick and easy payment of bills in shopping malls. Quite often, when shopping in a supermarket shoppers are frustrated at locating the items on the shopping list and no assistance is available. To overcome these problems we hav...
 Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. As security is becoming the primary concern of society and hence having a security system is becoming a big requirement. Video surveillance plays a vital role in securi...
 In the current scenario, automation plays major role in various sectors because of provide reliable products, performing hazardous tasks, and monitoring continuously without relaxation. These properties of automation have made the industries to adopt this technique for their profits and benefits. In some Org...
 This project gives the idea about Detection of various disease on grape field. Also provide the information about how to control this disease. India exported so many tons of grape every year. So, Grape played vital role in economic condition of country. But, because of disease the Grape quality is decrease so that we cannot exported this grape in f...
 In today’s world Automatic system is ubiquitous communication over manual system. The IoT can assist in integration of communications, control, and information processing across various systems. The Internet of Things allows objects to be sensed and controlled remotely. Wireless Home Automation system(WHAS) using I...
 In this paper, we proposed an LPG Gas Weight and Leakage Detection System Using GSM .This is useful in various applications in homes and hotels. Many times it happens that because of the rush or due to the shortage of cylinder, there is a delay in providing the gas cylinder. Main reason behind this is delay in informing to the gas provider or we in...
 Any distribution network is prone to faults, and intermittency in power availability creates loss for the supplier as well as user. Majorly, a supply line can be effected by conditions of overvoltage and overcurrent, also under-voltage condition. During the occurrence of any fault, the incident goes unreported for long duration. Manual reporting ca...
 This paper presents the technical construction of the vehicle controlled by user mobile. The designed GSM based vehicle could be operated from almost anywhere if GSM network exists. The procedure commences with initiating a call from the cell phone which is auto received by GSM module stacked in the vehicle. In the course of a call, if any of the k...
 The concept of a Smart City highlights the need to enhance quality, interconnection and performance of various urban services with the use of information and communication technologies (ICT). Smart City technologies promote cloud-based and Internet of Things (IoT) based services in which real-world user interfaces use smart phones, sensors and RFID...
 Wireless Sensor Networks (WSNs) have been employed in a wide range of applications due to the low-cost and ease of installation features. One of the applications is in the road safety and highways, in a wide range of scenarios. In this paper, an IoT-based system for collision detection on guardrails is presented. The developed system implements an ...
 This paper presents the creation of a CAN network for monitoring parameters route of cargo vehicles. By decree of law, all cargo vehicles must contain tachograph device that collects and records all information practiced during the trip, such as speed, distance, RPM (rotations per minute), among other parameters. The data provided by the tachograph...
 The integration of decentralized generation units and the application of demand response programs brings changes to the power systems. Microgrids are emerging with relevant advantages for the power system operation. For this reason, several research projects are currently studding and finding methods to improve microgrids management. The developmen...
 Recently, the frequent coal mine safety accidents have caused serious casualties and huge economic losses. It is urgent for the global mining industry to increase operational efficiency and improve overall mining safety. This paper proposes a lightweight mashup middleware to achieve remote monitoring and control automation of underground physical s...
 In this paper, the design of a new upper limb rehabilitation system is presented. The developed system is an exoskeleton with two degrees of freedom that can be used for diagnosis, physical therapy, and outcome evaluation. The system is dedicated to the patients with paraplegia of their upper extremities due to stroke or any disorders of the centra...
 Sudden Infant Death Syndrome (SIDS) is one of the major causes of death among infants during their sleep. To increase the safety of the infants, we matched different emergent research fields for the development of Baby Night Watch. This Smart Wearable System (SWS), developed under the context of the European Texas Instruments Innovation Challenge (...
 A home automation system for smart grid is designed and implemented. The system monitors temperature and humidity and controls air conditioning, lights and appliances. The Message Queuing Telemetry Transport protocol and Djanjo web framework are used. A graphical user interface is developed to enable the user to control the devices remotely via a w...
 Observing activities of working vehicles on a work site, such as a factory, is important in regard to managing the lifetime of vehicles and achieving high operational availability. However, it is a problem that an administrator cannot completely grasp the activities of a working vehicle. Existing systems cannot cover a large area, particularly in a...
 An interference-mitigated ZigBee based Advanced Metering Infrastructure solution, namely IMM2ZM, has been developed for high traffics smart metering. The IMM2ZM incorporates multi-radios multi-channels network architecture and features an interference mitigation design by using multi-objective optimization. To evaluate the performance of the networ...
 Nowadays, home appliances manufacturers are increasingly relying on wireless sensor network and single chip embedded technologies to build smart environment. Many existing systems are already in the market, however, they were designed without envisioning the need of residents with special needs. This work presents a framework that enables the integ...
 The development of telemonitoring via wireless body area networks (WBANs) is an evolving direction in personalized medicine and home-based mobile health. A WBAN consists of small, intelligent medical sensors which collect physiological parameters such as EKG (electrocardiogram), EEG (electroencephalography) and blood pressure. The recorded physiolo...
 Traditional top-k algorithms, e.g., TA and NRA, have been successfully applied in many areas such as information retrieval, data mining and databases. They are designed to discover k objects, e.g., top-k restaurants, with highest overall scores aggregated from different attributes, e.g., price and location. However, new emerging applications like q...
 Cloud storage is an application of clouds that liberates organizations from establishing in-house data storage systems. However, cloud storage gives rise to security concerns. In case of group-shared data, the data face both cloud-specific and conventional insider threats. Secure data sharing among a group that counters insider threats of legitimat...
 Cryptography is the essential subject for network information security to protect important data. Although following the symmetric cryptosystem for which the participations in the communication keep exactly the same keys, the special for the encryption and decryption algorithms proposed in this paper lays in the operational objectives, the quantum ...
 Marketing scholars are increasingly recognizing the importance of investigating phenomena at multiple levels. However, the analyses methods that are currently dominant within marketing may not be appropriate to dealing with multilevel or nested data structures. We identify the state of contemporary multilevel marketing research, fi nding that typic...
 To review and critically appraise published and preprint reports of prediction models for diagnosing coronavirus disease 2019 (covid-19) in patients with suspected infection, for prognosis of patients with covid-19, and for detecting people in the general population at risk of being admitted to hospital for covid-19 pneumonia. Design Rapid systemat...
 Data mining plays the key role in crime analysis. There are various number of different algorithm in previous research papers like virtual identifier, pruning strategy, support vector machines and apriori algorithms. “VID” (Virtual ID) is to find relationship between record. Then the “Apriori algorithm is used to around six hundred seconds to detec...
 Current banking data management on loan approval processes has great room for improvements of information quality and prevention of data problems in general, but especially with regards to fair lending and fair pricing practices. We first review briefly typical data collection protocols deployed at many financial institutions for loan approval and ...
 Agriculture is the backbone of Indian economy. Due to global warming and climate change traditional farming in the regular months have been distorted and crops have been ruined is the most common phrase seen today. This not only gives economic losses but also the main reason for farmer sucide. Now agriculture needs support, time has come for techno...
 Agriculture is the backbone of Indian economy. Due to global warming and climate change traditional farming in the regular months have been distorted and crops have been ruined is the most common phrase seen today. This not only gives economic losses but also the main reason for farmer sucide. Now agriculture needs support, time has come for techno...
 Generally, the electronic technology has been implemented to automate the traditional systems. So, different copy of management systems in different scope were presented. These systems include the services provided to company as well as people, such as, healthcare. The traditional data management systems for pharmacy as example, suffer from the cap...
 This paper deals with the design of Internet billing system, in which it is possible pay invoices electronically. This approach is implemented via virtual banks, in which the process of money transfer can be implemented. In other hand many applications can be realize such as; deposit e-money, withdrawal e-money and determine account balance. A Gate...
 With the increased popularity of online social networks, spammers find these platforms easily accessible to trap users in malicious activities by posting spam messages. In this work, we have taken Twitter platform and performed spam tweets detection. To stop spammers, Google SafeBrowsing and Twitter’s BotMaker tools detect and block spam tweets. Th...
 The evolution of distributed architectures and programming paradigms for performance-oriented program development, challenge the state-of-the-art technology for performance tools. The area of high performance computing is rapidly expanding from single parallel systems to clusters and grids of heterogeneous sequential and parallel systems. Performan...
 In modern days, people are getting too busy in their works but still they need to spend time in shopping malls. In Shopping malls, customers face a difficulty to follow a queue for the process of billing, which takes a long time under huge crowd. Customer thought that, to avoid the standing time in the billing section at shopping malls. To overcome...
 E-Leave Management System and Payroll (E-LMSP) project is a web application and mobile application which can be used for all the organization or company that will ease the employees leave management. This is due to the problem in using manual system which can cause damage, missing and can be costly as well. In addition, it also will cause delay in ...
 To simplify examination hall allotment and seating arrangement for the student, an application for automatic seating arrangement is developed. Using the above application, the examination information of a particular student in a particular class can be accessed. Main aim of the project is to assign the student, exam hall which is hassle free. Becau...
 Smart card data is increasingly used to investigate passenger behavior and the demand characteristics of public transport. The destination estimation of public transport is one of the major concerns for the implementation of smart card data. In recent years, numerous studies concerning destination estimation have been carried out—most automatic far...
 Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the da...
 Web Based Career Guidance is very important to our Educational System. We have an existing Manual Career Guidance System with human counselors in charge, but this system is plagued with the following problems: few number of human counselors, unavailability of a counselor in a good number of schools, few number of counselors attending to students du...
 The main aim of the project is to build an interaction between alumni, admin and the students; a system that will be able to manage alumni data of a college and provide easy access to the same. The alumni will also be interested to maintain relations with their institutions. Alumni can communicate to the students regarding job opportunities and the...
 Food waste has a significant detrimental economic, environmental and social impact. Recent efforts in HCI research have examined ways of influencing surplus food waste management. In this paper, we conduct a research survey to investigate and compare the effectiveness of existing approaches in food waste management throughout its lifecycle from agr...
 The digital age or the 4.0 industry makes its presence felt in all areas of the economy, making serious contributions to its development. The automotive industry is in a phase of change, acting on all its sub-industries such as the automotive tyre industry. We are witnessing a process in which large companies no longer sell a simple car or basic ty...
 Our aim is to replace the traditional notice board with E-notice board. Now no need to maintain number of accounts for sharing information and all college related news, now it will be accessible anywhere anytime just on a single click on your android device. Just install “College notification App” on your android device and you can access all notic...
 Vehicle tracking system is a well-established technology in this era which is used by fleet system and owner of vehicle all over the world. It is a very safe and reliable technology. In our thesis we are going to design a system which is used for tracking and positioning of any vehicle by using Global Positioning System [GPS] and Global System for ...
 In many application areas mobile robots need the ability to interact with people. In order to be able to communicate with even untrained users, the interaction should be as natural as possible. One of the preconditions of a natural interaction is that the robot focuses the person it is interacting with. In this paper we present a technique that com...
 We have developed a smart ration card the usage of Radio Frequency identity (RFID) method to save you the ration forgery as there are probabilities that the shopkeeper may additionally promote the cloth to a person else and take the profit and put a few false amount of their statistics. In this device, a RFID tag is used that includes the member of...
 Managing and controlling the final year projects of students using manual or traditional process is a very tedious job. The main aim of this project is to create an automated system for managing all the activities of projects. Project management system is a system for managing, controlling, monitoring the final year projects of students. It is a we...
 The positive or negative outcome that a firm experiences, depends mostly on the ability of making appropriate decision. The particular area of this research interest is, however, relies on the application of linear programming techniques for textile dyed fabrics to create efficient resource utilization mechanism for textile sector to improve their ...
 With the advancement of information and communication technology, life is getting simpler in all aspects. The rapid increase in the number of users on the internet over the past decade has made the internet as a part of human life. Home Automation using the Internet of Things (IoT) is a system that uses a smartphone device or pc to control basic ho...
 The information and intelligent requirement of modern residence is improving with the development of computer and property management. It is becoming the key problem for property companies how to implement the intelligent property information management. In this paper, we present a framework of property management information system based-on E-busi...
 The project deals with the I-Factor followed for an IT firm and also with the profit and process management followed for a firm. The Software companies will be in need of the hardware resources from the different client and the problem faced by the company is they will be unable to get the complete requirements of the hardware as due to finance to ...
 Every cooperate organization, institution or government agency requires data and good quality information to function effectively. It is not an over statement to say that many organizations, institutions or government agencies have become critically dependent on the use of database system for their successes especially in the hospital. Data collect...
  The paper deals with the newest ìkiller applicationî ñ professional service automation (PSA). The solution concept is explained, and the existing and potential users are identified as well as the benefits realized by users. Next the situation on the market is analyzed, main existing solutions are categorized and strength and weaknesses of the m...
 The development of School Event Notification through SMS is beneficial to students, teachers, and parents in receiving firsthand information from the school right into their mobile phone. With the use of SMS Notification, students will be notified with the upcoming events of the school, changes in schedule of events, and suspension of classes due t...
 Election is a process of selecting the right candidate to rule our nation. The voting system in India is insecure, because voters need to stand in a queue for a long time and the only security check is voter ID verification, which are fake nowadays. To overcome this we are introducing Online voting system which provides security, authentication, ac...
 Invoicing and billing application for different business purposes helps mainly the service providers and freelancers to manage, send professional invoices online, and track its status. Generally, all the small companies in Saudi Arabia facing a various issues for managing and tracking the invoice status of customers, which mostly back to the lacks ...
 In Petrol Pump management system, the main objective is to acquaint our user with various detail of our system. Ij which the software enables the manager of petrol pump to make reasonable decision made within a no time frame for sales, CNG, fuels like petrol, diesel, employee and should be updated towards system. In this Project, in which the proje...
 Online Bus pass generation is useful for students who are facing problems with the current manual work of bus pass registration and renewal. The students need to register by submitting their details through online. After registration an OTP code will be send to student’s mail. The administrator will verify the student details and if they are satisf...
 The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a sec...
 Customer relationship management (CRM) has the potential for achieving success and growth for organizations in the nowadays environment of extensive competition and rapid technological development. CRM enables organizations to know their customers better and to build sustainable relationships with them. However, CRM is considered as buzzword and it...
 Organ donation as we all know is a good cause and can save many lives but in a developing country like India it is still not that popular. Although, the rate of donation has been increasing from the past few years but it is still not enough as only 0.01% of people donate their organs after death. The main reason is lack of awareness and this androi...
 One of the key fundaments of building a society is common interest or shared aims of the group members. This research work is a try to analyze web-based services oriented towards money collection for various social and charity projects. The phenomenon of social founding is worth a closer look at because its success strongly depends on the ability t...
 There were a number of problems associated with adopted manual methods to manage student information in the Department of Student Affairs in the College of Medicine – University of Diyala, these followed regulations caused delay in the delivery of services to students, inaccuracies in the completion of tasks and so on. A new system designed and imp...
 This project is aimed at developing an online leave management system that is of importance to either an organization. The Leave Management System (LMS) is an Intranet based application that can be accessed throughout the organization or a specified group/Dept. This system can be used to automate the workflow of leave applications and their approva...
 Optical Character Recognition (OCR) has been a topic of interest for many years. It is defined as the process of digitizing a document image into its constituent characters. Despite decades of intense research, developing OCR with capabilities comparable to that of human still remains an open challenge. Due to this challenging nature, researchers f...
 Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient. The process of hiding the information in other information without altering is known as Steganography. It is the art of hiding message inside a multimedia block. Attacks, misuse or ...
 This history column article provides a tour of the main software development life cycle (SDLC) models. (A lifecycle covers all the stages of software from its inception with requirements definition through to fielding and maintenance.) System development lifecycle models have drawn heavily on software and so the two terms can be used interchangeabl...
 The objective of this paper is to enforce some of the emerging technologies like mobile computing, Information and Communication Technology and advances in behavioral science studies to enhance and enrich the current educational system, since education technology in India has been modernizing in the recent years due to the development and penetrati...
 The goal of the COOL Water Purification Project is to make potable water using two sources of energy. For everyday use, the mechanism uses wind as a renewable energy source. Additionally, a human powered prototype was constructed and tested for the 2007 ASME Design Competition. Both cases convert mechanical power to electric power through the use o...
 Opinion mining is very much essential in commerce websites, furthermore, advantages with individuals. An ever-increasing amount of results are stored on the web as well as the amount of people acquiring items from the web are increasing, as a result, the users reviews, or posts are increasing day by day. The reviews towards shipper sites express th...
 The purpose of Medical Shop Management System is to automate the existing manual system by the help of computerized equipments and full-fledged computer software, fulfilling their requirements, so that their valuable data/information can be stored for a longer period with easy accessing and manipulation of the same. The required software and hardwa...
