Traffic Squad is an app which helps the police as well as the police by means of time and efficiency. With the increasing importance of corruption has become major factor to be considered as a result the number of vehicles and the rapid development of population are growing in our everyday life.
Existing system makes the use of pen and paper that...
|
Project Scheduling is important since it plays an effective role in project success. To organize and complete your projects in a timely, quality and financially responsible manner, you need to schedule projects carefully. Effective project scheduling plays a crucial role in ensuring project success.
Scheduling is used to keep projects on track, s...
|
The Block chain-Based Online Loan Management System (BOLMS) is an innovative web application that leverages block chain technology to revolutionize the process of loan management for financial institutions.
By utilizing the decentralized and transparent nature of block chain, BOLMS aims to enhance security, trust, and efficiency in the loan manag...
|
Investment in India is a business-based idea. I will be in my project giving investors with a platform and connecting people with strong business concepts.
This will change how much you can invest and where the money can be invested. Good investment returns. Good investment returns. Here are two forms - one for investors and one for business pers...
|
One of the most important features of any online service is the quality of its customer care. However, with the development of NLP tools, businesses are considering automated chatbot solutions to keep up with the increasing demand for their products and services.
In view of this, the chatbot was developed using AIML java interpreter library Progr...
|
With the advent of the digital information age, the dynamics of cyberspace are rapidly evolving, resulting in a significant increase in cyber threats. In this paper, we propose to integrate the Zero Trust (ZT) security model and the MITRE ATT&CK matrix to address the need for enhancing cyber resilience, which is an organization’s ability to recover...
|
Vehicular edge computing (VEC) has emerged as a solution that places computing resources at the edge of the network to address resource management, service continuity, and scalability issues in dynamic vehicular environments. However, VEC faces challenges such as task offloading, varying communication conditions, and data security.
To tackle thes...
|
The COVID-19 pandemic has reshaped education and shifted learning from in-person to online. While this shift offers advantages such as liberating the learning process from time and space constraints and enabling education to occur anywhere and anytime, a challenge lies in detecting student engagement during online learning due to limited interactio...
|
This research explores the potential of technologies in human activity recognition among the elderly population. More precisely, using sensor data and implementing Active Learning (AL), Machine Learning (ML), and Deep learning (DL) techniques for elderly activity recognition.
Moreover, the study leverages the HAR70+ dataset, providing insight int...
|
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.
The privacy of health data can only be preserved by keeping it in an encrypted form, but it affects usability and flexibility in terms of effective search. Attribute-based searc...
|
Electric Power Systems (EPSs) are among the most critical infrastructures of any society, since they significantly impact other infrastructures. Recently, there has been a trend toward implementing modern technologies, such as Industrial Internet of Things (IIoT), in EPSs to enhance their real-time monitoring, control, situational awareness, and in...
|
Background: This problem requires an innovative approach to enhance the efficiency and transparency of faculty self-appraisal in the university settings. Through a robust web-based platform, the system should address the complexities associated with traditional evaluation processes. It should capture and manages intricate details of faculty activit...
|
Background: Children with Specific Learning Disability (SLD)who faces challenge of writing during their academic life especially during examinations where they need the provisions of a scribe. The purpose of rehabilitating people with disabilities is to reduce the dependence on other people.
In order to achieve this fundamental right to be indepe...
|
Project Concept: Enhanced Education System for specially abled Background: Interpersonal skills are learned and mastered by children when they interact with the world, but for children with Autism Spectrum Disorder (ASD) and Intellectual Disabilities (ID) this is where the challenges lie.
As traditional classroom settings cannot cater to their un...
|
Background: “Inclusivity” is the motto of Education department, Government of Gujarat. Opportunity for all is the new slogan and The Indian Government has come up with Indian Sign Language. There has been lot of work in done in American sign language and focusing on interpretation in English.
Majority schools in India adopt local language. In Guj...
|
Background: For a much simplified and initial solution, input (publication record) can also be provided in a consolidated single .bibtex file. However, it is desirable to provide input as an excel sheet, as mentioned earlier.
Description: The proposed solution should be able. Instructor shall have educational resources files in different formats ...
|
Problem Overview Innovation is a key driver of growth and success in educational institutions. Tracking and measuring innovation excellence is essential for fostering a culture of continuous improvement, recognizing achievements, and guiding strategic decisions. However, identifying, quantifying, and presenting innovation indicators can be challeng...
|
Description: 1. Background: For a much simplified and initial solution, input (publication record) can also be provided in a consolidated single bibtex file. However, it is desirable to provide input as an excel sheet, as mentioned earlier.
2. Description: The proposed solution should be able to crawl different popular academic databases, like Go...
|
Project Concept: Comprehensive Employment Platform/Portal The current employment portal lacks a personalized and adaptive approach to job matching and skill development. There is a need for an intelligent system that not only matches job seekers with potential employers but also identifies and suggests training courses to bridge skill gaps.
We wi...
|
Background: The use of Earth Observation Satellite (EOS) technology for estimation of seasonal Actual Evapotranspiration (AET) of crops at various growth stages is well establishd. Due to low levels of water metering in irrigation, it is challenging to control theft from canals and unauthorized ground water extractions.
Therefore, ET based techno...
|
Background: Solar panels are most efficient when they are directly facing the sun. However, the sun’s position changes throughout the day and across seasons, which can reduce the amount of sunlight that fixed solar panels receive.
Description: Traditional solar tracking systems often rely on electrical components and motors, which can be costly a...
|
Background 1. The hon’ble prime minister launched the svamitva scheme on the national panchayati raj day, 24th april 2020 with a resolve to enable the economic progress of rural india by providing “record of rights” to every rural household owner.
The scheme aims to demarcate inhabited (abadi) land in rural areas through the latest surveying dron...
|
Background: The increasing adoption of renewable energy sources like solar and wind presents significant challenges due to their intermittent nature. This variability can strain the power grid, leading to inefficiencies and reliability issues.
Traditional grid infrastructure is not designed to handle these fluctuations effectively, resulting in e...
|
Background: As per the census 2011, Disability is more common in elderly people. One of the major reasons for disability among the elderly people is falls. Every year, one-third of community-dwelling older adults (adults aged 65 and older) experience a fall.
Falls, defined as “unexpected event[s] in which the participant comes to rest on the grou...
|
Background: Yoga has gained global recognition for its numerous health benefits, including physical fitness, mental well-being, and stress reduction. As part of India's ancient heritage, yoga is a key component of the AYUSH (Ayurveda, Yoga & Naturopathy, Unani, Siddha, and Homoeopathy) systems of medicine, promoting holistic health practices.
In ...
|
Background: The AYUSH sector relies heavily on medicinal plants and herbs, which form the backbone of traditional healing practices. However, physical gardens that are not accessible to everyone.
A Virtual Herbal Garden will bridge this gap by offering a digital platform where users can explore, learn, and understand the significance of various m...
|
Background: As per the census 2011, Disability is more common in elderly people. One of the major reasons for disability among the elderly people is falls. Every year, one-third of community-dwelling older adults (adults aged 65 and older) experience a fall.