 Locating files is one of the biggest problems in universities nowadays. Time is wasted in searching files, energy is wasted chasing misspelled files, deadlines are missed. Due to this , I decided to make a system for file tracking that will solve all problems in the best way.File Tracking System is a internet application that manages all the file m...
 The manual system of preparing time table in colleges is very time consuming and tedious task which usually ends up with various classes clashing either at identical room or with same teachers having more than one class at a time. Due to manual approach, proper use of resources is neither effective nor efficient. To overcome all these problems we p...
 With the increasing importance of corruption has become a major factor to be considered as a result the number of vehicles and rapid development of population are growing in our everyday life. The process of developing ERTO Management, Automation of Road Transport Department through Cellular Network has gained major attention by traffic police, RTO...
 With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of da...
 Aspect-Oriented Programming (AOP) methodology has been investigated in the design and implementation of a representative Event Management System Software. Eclipse-AJDT environment has been used as open source enhanced IDE support for programming in AOP language – AspectJ. Twelve crosscutting concerns have been identified and modularized into highly...
 This project develops a Departmental Store Management System (DSMS) is commonly found today at most retail store registers. Store merchandise, identified by a price code is checked out by a cashier who then accepts payment for the item(s). A DSMS is either read by a bar code scanner or manually entered by the cashier. At the completion of a sale, a...
 It is a real time monitoring system which allows parents to check attendance and academics records of their ward. It also helps to college administrative people to maintain student related information. It is time consuming task to check each and every student attendance to the parent. This project gives the information to the parent about their war...
 Online assessments are a significant technique for assessing the achievement capability of understudies. This examination exertion the people viable were understudies who might be joining up with PC courses or Technologies Registrations. A model of an online arrangement assessment framework is depicted from the point of view of the examination exer...
 The Project ‘Citizen Card System’ gives us the information about the citizen in any country. A Citizen has unique Id to find out the personal information in each and every department or service wherever a citizen goes. This information can be found out by the unique Id of the citizen. If any citizen wants to utilize the services or utilities by the...
 The Main Objective of this System is to plan a framework to keep up impressive data of the workers, offices, Customer points of interest for any BPO association. Call Center Executer is an undeniably vital ability as the utilization of call focuses turns into a well-known technique for concentrating data administrations, streamlining request taking...
 In medical field, electronics industry gaining to develop medical equipment at very high advanced level techniques, they use electronics system every time for patient caring. Patient monitoring system can be defined as the system used for monitoring physiological signals that includes the parameters like electro-cardio graph (ECG), respiratory sign...
 The main aim of any canteen/mess is to provide clean and fresh food to the students/employees of the organization. In many organizations, entire mess management and billing calculations are done manually till date. It is very time consuming and increases the chances of performing calculation mistakes. It would be possible to do the same work within...
 One of the essential services on the internet is the Email Service. The Email server can be vulnerable to several types of cyber-attacks. This research aims to analyze and improve the Email service. This mail is the process of following the path and function performed by the receiver on the received mail. The development of this system serves as a ...
 Machine learning is a powerful technique which can increase the efficiency and accuracy in disease prediction. In current scenario there is a need for efficient machine learning models that can be used in healthcare system to predict the specific diseases by monitoring the patient’s symptoms over a period. But there exist very few studies pertainin...
 Most monetary transactions on the world have a tendency to be electronic, in light of the fact that it gives effectiveness, security, precision and unwavering quality.in Sudan staffs at the ticket counter are using the manual system to sell tickets and manage the bus seat booking. Travelling companies spends a substantial cost to manage the reserva...
 Chat applications have become one of the most important and popular applications on smartphones. It has the capability of exchange text messages, images and files which it cost free for the users to communicate with each other. All messages must be protected. The aim of the paper is to propose chat application that provides End-to-End security that...
 This article discusses various features in the design and implementation of online course materials. The author provides a critical review of some instructional design patterns and expands on the alignment among instruction, motivation and learners’ performances as part of a curriculum design process. In this context, the author emphasizes the valu...
 This paper gives detailed report on the application available for tracking blood donor and organ donors which helps to assist between blood donors and necessitous people. It facilitates the search process for necessitous people and it will be effortless before. With development in healthcare services Organ transplantation is increasing in demand so...
 With many potential practical applications, content-based image retrieval (CBIR) has attracted substantial attention during the past few years. Hence the authors implemented an advanced image pattern searching algorithm. In the proposed system, the images are searched based on the image patterns such as pixels, resolution, height and width of the i...
 Information security is a critical issue in modern society and image watermarking can effectively prevent unauthorized information access. Optical image watermarking techniques generally have advantages of parallel high-speed processing and multi-dimensional capabilities compared with digital approaches. This paper provides a comprehensive review o...
 The source of major and trace elements has been studied in the Arno river catchments, with repeated sampling of stream sediments in 73 stations within the basin. The study was performed for the inventory, survey, assessment and monitoring of metal pollution, and for geochemical mapping of the most representative elements. Chemical data displayed a ...
 The purpose of this review is to review what came in some studies and articles that talk about the topic of employment and selection during the time period between 2010 and 2020 in order to study the modalities that are carried out in these two tasks in various organizations. The review provided an explanation of both tasks, taking into account wha...
 Herbal database management is one of the emerging trends nowadays. There are many agencies working on herbal database management. This system helps to overcome many adverse reactions of drugs and their interactions. The safety profile of an herbal is maintained in this database which is very useful for appropriate use of herbal medicine. Here, an a...
 College is a place where student can learn method of developing their mind in right direction and build their future goals plan and research on them from college time onward they have to find the solutions of the problems they are getting from the real world and work on it. In our work, we have made cloud based college management system were studen...
 The task includes Android Application Development of a GPS based understudy Location Tracker in which with the assistance of any cell phone; some other GPS empowered handset could be found. In spite of the fact that target client might be found anyplace in inside the school foundation, he should have arranged availability and be GPS empowered. In p...
 The railway reservation system facilitates the passengers to enquiry about the trains available on the basis of source and destination, booking and cancellation of tickets, enquiry about the status of the booked ticket, etc. The aim of case study is to design and develop a data base maintaining records of different trains, train status and passenge...
 “HelpMe” is an android application for OnRoad Vehicle Breakdown Assistance that can search a mechanic basis of the user’s location. On-road vehicle breakdown assistance is designed for the user to get quick service at the event on any vehicle breakdown. Many android users can access this application. This application will help to reduce wasting use...
 The web application “Expense Tracker” is developed to manage the daily expenses in a more efficient and manageable way. By using this application we can reduce the manual calculations of the daily expenses and keep track of the expenditure. In this application, user can provide his income to calculate his total expenses per day and these results wi...
 Textual passwords are more commonly used in day to day life. They tend to be more vulnerable as far as security is concerned. Users tend to pick short password that are easy to remember which makes the password vulnerable for attackers to break. Furthermore, textual password is vulnerable to hidden camera, shoulder surfing, key loggers, spyware and...
 In our day to day life we consume food and our survival is predicated on mainly food. A considerable amount of our food is coming from farms and other means too. These farmers do their hard work for growing and serving many lives across the country, which pays for their source of income. But thanks to intermediates within the selling of their final...
 Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. Fingerprint Based ATM is a desktop application where fingerprint of the user is used as an authentication. The finger print minutiae ...
 Shopping is an activity of buying goods from the shop. Shop is a place where a customer can fulfil all their needs. Android based systems should be technically implemented in such a way that ensures adequate user requirements. The proposed methodology is implemented to allow the person to do shopping using fingerprint authentication of customer and...
 This Web Application helps user to register individual home or apartment to assist you in finding the perfect rental home or property. Also we can find your next rental from search view in your targeted area. This website is designed to attend to all our needs from buying property, selling property or renting/leasing of property in India. Here we f...
 A hostel management system (HOMASY) was designed to provide a computerized process that is stress free, reliable and quick through the use of PHP computer programming language and MySQL database application to both the students and the staff in charge of the registration and hostel management processes. HTML would be at the front-end and provide th...
 Dams must be permanently maintained in a proper way because of extremely grave consequences that may occur in case of a failure. Maintenance refers to monitoring the condition of a dam and its belonging facilities, that is to identification and undertaking of all necessary measures for ensuring safety and functionality of the facilities in a timely...
 In today’s age, education is the most important way of achieving success. When we discuss education, it is imperative to mention tests and examination. Examinations prepare students in their quest for knowledge. So, having a proper examination paper and format is quite necessary. Now the traditional method of generating question paper has been manu...
 Project failure is largely due to poor planning and monitoring. Many people consider event management to be a wedding planner or concert, but the field of event management involves more than that. Event management is the process of using business management and organizational skills to imagine, plan, and carry out social and business events. Many c...
 A billing system can be very useful within a business environment. Instead of making bills manually or to sum up the total manually, it is very much time consuming and also may have some human errors like adding up the wrong total or adding wrong items into the bill. When making a hand written bill the owner and customer both have to repeatedly che...
 Internet has become the biggest repository of information in the world. It can be considered as a global library where variety of information in different languages and formats is stored in digital form. The volume of information on web is enormous and it has become near to impossible to estimate its size. Because of its size and storing mechanism,...
 Attendance management is the act of managing attendance or presence in a work setting. Considering an academic institute, the conventional method of taking staff attendance is by signing on paper is very time consuming and insecure, hence inefficient. Maintaining these records for a long time adds to the difficulty of the task. In lieu of this, an ...
 Electronic Shop Management software helps Electronic showrooms owners and management staff by producing different kind of financial and stock tracking reports, etc. This software is able to manage all electronic stocks. In this software shop owner can manage the data of customer and buyers. Also tax information and other government charges includin...
 The Indian construction industry is known to be inefficient and highly resistant to change. Even with a changing market and increasing competition, there are no obvious signs of commensurate changes in methods and approach. Project management, on the other hand, seems to offer what is needed in terms of tools and techniques to raise industry standa...
 Sales enterprise in management appears fragmented and incoherent customer information make enterprise management or relevant personnel cannot view all of the data and related information, customer information that results could not keep consistent and complete, use the computer to car sales information management, has the crafts incomparable advant...
 Inventory constitutes a major component of working capital. To a large extent, the success and failure of a business depends upon its inventory management performance. The basic objective of inventory management is to optimize the size of inventory in a firm so that smooth performance of production and sales function may be possible at minimum cost...
 Education plays a vital role in human life. To encourage higher education, the Indian government has taken many initiatives. These include the disbursement of scholarships to financially help the students belonging to low-income families. Central Sector Scheme of Scholarship for College and University Students (CSS) is one such scheme that financia...
 This report in the title "Optical Shop Manager" which is a shop management system to manage optical shop business and it is implemented with inventory management. There are modules in this system, which are login, master inventory management, transaction management, staff management, and financial management. The problem statement of this thesis ar...
 Nowadays people don’t have much time to spend in canteen by just there and waiting for the waiter to take their order. Many customer visits the canteen in their lunch break and recess so they have limited time to eat and return to their respective office and colleges. So this software helps them to save time and order food whenever they want withou...
 The prospect of applying the semantic relationships to the question generation system can revolutionize the learning experience. The task of generating questions from the existing information is a tedious task. In this paper, Question generation system based on semantic relationships (Q-Genesis) is proposed to generate more relevant knowledge level...
 The Management Information System is a concept of the last decade or two. The role of MIS in an organization can be compared to the role of heart in the body. Most of the organizations be it small or large are using computer based information system with centralized, decentralized or distributed networks connecting data flow from and to the various...
 With the tremendous growth of the Internet and the expansion of the World Wide Web, more and more information is being put on the Internet. The Internet creates a global marketplace that breaks the barrier of time, place and distance, within which conducts Electronic Commerce. E-Comrnerce is a system that includes not only those transactions that c...
 Appointment scheduling systems are used by primary and specialty care clinics to manage access to service providers, as well as by hospitals to schedule elective surgeries. Many factors affect the performance of appointment systems including arrival and service time variability, patient and provider preferences, available information technology and...
 In our day to day life we consume food and our survival is based on mainly food. A considerable amount of our food is coming from farms and other means too. These farmers do their hard work for growing and serving many lives across the country, which pays for their source of income. But due to intermediates in the selling of their final products th...
 This system is a combination of web as well as android application where the driver will be using the android application whereas admin and parent will be using web application. This application is meant for drivers who is driving the school bus. System allows admin to add a new driver where driver id and password is generated and stored into the s...
 B/S structure (Browser/Server) is one hidden client mode after WEB development. This kind of network structure mode unifies WEB browser as the client-side in order to integrate the core part of system function realization to the server. B/S model simplifies system development, maintenance, and usage. The client only needs one Browser under the B/S ...
 E-mail system is one of the most ubiquitous Internet-based applications today. It enables users to send and receive E-mail messages among each other within and from outside of the local area network. E-mail system is used every day in almost all organizations as a communication tool between managers, employees, customers, and partners for better in...
 In such systems, the efficiency of task scheduling algorithms directly impacts the overall system performance. By using previously proposed 2D scheduling model, existing algorithms could not provide an efficient way to find all suitable allocations. In addition, most of them ignored the single reconfiguration port constraint and inter-task dependen...
 Cloud computing is a major blooming technology which has numerous applications in today’s market and is rightly so hyped. Images are a major part of today’s internet data traffic, especially due to widespread social media, and hence, its security is crucial. However, in the present scenario, the images in cloud are a major issue in terms of securit...
 The evolution of WWW leads to continuous growth of demands that are placed on web applications that results in creating sophisticated web architectures. To minimize the complexity behind their design, software frameworks were introduced. There are hundreds of web frameworks, hence the choice of the right framework can be seen as searching for the h...
 Security threats against computer systems are a big problem today which also includes PHP made applications. The report is focused on protection with the help of code and not how you protect a web server. Its purpose is not to educate the readers of the thesis how to make a PHP application, the purpose is how to program a safer PHP application. The...
 An organized and systematic office solution is essential for all universities and organizations. There are many departments of administration for the maintenance of college information and student databases in any institution. All these departments provide various records regarding students. Most of these track records need to maintain information ...
 The purpose of developing this software project is to fully automate salary system for an organization sweden sports academy. This software is capable of calculating monthly salaries, tax and social security of employees of that organization. On the basis of certain formulas it will generate files as an output such as bank files and salary slips et...
 The management and booking of Rooms in hotels is a tedious and complicated task especially if it is done manually. Keeping track of large customers and all their details requires an inordinate space for file cabinets, not to mention the time the hotel administrator would spend going back and forth to file cabinets so as to look up each customer’s i...
 Project management systems represent a rapidly growing technology in IT industry. As the number of users, who utilize project management applications continues to grow, web based project management systems enter a critical role in a multitude of companies. Thus, a proper project management system plays a distinctive part in ensuring reliable, robus...
 The purpose of this thesis was to show how to use Zend Framework to connect PHP applications to the cloud.To find out how easy it is for developers with basic knowledge of the Zend Framework, to incorporate cloud computing in their applications. In order to do this, a blog application was developed using the Zend Framework and the upload files func...
 A detailed accumulation of the methods of wireless power transfer (WPT) including short range as well as mid range transmission . The technology and the science behind WPT and the future scope is discussed in detail. While a lot of research has been done on this topic in the previous decade, a large part of it is yet to be explored. The topics furt...
 The vast amount of information on the World Wide Web is created and published by many different types of providers. Unlike books and journals, most of this information is not subject to editing or peer review by experts. This lack of quality control and the explosion of web sites make the task of finding quality information on the web especially cr...
 Student Information Management System can be used by education institutes to maintain the records of students easily. Achieving this objective is difficult using a manual system as the information is scattered, can be redundant and collecting relevant information may be very time consuming. All these problems are solved using this project....
 Pharmacy management system is one of the most essential tools that are mostly used in medical store in Tanzania; it is mostly used to manage pharmacy related activities such as medical inventory, record keeping, sales management as well as managing the drug stock and information of the expired medicines. Many pharmacies in Tanzania are still operat...
 A college management registration system empowers colleges and educators to manage regular tasks such as campaigns, student enrolment, admissions, course registration, etc. Registering for courses while taking admission to a college is the most crucial step as it lays the foundation for an entire semester. Providing this information to thousands of...
 To obtain information and knowledge of SNF (Solid not fat), feeding and milking management. System also included the management practices among the dairy farms at various state levels from District to Taluka level for maintaining daily records as well as effective payment system through digital transactions. This system recurring to information of ...
 There have been many applications oriented around controlling and tracing the lifecycle of project, tasks, and requirements. In the beginning of this work, the author provides an introduction into the problematic of the above-mentioned tracing, mentioning also software development methods and how they relate to this theme. In the second part of the...
 As an emerging form of enabling technology, Web-based e-Health portals provide patients easier accesses to their healthcare information and services. We design and implement such an e-Health portal which can integrate many backend medical services effectively. A major challenge in designing such a system is to meet critical security requirements, s...
 The following report will outline the development of an automated Ticket Reservation System for the Millennium Forum which will incorporate features in order to aid the process for visually impaired users. This application has been designed for customers to reserve theatre tickets for various shows....
  The Java Application World application world soft- ware is totally user oriented and only users access the software programs. The user can use multiple applications that re made with the help of java. In the J Appsor the Java application world, the user can use calculator, word count tool, ip finder etc java run software. Any particular IDE can...
 This paper deals with development of inventory management system for a manufacturing Industry. The developed software System is easy to use, less time consuming & all detail about the inventory items & transaction status. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The repor...
 This paper describes the importance of ERP in manufacturing industries and examines the various articles published by eminent Researchers in the field of ERP. Enterprise Resource Planning (ERP) software presents a frame work for organizations to better utilize their processes. The report is about windows based application. The main idea of this pap...
 Management of leave and payroll are critical operations for each institution as it has effect on payment of staff memebers of any institution and also to complete it accurately and on time. The Current Leave and Payroll Manager both are paper based systems. Though the attendance is Biometric but still it is not that much efficient in terms of matte...
 Parenting is not an easy task. Good parenting requires the parent to quickly respond to the needs of their child. Constant monitoring of the child also becomes a necessity, especially up to an age of 18 months. In this work, a mobile robotic device has been designed and developed. This device can help a parent to keep track of their baby and its su...
 In the present scenario, any type of communication over the internet and other network applications need to be secure due to their increasing utility. For this task, lots of algorithms for security have been implemented and used so far. With these developments, attackers have also come up with the new ideas to penetrate the communication mediums. T...
 The purpose of this paper is to analyze and implement incremental updates of data lineage storage in the software tool Manta Flow. The basis of this work is the study of current data lineage storage in Manta Flow, research of existing solutions of incremental updates in version control systems, research of incremental backups in databases, analysis...
 A very simple cross platform client. Server chat application has been implemented in Java. Its design is described, limitations are discussed, improvements are proposed and a user manual is included. ...
 The paper titled Library Management System is Library management software for monitoring and controlling the transactions in a library .The paper "Library Management System" is developed in java which mainly focuses on basic operations in a library like adding new member, new books, and updating new information, searching books and members and faci...
 The purpose of this project is to develop an on-line banking system that provides customers with the facility to check their accounts and do transactions on-line. The system will provide all the banks facilities to its customers when their authentications [user id and password] match, including viewing account information, performing transfers, giv...
 With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of da...
 This article investigates the basic design principles for a new Wireless Network Operating System (WNOS), a radically different approach to software-defined networking (SDN) for infrastructure-less wireless networks. Departing from well understood approaches inspired by Open Flow, WNOS provides the network designer with an abstraction hiding (i) th...
 The integration of multi-access edge computing (MEC) and RAFT consensus makes it feasible to deploy blockchain on trustful base stations and gateways to provide efficient and tamper-proof edge data services for Internet of Things (IoT) applications. However, reducing the latency of storing data on blockchain remains a challenge, especially when an ...
 Federated Learning (FL) is a distributed learning framework that can deal with the distributed issue in machine learning and still guarantee high learning performance. However, it is impractical that all users will sacrifice their resources to join the FL algorithm. This motivates us to study the incentive mechanism design for FL. In this paper, we...
 In this paper, a multiple cluster-based transmission diversity scheme is proposed for asynchronous joint transmissions (JT) in private networks. The use of multiple clusters or small cells is adopted to reduce the transmission distance to users thereby increasing data-rates and reducing latency. To further increase the spectral efficiency and achie...
 This article presented a single-phase shaded-pole induction motor (SPIM) system, which aims to work in an isolated environment. Compared with the previous wireless SPIM, this system employs less controlled switches and can work at full-resonant condition, while retaining the merit of secondary controllerless. The key is to employ a half-bridge inve...
 As the core count in shared-memory manycores keeps increasing, it is becoming increasingly harder to design cache-coherence protocols that deliver high performance without an inordinate increase in complexity and cost. In particular, sharing patterns where a group of cores frequently reads and writes a shared variable are hard to support efficientl...
 Intelligent reflecting surface (IRS) is a new and promising paradigm to substantially improve the spectral and energy efficiency of wireless networks, by constructing favorable communication channels via tuning massive low-cost passive reflecting elements. Despite recent advances in the link-level performance optimization for various IRS-aided wire...
 Unmanned aerial vehicles (UAVs) have extensive civilian and military applications, but establishing a UAV network providing high data rate communications with low delay is a challenge. Millimeter wave (mmWave), with its high bandwidth nature, can be adopted in the UAV network to achieve high speed data transfer. However, it is difficult to establis...
 The flexibility offered by reconfigurable wireless networks, provide new opportunities for various applications such as online AR/VR gaming, high-quality video streaming and autonomous vehicles, that desire high-bandwidth, reliable and low-latency communications. These applications come with very stringent Quality of Service (QoS) requirements and ...
 In ultra-dense networks, the increasing popularity of computation intensive applications imposes challenges to the resource-constrained smart mobile devices (SMDs), which may be solved by offloading these computation tasks to the nearby mobile edge computing centers. However, when massive SMDs offload computation tasks in a dynamic wireless environ...
 This paper investigates a futuristic spectrum sharing paradigm for heterogeneous wireless networks with imperfect channels. In the heterogeneous networks, multiple wireless networks adopt different medium access control (MAC) protocols to share a common wireless spectrum and each network is unaware of the MACs of others. This paper aims to design a...
 In application scenarios such as Internet of Things, a large number of energy receivers (ERs) exist and line-of-sight (LOS) propagation could be common. Considering this, we investigate wireless energy transfer (WET) in extra-large massive MIMO Rician channels. We derive analytical expressions of the received net energy for different schemes, inclu...
 Future of massive Internet-of-things (IoT) and low latency applications hinges on delivering fresh information on time. Thus, to analyse data freshness for time critical use cases in future networks, the age of information (AoI) measure is introduced. Besides, energy harvesting is also essential to improve energy sustainability and lifetime of a po...
 This project work titled “THREE AXIS TRAILER” has been conceived having studied the difficulty in unloading the materials. Our survey in the regard in several automobile garages, revealed the facts that mostly some difficult methods were adopted in unloading the materials from the trailer. The trailer will unload the material in only one single dir...
 The project work titled “Electro Hydraulic Jack” has been conceived having studied the difficulty in lifting any type of vehicles. Our survey regarding several automobile garages, revealed the facts that mostly some difficult methods were adopted in lifting the vehicles for reconditioning. The project has mainly concentrated on this difficulty. In ...
 This project work titled “FABRICATION OF QUICK LIFTING JACK WITH GEAR ARRANGEMENT” has been conceived having studied the difficulty in lifting the any type of light vehicles. Our survey in the regard in several automobile garages, revealed the facts that mostly some difficult methods were adopted in lifting the vehicles for reconditioning. Now the ...
 The eddy-current is created by the relative motion between a magnet and a metal (or alloy) conductor. The current induces the reverse magnetic field and results in the deceleration of motion. The proposed mechanism implements this phenomenon in developing a braking system. The potential applications of the braking system can be a decelerating syste...
 Here we are fabricating an automobile for producing power using turbines. Nowadays in automobile field many new innovating concepts are being developed. We are using the power from vehicle exhaust to generate the electric power which can be stored in battery for the later consumption. In this project, we are demonstrating a concept of generating po...
 Groundnut product demand is on the increase and the application is largely dependent on the cleanness of the nuts. The separation process from plant is usually an energy sapping task that requires a lot of time. In order to separate the nuts from its plant effectively a machine was developed. The machine basically comprises of chain drive, pedal, f...
 In this Pedal operated drilling machine which can be used for industrial applications and Household needs in which no specific input energy or power is needed. This project consists of a crank and slider mechanism. In the mechanism pedal is directly connected to the hacksaw through crank and slider mechanism for the processing of drilling the woode...
 In this project we are fabricate the automatic punching machine. This project we are using the motor, sensor, punch tool, supporting column, base and control unit. The project constructed by the simple arrangements so this project is easily operates to any worker in industries. Cost of the project is less so this project is suitable for small scale...
 This report deals with design and fabrications of pneumatic multipurpose presses which is used for bearings pressing of robots in the shaft, bearing removing, sheet metal bending and bend removing with the help of a compressor. Initially the shaft is held between two fixtures; top of the bearing is freely located on the step in the shaft and the ot...
 Unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) has recently emerged as a promising technique to provide sustainable energy supply for widely distributed low-power ground devices (GDs) in large-scale wireless networks. Compared with the energy transmitters (ETs) in conventional WPT systems which are deployed at fixed locations, ...
 In the past two decades, wireless sensor networks (WSNs) and their applications have been the topic of many studies. Different multi-sensor nodes are used to collect, process and distribute data over wireless links to perform different tasks such as smart detection, target tracking, node localization, etc. In this article, the problem of distribute...
 We consider a wireless-powered ad hoc network with clustered Power Beacons (PBs). The wireless-powered transmitters (WP-Txs) only activate stochastically deployed PBs within the circles centered at their locations. The PBs transmit radio frequency (RF) signals, which are harvested by the WP-Txs to transmit information to their target receivers. The...
 Wireless charging coupled with computation offloading in edge networks offers a promising solution for realizing power-hungry and computation intensive applications on user-devices. We consider a multi-access edge computing (MEC) system with collocated MEC server and base-station/access point (AP), each equipped with a massive MIMO antenna array, s...
 This paper presents a cost-effective, ultra-low-power and highly sensitive wake-up receiver (WuRX) to reduce overall power consumption of Wireless Sensor Networks (WSN). The proposed tuned radio frequency (TRF) receiver (RX) analogue front-end (AFE) incorporates a 400-MHz, low-power, low-noise amplifier (LNA) with a high voltage gain of 50 dB as we...
 Traditional ground wireless communication networks cannot provide high-quality services for artificial intelligence (AI) applications such as intelligent transportation systems (ITS) due to deployment, coverage and capacity issues. The space-air-ground integrated network (SAGIN) has become a research focus in the industry. Compared with traditional...
 In this modern era, each and every individual needs to utilize the communication medium for sending and receiving the respective data between source and destination entities. A Wireless Sensor Network (WSN) environments provide such facility to clients to perform a successful and range free communication between source and destination. This paper u...
 Intelligent network management for reconfigurable wireless networks such as 5G and beyond applications is crucial for many industrial applications, and has been the subject of ongoing research. This paper proposes an Artificial Intelligence(AI)-Assisted energy-efficient and intelligent routing, based on both energy efficiency prioritization and AI ...
 Clock synchronization is crucial for applications in wireless sensor networks, such as event scheduling and data fusion. In practical wireless networks, environmental changes cause the oscillator to be imperfect. Thus, it is necessary to track the nonlinear varying clock dynamically. In this paper, we propose a timestamp-free clock skew (frequency ...
 Many Internet of Things smart-* applications are being powered solely through ambient energy-harvested energy. These applications require periodic data collection with low latency and high reliability. Since the energy is harvested in small amounts from ambient sources and is stochastic in nature, it is extremely challenging to achieve low latency ...
 The network control plays a vital role in the mega satellite constellation (MSC) to coordinate massive network nodes to ensure the effectiveness and reliability of operations and services for future space wireless communications networks. One of the critical issues in satellite network control is how to design an optimal network control structure (...
 Unmanned aerial vehicles (UAVs) are anticipated to be integrated into the next generation wireless networks as new aerial mobile nodes, which can provide various live streaming applications such as surveillance, reconnaissance, etc. For such applications, due to the dynamic characteristics of traffic and wireless channels, how to guarantee the qual...
 Wireless blockchain network is proposed to enable a decentralized and safe wireless networks for various blockchain applications. To achieve blockchain consensus in wireless network, one of the important steps is to broadcast new block using wireless channel. Under wireless network protocols, the block transmitting will be affected significantly. I...
 This paper presents wChain, a blockchain protocol specifically designed for multihop wireless networks that deeply integrates wireless communication properties and blockchain technologies under the realistic SINR model. We adopt a hierarchical spanner as the communication backbone to address medium contention and achieve fast data aggregation withi...
 This paper presents a machine learning strategy that tackles a distributed optimization task in a wireless network with an arbitrary number of randomly interconnected nodes. Individual nodes decide their optimal states with distributed coordination among other nodes through randomly varying backhaul links. This poses a technical challenge in distri...
 Age of information (AoI) is a newly proposed metric to quantify the freshness of system status. However, in many cases, the original raw data collected by IoT devices needs to be preprocessed in real-time to extract the hidden effective information, which is usually time consuming. To this end, we promote an edge computing assisted approach and aim...
 Backscatter communication (BC) and radio-frequency energy harvesting (RF-EH) are two promising technologies for extending the battery lifetime of wireless devices. Although there have been some qualitative comparisons between these two technologies, quantitative comparisons are still lacking, especially for massive IoT networks. In this paper, we a...
 The proliferation of IoT devices in society demands a renewed focus on securing the use and maintenance of such systems. IoT-based systems have a significant impact on society and therefore such systems must have guaranteed resilience. We introduce a solution as a protocol that utilizes smart contracts on the Ethereum blockchain to enforce a securi...
 In this paper, the problem of energy-efficient data gathering in an Internet of Things (IoT) based remote area surveillance application is addressed by designing a suitable MAC layer uplink solution. We follow the 3GPP specified scheduled access scheme for narrowband IoT (NB-IoT) and consider presence of both delay sensitive and delay tolerant traf...
 The time series data generated by massive sensors in Internet of Things (IoT) is extremely dynamic, heterogeneous, large scale and time-dependent. It poses great challenges (e.g. accuracy, reliability, stability) on the real-time analysis and decision making for different IoT applications. In this paper, we design, implement and evaluate EdgeLSTM, ...
 The awareness of physical network topology in a large-scale Internet of Things (IoT) system is critical to enable location-based service provisioning and performance optimization. However, due to the dynamics and complexity of IoT networks, it is usually very difficult to discover and update the physical topology of the large-scale IoT systems in r...
 5G-enabled Industrial Internet of Things (IIoT) deployment will bring more severe security and privacy challenges, which puts forward higher requirements for access control. Blockchain-based access control method has become a promising security technology, but it still faces high latency in consensus process and weak adaptability to dynamic changes...
 Urban crowd flow prediction is very challenging for public management and planning in smart city applications. Existing work mostly focuses on spatial and temporal dependence based flow prediction that are not well suited for predictions of instantaneous flow change usually due to social emergency incidents and accidents. In this paper, we propose ...
 Deep neural network (DNN) has become increasingly popular in industrial IoT scenarios. Due to high demands on computational capability, it is hard for DNN-based applications to directly run on intelligent end devices with limited resources. Computation offloading technology offers a feasible solution by offloading some computation-intensive tasks t...
 The increase in electronic loads connected to electrical network became relevant requirements of the quality of supply. Among the equipment used in the power distribution system stands out regulators medium voltage installed over the grid to maintain voltage levels within indifferent operating range of the oscillations. Therefore, the quality of su...
 This article presents a 2.4 GHz and high-efficiency wireless power receiver (Rx) integrated with a low-power transmitter (Tx) for wireless charging of the Internet-of-Things (IoT) or wearable devices. A single pole double throw (SPDT) circuit isolates the operation of the Rx from Tx, thereby offering the capability of sharing antenna between them. ...
 The dual mode technology has been adopted to support smart devices to connect to both the NB-IoT and the LTE simultaneously. How to reduce the power consumption of a smart device with limited battery capacity has been treated as an important issue. In this paper, we propose the Module Switching Mechanism (MSM) that consists of the PS scheme and the...
 Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect and transfer biomedical data pertaining to blood pressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. Among these devices, wearables have found their presenc...
 The global healthcare industry and artificial intelligence has promoted the development of the diversified intelligent healthcare applications. IoT will play an important role in meeting the high throughput requirements of diversified intelligent healthcare applications. However, the healthcare big data transmission is vulnerable to a potential att...
 This work presents an instruction-set extension to the open-source RISC-V ISA (RV32IM) dedicated to ultra-low power (ULP) software-defined wireless IoT transceivers. The custom instructions are tailored to the needs of 8/16/32-bit integer complex arithmetic typically required by quadrature modulations. The proposed extension occupies only 2 major o...
 The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people's lives in all directions. The rapid development of the IoT technology accelerates the process of the era of ``Internet of everything'' but also changes the role of terminal equipment at the edge of...
 Blockchain technology has recently witnessed a rapid proliferation across multiple industries and has the potential to evolve as a popular energy transaction platform for grid operators and general users. The current proof-of-work consensus algorithm used by many blockchain protocols suffer from vulnerabilities such as the majority attacks problem ...
 Developing products and entering new markets in the Internet of Things (IoT) and industry 4.0 space are challenging because value propositions and business models are complex. IoT products are fundamentally platform products, whose embedded components can measure a disparate set of characteristics for several user types. Deciding in advance which c...