Falls, defined as “unexpected event[s] in which the participant comes to rest on the grou...
|
Background: Himachal Pradesh, a northern state in India, is renowned for its apple production, contributing significantly to the local economy and livelihoods. With an annual apple production of approximately 600,000 metric tons, the region's apple orchards face challenges related to tree health monitoring, nutrient management, pest and disease con...
|
Background: Crop diseases can devastate yields, leading to significant financial losses for farmers. Early detection and timely intervention are crucial for effective management. Description: Develop an AI-driven system that analyzes crop images and environmental data to predict potential disease outbreaks.
This system will provide farmers with a...
|
Nowadays, home loan is a frequently accessed component of people’s financing activities. Homeowners wants to increase the probability of loan acceptance, however banks seek to borrow money to low risk customers.
This paper compared and examined the machine learning models to select when loan applicants evaluating their probability of success. Thi...
|
Background: Critical Sector organisations uses a number of IT and OT equipment (e.g. Networking and hardware device, Operating Systems, Applications, Firmware etc.). These devices/application come with vulnerabilities from time to time.
There should be timely information sharing mechanism by which the concerned equipment users at critical sector ...
|
Background: Dual use precursor chemicals are substances that have legitimate industrial and commercial applications but can also be used in the illicit manufacture of drugs. For e.g. Opium is converted to Heroin using Acetic Anhydride and manufacturing of Methamphetamine is done using Ephedrine or Pseudoephedrine.
Precursor chemicals are essentia...
|
Description: Develop an application firewall for end-points that can identity and restrict access of application to external network/hosts. The application firewall should provide further granular control of restricting domains, IP addresses and protocols for each application.
The firewall should be manageable through a centralized web console wh...
|
Sentiment analysis is defined as the process of mining of data, view, review or sentence to predict the emotion of the sentence through natural language processing (NLP). The sentiment analysis involve classification of text into three phase “Positive”, “Negative” or “Neutral”.
It analyzes the data and labels the ‘better’ and ‘worse’ sentiment as...
|
The covid-19 pandemic intensified the deployment of technology in Nigeria, particularly in the realm of public service delivery in Nigeria. While this has brought series of benefits, there are equally some factors undermining the utilisation of the full potential of new technologies.
This study focused on the effects of the deployment of technolo...
|
The PDF to Audio Converter project provides an alternative was to access the PDF books for blind, lazy, readers and others.
Using this PDF to Audio Converter the user will be able to listen to his\her favorite PDF and can do their daily routine.
The application can be used to read any PDF which has page numbers. The following application can be...
|
Credit card fraud detection is a relevant problem that draws attention of machine learning. In the fraud detection task, there are some peculiarities present, such as the unavoidable condition of a strong class imbalance, the existence of unlabelled transaction, and the large number of records that must be processed.
The present paper aims to pro...
|
This paper presents the design and implementation of an energy management system (EMS) with fuzzy control for a dc microgrid system. Modeling, analysis, and control of distributed and energy storage devices with MATLAB/Simulink are proposed.
To improve the life cycle of the battery, fuzzy control manages the desired state of charge. A fuzzy netwo...
|
The Online Task Management System is designed from day to day working of department of a college. The project provides online platform to accomplish day to day department level task and provide information of the task to specified user.
Admin can assign task, give notification and adds different users in this project. Important benefit of this pr...
|
Frequently we tend to tend to pay our time interrelate with numerous chatterboxes on the net, mostly targeted at such functions or just amusement. The chatbots have embedded information that helps them acknowledge the user's question and provide an answer to it.
The college enquiry chatbot project is meant exploitation algorithms that interpret ...
|
Accurately classifying brain tumor types is critical for timely diagnosis and potentially saving lives. Magnetic Resonance Imaging (MRI) is a widely used non-invasive method for obtaining high-contrast grayscale brain images, primarily for tumor diagnosis.
The application of Convolutional Neural Networks (CNNs) in deep learning has revolutioniz...
|
Health is very important for human life. In particular, the health of the brain, which is the executive of the vital resource, is very important. Diagnosis for human health is provided by magnetic resonance imaging (MRI) devices, which help health decision makers in critical organs such as brain health.
Images from these devices are a source of...
|
Mobile wallets have emerged as the most significant contributor in pushing cashless and electronic payments. The surge of smartphones and internet connectivity of 4G and 5G is reflected in the robust growth of Mobile-wallets in India.
Numerous digital wallet providers have risen. Technological advancement has made everything possible under one to...
|
With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries.
In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of ...
|
Internet banking is now becoming the most commonly used form of banking transactions. Confidentiality can be compromised in the process of electronic purchases.
We therefore introduced a new approach to prevent theft during online transactions in order to protect information through a two-step mechanism of authentication.
The primary step o...
|
Brain tumor detection is a critical application in the field of medical imaging, aimed at aiding healthcare professionals in the early and accurate diagnosis of brain tumors. This project leverages machine learning and deep learning techniques in Python to developa robust and reliable brain tumor detection system.
The system undergoes sensitivi...
|
In recent years, due to the booming development of online social networks, fake news for various commercial and political purposes has been appearing in large numbers and widespread in the online world.
With deceptive words, online social network users can get infected by these online fake news easily, which has brought about tremendous effects...
|
Fake news, deceptive information, and conspiracy theories are part of our everyday life. It is really hard to distinguish between false and valid information.
As contemporary people receive the majority of information from electronic publications, in many cases fake information can seriously harm people’s health or economic status.
This article...
|
To meet the requirements of high accuracy and low cost of target classification in modern warfare, and lay the foundation for target threat assessment, the article proposes a human-machine agent for target classification based on active reinforcement learning (TCARL_H-M), inferring when to introduce human experience guidance for model and how to au...
|
Managing the result sheets using traditional approach is a cumbersome process. The person must maintain the result records in registers and files using pen and paper.
The problem with this approach is, it requires lot of paperwork which is the part of our non-renewable natural resources. We are in the age, where we must think about sustain...
|
As modern technology of human-computer interactions become important in our everyday lives, varieties of mouse of all kinds of shapes and sizes were invented, from a casual office mouse to hard-core gaming mouse.
However, there are some limitations to this hardware as they are not as environmentally friendly as it seems. For example, the physical...
|
In our day to day life we consume food and our survival is based on mainly food. A considerable amount of our food is coming from farms and other means too. These farmers do their hard work for growing and serving many lives across the country, which pays for their source of income. But due to intermediates in the selling of their final product...
|
Nowadays, digital images are a main source of shared information in social media. Meanwhile, malicious software can forge such images for fake information. So, it’s crucial to identify these forgeries.