 The Internet of Things (IoT) is playing an increasingly vital role in multiple industries and our everyday life. A pressing practical problem of IoT devices (IoT-Ds) is their explosive growth of connectivity which leads to large energy consumption. One of the most promising solutions to achieve a sustainable green IoT network is unmanned aerial veh...
 Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., s...
 For most Internet-of-Things (IoT) applications, embedded processors typically execute lightweight tasks such as sensing and communication. The typical IoT program senses some information and sends them via a channel, usually a wireless channel with an RF circuit. These IoT nodes often require a system with networking capabilities and a low-power ha...
 This paper studies the interplay between device-to-device (D2D) communications and real-time monitoring systems in a cellular-based Internet of Things (IoT) network. In particular, besides the possibility that the IoT devices communicate directly with each other in a D2D fashion, we consider that they frequently send time-sensitive information/stat...
 Nowadays, users can personalize IoT devices/Web services via Trigger-Action Programming (TAP). As the number of connected entities grows, the relations of triggers and actions become progressively complex (i.e., the heterogeneity of TAP), which becomes a challenge for existing models to completely preserve the heterogeneous data and semantic inform...
 With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have become emerging challenges of the IoT. In this paper, we are concerned about the security of image transmission in green IoT. I...
 In this paper, we study sensing data collection of IoT devices in a sparse IoT-sensor network, using an energy-constrained Unmanned Aerial Vehicle (UAV), where the sensory data is stored in IoT devices while the IoT devices may or may not be within the transmission range of each other. We formulate two novel data collection problems to fully or par...
 In recent years, Internet of Things (IoT) security has attracted significant interest by researchers due to new characteristics of IoT such as heterogeneity of devices, resource constraints, and new types of attacks targeting IoT. Intrusion detection, which is an indispensable part of a security system, is also included in these studies. In order t...
 Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...
 The Software Defined Network in Internet of Things (SDN-IoT) is enjoying growing popularity due to its flexibility, automaticity and programmability. However, there still lack proper permission management on SDN-IoT applications (SIApps), especially when the SIApp’s required northbound interfaces are located in multiple heterogeneous controllers wi...
 The Internet of Things (IoT) edge network has connected lots of heterogeneous smart devices, thanks to unmanned aerial vehicles (UAVs) and their groundbreaking emerging applications. Limited computational capacity and energy availability have been major factors hindering the performance of edge user equipment (UE) and IoT devices in IoT edge networ...
 Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a ...
 This article analyzes the effectiveness of deploying the Blockchain technology in the implementation of the IoT ecosystem database. To this end, we assess the processing efficiency of transactions originated by smart devices and the storeddata integrity. The processing-efficiency evaluation is carried out through queue-theory-based analytical model...
 Today's IoT devices rely on batteries, which offer stable energy storage but contain harmful chemicals. Having billions of IoT devices powered by batteries is not sustainable for the future. As an alternative, batteryless devices run on long-lived capacitors charged using energy harvesters. The small energy storage capacity of capacitors results in...
 Verifying the integrity of IoT data in cloud-based IoT architectures is crucial for building reliable IoT applications. Traditional data integrity verification methods rely on a Trusted Third Party (TTP) that has issues of risk and operational cost by centralization. Distributed Ledger Technology (DLT) has a high potential to verify IoT data integr...
 In Industrial Internet of Things (IIoT), a number of mutually untrusted devices with diverse computing resources and application requirements often need to work together to serve industrial production. When applying permissionless blockchain to process transactions among these devices, we are concerned with two types of fairness: mining fairness (i...
 Blockchain is a safe technology for transaction as it keeps the information safe that it is impossible to change, hack or cheat. blockchain is a digital mode of transaction that is spread across the entire network of computer systems in blockchain. IoT devices allows to send information or useful data in the blockchain to the persons that are inter...
 We develop a novel framework for efficiently and effectively discovering crowdsourced services that move in close proximity to a user over a period of time. We introduce a moving crowdsourced service model which is modelled as a moving region. We propose a deep reinforcement learning-based composition approach to select and compose moving IoT servi...
 Cloud computing is becoming an popular model of computing. Due to the increasing complexity of the cloud service requests, it often exploits heterogeneous architecture. Moreover, some service requests (SRs)/tasks exhibit real-time features, which are required to be handled within a specified duration. Along with the stipulated temporal management, ...
 In recent years, edge computing, as an extension of cloud computing, has emerged as a promising paradigm for powering a variety of applications demanding low latency, e.g., virtual or augmented reality, interactive gaming, real-time navigation, etc. In the edge computing environment, edge servers are deployed at base stations to offer highly-access...
 With the rapid development of 5G, Mobile Edge Computing (MEC) paradigm has emerged to enable various devices or servers at the network edge to contribute their computing capacity for reducing communication delay. A fundamental problem is to preserve satisfactory quality-of-service (QoS) for mobile users in light of densely dispersed wireless commun...
 Mobile edge computing (MEC), extending computing services from cloud to edge, is recognized as one of key pillars to facilitate real-time services and tackle backhaul bottleneck. However, it is not economically efficient to attach intensive security appliances to every MEC node to defend application-level DDoS attacks and ensure the availability of...
 In this paper, we propose online learning methodologies for performance modeling and prediction of applications that run repetitively on multi-tenant clouds. Based on a few micro-benchmarks to probe in-situ perceivable performance of major components of the target VM, we proposed both periodic model retraining and progressive modeling approaches to...
 Delivering cloud-like computing facilities at the network edge provides computing services with ultra-low-latency access, yielding highly responsive computing services to application requests. The concept of fog computing has emerged as a computing paradigm that adds layers of computing nodes between the edge and the cloud, also known as cloudlets,...
 Fog computing extends cloud computing capabilities to the edge of the network and reduces high latency and network congestion. This paradigm enables portions of a transaction to be executed at a fog server and other portions at the cloud. Fog servers are generally not as robust as cloud servers; at peak loads, the data that cannot be processed by f...
 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
 The instance price in the Amazon EC2 spot model is often much lower than in the on-demand counterpart. However, this price reduction comes with a decrease in the availability guarantees. To our knowledge, there is no work that accurately captures the short-term trade-off between spot price and availability, and does long-term analysis for spot pric...
 In a public blockchain system applying Proof of Work (PoW), the participants need to compete with their computing resources for reward, which is challenging for resource-limited devices. Mobile blockchain is proposed to facilitate the application of blockchain for mobile service, in which the lightweight devices can participate mining by renting re...
 For a robot to perform a task, several algorithms must be executed, sometimes simultaneously. The algorithms can be executed either on the robot itself or, if desired, on a cloud infrastructure. The term cloud infrastructure refers to hardware, storage, abstracted resources, and network resources associated with cloud computing. Depending on the de...
 Fog computing is an emerging computing paradigm that uses processing and storage capabilities located at the edge, in the cloud, and possibly in between. Testing and benchmarking fog applications, however, is hard since runtime infrastructure will typically be in use or may not exist, yet. While approaches for the emulation of infrastructure testbe...
 Due to the excessive concentration of computing resources in the traditional centralized cloud service system, there will be three prominent problems of management confusion, construction cost and network delay. Therefore, we propose to virtualize regional edge computing resources in intelligent buildings as edge service pooling, then presents a hi...
 Replicating data across geo-distributed datacenters is usually necessary for large scale cloud services to achieve high locality, durability and availability. One of the major challenges in such geo-replicated data services lies in consistency maintenance, which usually suffers from long latency due to costly coordination across datacenters. Among ...
 Workflow scheduling in cloud environments has become a significant topic in both commercial and industrial applications. However, it is still an extraordinarily challenge to generate effective and economical scheduling schemes under the deadline constraint especially for the large scale workflow applications. To address the issue, this paper invest...
 Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...
 Big data frameworks such as Apache Spark are becoming prominent to perform large-scale data analytics jobs. However, local or on-premise computing resources are often not sufficient to run these jobs. Therefore, public cloud resources can be hired on a pay-per-use basis from the cloud service providers to deploy a Spark cluster entirely on the clou...
 In recent years, edge computing has attracted significant attention because it can effectively support many delay-sensitive applications. Despite such a salient feature, edge computing also faces many challenges, especially for efficiency and security, because edge devices are usually heterogeneous and may be untrustworthy. To address these challen...
 The population of cloud computing greatly facilitates the sharing of explosively generated image today. While benefiting from the convenient of cloud, the privacy protection mechanism that commonly applied in cloud service makes the spreading of illegal and harmful data very hard to be detected or controlled. Such a realistic threat should be serio...
 Recent advances in smart connected vehicles and Intelligent Transportation Systems (ITS) are based upon the capture and processing of large amounts of sensor data. Modern vehicles contain many internal sensors to monitor a wide range of mechanical and electrical systems and the move to semi-autonomous vehicles adds outward looking sensors such as c...
 Broadcast encryption provides a promising technique of data access control for specified users in cloud computing. A data uploader can generate a ciphertext for a set of chosen users such that only the intended users are able to learn the data content. However, with the rapidly increasing of collaboration between users, it is desired to extend the ...
 This article surveys the interdisciplinary research of neuroscience, network science, and dynamic systems, with emphasis on the emergence of brain-inspired intelligence. To replicate brain intelligence, a practical way is to reconstruct cortical networks with dynamic activities that nourish the brain functions, instead of using only artificial comp...
 Tubulin is a promising target for designing anti-cancer drugs. Identification of hotspots in multifunctional Tubulin protein provides insights for new drug discovery. Although machine learning techniques have shown significant results in prediction, they fail to identify the hotspots corresponding to a particular biological function. This paper pre...
 Linear discriminant analysis (LDA) is a classical statistical machine-learning method, which aims to find a linear data transformation increasing class discrimination in an optimal discriminant subspace. Traditional LDA sets assumptions related to the Gaussian class distributions and single-label data annotations. In this article, we propose a new ...
 These days, clustering is one of the most classical themes to analyze data structures in machine learning and pattern recognition. Recently, the anchor-based graph has been widely adopted to promote the clustering accuracy of plentiful graph-based clustering techniques. In order to achieve more satisfying clustering performance, we propose a novel ...
 This article proposes a novel modeling method for the stochastic nonlinear degradation process by using the relevance vector machine (RVM), which can describe the nonlinearity of degradation process more flexibly and accurately. Compared with the existing methods, where degradation processes are modeled as the Wiener process with a nonlinear drift ...
 Multiview fuzzy systems aim to deal with fuzzy modeling in multiview scenarios effectively and to obtain the interpretable model through multiview learning. However, current studies of multiview fuzzy systems still face several challenges, one of which is how to achieve efficient collaboration between multiple views when there are few labeled data....
 A traveling salesman problem (CTSP) as a generalization of the well-known multiple traveling salesman problem utilizes colors to distinguish the accessibility of individual cities to salesmen. This work formulates a precedence-constrained CTSP (PCTSP) over hypergraphs with asymmetric city distances. It is capable of modeling the problems with opera...
 Resource constraint job scheduling is an important combinatorial optimization problem with many practical applications. This problem aims at determining a schedule for executing jobs on machines satisfying several constraints (e.g., precedence and resource constraints) given a shared central resource while minimizing the tardiness of the jobs. Due ...
 Many deep-learning methods have been developed for fault diagnosis. However, due to the difficulty of collecting and labeling machine fault data, the datasets in some practical applications are relatively much smaller than the other big data benchmarks. In addition, the fault data come from different machines. Therefore, on some occasions, fault di...
 For a broad range of applications, hyperspectral image (HSI) classification is a hot topic in remote sensing, and convolutional neural network (CNN)-based methods are drawing increasing attention. However, to train millions of parameters in CNN requires a large number of labeled training samples, which are difficult to collect. A conventional Gabor...
 Lithology identification plays an essential role in formation characterization and reservoir exploration. As an emerging technology, intelligent logging lithology identification has received great attention recently, which aims to infer the lithology type through the well-logging curves using machine-learning methods. However, the model trained on ...
 Stochastic point location deals with the problem of finding a target point on a real line through a learning mechanism (LM) with the stochastic environment (SE) offering directional information. The SE can be further categorized into an informative or deceptive one, according to whether p is above 0.5 or not, where p is the probability of providing...
 In recent years, the appearance of the broad learning system (BLS) is poised to revolutionize conventional artificial intelligence methods. It represents a step toward building more efficient and effective machine-learning methods that can be extended to a broader range of necessary research fields. In this survey, we provide a comprehensive overvi...
 Concept drift refers to changes in the underlying data distribution of data streams over time. A well-trained model will be outdated if concept drift occurs. Once concept drift is detected, it is necessary to understand where the drift occurs to support the drift adaptation strategy and effectively update the outdated models. This process, called d...
 The broad learning system (BLS) has been identified as an important research topic in machine learning. However, the typical BLS suffers from poor robustness for uncertainties because of its characteristic of the deterministic representation. To overcome this problem, a type-2 fuzzy BLS (FBLS) is designed and analyzed in this article. First, a grou...
 Autonomous learning algorithms operate in an online fashion in dealing with data stream mining, where minimum computational complexity is a desirable feature. For such applications, parsimonious learning machines (PALMs) are suitable candidates due to their structural simplicity. However, these parsimonious algorithms depend upon predefined thresho...
 Federated learning (FL) is a machine-learning setting, where multiple clients collaboratively train a model under the coordination of a central server. The clients' raw data are locally stored, and each client only uploads the trained weight to the server, which can mitigate the privacy risks from the centralized machine learning. However, most of ...
 Predicting attention-modulated brain responses is a major area of investigation in brain-computer interface (BCI) research that aims to translate neural activities into useful control and communication commands. Such studies involve collecting electroencephalographic (EEG) data from subjects to train classifiers for decoding users' mental states. H...
 This article explores the problem of semisupervised affinity matrix learning, that is, learning an affinity matrix of data samples under the supervision of a small number of pairwise constraints (PCs). By observing that both the matrix encoding PCs, called pairwise constraint matrix (PCM) and the empirically constructed affinity matrix (EAM), expre...
 This article presents a novel discriminative subspace-learning-based unsupervised domain adaptation (DA) method for the gas sensor drift problem. Many existing subspace learning approaches assume that the gas sensor data follow a certain distribution such as Gaussian, which often does not exist in real-world applications. In this article, we addres...
 Due to the development of convenient brain-machine interfaces (BMIs), the automatic selection of a minimum channel (electrode) set has attracted increasing interest because the decrease in the number of channels increases the efficiency of BMIs. This study proposes a deep-learning-based technique to automatically search for the minimum number of ch...
 Complex-valued neural network is a kind of learning model which can deal with problems in complex domain. Fully complex extreme learning machine (CELM) is a much faster training algorithm than the complex backpropagation (CBP) scheme. However, it is at the cost of using more hidden nodes to obtain the comparable performance. An upper-layer-solution...
 Passwords are pervasively used to authenticate users' identities in mobile apps. To secure passwords against attacks, protection is applied to the password authentication protocol (PAP). The implementation of the protection scheme becomes an important factor in protecting PAP against attacks. We focus on two basic protection in Android, i.e., SSL/T...
 Andriod malware poses a serious threat to users privacy, money, equipment and file integrity. A series of data-driven malware detection methods were proposed. However, there exist two key challenges for these methods: (1) how to learn effective feature representation from raw data; (2) how to reduce the dependence on the prior knowledge or human la...
 The increasing demand for wireless connectivity and the emergence of the notion of the Internet of Everything require new communication paradigms that will ultimately enable a plethora of new applications and new disruptive technologies. In this context, the present contribution investigates the use of the recently introduced intelligent reflecting...
 IoT-enabled smart healthcare systems has the characteristics of heterogeneous fusion, cross domain, collaborative autonomy, dynamic change and open interconnection, but they bring huge challenges in privacy issues. We proposed a scheme of forward privacy preserving for IoT-enabled healthcare systems, which mainly includes a searchable encryption sc...
 Data in modern industrial applications and data science presents multidimensional progressively, the dimension and the structural complexity of these data are becoming extremely high, which renders existing data analysis methods and machine learning algorithms inadequate to the extent. In addition, high-dimensional data in actual scenarios often sh...
 This paper addresses the problem of decentralized sensor selection in an energy-constrained wireless sensor network-based Internet-of-Things, for monitoring a spatio-temporally varying process. To do so, an adaptive edge computing framework and its variants are proposed which distributedly optimize a critical trade-off between sensing quality and r...
 The rapid development of the Industrial Internet of Things (IIoT) has led to the explosive growth of industrial control data. Cloud computing-based industrial control models cause vast energy consumption. Most existing solutions try to reduce the overall energy consumption by optimizing task scheduling and disregard how to reduce the load of comput...
 Driving behaviors are highly relevant to automotive statuses and on-board safety, which offer compelling shreds of evidence for mobility as a service (MaaS) providers to develop personalized rental prices and insurance products. However, the direct dissemination of driving behaviors may lead to violations of identity and location privacy. In this p...