This problem was tackled in the literature by various digital image forgery detection techniques. But most of these techniques are tied to detec...
|
Over the years, there has been a global increase in the use of technology to deliver interventions for health and wellness, such as improving people’s mental health and resilience. An example of such technology is the Q-Life app which aims to improve people’s resilience to stress and adverse life events through various coping mechanisms, including ...
|
Sell-side analysts’ recommendations are primarily targeted at institutional investors mandated to invest across many companies within client-mandated equity benchmarks, such as the FTSE/JSE All-Share index. Given the numerous sell-side recommendations for a single stock, making unbiased investment decisions is not often straightforward for portfoli...
|
Machine learning is widely deployed in society, unleashing its power in a wide rangeof applications owing to the advent of big data.One emerging problem faced by machine learning is the discrimination from data, and such discrimination is reflected in the eventual decisions made by the algorithms. Recent study has proved that increasing the size of...
|
Most State-Of-The-Art (SOTA) Neural Machine Translation (NMT) systems today achieve outstanding results based only on large parallel corpora. The large-scale parallel corpora for high-resource languages is easily obtainable. However, the translation quality of NMT for morphologically rich languages is still unsatisfactory, mainly because of the dat...
|
Stereo matching is one of the longest-standing problems in computer vision with close to 40 years of studies and research. Throughout the years the paradigm has shifted from local, pixel-level decision to various forms of discrete and continuous optimization to data-driven, learning-based methods.Recently, the rise of machine learning and the rapid...
|
Even though machine learning (ML) applications are not novel, they have gained popularity partly due to the advance in computing processing.This study explores the adoption of ML methods in marketing applications through a bibliographic review of the period 2008–2022. In this period, the adoption of ML in marketing has grown significantly. This gro...
|
We present the Interactive Classification System (ICS), a web-based application that supports the activity of manual text classification.The application uses machine learning to continuously fit automatic classification models that are in turn used to actively support its users with classification suggestions. The key requirement we have establishe...
|
Emojis are used in Computer Mediated Communication (CMC) as a way to express paralinguistics otherwise missing from text, such as facial expressions or gestures. However, finding an emoji on the ever expanding emoji list is a linear search problem and most users end up using a small subset of emojis that are near the top of the emoji list. Current ...
|
Feature selection is the task of choosing a small subset of features that is sufficient to predict the target labels well. Here, instead of trying to directly determine which features are better, we attempt to learn the properties of good features. For this purpose we assume that each feature is represented by a set of properties, referred to as me...
|
Meta-learning has been proposed as a framework to address the challenging few-shot learning setting. The key idea is to leverage a large number of similar few-shot tasks in order to learn how to adapt a base-learner to a new task for which only a few labeled samples are available. As deep neural networks (DNNs) tend to overfit using a few samples o...
|
Knee osteoarthritis (KOA) as a disabling joint disease has doubled in prevalence since the mid-20th century. Early diagnosis for the longitudinal KOA grades has been increasingly important for effective monitoring and intervention. Although recent studies have achieved promising performance for baseline KOA grading, longitudinal KOA grading has bee...
|
Background matting is a recently developed image matting approach, with applications to image and video editing. It refers to estimating both the alpha matte and foreground from a pair of images with and without foreground objects. Recent work has applied deep learning to background matting, with very promising performance achieved. However, existi...
|
We show that the classification performance of graph convolutional networks (GCNs) is related to the alignment between features, graph, and ground truth, which we quantify using a subspace alignment measure (SAM) corresponding to the Frobenius norm of the matrix of pairwise chordal distances between three subspaces associated with features, graph, ...
|
Photonic crystal fibers (PCFs) are the specialized optical waveguides that led to many interesting applications ranging from nonlinear optical signal processing to high-power fiber amplifiers. In this paper, machine learning techniques are used to compute various optical properties including effective index, effective mode area, dispersion and conf...
|
With the rapid development of vehicular networks, vehicle-to-everything (V2X) communications have huge number of tasks to be calculated, which brings challenges to the scarce network resources. Cloud servers can alleviate the terrible situation regarding the lack of computing abilities of vehicular user equipment (VUE), but the limited resources, t...
|
Phosphoaspartate is one of the major components of eukaryotes and prokaryotic two-component signaling pathways, and it communicates the signal from the sensor of histidine kinase, through the response regulator, to the DNA alongside transcription features and initiates the transcription of correct response genes. Thus, the prediction of phosphoaspa...
|
The interpretation of deep neural networks (DNNs) has become a key topic as more and more people apply them to solve various problems and making critical decisions. Concept-based explanations have recently become a popular approach for post-hoc interpretation of DNNs. However, identifying human-understandable visual concepts that affect model decis...
|
The need for medical image encryption is increasingly pronounced, for example to safeguard the privacy of the patients’ medical imaging data. In this paper, a novel deep learningbased key generation network (DeepKeyGen) is proposed as a stream cipher generator to generate the private key, which can then be used for encrypting and decrypting of medi...
|
As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
|
Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
|
We show that the classification performance of graph convolutional networks (GCNs) is related to the alignment between features, graph, and ground truth, which we quantify using a subspace alignment measure (SAM) corresponding to the Frobenius norm of the matrix of pairwise chordal distances between three subspaces associated with features, graph, ...
|
The interpretation of deep neural networks (DNNs) has become a key topic as more and more people apply them to solve various problems and making critical decisions. Concept-based explanations have recently become a popular approach for post-hoc interpretation of DNNs. However, identifying human-understandable visual concepts that affect model decis...
|
Automatic Leukemia or blood cancer detection is a challenging job and is very much required in healthcare centers. It has a significant role in early diagnosis and treatment planning. Leukemia is a hematological disorder that starts from the bone marrow and affects white blood cells (WBCs). Microscopic analysis of WBCs is a preferred approach for a...
|
Automatic Leukemia or blood cancer detection is a challenging job and is very much required in healthcare centers. It has a significant role in early diagnosis and treatment planning. Leukemia is a hematological disorder that starts from the bone marrow and affects white blood cells (WBCs). Microscopic analysis of WBCs is a preferred approach for a...
|
The ability to predict, anticipate and reason about future outcomes is a key component of intelligent decision-making systems. In light of the success of deep learning in computer vision, deep-learning-based video prediction emerged as a promising research direction. Defined as a self-supervised learning task, video prediction represents a suitable...
|
The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the governmentPeople are open to sharing opinions, views, and ideas on any topic in different formats out loud. This cr...
|
The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the governmentPeople are open to sharing opinions, views, and ideas on any topic in different formats out loud. This cr...
|
The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the governmentPeople are open to sharing opinions, views, and ideas on any topic in different formats out loud. This cr...
|
Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras. With the advancement of deep neural networks and increasing demand of intelligent video surveillance, it has gained significantly increased interest in the computer vision community. By dissecting the involved components in developing a...
|
As a high-tech strategic emerging comprehensive industry, the nuclear industry is committed to the research, production, and processing of nuclear fuel, as well as the development and utilization of nuclear energy. Nowadays, the nuclear industry has made remarkable progress in the application fields of nuclear weapons, nuclear power, nuclear medica...
|
Phosphoaspartate is one of the major components of eukaryotes and prokaryotic two-component signaling pathways, and it communicates the signal from the sensor of histidine kinase, through the response regulator, to the DNA alongside transcription features and initiates the transcription of correct response genes. Thus, the prediction of phosphoaspa...
|
Photonic crystal fibers (PCFs) are the specialized optical waveguides that led to many interesting applications ranging from nonlinear optical signal processing to high-power fiber amplifiers. In this paper, machine learning techniques are used to compute various optical properties including effective index, effective mode area, dispersion and conf...
|
Background matting is a recently developed image matting approach, with applications to image and video editing. It refers to estimating both the alpha matte and foreground from a pair of images with and without foreground objects. Recent work has applied deep learning to background matting, with very promising performance achieved. However, existi...
|
The ability to predict, anticipate and reason about future outcomes is a key component of intelligent decision-making systems. In light of the success of deep learning in computer vision, deep-learning-based video prediction emerged as a promising research direction. Defined as a self-supervised learning task, video prediction represents a suitable...
|
The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...
|
One of the main important resources for higher education is a Learning Management System (LMS), which has shown an enhancement of students’ progress with high quality learning outcomes worldwide. Many e-learning tools exist, each one has its own weaknesses and strongest points to the online learning process. This number increases continuously, and ...
|
Iris tumors, so called intraocular tumors are kind of tumors that start in the iris; the colored part of the eye that surrounds the pupil. There is a need for an accurate and cost-effective iris tumor detection system since the available techniques used currently are still not efficient. The combination of the image processing different techniques ...
|
In three level graphical, text and color file security system the authentication is done by image representation password. Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce co...
|
Building Energy Management System (BEMS) has been a substantial topic nowadays due to its importance in reducing energy wastage. However, the performance of one of BEMS applications which is energy consumption prediction has been stagnant due to problems such as low prediction accuracy. Thus, this research aims to address the problems by developing...
|
Since stroke disease often causes death or serious disability, active primary prevention and early detection of prognostic symptoms are very important. Stroke diseases can be divided into ischemic stroke and hemorrhagic stroke, and they should be minimized by emergency treatment such as thrombolytic or coagulant administration by type. First, it is...
|
It is a common phenomenon in cities that waterlogging affects people’s normal life. It is of great significance for targeted transformation and upgrading to identify the risk factors of urban waterlogging. This paper collected the waterlogging data of Tianjin in China, analyzed the coupling mechanism among waterlogging risk factors of urban drainag...
|
This study reviews the scientific literature for business models contributing to sustainable plastic management and suggests avenues for future research. We define sustainable plastic management (SPM) as any technique along the waste hierarchy seeking to minimize the environmental damage of plastic material. Limited cases were found during the lite...
|
The rapidly growing biofuel industry poses considerable challenges to its supply chain network design and operations. In this chapter, we introduce key characteristics of the biofuel supply chain that comprises of feedstock production, biomass logistics, biofuel production and distribution. We then discuss the recent literature on biofuel supply ch...
|
There are many countries enforcing a regulation that requires the bike rider to wear a helmet when riding on their bike. With this reason, this project is specially developed as to improve the safety of the bike rider. The impact when bike involves in a high speed accident without wearing a helmet is very dangerous and can cause fatality. Wearing a...
|
Aerial security means performing security-aimed monitoring and surveillance operations with the help of airborne vehicles. This kind of activities suggest that human officers (security organizations, law enforcement, police etc.) would be able to remotely monitor and view video and data acquired from Drones while planning and evaluating their opera...
|
Road lane detection systems play a crucial role in the context of Advanced Driver Assistance Systems (ADASs) and autonomous driving. Such systems can lessen road accidents and increase driving safety by alerting the driver in risky traffic situations. Additionally, the detection of ego lanes with their left and right boundaries along with the recog...
|
This paper presents an effective approach for detecting abandoned luggage in surveillance videos. We combine short- and long-term background models to extract foreground objects, where each pixel in an input image is classified as a 2-bit code. Subsequently, we introduce a framework to identify static foreground regions based on the temporal transi...
|
Student’s attendance tracking is a vital issue in order to monitor students’ performance in the classroom as well as in their studies. It becomes a key concern because the university authority maintains a rule that one student can only attend in the exam if his/her attendance is higher or equal to several percentages (60%,70% or 80% etc.) otherwise...
|
The dairy industry generates excessive amounts of waste and by-products while it gives a wide range of dairy products. Alternative biotechnological uses of these wastes need to be determined to aerobic and anaerobic treatment systems due to their high chemical oxygen demand (COD) levels and rich nutrient (lactose, protein and fat) contents. This wo...
|
They exist as an integral form of rural development that offers a valuable framework for GIs. These are unique expression of local agro-ecological and cultural characteristics that have come to be evaluated and protected in many countries throughout the world. A GI is a unique and important form of collective intellectual and cultural property, wit...
|
Predicting future changes in ecosystem services is not only highly desirable but is also becoming feasible as several forces (e.g., available big data, developed data assimilation (DA) techniques, and advanced cyber-infrastructure) are converging to transform ecological research into quantitative forecasting. To realize ecological forecasting, we h...
|
The last two decades has witnessed a phenomenal growth in the number of Self Help groups (SHGs) and SHG federations in India. There were an estimated 1, 78,664 SHG federations in India1 during 2013-14. SHG federations emerged as important institutions to take over the functions formerly provided by SHG promoting organizations. Placed in a situation...
|
In this paper we are proposing an adaptive and real-time approach to resolve real-time fnancial data integration latency problems and semantic heterogeneity. Due to constraints that we have faced in some projects that requires real-time massive fnancial data integration and analysis, we decided to follow a new approach by combining a hybrid fnancia...
|
Rural development is a very dynamic process which includes in improving the socio-economic, political, environmental, and well-being of the poor people living in rural areas. In India more than 70 percent people living in rural areas, the concept of rural development assume great significance. The Molakalmuru taluk is one of the most backward taluk...
|
A wide range of relatively short-term disruptive events such as partial flooding, visibility reductions, traction hazards due to weather, and pavement deterioration occur on transportation networks on a daily basis. Despite being relatively minor when compared to catastrophes, these events still have profound impacts on traffic flow. To date there ...
|
The building permission process is to a large extent an analogue process where much information is handled in paper format or as pdf files. With the ongoing digitalisation in society, there is a potential to automate this process by integrating Building Information Models (BIM) of planned buildings and geospatial data to check if a building conform...
|
This study has evaluated the differentiating impact of MGNREGA on the extent of fulfilment of the basic entitlements such as days of employment, wages and earnings and the extent of coverage of social groups like dalits, adivasis and women and poverty alleviation. This study has disaggregated state level data to discern the factors that make a diff...
|
Innovation in the workplace has been claimed to be a key factor in organizational survival and success. As future workers, university students are a major source of future innovations in organizational settings. Before they enter the labour market, it is in the context of Higher Education that they start developing some of their long-term behaviour...
|
Design of fishing boat for Pelabuhanratu fisherman as one of effort to increase production of capture fisheries. The fishing boat should be proper for the characteristic of its service area, as ;capacity of fishing boat up to 60 GT, the fishing boat has minimum 6 fish holds and location of fish hold in the middle body, the fishing boat hull has the...
|
There is a need for automatic systems that can reliably detect, track and classify fish and other marine species in underwater videos without human intervention. Conventional computer vision techniques do not perform well in underwater conditions where the background is complex and the shape and textural features of fish are subtle. Data-driven cla...
|
In this brief, the implementation of residue number system reverse converters based on well-known regular and modular parallelprefix adders is analyzed. The VLSI implementation results show a significant delay reduction and area × time2 improvements, all this at the cost of higher power consumption, which is the main reason preventing the use of pa...
|
This paper proposes an efficient constant multiplier architecture based on vertical-horizontal binary common sub-expression elimination (VHBCSE) algorithm for designing a reconfigurable finite impulse response (FIR) filter whose coeffi- cients can dynamically change in real time. To design an efficient reconfigurable FIR filter, according to the pr...
|
This paper presents a design approach for improving energy-efficiency and throughput of parallel architectures in near- and subthreshold voltage circuits. The focus is to suppress leakage energy dissipation of the idle portions of circuits during active modes, which can allow us to wholly transform the throughput improvement from parallel architect...