  It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication protocol based on device signature generated during voltage over-scaling (VOS) was recently proposed to address this issue. VOS-based authentication employs the computation unit such as adder...
 Connecting all devices through the Internet is now practical via the Internet of Things (IoT). IoT is characterized by using smart and self-configuring objects that can interact with each other via global network infrastructure. Clustering is the promising technique that effectively works on the enhancement of network lifetime. This paper intends t...
 Artificial Intelligence (AI) technology has been widely applied to Internet of Thing (IoT) and one of key applications is intelligence data collection from billions of IoT devices. However, many AI based data collection approaches lack security considerations leading to availability restricted. In this paper, an Intelligent Trust Collaboration Netw...
 In Green Internet of Things, energy consumption research is a hot topic. Our research focuses on Supervisory Control And Data Acquisition (SCADA) system, and it is a system consisting of a plurality of self-organized sensing networks. Live data gathering from numerous Sub-connected SCADA (S-SCADA) networks to make unified decisions based on collect...
 As 5G and mobile computing are growing rapidly, deep learning services in the Social Computing and Social Internet of Things (IoT) have enriched our lives over the past few years. Mobile devices and IoT devices with computing capabilities can join social computing anytime and anywhere. Federated learning allows for the full use of decentralized tra...
 An always-on video-based human action recognition (HAR) system on chip (SoC) integrated with a CMOS image sensor (CIS) is proposed for the Internet of Things (IoT) devices. The proposed SoC is the first always-on integrated circuit (IC) performing the full process of HAR in a single chip. To resolve large power consumption from vision sensor and co...
 Owing to the nature of battery-operated sensors, the residual energy of their battery should be considered when a sink node collects sensory data from them. If a sink attempts to collect data from a sensor that does not have sufficient residual energy to transmit data, the utilization of wireless communication resources may be degraded. However, re...
 One of the major challenges for Internet-of-Things applications is that the existing cellular technologies do not support the uplink IoT traffic in an energy-efficient manner. There are two principal ways for serving the uplink IoT traffic: grant-based (i.e., scheduled) and grant-free (i.e., random access). Grant-based access provides fine-grained ...
 With the development of the Internet of Things, trust has become a limited factor in the integration of heterogeneous IoT networks. In this regard, we use the combination of blockchain technology and SDN/NFV to build a heterogeneous IoT network resource management model based on the consortium chain. In order to solve the efficiency problem caused ...
 Satisfying the software requirements of emerging service-based Internet of Things (IoT) applications has become challenging for cloud-centric architectures, as applications demand fast response times and availability of computational resources closer to end-users. As such, meeting application demands must occur at runtime, facing uncertainty and in...
 Sensor systems have the potential to make abstract science phenomena concrete for K–12 students. Internet of Things (IoT) sensor systems provide a variety of benefits for modern classrooms, creating the opportunity for global data production, orienting learners to the opportunities and drawbacks of distributed sensor and control systems, and reduci...
 Internet-of-Things (IoT) innovations produce interesting opportunities, impact ethical and social aspects toward human society, and influence operational and technical solutions toward the structural systems. This article discusses the impact of some relevant characteristics of the IoT innovations. Significant debated aspects are the product discon...
 Fog/edge computing has been recently regarded as a promising approach for supporting emerging mission-critical Internet of Things (IoT) applications on capacity and battery constrained devices. By harvesting and collaborating a massive crowd of devices in close proximity for computation, communication and caching resource sharing (i.e., 3C resource...
 Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
 The prosperity of Internet of Things (IoT) brings forth the deployment of large-scale sensing systems such as smart cities. The distributed devices upload their local sensing data to the cloud and collaborate to fulfill the large-area tasks such as pollutant diffusion analysis and target tracking. To accomplish the collaboration, time synchronizati...
 The next generation Internet of Things (IoT) exhibits a unique feature that IoT devices have different energy profiles and quality of service (QoS) requirements. In this paper, two energy and spectrally efficient transmission strategies, namely wireless power transfer assisted non-orthogonal multiple access (WPT-NOMA) and backscatter communication ...
 The Internet of Things (IoT) is an emerging paradigm and has penetrated deeply into our daily life. Due to the seamless connections of the IoT devices with the physical world through the Internet, the IoT applications use the cloud to store and provide ubiquitous access to collected data. Sharing of data with third party services and other users in...
 With more than 75 billions of objects connected by 2025, Internet of Things (IoT) is the catalyst for the digital revolution, contributing to the generation of big amounts of (transient) data, which calls into question the storage and processing performance of the conventional cloud. Moving storage resources at the edge can reduce the data retrieva...
 Current Internet of Things (IoT) infrastructures rely on cloud storage however, relying on a single cloud provider puts limitations on the IoT applications and Service Level Agreement (SLA) requirements. Recently, multiple decentralized storage solutions (e.g., based on blockchains) have entered the market with distinct architecture, Quality of Ser...
 Strongly quantized fixed-point arithmetic is now considered a well-established solution to deploy Convolutional Neural Networks (CNNs) on limited-memory low-power IoT endnodes. Such a trend is challenging due to the lack of support for low bitwidth fixed-point instructions in the Instruction Set Architecture (ISA) of state-of-the-art embedded Micro...
 In this paper, we propose a region-based pricing scheme, named as RegPrice, for provisioning safety-related decisions dynamically to the end-users. Typically, heterogeneous type of sensor nodes are present in the device layer of Safe-aaS. Considering the case of safety in road transportation, we compute the fixed and variable costs incurred in proc...
 The reliance on Network-on-Chip (NoC)-based Multiprocessor Systems-on-Chips (MPSoCs) is proliferating in modern embedded systems to satisfy the higher performance requirement of multimedia streaming applications. Task level coarse grained software pipeling also called re-timing when combined with Dynamic Voltage and Frequency Scaling (DVFS) has sho...
 The deployment of Deep Neural Networks (DNNs) on end-nodes at the extreme edge of the Internet-of-Things is a critical enabler to support pervasive Deep Learning-enhanced applications. Low-Cost MCU-based end-nodes have limited on-chip memory and often replace caches with scratchpads, to reduce area overheads and increase energy efficiency – requiri...
 Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) is activated to meet the key Quality of Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden and unexpected node failures in a barrier due to security attacks ...
 This paper presents a distributed and decentralized architecture for the implementation of Distributed Artificial Intelligence (DAI) using hardware platforms provided by the Internet of Things (IoT). A trained DAI system has been implemented over the IoT, where each IoT device acts as one or more of the neurons within the DAI layers. This is accomp...
 In this paper, an innovative quadrupole-based broadside-radiating unidirectional antenna is designed at 28.475 GHz for 5G IoT applications. The planar antenna is based on a single-layer technology and realized on a flexible substrate to facilitate conformal applications. It consists of a coax-fed driven dipole and two quadrupolar near-field resonan...
 With the booming of smart grid, The ubiquitously deployed smart meters constitutes an energy internet of things. This paper develops a novel blockchain-based transactive energy management system for IoT-aided smart homes. We consider a holistic set of options for smart homes to participate in transactive energy. Smart homes can interact with the gr...
 This brief presents an inductorless gm-boosted wideband balun low noise amplifier (LNA) for low power sub-GHz IoT applications. The proposed common source (CS) -common gate (CG) based gm-boosted balun LNA uses nMOS-pMOS configuration for doubling the transconductance and gain efficiency. Loads of CS and CG stages are capacitively coupled to remove ...
 The integration of drones, IoT, and AI domains can produce exceptional solutions to today's complex problems in smart cities. A drone, which essentially is a data-gathering robot, can access geographical areas that are difficult, unsafe, or even impossible for humans to reach. In this paper, an intelligent technique is proposed to predict the signa...
 In recent years, the Internet of Things (IoT) has made great progress. The interconnection between IoT and the Internet enables real-time information processing and transaction implementation through heterogeneous intelligent devices. But the security, the privacy, and the reliability of IoT are key challenges that limit its development. The featur...
 Cloud Data Centers (CDCs) have become a vital computing infrastructure for enterprises. However, CDCs consume substantial energy due to the increased demand for computing power, especially for the Internet of Things (IoT) applications. Although a great deal of research in green resource allocation algorithms have been proposed to reduce the energy ...
 The interest of Industry 4.0 in Smart Contracts and blockchain technologies is growing up day by day. Smart Contracts have enabled new kinds of interactions whereby contractors can even fully automate processes they agree on. This technology is really appealing in Internet of Things (IoT) domain because smart devices generate events for software ag...
 The social Internet of Things (IoT) (SIoT) helps to enable an autonomous interaction between the two architectures that have already been established: social networks and the IoT. SIoT also integrates the concepts of social networking and IoT into collaborative edge computing (CEC), the so-called CEC-based SIoT architecture. In closer proximity, Io...
 In the modern world, the connectivity-as-we-go model is gaining popularity. Internet-of-Things (IoT) envisions a future in which human beings communicate with each other and with devices that have identities and virtual personalities, as well as sensing, processing, and networking capabilities, which will allow the developing of smart environments ...
 Data-driven approaches are envisioned to build future Edge-IoT systems that satisfy IoT devices demands for edge resources. However, significant challenges and technical barriers exist which complicate resource management of such systems. IoT devices can demonstrate a wide range of behaviors in the devices resource demand that are extremely difficu...
 Computationally expensive applications, including machine learning, chemical simulations, and financial modeling, are promising candidates for noisy intermediate scale quantum (NISQ) computers. In these problems, one important challenge is mapping a quantum circuit onto NISQ hardware while satisfying physical constraints of an underlying quantum ar...
 An optimized three-dimensional one-step leapfrog finite-difference time-domain (FDTD) method has been investigated, which is with a weakly conditional stability (WCS) to reduce numerical dispersion further. By introducing the artificial anisotropy parameters in a cross-correspondence manner, the phase velocity error is effectively limited without a...
 In current Data Science applications, the course of action has derived to adapt the system behavior for the human cognition, resulting in the emerging area of explainable artificial intelligence. Among different classification paradigms, those based on fuzzy rules are suitable solutions to stress the interpretability of the global systems. However,...
 With the aim of reducing the reactive power for the dual-active-bridge (DAB) converter, this letter proposes an artificial intelligence (AI) aided minimum reactive power control scheme based on the harmonic analysis method. Specifically, as an advanced algorithm of the deep reinforcement learning (DRL), the deep deterministic policy gradient (DDPG)...
 Recently, there have been many studies attempting to take advantage of advancements in Artificial Intelligence (AI) in Analog and Mixed-Signal (AMS) circuit design. Automated circuit sizing optimization and improving the accuracy of performance models are the two predominant uses of AI in AMS circuit design. This paper first introduces and explains...
 Big-data frameworks such as MapReduce/Hadoop or Spark have many performance-critical configuration parameters which may interact with each other in a complex way. Their optimal values for an application on a given cluster are affected by not only the application itself but also its input data. This makes offline auto-configuration approaches hard t...
 Most convolutional neural network (CNN)-based cloud detection methods are built upon the supervised learning framework that requires a large number of pixel-level labels. However, it is expensive and time-consuming to manually annotate pixelwise labels for massive remote sensing images. To reduce the labeling cost, we propose an unsupervised domain...
 Since the advent of network function virtualization (NFV), cloud service providers (CSPs) can implement traditional dedicated network devices as software and flexibly instantiate network functions (NFs) on common off-the-shelf servers. NFV technology enables CSPs to deploy their NFs to a cloud data center in the form of virtual network functions (V...
 With convenient Internet access and ubiquitous high-quality sensors in end-user devices, a growing number of content consumers are engaging in the content creation process. Meanwhile, mobile edge computing (MEC) can provision distributed computing resources for local data processing. The MEC-enhanced video crowdsourcing application will gather user...
 Point clouds are fundamental in the representation of 3D objects. However, they can also be highly unstructured and irregular. This makes it difficult to directly extend 2D generative models to three-dimensional space. In this paper, we cast the problem of point cloud generation as a topological representation learning problem. To infer the represe...
 Cloud Warehouses have been exploiting CPU-FPGA environments to accelerate multi-tenant applications to achieve scalability and maximize resource utilization. In this scenario, kernels are sent to CPU and FPGA concurrently, considering available resources and workload characteristics, which are highly variant. Therefore, we propose a multi-objective...
 Point clouds are the most general data representations of real and abstract objects, and have a wide variety of applications in many science and engineering fields. Point clouds also provide the most scalable multi-resolution composition for geometric structures. Although point cloud learning has shown remarkable results in shape estimation and sem...
 Cloud Data Centers (CDCs) have become a vital computing infrastructure for enterprises. However, CDCs consume substantial energy due to the increased demand for computing power, especially for the Internet of Things (IoT) applications. Although a great deal of research in green resource allocation algorithms have been proposed to reduce the energy ...
 Cloud data centers provide services for an increasing number of applications. The virtual machines (VMs) that perform the corresponding application tasks need to be allocated to physical machines (PMs). For VM allocation, cloud service centers consider both energy consumption and quality of service (QoS), while cloud users are primarily concerned w...
 Mobile edge computing (MEC) is an emerging architecture for accommodating latency sensitive virtualized services (VSs). Many of these VSs are expected to be safety critical, and will have some form of reliability requirements. In order to support provisioning reliability to such VSs in MEC in an efficient and confidentiality preserving manner, in t...
 Most UAVs depend on realtime 3D point clouds to navigate through unknown environments. However, both point clouds processing and trajectory planning are computationally expensive and will deplete UAV's battery quickly. There are also inevitable uncertainties in point clouds, which further makes collision-free trajectory planning a very challenging ...
 In this paper, we present a real-world case study on deploying a face recognition application, using MTCNN detector and FaceNet recognizer. We report the challenges faced to decide on the best deployment strategy. We propose three inference architectures for the deployment, including cloud-based, edge-based, and hybrid. Furthermore, we evaluate the...
 Edge computing has emerged as a new paradigm to bring cloud applications closer to users for increased performance. Unlike back-end cloud systems which consolidate their resources in a centralized data center location with virtually unlimited capacity, edge-clouds comprise distributed resources at various computation spots, each with very limited c...
 With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network resource allocation, which profoundly affects the traditional security solution. Security is regarded as a technology independent of the cloud native architecture in the initial design, traditi...
 To increase the flexibility and the dynamism of communication networks, Software Defined Networking (SDN) has emerged as the challenging approach to decouple control and data planes, using a logically centralized controller able to manage the underlying network resources. However, traditional network solutions can not be always used in SDN. In this...
 Mobile edge computing enables resource-limited edge clouds (ECs) in federation to help each other with resource-hungry yet delay-sensitive service requests. Contrary to common practice, we acknowledge that mobile services are heterogeneous and the limited storage resources of ECs allow only a subset of services to be placed at the same time. This p...
 This Special Section on ‘`Cloud-Edge Computing for Cyber-Physical Systems and Internet-of-Things’' is oriented to the dissemination of a few of those latest research and innovation results, covering many aspects of design, optimization, implementation, and evaluation of emerging cloud-edge solutions for CPS and IoT applications. The selected high-q...
 The long-term data record (LTDR) has the goal of developing a quality and consistent Advanced Very High Resolution Radiometer (AVHRR) surface reflectance and albedo products dating back to 1982 at 0.05° spatial resolution. Distinguishing between cloud and snow is of critical importance when analyzing global albedo trends, for they influence the Ear...
 As a promising technology in the development of human healthcare services, the wireless body area networks (WBANs) technology has attracted widespread attention in recent years from both industry and academia. However, due to the sensitiveness of the medical system and the capability limitation of the wearable devices, security, privacy, and effici...
 The rapid growth of mobile device (e.g., smart phone and bracelet) has spawned a lot of new applications, during which the requirements of applications are increasing, while the capacities of some mobile devices are still limited. Such contradiction drives the emergency of computation migration among mobile edge devices, which is a lack of research...
 In contrast to the traditional cloud-based IoT structure, which imposes high computation and storage demands on the central cloud server, edge computing can process data at the network edge. In this paper, we present an edge computing data storage protocol employing the blockchain and the group signature, where the blockchain works as the trusted t...
 With the widespread application of cloud storage, ensuring the integrity of user outsourced data catches more and more attention. To remotely check the integrity of cloud storage, plenty of protocols have been proposed, implemented by checking the equation constructed by the aggregated blocks, tags, and indices. However, the verifier only has the k...
 Cloud computing becomes a promising technology to reduce computation cost by providing users with elastic resources and application-deploying environments as a pay-per-use model. More scientific workflow applications have been moved or are being migrated to the cloud. Scheduling workflows turns to the main bottleneck for increasing resource utiliza...
 Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
 In this letter, we discuss the security weakness of Wang et al.'s attribute-based data sharing scheme, in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI: 10.1109/TIFS.2016.2549004). Through designing two concrete attacks, we identify two serious security flaws in their scheme. 1) First, we show that their scheme is insecure bec...
 Cloud services request lower cost compared to traditional software of self-purchased infrastructure due to the characteristics of on-demand resource provisioning and pay-as-you-go mode.In the cloud services market, service providers attempt to make more profits from their services,while users hope to choose low-cost services with high-quality.The c...
 This work takes as a starting point a collection of patterns for engineering software for the cloud and tries to find how they are regarded and adopted by professionals. Existing literature assessed the adoption of cloud computing with a focus on business and technological aspects and fall short in grasping a holistic view of the underlying approac...
 This paper proposes a backup resource allocation model that provides a probabilistic protection for primary physical machines in a cloud provider to minimize the required total capacity. When any random failure occurs, workloads are transferred to preplanned and dedicated backup physical machines for prompt recovery. In the proposed model, a probab...
  Cloud computing enables enterprises and individuals to outsource and share their data. This way, cloud computing eliminates the heavy workload of local information infrastructure. Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data shari...
 In recent years, the investigations on Cyber-Physical Systems~(CPS) have become increasingly popular in both academia and industry. A primary obstruction against the booming deployment of CPS applications lies in how to process and manage large amounts of generated data for decision making. To tackle this predicament, researchers advocate the idea ...
 Nowadays, more and more computation-intensive scientific applications with diverse needs are migrating to cloud computing systems. However, the cloud systems alone cannot meet applications' requirements at all times with the increasing demands from users. Therefore, the multi-cloud systems that can provide scalable storage and computing resources b...
 IaaS from the public cloud is becoming a new option for organizations in need of HPC capabilities. IaaS offers greater flexibility in hardware choices and operational costs. Furthermore, IaaS enables small organizations to access resources previously reserved for organizations with larger capitals. This study uses the HPCG benchmark to assess the p...
 Online non-intrusive load monitoring methods have captivated academia and industries as parsimonious solutions for household energy efficiency monitoring as well as safety control, anomaly detection, and demand-side management. However, despite the promised energy efficiency by providing appliance specific consumption information feed-backs, the co...
 Public auditing schemes for cloud storage systems have been extensively explored with the increasing importance of data integrity. A third-party auditor (TPA) is introduced in public auditing schemes to verify the integrity of outsourced data on behalf of users. To resist malicious TPAs, many blockchain-based public verification schemes have been p...
 Inappropriate service migrations can lead to undesirable situations, such as high traffic overhead, long service latency, and service disruption. In this paper, we propose an application-aware migration algorithm (AMA) with prefetching. In AMA, a mobile device sends a service offloading request to the controller. After receiving this request, the c...
 When dealing with traffic big data under the background of Internet of Things (IoT), traffic control under the single-machine computing environment is difficult to adapt to the massive and rapid analysis and decision-making. To tackle this problem, we propose a parallel computing approach of traffic network flow control based on the mechanism of mo...
 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...
 With increasing of data size and development of multi-core computers, asynchronous parallel stochastic optimization algorithms such as KroMagnon have gained significant attention. In this paper, we propose a new Sparse approximation and asynchronous parallel Stochastic Variance Reduced Gradient (SSVRG) method for sparse and high-dimensional machine...
 Nowadays transceiver-free (also referred to as device-free) localization using Received Signal Strength (RSS) is a hot topic for researchers due to its widespread applicability. However, RSS is easily affected by the indoor environment, resulting in a dense deployment of reference nodes. Some hybrid systems have already been proposed to help RSS lo...
 A swarm of Autonomous Underwater Vehicles (AUVs) can provide richer spatial-temporal information than the traditional single-robot system, which can be used for underwater mapping, exploration, target tracking, among others. However, the limitation of AUVs’ battery cannot support persistent services, which restricts AUVs’ operating range and missio...
 In the coming 6G communications, network densification, high throughput, positioning accuracy, energy efficiency, and many other key performance indicator requirements are becoming increasingly strict. In the future, how to improve work efficiency while saving costs is one of the foremost research directions in wireless communications. Being able t...
 Recently, wireless edge networks have realized intelligent operation and management with edge artificial intelligence (AI) techniques (i.e., federated edge learning). However, the trustworthiness and effective incentive mechanisms of federated edge learning (FEL) have not been fully studied. Thus, the current FEL framework will still suffer untrust...
 Wireless Multimedia Sensor Network (WMSN) is increasingly being deployed for surveillance, monitoring and Internet-of-Things (IoT) sensing applications where a set of cameras capture and compress local images and then transmit the data to a remote controller. Such captured local images may also be compressed in a multi-view fashion to reduce the re...
 This paper presents an integrated ultra-low-power (ULP) wireless sensor system-on-chip (SoC) that can be used for voltage sensing in both Internet of Things applications and bio-potential monitoring. In order to increase the energy efficiency of the analog front-end (AFE), we propose a noise and power efficient push-pull low noise instrumentation a...
 Recently, wireless powered cooperative cognitive radio networks (CRNs), which combine the technologies of radio frequency (RF) energy harvesting and CR, have drawn great attention. In such networks, energy cooperation between the cognitive users (CUs) and the wireless powered primary users (PUs) can be performed, where the CUs can charge the PUs wi...
 The excessive use of nodes and communication links in a wireless control system (WCS) causes unnecessary utilization of resources. In this article, a strategic topological formation is studied for a WCS, where a previously proposed topology consisting of a plant system, a controller system, and an intermediate network system is further developed. M...
 Next generation wireless systems have witnessed significant R&D attention from academia and industries to enable wide range of applications for connected environment around us. The technical design of next generation wireless systems in terms of relay and transmit power control is very critical due to the ever-reducing size of these sensor enabled ...
 Intelligent reflecting surface (IRS) is an enabling technology to engineer the radio signal propagation in wireless networks. By smartly tuning the signal reflection via a large number of low-cost passive reflecting elements, IRS is capable of dynamically altering wireless channels to enhance the communication performance. It is thus expected that ...
 This correspondence studies resource allocation for a wireless-powered relay network, where a hybrid relay with constant energy supply assists an energy-constrained source to send confidential information to a destination in the presence of an eavesdropper. We propose a novel transmission protocol termed charge-then-cooperate to support secure comm...
 To perform large-scale monitoring of sensitive events, energy harvesting wireless sensor network is considered where a mobile data sink MS collects data while travelling on a fixed path Pms. The sensor nodes sense environmental data continuously at a pre-specified rate. The sensors close to Pms are referred as gateways. Sensors forward their data t...
 Thanks to flexible deployment and excellent maneuverability, autonomous drones are regarded as an effective means to enable aerial data capture in large-scale wireless sensor networks with limited to no cellular infrastructure, e.g., smart farming in a remote area. A key challenge in drone-assisted sensor networks is that the autonomous drone's man...
 With advances in wireless power transfer techniques, Battery-Free Wireless Sensor Networks (BF-WSNs) which can support long-term applications, has been attracting increasing interests in recent years. Unfortunately, the problem of Minimum Latency Aggregation Scheduling (MLAS) is not well studied in BF-WSNs. Existing works always have a rigid assump...
 This paper studies an intelligent reflecting surface (IRS) aided wireless powered sensor network (WPSN). Specifically, a power station (PS) provides wireless energy to multiple internet of thing (IoT) devices which supports them to deliver their own messages to an access point (AP). Moreover, we deploy an IRS to enhance the performance of the WPSN ...
 The byzantine model is widely used to depict a variety of node faults in networks. Previous studies on byzantine-resilient protocols in wireless networks assume reliable communications and do not consider the jamming behavior of byzantine nodes. Such jamming, however, is a very critical and realistic behavior to be considered in modern wireless net...
 Sensor scheduling is a well studied problem in signal processing and control with numerous applications. Despite its successful history, most of the related literature assumes the knowledge of the underlying probabilistic model of the sensor measurements such as the correlation structure or the entire joint probability density function. Herein, a f...
 Minimized and nearly deterministic end-to-end latency facilitates real-time data acquisition and actuator control. In addition, defined latency is an integral part of quality oriented service in order to get closer to the reliability of wired networks and at the same time take advantage of wireless networking. This paper introduces a QoS routing pr...
 Wireless sensor networks have wide applications in monitoring applications. However, sensors' energy and processing power constraints, as well as the limited network bandwidth, constitute significant obstacles to near-real-time requirements of modern IoT applications. Offloading sensor data on an edge computing infrastructure instead of in-cloud or...
 Wireless sensor network (WSN) is composed of many micro sensor nodes, and the localization technology is one of the most important applications of WSN technology. At present, many positioning algorithms have high position-ing accuracy in line-of-sight (LOS) environment, but poor positioning accuracy in non-line-of-sight (NLOS) environ-ment. In this...
 With the development of sensor-clouds, the traditional WSN is expanded and the computing capacity is greatly improved. However, there are still challenges to be solved in sensor-clouds, such as how to disseminate codes to all nodes in a fast and energy-saving way. In this paper, an early wake-up ahead (EWA) code dissemination scheme is proposed to ...
 To extend the lifetime of wireless multihop networks suffering from energy scarcity of constituent nodes, we apply a wireless power transfer (WPT) technology to multihop transmission and allow the nodes with substantial energy to perform WPT to energy-deprived nodes in a cooperative way. We construct a system model for this cooperative WPT (CoWPT)-...
 In this article, a patterned honeycomb absorber (PHA) with an embedded frequency-selective surface (FSS) was proposed for broadband applications. The impedance of the FSS embedded in a homogeneous honeycomb absorber (HA) was first analyzed, which suggested that directly combining an FSS with a homogeneous HA was unreliable. Subsequently, a PHA was ...
 Lightly damping linear dynamic characteristics of a flexure-based stage mainly limit control bandwidth when its piezo-actuating hysteresis is well compensated. In this paper, a novel damped decoupled XY nanopositioning stage embedding graded local resonators (GLRs) is developed and optimized based on the maximization of motion range and first-order...
 A subranging analog-to-digital converter (ADC) with reference-embedded comparators (RECs) is proposed. By adjusting the bias current and/or body voltage of the REC’s input differential pair, the REC offset can be adjusted to a specific voltage equal to a reference voltage referred to henceforth as the embedded reference. For the ADC’s coarse stage,...
 Ridge regression is frequently utilized by both supervised learning and semisupervised learning. However, the results cannot obtain the closed-form solution and perform manifold structure when ridge regression is directly applied to semisupervised learning. To address this issue, we propose a novel semisupervised feature selection method under gene...
 Rotor position is essential in control of permanent magnet synchronous motors (PMSMs). In terms of resolution, structural complexity, occupied volume, anti- interference ability, environmental adaptability and cost, embedded magnetic encoder based on linear Halls owns strong competitiveness. When linear Hall sensors are selectively installed at sta...
 Chinese word embedding models capture Chinese semantics based on the character feature of Chinese words and the internal features of Chinese characters such as radical, component, stroke, structure and pinyin. However, some features are overlapping and most methods do not consider their relevance. Meanwhile, they express words as point vectors that...
 In this paper, a half-bridge class-D audio amplifier (HB-CDAA) system with embedded bidirectional buck-boost converter is proposed. The proposed HB-CDAA system consists of a front-end symmetric bipolar output converter, a bidirectional buck-boost converter and a HB-CDAA. With the help of the embedded bidirectional buck-boost converter, bus voltage ...
 A class of multi-resonant RF filtering stage that exhibits a multi-band bandpass filtering transfer function with embedded in-band notches is presented. It is derived from the application of a composed lowpass-to-multi-passband/multi-stopband frequency transformation that converts the normalized lowpass prototype into the proposed multi-passband/mu...
 Parkinson's disease (PD) is known as an irreversible neurodegenerative disease that mainly affects the patient's motor system. Early classification and regression of PD are essential to slow down this degenerative process from its onset. In this article, a novel adaptive unsupervised feature selection approach is proposed by exploiting manifold lea...
 Hyperspectral images with tens to hundreds of spectral bands usually suffer from low spatial resolution due to the limitation of the amount of incident energy. Without auxiliary images, the single hyperspectral image super-resolution (SR) method is still a challenging problem because of the high-dimensionality characteristic and special spectral pa...
  Feature selection is of great importance to make prediction for process variables in industrial production. An embedded feature selection method, based on relevance vector machines with an approximated marginal likelihood function, is proposed in this study. By setting hierarchical prior distributions over the model weights and the parameters o...
 This article presents a comprehensive design methodology to improve the field weakening (FW) operation of low inductance slotless permanent magnet synchronous machines (PMSMs). The proposed concept of using a stator embedded inductor integrated with the torque producing machine windings helps achieve a wide constant power speed range (CPSR) and a d...
 Modern mobile OSes support to display Web pages in the native apps, which we call embedded Web pages. In this paper, we conduct, to the best of our knowledge, the first measurement study on browsing embedded Web pages on Android. Our study on 22,521 popular Android apps shows that 57.9% and 73.8% of apps embed Web pages on two popular app markets: ...
 Learning node representations in a network has a wide range of applications. Most of the existing work focuses on improving the performance of the learned node representations by designing advanced network embedding models. In contrast to these work, this article aims to provide some understanding of the rationale behind the existing network embedd...
 High-speed ADC front-ends in wireline receivers allow for implementing flexible, complex, and robust equalization in the digital domain, as well as easily supporting bandwidth-efficient modulation schemes, such as PAM4 and duobinary. However, the power consumption of these ADC front-ends and subsequent digital signal processing is a major issue. Th...
 The unpredictability of processes in electric power systems (EPS) determine complexity of its control. This problem is especially relevant for EPS with renewable energy sources, FACTS and HVDC systems. Despite automatic control development, many issues related to EPS regimes control are solved by power system operators. Decision support systems (DS...
  As a complex nonlinear system, the power system in operation may experience chaotic oscillation which can threaten the stability of the system for unexpected events and uncertain factors. Initially, through considering factors such as the generators, the power system node voltage amplitude and phase angle, this article establishes a fourth-orde...
 A strategy was developed for reactive power control of the line-commutated converters (LCCs) of hybrid multi-terminal high-voltage direct current (MT-HVDC) systems. In the conventional method, the reactive power outputs of hybrid MT-HVDC systems are regulated discontinuously by only using switched shunt devices (SSDs). If continuous reactive power ...
 Graph-based learning in semisupervised models provides an effective tool for modeling big data sets in high-dimensional spaces. It has been useful for propagating a small set of initial labels to a large set of unlabeled data. Thus, it meets the requirements of many emerging applications. However, in real-world applications, the scarcity of labeled...
 The line commutated converter (LCC) based HVDC projects generally use passive AC filters for harmonic cancellation, which has disadvantages of large footprint, poor filtering effect due to the offset of the resonance point, etc. This paper introduces a high-power LC hybrid active power filter (HAPF), which can meet the requirements of filtering and...
 This paper presents a unified power flow algorithm for large and complex mixed AC/DC power systems based on the partitioning of power grids, a version of the two-level Newton method, and the modified nodal analysis formulation. Partitioning significantly increases numerical efficiency without altering the accuracy of the power flow solution. This a...
 Compared with a power system under centralized control, a power system under fully distributed control has stronger interdependence between its physical side and cyber side. Such a system is a typical cyber-physical system (CPS). The time delay problem is one of the most critical issues in the application of distributed control for power systems. F...
 Due to the energy linkage between electricity and gas networks, assessing the voltage security of the electricity system without considering the practical constraints of both systems, may lead to unrealistic values of loading margins (LM). This work proposes a model for investigating the impact of gas networks on the voltage security of electric tr...
 This paper proposes a new decentralized data-driven load res-toration (DDLR) scheme for transmission and distribution (TD) systems with high penetration of wind power. Robust DDLR models are constructed in order to handle uncertainties and ensure the feasibility of decentralized schemes. The Wasserstein metric is used to describe the ambiguity sets...
 Parasitic inductance reduction is increasingly vital for the SiC power module in high-frequency and high-capacity applications. To address the parasitic issue, the automatic layout design offers the potential to pursue the optimal configuration of the power packaging. However, the efficient and accurate parasitic extraction of the packaging is the ...
  The problem of effective use of Phasor Measurement Units (PMUs) to enhance power systems awareness and security is a topic of key interest. The central question to solve is how to use this new measurements to reconstruct the state of the system. In this paper we provide the first solution to the problem of (globally convergent) state estimation...
 Distributed Series Reactances are devices that dynamically increase the impedance of a line to reduce the power ow it carries. This work explores whether widely deploying these devices enhances a power system's robustness against line overload cascading failures. The presence of Distributed Series Reactances may make it less likely that equipped li...
 The extensive application of the power electronic transformers (PET) in power systems poses a challenge as the accurate and high-speed electromagnetic transient (EMT) simulation of PET has been a critical issue. The computational time of the detailed EMT simulation of PET on EMT programs is unacceptable, due to the large electrical node count, micr...