|
The Hilbert Huang Transform (HHT) has been used extensively in the time-frequency analysis of electroencephalography (EEG) signals and Brain-Computer Interfaces. Most studies utilizing the HHT for extracting features in seizure prediction have used intracranial EEG recordings. Invasive implants in the cortex have unknown long term consequences and ...
|
Reconfigurable filters based on the spectral parameter approximation (SPA) technique and its combination with other techniques provide a continuous control over the cutoff frequency (fc). However, when very wide fc range and narrow transition bandwidth is desired, these filters either fail to satisfy some of the specifications or have extremely hig...
|
A new adaptive frequency search algorithm (A-FSA) is presented for a fast automatic frequency calibrator in wideband phase-locked loops (PLLs). The proposed A-FSA optimizes the number of clock counts for each frequency comparison cycle, depending on the difference between the target frequency and the PLL output frequency, as opposed to a binary fre...
|
A dynamic functional verification method that compares untimed simulations versus timed simulations for synthesizable [high-level synthesis (HLS)] behavioral descriptions (ANSI-C) is presented in this paper. This paper proposes a method that automatically inserts a set of probes into the untimed behavioral description. These probes record the statu...
|
In this paper, a novel computation and energy reduction technique for High Efficiency Video Coding (HEVC) Discrete Cosine Transform (DCT) for all Transform Unit (TU) sizes is proposed. The proposed technique reduces the computational complexity of HEVC DCT significantly at the expense of slight decrease in PSNR and slight increase in bit rate by on...
|
This paper presents the design of a fully integrated electrocardiogram (ECG) signal processor (ESP) for the prediction of ventricular arrhythmia using a unique set of ECG features and a naive Bayes classifier. Real-time and adaptive techniques for the detection and the delineation of the P-QRS-T waves were investigated to extract the fiducial point...
|
Transistor network optimization represents an effective way of improving VLSI circuits. This paper proposes a novel method to automatically generate networks with minimal transistor count, starting from an irredundant sum-of-products expression as the input. The method is able to deliver both series–parallel (SP) and non-SP switch arrangements, imp...
|
Data-driven clock gated (DDCG) and multibit flip-flops (MBFFs) are two low-power design techniques that are usually treated separately. Combining these techniques into a single grouping algorithm and design flow enables further power savings. We study MBFF multiplicity and its synergy with FF data-to-clock toggling probabilities. A probabilistic mo...
|
With fabrication technology reaching nanolevels, systems are becoming more prone to manufacturing defects with higher susceptibility to soft errors. This paper is focused on designing combinational circuits for soft error tolerance with minimal area overhead. The idea is based on analyzing random pattern testability of faults in a circuit and prote...
|
A duty-cycle correction technique using a novel pulsewidth modification cell is demonstrated across a frequency range of 100 MHz–3.5 GHz. The technique works at frequencies where most digital techniques implemented in the same technology node fail. An alternative method of making time domain measurements such as duty cycle and rise/fall times from ...
|
In this paper, a closed-form expression for estimating the minimum operating voltage (VDDmin) of D flip-flops (FFs) is proposed. VDDmin is defined as the minimum supply voltage at which the FFs are functional without errors. The proposed expression indicates that VDDmin of FFs is a linear function of the square root of logarithm of the number of FF...
|
One bit full adder cell is one of the most frequently used digital circuit component in arithmetic logic unit (ALU) and it is the essential functional unit of all computational circuit. Till now lots of improvement has been done in this area to refine the architecture and performance of full adder circuit design. In this paper two designs of novel ...
|
This paper proposes an all-digital phase-locked loop (ADPLL) used as the phase-shift keying (PSK) receiver for very high bit rate (VHBR) of 13.56 MHz smartcards. A detailed implementation from system to circuit level is presented. This ADPLL-based PSK demodulator mainly consists of a high dynamic range time to digital converter (TDC) without pulse ...
|
The modern real time applications related to image processing and etc., demand high performance discrete wavelet transform (DWT). This paper proposes the floating point multiply accumulate circuit (MAC) based 1D/2D-DWT, where the MAC is used to find the outputs of high/low pass FIR filters. The proposed technique is implemented with 45 nm CMOS tech...
|
Globalization of microchip fabrication opens the possibility for an attacker to insert hardware Trojans into a chip during the manufacturing process. While most defensive methods focus on detection or prevention, a recent method, called Randomized Encoding of Combinational Logic for Resistance to Data Leakage (RECORD), uses data randomization to pr...
|
In this paper, we first theoretically re-defined output decimal carry in terms of majority gates and proposed a carry lookahead structure for calculating all the intermediate output carries. We have used this method for designing the multi-digit decimal adders. Theoretically, our best n-digit decimal adder design reduces the delay and area-delay pr...
|
This paper proposes a time-to-digital converter (TDC) that achieves wide input range and fine time resolution at the same time. The proposed TDC utilizes pulse-shrinking (PS) scheme in the second stage for a fine resolution and two-step (TS) architecture for a wide range. The proposed PS TDC prevents an undesirable nonuniform shrinking rate issue i...
|
As the device dimension is shrinking day by day the conventional transistor based CMOS technology encounters serious hindrances due to the physical barriers of the technology such as ultra-thin gate oxides, short channel effects, leakage currents & excessive power dissipation at nano scale regimes. Quantum Dot Cellular Automata is an alternate chal...
|
A low-complexity analog technique to suppress the local oscillator (LO) harmonics in software-defined radios is presented. Accurate mathematical analyses show that an effective attenuation of the LO harmonics is achieved by modulating the transconductance of the low-noise transconductance amplifier (LNTA) with a raised-cosine signal. This modulatio...
|
Modern cars are incorporating an increasing number of driver assist features, among which automatic lane keeping. The latter allows the car to properly position itself within the road lanes, which is also crucial for any subsequent lane departure or trajectory planning decision in fully autonomous cars. Traditional lane detection methods rely on a ...
|
Tracking seizures is crucial for epilepsy monitoring and treatment evaluation. Current epilepsy care relies on caretaker seizure diaries, but clinical seizure monitoring may miss seizures. Wearable devices may be better tolerated and more suitable for long-term ambulatory monitoring. This study evaluates the seizure detection performance of custom-...
|
One common interest in radiography is producing radiographs with as low as possible radiation exposures to patients. In clinical practices, radiation exposure factors are preset for optimal image qualities to avoid underexposures which will lead to repeating examinations hence increasing radiation exposures to patients. Underexposed radiographs mai...
|
With the increasing popularity of blockchain technology, it has also become a hotbed of various cybercrimes. As a traditional way of scam, the phishing scam has new means of scam in the blockchain scenario and swindles a lot of money from users. In order to create a safe environment for investors, an ecient method for phishing detection is urge...
|
Network embedding assigns nodes in a network to low dimensional representations and effectively preserves the network structure. Recently, a significant amount of progresses have been made toward this emerging network analysis paradigm. In this survey, we focus on categorizing and then reviewing the current development on network embedding methods,...
|
A detailed accumulation of the methods of wireless power transfer (WPT) including short range as well as mid range transmission . The technology and the science behind WPT and the future scope is discussed in detail. While a lot of research has been done on this topic in the previous decade, a large part of it is yet to be explored. The topics furt...