  Urban power grids are facing many operational and expansion challenges to meet further demand growth and increased reliability requirements. Advanced transmission technologies have been considered by the electric utilities to effectively increase the utilization of existing infrastructure and operational flexibility. The focus of this paper is ...
 Novel cable traction power supply system (NCTPSS) is a kind of long distance co-phase traction power supply system (TPSS), it can effectively solve problems caused by train's passing through electrical phase separation and improve utilization rate of regenerative energy in system, which is an ideal traction power supply mode. However, its structure...
  Linearization of power flow is an important topic in power system analysis. The computational burden can be greatly reduced under the linear power flow (LPF) model while the model error is the main concern. Therefore, various linear power flow models have been proposed in literature and dedicated to seek better linear models. Many linear power ...
 With the wide application of distributed energy technology in active distribution networks (ADNs), virtual power plants (VPPs) are introduced as a promising integration and management technology. To coordinate their operation schedule and ensure confidentiality, we establish a coordinated optimal power flow (OPF) model and propose an efficient dece...
 The ability of HTS cable networks to provide a solution for the high power density requirements of electric transportation applications was explored. The high current density and the temperature-dependent critical current features of HTS cables were shown to allow resilient designs for power distribution in electric transportation applications. Hea...
 Linear power supplies (LPSs) are widely used in fields including measurement systems, radiofrequency systems, medical applications, nuclear power plants, and spacecraft electronics. Electrolytic capacitors are used in a variety of devices because of their small size, low cost, and large capacity. During the use of electrolytic capacitor, it is very...
  Power quality is an important concern for practical microgrid (MG) applications due to the widespread use of non-linear loads, and it is characterised by the implicit trade-off between voltage quality in the MG nodes and harmonic current sharing between distributed generators (DGs). Active and passive filters can be used to address this problem...
 The renewable power-based hydrogen production can lead to the integrated electric power and hydrogen system (IPHS) and a pathway to a sustainable energy utilization. Hydrogen is mainly transported via hydrogen tube trailers (HTs), making the hydrogen energy system (HES) operation quite different from those of others energy technologies. This paper ...
 This letter investigates parallelism approaches for equation and Jacobian evaluations in power flow calculation. Two levels of parallelism are proposed and analyzed: inter-model parallelism, which evaluates models in parallel, and intra-model parallelism, which evaluates calculations within each model in parallel. Parallelism techniques such as mul...
 The switching operations of circuit breakers and disconnectors in substations can generate very fast transients, including transient earth voltage rise and intense electromagnetic radiation, causing severe disturbance of on-site electronic devices in substations and seriously affecting the development of smart power equipment. The power supply of a...
 With a fixed driving frequency, the number of Rx is not limited. It is analyzed that the quadrature phenomenon of the Tx and Rx currents can be used as a sign that the cross-coupling is fully compensated. A phase synchronization channel is established that shares power transfer coils. An MCU-free feedback loop is constructed in Rx to control the va...
 Full converter-based wind power generation (FCWG, e.g., a permanent magnet synchronous generator (PMSG)), though normally considered to be decoupled from the external power grid can be actuated as an inertia source to suppress modal resonance in wind generation penetrated power systems by installing auxiliary resonance controllers (ARCs). In this p...
  With the introduction of massive renewable energy sources and storage devices, the traditional process of grid operation must be improved in order to be safe, reliable, fast responsive and cost efficient, and in this regard power flow solvers are indispensable. In this paper, we introduce an Interior Point-based (IP) Multi-Period AC Optimal Pow...
 This paper presents a comprehensive analysis of non-linear voltage-dependent capacitances of vertical SiC power MOSFETs with lateral channel, focusing specifically on fast switching transients. The capacitance-voltage (C-V) device characteristics, (Cgs, Cgd, Cds), being dependent on both Vgs and Vds, are extracted by means of two-dimensional Techno...
  Voltage and current waveforms contain the most authentic and granular information on the behaviors of power systems. In recent years, it has become possible to synchronize waveform data measured from different locations. Thus largescale coordinated analyses of multiple waveforms over a wide area are within our reach. This development could unle...
 Recently, several convex relaxations have been successfully applied to solve the AC optimal power flow (OPF) problem, which has caught the attention of the research community. Among these relaxations, a relaxation based on semidefinite programming (SDP) stands out. Accordingly, in this work a methodology to solve the optimal reactive power dispatch...
 This paper proposes a data-driven chanceconstrained optimal gas-power flow (OGPF) calculation method without any prior assumption on the distribution of uncertainties of wind power generation. The Gaussian mixture model is employed to fit the uncertainty distribution, where the Bayesian nonparametric Dirichlet process is adopted to tune the compone...
  This paper presents an optimal transient-stability control strategy that modulates the real power injected and absorbed by distributed energy-storage devices. These devices are located at the high-voltage bus of several generators in a synchronous power system. The system is broken into areas based upon groupings of generators. The control stra...
  Time delays are inevitable in the power systems with wide-area control signals, which may compromise the control performance and thus jeopardize the stability of the power systems. To analyze the impacts of system parameters on critical oscillation modes of a time-delayed power system (TDPS), a new method for eigenvalue trajectory tracking of TD...
 Conventionally, the converter of switched reluctance motor (SRM) is fed by the uncontrollable diode bridge rectifier (DBR), which leads to a low grid-side power factor (PF) and high current total harmonic distortion (THD). In this paper, an alternative solution for the grid-connected high-speed SRM drive system with improved PF is proposed. In the ...
 The paper presents accurate and simple dynamic model of a supercapacitor bank system for power system dynamics studies. The proposed model is derived from a detailed RC circuit representation. Furthermore, a complete control system of the supercapacitor bank is also presented. The proposed model is easy to integrate in any power system simulation s...
 Deep learning methods have played a more and more important role in hyperspectral image classification. However, general deep learning methods mainly take advantage of the sample-wise information to formulate the training loss while ignoring the intrinsic data structure of each class. Due to the high spectral dimension and great redundancy between ...
 Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel ...
 Graph node embedding aims at learning a vector representation for all nodes given a graph. It is a central problem in many machine learning tasks (e.g., node classification, recommendation, community detection). The key problem in graph node embedding lies in how to define the dependence to neighbors. Existing approaches specify (either explicitly ...
  In this paper, we report our discovery on named entity distribution in a general word embedding space, which helps an open definition on multilingual named entity definition rather than previous closed and constraint definition on named entities through a named entity dictionary, which is usually derived from human labor and replies on schedule...
 Most recent semi-supervised video object segmentation (VOS) methods rely on fine-tuning deep convolutional neural networks online using the given mask of the first frame or predicted masks of subsequent frames. However, the online fine-tuning process is usually time-consuming, limiting the practical use of such methods. We propose a directional dee...
 Querying and reporting from large volumes of structured, semi-structured, and unstructured data often requires some flexibility. This flexibility provided by fuzzy sets allows for categorization of the surrounding world in a flexible, human mind-like manner. Apache Hive is a data warehousing framework working on top of the Hadoop platform for Big D...
 Big data processing systems, such as Hadoop and Spark, usually work in large-scale, highly-concurrent, and multi-tenant environments that can easily cause hardware and software malfunctions or failures, thereby leading to performance degradation. Several systems and methods exist to detect big data processing systems’ performance degradation, perfo...
 The AI chips increasingly focus on implementing neural computing at low power and cost. The intelligent sensing, automation, and edge computing applications have been the market drivers for AI chips. Increasingly, the generalisation, performance, robustness, and scalability of the AI chip solutions are compared with human-like intelligence abilitie...
  In this paper, a video service enhancement strategy is investigated under an edge-cloud collaboration framework, where video caching and delivery decisions are made in the cloud and edge respectively. We aim to guarantee the user fairness in terms of video coding rate under statistical delay constraint and edge caching capacity constraint. A hy...
  The human brain is the gold standard of adaptive learning. It not only can learn and benefit from experience, but also can adapt to new situations. In contrast, deep neural networks only learn one sophisticated but fixed mapping from inputs to outputs. This limits their applicability to more dynamic situations, where the input to output mapping...
 With the fast growth in network-connected vehicular devices, the Internet of Vehicles (IoV) has many advances in terms of size and speed for Intelligent Transportation System (ITS) applications. As a result, the amount of produced data and computational loads has increased intensely. A solution to handle the vast volume of workload has been traditi...
 The development of vehicular Internet of Things (IoT) applications, such as E-Transport, Augmented Reality, and Virtual Reality are growing progressively. The mobility aware services and network-based security are fundamental requirements of these applications. However, multiside offloading enabling blockchain and cost-efficient scheduling in heter...
  Mobile cloud and edge computing protocols make it possible to offer computationally heavy applications to mobile devices via computational offloading from devices to nearby edge servers or more powerful, but remote, cloud servers. Previous work assumed that computational tasks can be fractionally offloaded at both cloud processor (CP) and at a l...
  Robust road boundary extraction and completion play an important role in providing guidance to all road users and supporting high-definition (HD) maps. The significant challenges remain in remarkable and accurate road boundary recovery from poor road boundary conditions. This paper presents a novel deep learning framework, named BoundaryNet, to...
 The supply-demand matching (SDM) strategy is an important part of the transaction mechanism design of cloud manufacturing (CMfg) platforms, which has a significant impact on the evolution trend of cloud manufacturing ecosystems (CMEs). To help CMfg platform operators choose the appropriate SDM strategy, first, the evolution process of the CME was q...
  Computation partitioning is an important technique to improve the application performance by selectively offloading some computations from the mobile devices to the nearby edge cloud. In a dynamic environment in which the network bandwidth to the edge cloud may change frequently, the partitioning of the computation needs to be updated according...
 Vehicular cloud computing has emerged as a promising solution to fulfill users’ demands on processing computation-intensive applications in modern driving environments. Such applications are commonly represented by graphs consisting of components and edges. However, encouraging vehicles to share resources poses significant challenges owing to users...
 We investigate the performance of multi-user multiple-antenna downlink systems in which a base station (BS) serves multiple users via a shared wireless medium. In order to fully exploit the spatial diversity while minimizing the passive energy consumed by radio frequency (RF) components, the BS is equipped with M RF chains and N antennas, where M <...
 Cold atmospheric plasmas (CAPs) have shown great promise for medical applications through their synergistic chemical, electrical, and thermal effects, which can induce therapeutic outcomes. However, safe and reproducible plasma treatment of complex biological surfaces poses a major hurdle to the widespread adoption of CAPs for medical applications....
 The synthesis of a metasurface exhibiting a specific set of desired scattering properties is a time-consuming and resource-demanding process, which conventionally relies on many cycles of full-wave simulations.It requires an experienced designer to choose the number of the metallic layers, the scatterer shapes and dimensions, and the type and the t...
  Continuous monitoring of anaesthetics infusion is demanded by anaesthesiologists to help in defining personalized dose, hence reducing risks and side effects. We propose the first piece of technology tailored explicitly to close the loop between anaesthesiologist and patient with continuous drug monitoring. Direct detection of drugs is achieved...
 An efficient multilayer machine learning-assisted optimization (ML-MLAO)-based robust design method is proposed for antenna and array applications. Machine learning methods are introduced into multiple layers of the robust design process, including worst-case analysis (WCA), maximum input tolerance hypervolume (MITH) searching, and robust optimizat...
 Stochastic unit commitment is an efficient method for grid operation in the presence of significant uncertainties.An example is an operation during a predicted hurricane with uncertain line out-ages.However, the solution quality comes at the cost of substantial computational burden, which makes its adoption challenging.This paper evaluates some pos...
 Automated Machine Learning (AutoML) has achieved remarkable progress on various tasks, which is attributed to its minimal involvement of manual feature and model designs. However, existing AutoML pipelines only touch parts of the full machine learning pipeline, e.g., Neural Architecture Search or optimizer selection.This leaves potentially importan...
 ? Curriculum learning (CL) is a training strategy that trains a machine learning model from easier data to harder data, which imitates the meaningful learning order in human curricula. ? As an easy-to-use plug-in, the CL strategy has demonstrated its power in improving the generalization capacity and convergence rate of various models in a wide r...
 Multi-task learning technique is widely utilized in machine learning modeling where commonalities and differences across multiple tasks are exploited. However, multiple conflicting objectives often occur in multi-task learning. Conventionally, a common compromise is to minimize the weighted sum of multiple objectives which may be invalid if the obj...
 Stereo matching is one of the longest-standing problems in computer vision with close to 40 years of studies and research. Throughout the years the paradigm has shifted from local, pixel-level decision to various forms of discrete and continuous optimization to data-driven, learning-based methods. Recently, the rise of machine learning and the rapi...
 ? This work aims to enhance our fundamental understanding of how the measurement setup used to generate training and testing datasets affects the accuracy of the machine learning algorithms that attempt solving electromagnetic inversion problems solely from data. ? A systematic study is carried out on a one-dimensional semi-inverse electromagneti...
 Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trust worth entity in an electronic communication there are several different techniques to control phishing, including legislation and technology created specifically to protect against phishing. This project provides...
 In this paper, we show the remarkable timing error (TE) and residual chromatic dispersion (CD) tolerance improvements of the filter bank multicarrier (FBMC) over orthogonal frequency division multiplexing (OFDM) for high-baudrate spectral slicing transmitter and single coherent receiver transmissions. For a 512 Gb/s 16 quadrature amplitude modulate...
  Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trust worth entity in an electronic communication there are several different techniques to control phishing, including legislation and technology created specifically to protect against phishing. This project provide...
 Social Media has quickly gained prominence as it provides people with the opportunity to communicate and share posts and topics. Tremendous value lies in automated analysing and reasoning about such data in order to derive meaningful insights, which carries potential opportunities for businesses, users, and consumers. Many events in the world are a...
 Falls are the main source of injury for elderly patients with epilepsy and Parkinson’s disease. Elderly people who carry battery powered health monitoring systems can move unhindered from one place to another according to their activities, thus improving their quality of life. This paper aims to detect when an elderly individual falls and to provid...
 Telemedicine is the newest technology which is the combination of telecommunication and information technology for medical purposes. An embedded system is a computer system with a dedicated function within a larger mechanical or electrical system, often with real-time computing constraints It is embedded as part of a complete device often including...
 A control unit (CU) handles all processor control signals. It directs all input and output flow, fetches code for instructions from microprograms and directs other units and models by providing control and timing signals. A CU component is considered the processor brain because it issues orders to just about everything and ensures correct instructi...
 Digital image processing deals with the manipulation of digital images through a digital computer. It is a subfield of signal and systems but focus particularly on images. DIP focuses on developing a computer system that is able to perform processing on an image. The input of that system is a digital image and the system process that image using ef...
 Single phase and three phase induction machines are very popular in the industries because of their vast applications. Hence it becomes necessary to protect them against faults so as to ensure uninterrupted operation and functioning. Various parameter controlling and monitoring systems are present for other types of machine, but in case the of indu...
 Home automation is the control of any electrical and electronic device in our home, whether we are there or not. Some products are available that allow us to control over the devices automatically using raspberry pi model either by remote control. This home automation system provide the user with remote control of various lights and appliances with...
 “GSM Based DC Motor Speed Control” implements the emerging applications of the GSM technology. Using GSM networks, a control system has been proposed that will act as an embedded system which can monitor and control appliances and other devices locally using built-in input and output peripherals. Remotely the system allows the user to effectively ...
 Home automation or smart home is building automation for the home. It involves the control and automation of lighting, heating, ventilation, air conditioning, and security, as well as home appliances such as washer/dryers, ovens or refrigerators/freezers. Wi-Fi is often used for remote monitoring and control Home devices, when remotely monitored an...
 Present industry is increasingly shifting towards automation. Two principle components of today’s industrial automations are programmable controllers and robots. In order to aid the tedious work and to serve the mankind, today there is a general tendency to develop an intelligent. As the name signifies, an embedded system is embedded or builds int...
 Digital media archives are increasing to colossal proportions in the world today, which includes audio, video and images An Image refers as a picture produced on an electronic display .A digital image is a numeric representation of a two-dimensional image. Digital image processing refers to processing of digital images by using digital computers. N...
 Grass cutter machines have become very popular today. Most of the times grass cutter machines are used for soft grass furnishing. In a time where technology is merging with environmental awareness, consumers are looking for ways to contribute to the relief of their own carbon footprints. Pollution is man-made and can be seen in our own daily lives,...
 The Internet of Medical Things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks. Medical devices equipped with Wi-Fi allow the communication that is the basis of IoMT. IoMT devices link to cloud platforms such as Things Speak, Amazon Web Services, on which captured d...
 The disasters in underground coal mine are very serious issues to day. So the safe production of coal in the mine is an important factor to be considered. To improve the safety system in the mines, a reliable communication system must be there, between the workers of the mine, and the control base station. Wired communication system was used inside...