|
Active safety is an important feature of a modern vehicle to provide precaution warning or compensatory control before the pre-crash stage of vehicle safety. All vehicle signals and information are acquired by several in-vehicle sensors on ECUs or surrounding vehicles, and integrated in vehicle gateway throu...
|
This paper deals with Access control constrains what a user can do directly, as well as what programs executing on behalf of the users are allowed to do. In this way access control seeks to prevent activity that could lead to a breach of security. This article explains access control and its relationship to other security services such as authentic...
|
Security is a too much important thing to be concerned in our day-to-day life. Everyone wants to be secured as much as possible. Knowing our home or shop is secure provides us peace of mind. We know now a day’s theft has become a major issue. In this paper we design an advanced electronic security system by using small PIR and IR sensors...
|
This paper presents the extensions added to the measurement and monitoring tool TestelDroid, to support remote control and instrumentation of Android devices. The extensions include support for Standard Commands for Programmable Instruments (SCPI), cOntrol and Management Framework (OMF) and OMF Measurement Library (OML). SCPI is the most widespread...
|
This paper presents a proposal for integration of Android into vehicle infotainment systems. The proposed system offers infotainment functionality, while enabling users to use the device as a regular Android device. The proposal includes a specification of a Java API that should be used to access in-vehicle related content from Android applications...
|
In recent years, EEG brainwave-reading device is used more and more in various academic fields and real life. Analyzing brainwave from drivers, we divide the brainwave data into light fatigue, medium fatigue and severe fatigue. Once the driver's Low-a <;0.7, High-a <;0.5, ?>0.5, or attention and meditation less than 40 degrees, then the system is d...
|
The main aim of the paper is the development of an overall routing system which accepts input from common users via a simple android application and as a result directs the nearest vacant Cab towards the passenger. In this project two algorithms for the implementation of our project have been developed. The first algorithm is an autonomous route...
|
Health monitoring systems have rapidly evolved recently, and smart systems have been proposed to monitor patient current health conditions, in our proposed and implemented system, we focus on monitoring the patient’s blood pressure, and his body temperature. Based on last decade statistics of medical records, death rates due to hypertensive heart d...
|
In today’s world Automatic system is ubiquitous communication over manual system. The IoT can assist in integration of communications, control, and information processing across various systems. The Internet of Things allows objects to be sensed and controlled remotely. Wireless Home Automation system(WHAS) using I...
|
Now a day, technology rapidly growth, but also people do not survive his/her life after road accident because there is no emergency facilities available in our country. So we design a technology which facilitates the emergency facilities. This project inform about an accident that is occurred to vehicle to rescue team and the family members of the ...
|
Imbalance in the nervous system causes Epilepsy disease which may lead to death. The most common symptoms of epilepsy disease are sudden fluctuations in heart beat rate and involuntary muscular movements (seizures).The wireless electronic diagnosing system used here is meant for epilepsy patients only. Occurrence of seizures predicated by this syst...
|
Robust and reliable detection of falls is crucial especially for elderly activity monitoring systems. In this letter, we present a fall detection system using wearable devices, e.g., smartphones, and tablets, equipped with cameras and accelerometers. Since the portable device is worn by the subject, monitoring is not limited to confined areas, and ...
|
Traditional top-k algorithms, e.g., TA and NRA, have been successfully applied in many areas such as information retrieval, data mining and databases. They are designed to discover k objects, e.g., top-k restaurants, with highest overall scores aggregated from different attributes, e.g., price and location. However, new emerging applications like q...
|
To review and critically appraise published and preprint reports of prediction models for diagnosing coronavirus disease 2019 (covid-19) in patients with suspected infection, for prognosis of patients with covid-19, and for detecting people in the general population at risk of being admitted to hospital for covid-19 pneumonia. Design Rapid systemat...
|
Current banking data management on loan approval processes has great room for improvements of information quality and prevention of data problems in general, but especially with regards to fair lending and fair pricing practices. We first review briefly typical data collection protocols deployed at many financial institutions for loan approval and ...
|
Agriculture is the backbone of Indian economy. Due to global warming and climate change traditional farming in the regular months have been distorted and crops have been ruined is the most common phrase seen today. This not only gives economic losses but also the main reason for farmer sucide. Now agriculture needs support, time has come for techno...
|
Agriculture is the backbone of Indian economy. Due to global warming and climate change traditional farming in the regular months have been distorted and crops have been ruined is the most common phrase seen today. This not only gives economic losses but also the main reason for farmer sucide. Now agriculture needs support, time has come for techno...
|
Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the da...
|
This paper proposes a model Online Cashless Payment System which is based on Finger print in Aadhaar Card. Unique mark installment framework is utilized for different sorts of instalment framework as opposed to conveying cards and to remember the each card passwords and pin numbers. Todays current big issue in e-payment system is providing security...
|
Food waste has a significant detrimental economic, environmental and social impact. Recent efforts in HCI research have examined ways of influencing surplus food waste management. In this paper, we conduct a research survey to investigate and compare the effectiveness of existing approaches in food waste management throughout its lifecycle from agr...
|
In recent years, the prospect of the Vehicle market is worrisome. The development of automotive aftermarket business has become the core of 4s stores. And the spare parts in stock are the key part of the aftermarket. Therefore, it is very important for the development of the aftermarket to make a good classification of spare parts. Aiming at the pr...
|
Academic research faces new methods of knowledge production that trigger a need for managing research by projects. However, the literature reports friction between management and research. In this study, we investigate whether and to what extent academic research projects can be managed using classical project management (PM) principles. An analysi...
|
The positive or negative outcome that a firm experiences, depends mostly on the ability of making appropriate decision. The particular area of this research interest is, however, relies on the application of linear programming techniques for textile dyed fabrics to create efficient resource utilization mechanism for textile sector to improve their ...
|
Almost no project can be delivered smoothly without facing some obstacles and issues during its lifecycle from concept till closure. This inevitable topic of ‘‘project issue management” did not attain the appropriate attention either in the literature or in the project management standards or implementation practices. This paper explores the curren...
|
Many retail stores, as well as other organizations that employ a multitude of part-time employees, rely on developing schedules frequently, since the availabilities of the employees as well as the needs of the business change often. This process is often performed on a weekly basis, and is complex and time-consuming. The schedule must typically sat...
|
Organ donation as we all know is a good cause and can save many lives but in a developing country like India it is still not that popular. Although, the rate of donation has been increasing from the past few years but it is still not enough as only 0.01% of people donate their organs after death. The main reason is lack of awareness and this androi...
|
As online transactions continue to increase and become a significant part of the global economy, the ability to accept payments online becomes more important for businesses. This paper evaluates the literature and provides current information for IS researchers and instructors focusing on electronic commerce. In this paper, we explore the component...
|
A cibil system to keep tracks of peoples credit scores and dues. The system is similar to the real cibil system with an enhancement(Here the defaulter can view his status and can apply for improvement by good behavior). Our software system consists of admin login ,Cibil associates login and individual login. Here cibil associates are banks or compa...
|
Optical Character Recognition (OCR) has been a topic of interest for many years. It is defined as the process of digitizing a document image into its constituent characters. Despite decades of intense research, developing OCR with capabilities comparable to that of human still remains an open challenge. Due to this challenging nature, researchers f...