 This project proposes a supervisory system based on WIFI technology, to improve the operation efficiency of bus monitoring system and realize intelligent transportation system. Using IR sensors to know the available seats in the bus. RF TRANSCEIVER is used to track the object(ie.bus) in certain regions. RF is used to convey the informations wh...
 An automatic irrigation system is developed to optimize water use for agricultural crops. The system consists soil moisture sensor and temperature senor placed in the soil. The system consist water Level sensor which will indicate the presence of water level in the water source. By comparing the signal from the sensors with threshold value the d...
 Design a prepaid energy meter to monitor the consumption of electricity. The concept “Pay first and then use it”. Prepaid energy meter also reduces the error made by humans while taking readings to a large extent. This project helps us to monitor the electricity system. ...
 Recommender system algorithms are widely used in e-commerce to provide personalized and more accurate recommendations to online users and enhance the sales and user stickiness of e-commerce. This paper discusses several recommendation algorithms and the challenge of tradition recommender system in big data situation, and then proposes a framework o...
 Learning with streaming data has received extensiveattention during the past few years. Existing approaches assumethat the feature space is fixed or changes by following explicitregularities, limiting their applicability in real-time applications.For example, in a smart healthcare platform, the feature space ofthe patient data varies when different...
 Representation learning has been proven to play an important role in the unprecedented success of machine learning models in numerous tasks, such as machine translation, face recognition and recommendation.The majority of existing representation learning approaches often require large amounts of consistent and noise-free labels. However, due to var...
 Periodicity is a frequently happening phenomenon for social interactions in temporal networks. Mining periodic communities are essential to understanding periodic group behaviors in temporal networks. Unfortunately, most previous studies for community mining in temporal networks ignore the periodic patterns of communities.In this paper, we study th...
 Frequent-pattern mining is a common means to reveal the hidden trends behind data. However, most frequent-pattern mining algorithms are designed for DRAM, instead of nonvolatile memories (NVMs) which are preferred by energy-limited systems.Due to the huge differences between the characteristics of NVMs and those of DRAM, existing frequent-pattern m...
 Understanding complex biological phenomena involves answering complex biomedical questions on multiple biomolecular information simultaneously, which are expressed through multiple genomic and proteomic semantic annotations scattered in many distributed and heterogeneous data sources; such heterogeneity and dispersion hamper the biologists’ ability...
 ALTEC defined and developed a framework with the main aim to process a big amount of data allowing a seamless connection between the collected information and the analyses performed by end users.This is the ASDP environment, that allows to organize data in the most adapt domain data store in order to have data ready for complex analyses. In particu...
 Heterogeneous information networks (HINs) are usually used to model information systems with multi-type objects and relations. In contrast, graphs that have a single type of nodes and edges, are often called homogeneous graphs. Measuring similarities among objects is an important task in data mining applications, such as web search, link prediction...
 With the fast development of various positioning techniques such as Global Position System (GPS), mobile devices and remote sensing, spatio -temporal data has become increasingly available nowadays.Mining valuable knowledge from spatio - temporal data is critically important to many real-world applications including human mobility understanding, sm...
 The advancement of several significant technologies, such as artificial intelligence, cyber intelligence, and machine learning, has made big data penetrate not only into the industry and academic field but also our daily life along with a variety of cyber-enabled applications. In this article, we focus on a deep correlation mining method in heterog...
 Matrix factorization (MF), a popular unsupervised learning technique for data representation, has been widely applied in data mining and machine learning. According to different application scenarios, one can impose different constraintson the factorization to find the desired basis, which captures high-level semantics for the given data, and lea...
 The city’s district attraction ranking plays an essential role in the city’s government because it can be used to reveal the city’s district attraction and thus help government make decisions for urban planning in terms of the smart city . The traditional methods for urban planning mainly rely on the district’s GDP, employment rate, population de...
 In recent decades, mobile or the Internet of Thing(IoT) devices are dramatically increasing in many domains and applications. Thus, a massive amount of data is generated and produced. Those collected data contain a large amount of in-teresting information (i.e., interestingness, weight, frequency, or uncertainty), and most of the existing and gen...
 User identification across multiple datasets has a wide range of applications and there has been an increasing set of research works on this topic during recent years.However, most of existing works focus on user identification with a single input data type, e.g., (I) identifying a user across multiple social networks with online data and (II) dete...
 The discovery and exploitation of hidden informa-tion in collected data has gained attention in many areas, particularly in the energy field due to their economic and environmental impact.Data mining techniques have then emerged as a suitable toolbox for analysing the data collected in modern network management systems in order to obtain a meaning...
 Biometric Fingerprint systems are used in the Voting machine for voter confirmation. fingerprint voting machine is designed where there is no need for the user to carry his ID which contains his essential details, so that the controller fetches the data from the fingerprint module and then compares it with already registered fingerprints of the vot...
 In this paper, heart disease prediction modeled using partially observable Markova decision process (POMDP) is proposed. In emergency, the patient is alerted through the doctor by fog computing. Ambulance sent to the location of patient at critical situations. The doctor gets the data through fog computing iFogSim. Fog computing in healthcare is a ...
 Smart grid applications, such as teleportation, synchrophasors, remote condition monitoring, and control of assets, require timely and reliable data communication systems. Many communication architectures and solutions have been proposed to provide support for these smart grid applications, including ber networks, wireless mobile networks, wireless...
  This paper is intended to monitor Heart beat with android application which is used to measure the heart beat of different persons. It is built using Android Studio. It may also include the different modules based on the software specification, system requirement, hardware requirement and disk space....
 Malaria is one of the deadliest diseases ever exists in this planet. Automated evaluation process can notably decrease the time needed for diagnosis of the disease. This will result in early onset of treatment saving many lives. As it poses a serious global health problem, we approached to develop a model to detect malaria parasite accurately from ...
 In this paper, the concept o 2-Layer routing for wireless 5G networks is presented. New fifth generations of the network along with the platform known asthe Internet of Things (IoT) are an upcoming trend not only in the commercial market but also in the research area. The 5G networks and IoT will be part of smart homes, smart cities and every aspec...
 As water supply is becoming scarce in today’s world there is an urgency of adopting smart ways of irrigation. The project describes how irrigation can be handled smartly using IOT. This project aims at saving time and avoiding problems like constant vigilance. It also helps in conserving water by automatically providing w...
  In this era of rapid growth of vehicles, the ratio of road accident increases day by day. Nowadays, Traffic incidents are persistent problems in both developed and developing countries which result in huge loss of life and property. No one in this world is ready to gaze what’s happening around them. Nobody cares even when an accident occurs. This ...
 The rapid development of e-learning and the use of LMS (moodle) have triggered some universities and schools in Indonesia to develop e-learning. However, most of their e-learning materials or contents still underuse the powerful features available in the LMS. The powerful features of the LMS are described and discussed along with their educational ...
 The evolution of multipurpose sensors over the last decades has been investigated with the aim of developing innovative devices with applications in several ?elds of technology, including in the food industry. The integration of such sensors in food packaging technology has paved the way for intelligent food packaging. These integrated systems are ...
 Fault tolerance is a major concern to guarantee availability and reliability of critical services as well as application execution. In order to minimize failure impact on the system and application execution, failures should be anticipated and proactively handled. Fault tolerance techniques are used to predict these failures and take an appropriate...
 This Android application (stand alone too), where one can set the question for different technology i.e. Android, Java etc and one can register them self for test as a student, he can choose the choice of technology (Android, Java), and simultaneously he can get the exam result. After submit or End of the Test the form will be submitted and evaluat...
 Power system consist of large number of nonlinear load which causes power quality issues. Sensitive components like electronic devices, medical equipment working on power supply are vulnerable to power quality problems. Voltage sag ,Swell ,harmonics ,noise are considered to be some important power quality issues .Voltage dips are the major disturb...
 This project deals with the fabrication of pneumatic mobile crane. The aim of this project work is to acquire practical knowledge in the field of material handling equipment. The project work is concerned with the fabrication of the portable jib crane. This machine is very useful for lifting and transporting heavy jobs up to two tons for all types ...
 A device, usually motor-driven, fitted with an end cutting tool that is rotated with sufficient power either to create a hole or to enlarge an existing hole in a solid material and also known as driller. Tapping is the process of making thread inside the drilled hole. This operation requires less force to operate. In this project the drilling mach...
 Nowadays, rice farming is affected by various diseases that are economically significant and worthy of attention. One of these diseases is blast. Rice blast is one of the most important limiting factors in rice yield. The purpose of this study is the timely and rapid diagnosis of rice blast based on the image processing technique in field condition...
 Cloud computing is a great innovation in the world of computing, there also exist downsides of cloud computing. These most important challenges are security and privacy of data on the cloud, check availability of data on the cloud. For these problems, data storage security refers to the security of data on the storage media. Security is an importan...
 Hostel Management is an application developed to manage the various activities in hostel. The particular project is deal with the problems on managing the a hostel and avoids the problem occurs when carried out manually. Identification of the drawbacks of the existing system leads to the designing of computerized system that will be compatible t...
 The problem about checking attendant is the main problem of teacher in nowadays. In order to solve this problem, Many systems have been completely changed due to this evolve to achieve more accurate results. However, in my study, these study still lack of the efficiency about correct the face and students cannot verify or pose to edit the data when...
 Orphanage is the name to describe a residential place dedicated for orphans whose parents are dead. Parent and grandparent are legally responsible for taking up the responsibility of taking care of their grandchildren, but in case both parents and grandparents, or other relations willing to take up the responsibility of the children, they lose all ...
 Deep learning (DL) has proved successful in medical imaging and, in the wake of the recent COVID-19 pandemic, some works have started to investigate DL-based solutions for the assisted diagnosis of lung diseases. While existing works focus on CT scans, this paper studies the application of DL techniques for the analysis of lung ultra sono graphy (L...
 Machine learning (ML) methods has recently contributed very well in the advancement of the prediction models used for energy consumption. Such models highly improve the accuracy, robustness, and precision and the generalization ability of the conventional time series forecasting tools. This article reviews the state of the art of machine learning ...
 With the rapid advances of wireless technologies and popularization of smart mobile devices, edge-enabled mobile social networks (MSNs) have emerged as a promising network paradigm for mobile users to deliver, share, and exchange contents with each other. By leveraging edge caching technology, various content services can be provided to mobile user...
 Today, the growth of technology is rapid and provides all necessary and effective solutions for the requirements. One of the most important areas of concern is security. In this scenario, IOT Asset tracking system is developed to increase the safety of women, children, people with mental disorder and any valuable items through the technology of Rad...
 The organ donation is currently increasing in our country. Organ donation leads to control death rate due to organ malfunction. The organ donor and recipient data bases are to be organized with our application. The lists of donors and required patients will be updated in the database with their necessary data like blood group, age, gender, etc from...
 This is an online auction web site aimed at taking the auction to the fingertips of aspiring bidders there by opening up the doors of the "OPEN Auction House' to a wider cross section of Art Lovers and Antique Collectors. This site also acts as an open forum where buyers and sellers can come together and exchange their products. The site makes sure...
 With the explosive growth of mobile data demand, the fifth generation (5G) mobile network would exploit the enormous amount of spectrum in the millimeter wave (mmWave) bands to greatly increase communication capacity. There are fundamental differences between mmWave communications and existing other communication systems, in terms of high propagati...
 Passenger traffic fore casting and decision-making of investment and construction of the tourism highway under the background of artificial intelligence is studied in this paper. As an important information asset, big data is expected to provide people with comprehensive, accurate, and real-time business insights a...
 Tumour is the undesired mass in the body. Brain tumour is the significant growth of brain cells. Manual method of classifying is time consuming and can be done at selective diagnostic centers only. Brain tumour classification is crucial task to do since treatment is based on different location and size of it. Magnetic Resonance Imaging (MRI) is mos...
 With the advancementofweb technology and its growth, there is huge volume of data present in the web for internet users and a lot of data is generated too. Internet has become a platform for online learning, exchanging ideasandsharing opinions. Social networkingsiteslike Twitter, Face book, Google are rapidly gaining popularity as they allow people...
 This paper presents a technique for secret communication using Cryptography and Steganography. In this paper, the secret message of different size is hidden into an image for making the system more secure. The only authorized users can hide and extract the secret message. The secret messages of different size are used to test the system and the sys...
 In this project, an online auction system is presented. It has a very large potential market of sellers and buyers. An On Line Transaction Processing (OLTP) database model structure is, therefore, desirable. The project involves the design and implementation of an online auction system. The analysis stage is performed first for the case study. Proj...
 Cloud computing enables users to remove the necessity of the need of local hardware architecture, which removes the burden of the users from high computation costs. Therefore, it has attracted much attention and research has been conducted heavily on it. To protect users’ privacy, data is usually encrypted prior to being sent to the cloud server. A...
 The recent growth in intensive services and applications demand has triggered the functional integration of cloud computing with edge computing capabilities. One of the main goals is to allow a fast processing to tasks with strict real time constraints in order to lower the task dropping probabi...
 The combination of pervasive edge computing and block chain technologies opens up significant possibilities for Industrial Internet of Things (IIoT) applications, but there are several critical limitations regarding efficient storage and rapid response for large-scale low-delay IIoT scenarios. To address these limitations, we propose a hierarchical...
 Predictive cloud resource management has been widely adopted to overcome the limitations of reactive cloud auto scaling. The predictive resource management is highly relying on workload predictors, which estimate short-/long-term fluctuations of cloud application workloads. These predictors tend to be pre-optimized for specific workload patterns. H...
 Predictive cloud resource management has been widely adopted to overcome the limitations of reactive cloud auto scaling. The predictive resource management is highly relying on workload predictors, which estimate short-/long-term fluctuations of cloud application workloads. These predictors tend to be pre-optimized for specific workload patterns. H...
 Cloud computing systems fail in complex and unexpected ways, due to unexpected combinations of events and interactions between hardware and software components. Fault injection is an effective means to bring out these failures in a controlled environment. However, fault injection experiments produce massive amounts of data, and manually analyzing t...
 Nowadays scalable IoT management is a bottleneck of IoT development due to the geographically dispersed distribution, fragmented ownerships, and ever growing population of IoT devices. To intelligently manage massive decentralized applications (dApps) in IoT use cases, Edgence (EDGe + intelligence) is proposed to use edge clouds to access IoT devic...
 The ubiquitous adoption of Internet-of-Things (IoT) based applications has resulted in the emergence of the Fog computing paradigm, which allows seamlessly harnessing both mobile-edge and cloud resources. Efficient scheduling of application tasks in such environments is challenging due to constrained resource capabilities, mobility factors in IoT, ...
 Fog computing as an extension of the cloud based infrastructure, provides a better computing platform than cloud computing for mobile computing, Internet of Things, etc. One of the problems is how to make full use of the resources of the fog so that more requests of applications can be executed on the edge, reducing the pressure on the network and ...
 Distributed cloud computing environments rely on sophisticated communication and sharing paradigms for ease of access, information processing, and analysis. The challenging characteristic of such cloud computing environments is the concurrency and access as both the service provider and end-user rely on the common sharing platform. In this manuscri...
 Mobile edge computing (MEC) is a promising approach that can reduce the latency of task processing by offloading tasks from user equipments (UEs) to MEC servers. Existing works always assume that the MEC server is capable of executing the offloaded tasks, without considering the impact of improper load on task processing efficiency. In this paper, ...
 Cloud Computing has assumed a relevant role in the ICT, profoundly influencing the life-cycle of modern applications in the manner they are designed, developed, deployed and operated. In this paper, we tackle the problem of supporting the design-time analysis of Cloud applications to identify a cost-optimized strategy for allocating components onto...
 Edge computing is a new computing paradigm, which aims at enhancing user experience by bringing computing resources closer to where data is produced by Internet of Things (IoT). Edge services are provided by small data centers located at the edge of the network, called cloudlets. However, IoT users often face strict Quality of Service (QoS) constra...
 Cloud computing (CC) is a centralized computing paradigm that accumulates resources centrally and provides these resources to users through Internet. Although CC holds a large number of resources, it may not be acceptable by real-time mobile applications, as it is usually far away from users geographically. On the other hand, edge computing (EC), w...
 Edge node placement is a key topic to edge cloud systems for that it affects their service performances significantly. Previous solutions based on the existing information are not suitable for the mobile environment due to the mobility and random Internet access of end users. In this paper, we propose a dynamic virtual edge node placement scheme, i...
 Containers are lightweight and provide the potential to reduce more energy consumption of data centers than Virtual Machines (VMs) in container-based clouds. The on-line resource allocation is the most common operation in clouds. However, the on-line Resource Allocation in Container-based clouds (RAC) is new and challenging because of its two-level...
 Cloud computing has significantly enhanced the growth of the Internet of Things (IoT) by ensuring and supporting the Quality of Service (QoS) of IoT applications. However, cloud services are still far from IoT devices. Notably, the transmission of IoT data experiences network issues, such as high latency. In this case, the cloud platforms cannot sa...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com