|
As online transactions continue to increase and become a significant part of the global economy, the ability to accept payments online becomes more important for businesses. This paper evaluates the literature and provides current information for IS researchers and instructors focusing on electronic commerce. In this paper, we explore the component...
|
This history column article provides a tour of the main software development life cycle (SDLC) models. (A lifecycle covers all the stages of software from its inception with requirements definition through to fielding and maintenance.) System development lifecycle models have drawn heavily on software and so the two terms can be used interchangeabl...
|
Opinion mining is very much essential in commerce websites, furthermore, advantages with individuals. An ever-increasing amount of results are stored on the web as well as the amount of people acquiring items from the web are increasing, as a result, the users reviews, or posts are increasing day by day. The reviews towards shipper sites express th...
|
With the increasing importance of corruption has become a major factor to be considered as a result the number of vehicles and rapid development of population are growing in our everyday life. The process of developing ERTO Management, Automation of Road Transport Department through Cellular Network has gained major attention by traffic police, RTO...
|
With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of da...
|
This project develops a Departmental Store Management System (DSMS) is commonly found today at most retail store registers. Store merchandise, identified by a price code is checked out by a cashier who then accepts payment for the item(s). A DSMS is either read by a bar code scanner or manually entered by the cashier. At the completion of a sale, a...
|
This study explored the need for monitoring and evaluation system in an environment of a university in a third world country. Two methods were employed for data collection, which are qualitative and quantitative methodology combined with participatory action research methodology. Also prototype approach was used as method for system development. Gr...
|
In medical field, electronics industry gaining to develop medical equipment at very high advanced level techniques, they use electronics system every time for patient caring. Patient monitoring system can be defined as the system used for monitoring physiological signals that includes the parameters like electro-cardio graph (ECG), respiratory sign...
|
In today’s world, most of the people utilize Online Social Networks (OSN) to mingle with people of their interest. Various new and innovative photo sharing features attract many users and kindle them to post several photos. The user has the privilege of posting any photo on his/her profile and share it with a range of people. Unfortunately, it may ...
|
This article discusses various features in the design and implementation of online course materials. The author provides a critical review of some instructional design patterns and expands on the alignment among instruction, motivation and learners’ performances as part of a curriculum design process. In this context, the author emphasizes the valu...
|
Using a qualitative research method we studied the case of Linnaeus University. The purpose of this research was to study how Linnaeus University is using their corporate identity in their communication against students and employers. After analyzing the results of our empirical study and reflecting on the theoretical framework we concluded that Li...
|
Flooding is the most common worldwide natural disaster which is stylish throughout the year. There are various methods of alerts such as the email notifications, sirens etc. The design goal of this project is to monitor sudden floods can create a alert that will reach an end user through their mobile phone. Living in a very place that gets several ...
|
Herbal database management is one of the emerging trends nowadays. There are many agencies working on herbal database management. This system helps to overcome many adverse reactions of drugs and their interactions. The safety profile of an herbal is maintained in this database which is very useful for appropriate use of herbal medicine. Here, an a...
|
Using a novel approach with video-recordings of sales interactions, this study focuses on a dynamic analysis of salesperson effectiveness in handling customer queries. We conceptualize salesperson behaviors, namely, resolving, relating, and emoting, as separate elements of customer query handling and empirically identify the distinct verbal and non...
|
College is a place where student can learn method of developing their mind in right direction and build their future goals plan and research on them from college time onward they have to find the solutions of the problems they are getting from the real world and work on it. In our work, we have made cloud based college management system were studen...
|
The task includes Android Application Development of a GPS based understudy Location Tracker in which with the assistance of any cell phone; some other GPS empowered handset could be found. In spite of the fact that target client might be found anyplace in inside the school foundation, he should have arranged availability and be GPS empowered. In p...
|
Multilevel Marketing is a very popular business model in the Western countries. It is a kind of hybrid of the method of distribution of goods and the method of building a sales network. It is one of the safest (Carries a very low risk) ways of conducting a business activity. The knowledge about functioning of this Business model, both among theoret...
|
A billing system can be very useful within a business environment. Instead of making bills manually or to sum up the total manually, it is very much time consuming and also may have some human errors like adding up the wrong total or adding wrong items into the bill. When making a hand written bill the owner and customer both have to repeatedly che...
|
This report in the title "Optical Shop Manager" which is a shop management system to manage optical shop business and it is implemented with inventory management. There are modules in this system, which are login, master inventory management, transaction management, staff management, and financial management. The problem statement of this thesis ar...
|
The online tourism industry is growing at a fast pace in India. The traditional forms of tourism are being replaced by new form e-tourism. The internet has offered with easy and costeffective solution to people who go for online travel bookings. E-service tourism companies need to understand the customer requirement and meet their expectations by e...
|
Browsing Centre Management System is a task which helps with keeping the Record of whatever the deals from a shop (entire vender), additionally it monitor remaining balance which due in the wake of offering the item. Through this undertaking, we keep up the warranty given on specific items alongside total data identified with that product. Computer...
|
Accurate measurement of household food purchase behavior (HFPB) is important for understanding its association with household characteristics, individual dietary intake and neighborhood food retail outlets. However, little research has been done to develop measures of HFPB. The main objective of this paper is to describe the development of a measur...
|
The Management Information System is a concept of the last decade or two. The role of MIS in an organization can be compared to the role of heart in the body. Most of the organizations be it small or large are using computer based information system with centralized, decentralized or distributed networks connecting data flow from and to the various...
|
In our day to day life we consume food and our survival is based on mainly food. A considerable amount of our food is coming from farms and other means too. These farmers do their hard work for growing and serving many lives across the country, which pays for their source of income. But due to intermediates in the selling of their final products th...
|
This paper introduces a video copy detection system which efficiently matches individual frames and then verifies their spatio-temporal consistency. The approach for matching frames relies on a recent local feature indexing method, which is at the same time robust to significant video transformations and efficient in terms of memory usage and compu...
|
In this paper, we present the architecture of a new multimedia E-mail system, which has been successfully developed in the Communication and Multimedia Laboratory of National Taiwan University. This prototype E-mail system is fully compatible with traditional Internet E-mails in that the multimedia emails can be sent through Internet. For allowing ...
|
The evolution of WWW leads to continuous growth of demands that are placed on web applications that results in creating sophisticated web architectures. To minimize the complexity behind their design, software frameworks were introduced. There are hundreds of web frameworks, hence the choice of the right framework can be seen as searching for the h...
|
A detailed accumulation of the methods of wireless power transfer (WPT) including short range as well as mid range transmission . The technology and the science behind WPT and the future scope is discussed in detail. While a lot of research has been done on this topic in the previous decade, a large part of it is yet to be explored. The topics furt...
|
There have been many applications oriented around controlling and tracing the lifecycle of project, tasks, and requirements. In the beginning of this work, the author provides an introduction into the problematic of the above-mentioned tracing, mentioning also software development methods and how they relate to this theme. In the second part of the...
|
Hospital Management System is an organized computerized system designed and programmed to deal with day to day operations and management of the hospital activities. The program can look after inpatients, outpatients, records, database treatments, status illness, billings in the pharmacy and labs. It also maintains hospital information such as ward ...
|
Online Examination is an essential ingredient in electronic and interactive learning, however, in educational environment most of examinations are done in the classical paper-based way due to the lack of resumption capability when power/network/physical computer’s component failures. For this reason, adopting and developing an online examination sy...
|
In the present scenario, any type of communication over the internet and other network applications need to be secure due to their increasing utility. For this task, lots of algorithms for security have been implemented and used so far. With these developments, attackers have also come up with the new ideas to penetrate the communication mediums. T...
|
Presently a-days Cloud registering is rising field in light of its Performance, high accessibility, easily. Information store is principle future that cloud benefit gives to the huge association to store tremendous measure of information. Yet at the same time numerous associations are not prepared to execute distributed computing innovation since a...
|
With the advancement of technology, it is imperative to exalt all the systems into a user-friendly manner. The Library Management system (LMS) acts as a tool to transform traditional libraries into digital libraries. In traditional libraries, the students/user has to search for books which are hassle process and there is no proper maintenance of da...
|
This article investigates the basic design principles for a new Wireless Network Operating System (WNOS), a radically different approach to software-defined networking (SDN) for infrastructure-less wireless networks. Departing from well understood approaches inspired by Open Flow, WNOS provides the network designer with an abstraction hiding (i) th...
|
This work conceives the robust linear transceivers for the estimation of an unknown vector parameter in a coherent multiple access channel (MAC)-based multiple-input multiple-output (MIMO) multi-sensor network under imperfect channel state information (CSI) at the fusion center (FC). Both the popular stochastic (S-) and norm ball CSI uncertainty (N...
|
As the core count in shared-memory manycores keeps increasing, it is becoming increasingly harder to design cache-coherence protocols that deliver high performance without an inordinate increase in complexity and cost. In particular, sharing patterns where a group of cores frequently reads and writes a shared variable are hard to support efficientl...
|
This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...
|
In this paper, we consider a wireless-powered communication network (WPCN) where one mobile hybrid access point (HAP) coordinates the wireless energy transfer to sensor nodes and receives data from sensor nodes, which are powered exclusively by the harvested wireless energy. As the harvest-then-transmit protocol is employed by sensor nodes, a major...
|
Research efforts in trust evaluation has evolved to provide security in Wireless Sensor Networks (WSNs), while being dependent on external parameters and network topology. Existing node level trust evaluation in WSNs evaluate trust over 1-hop assuring trustworthiness of an immediate node. This paper proposes trust evaluation using the intrinsic pro...
|
Unmanned aerial vehicles (UAVs) have extensive civilian and military applications, but establishing a UAV network providing high data rate communications with low delay is a challenge. Millimeter wave (mmWave), with its high bandwidth nature, can be adopted in the UAV network to achieve high speed data transfer. However, it is difficult to establis...
|
In ultra-dense networks, the increasing popularity of computation intensive applications imposes challenges to the resource-constrained smart mobile devices (SMDs), which may be solved by offloading these computation tasks to the nearby mobile edge computing centers. However, when massive SMDs offload computation tasks in a dynamic wireless environ...
|
Wireless Ad Hoc Networks are self-organizing networks deployed without any centralized infrastructure. Flooding based Denial-of-Service (DoS) attacks were targeting the constrained resources of mobile nodes as well as the network. Route Request (RREQ) flooding attack is one of the prominent DoS attacks launched from the network layer in which the a...
|
Here were fabricating the charcoal mixing and grinding machine. It is used for mixing the charcoal finely for the several purposes. Here were developing this concept for the main reason is, reducing the manual effort and also increasing the productivity. This project is made done by these components, motor, belt, pulley, bearings and the hopper. Th...
|
Multi tool turret head is used to make more operations like drilling, facing, turning; chamfering, grooving etc… are done sequentially. It has proved to be the most versatile method to machining works on the work piece. This machine includes a first functional portion known as the work holder which helps to hold the work piece. This system is provi...
|
This paper investigates the performance of a wireless network that consists of two pairs of transmitter-receiver sharing the same channel, modeled using two coupled queues. In this analysis, we use the power metric P , defined as the ratio of throughput and mean delay, to understand the compromise between these two metrics. We show that, when the u...
|
This paper investigates the problem of resource allocation for a wireless communication network with distributed reconfigurable intelligent surfaces (RISs). In this network, multiple RISs are spatially distributed to serve wireless users and the energy efficiency of the network is maximized by dynamically controlling the on-off status of each RIS a...
|
Limited backhaul bandwidth and blockage effects are two main factors limiting the practical deployment of millimeter wave (mmWave) networks. To tackle these issues, we study the feasibility of relaying as well as caching in mmWave networks. A user association and relaying (UAR) criterion dependent on both caching status and maximum biased received ...
|
Coded caching is a technique that promises significant reductions in network traffic by exploiting the multicast opportunities among multiple cache-enabled users. Most works in this area investigate the fundamental performance limits of coded caching from an information-theoretic perspective. In this paper, from a practical perspective, we focus on...
|
In this modern era, each and every individual needs to utilize the communication medium for sending and receiving the respective data between source and destination entities. A Wireless Sensor Network (WSN) environments provide such facility to clients to perform a successful and range free communication between source and destination. This paper u...
|
Radio access network (RAN) slicing is a virtualization technology that partitions radio resources into multiple autonomous virtual networks. Since RAN slicing can be tailored to provide diverse performance requirements, it will be pivotal to achieve the high-throughput and low-latency communications that next-generation (5G) systems have long yearn...
|
Intelligent network management for reconfigurable wireless networks such as 5G and beyond applications is crucial for many industrial applications, and has been the subject of ongoing research. This paper proposes an Artificial Intelligence(AI)-Assisted energy-efficient and intelligent routing, based on both energy efficiency prioritization and AI ...
|
Clock synchronization is crucial for applications in wireless sensor networks, such as event scheduling and data fusion. In practical wireless networks, environmental changes cause the oscillator to be imperfect. Thus, it is necessary to track the nonlinear varying clock dynamically. In this paper, we propose a timestamp-free clock skew (frequency ...
|
Many Internet of Things smart-* applications are being powered solely through ambient energy-harvested energy. These applications require periodic data collection with low latency and high reliability. Since the energy is harvested in small amounts from ambient sources and is stochastic in nature, it is extremely challenging to achieve low latency ...
|
Unmanned aerial vehicles (UAVs) are anticipated to be integrated into the next generation wireless networks as new aerial mobile nodes, which can provide various live streaming applications such as surveillance, reconnaissance, etc. For such applications, due to the dynamic characteristics of traffic and wireless channels, how to guarantee the qual...
|
This paper presents wChain, a blockchain protocol specifically designed for multihop wireless networks that deeply integrates wireless communication properties and blockchain technologies under the realistic SINR model. We adopt a hierarchical spanner as the communication backbone to address medium contention and achieve fast data aggregation withi...
|
The time series data generated by massive sensors in Internet of Things (IoT) is extremely dynamic, heterogeneous, large scale and time-dependent. It poses great challenges (e.g. accuracy, reliability, stability) on the real-time analysis and decision making for different IoT applications. In this paper, we design, implement and evaluate EdgeLSTM, ...
|
Urban crowd flow prediction is very challenging for public management and planning in smart city applications. Existing work mostly focuses on spatial and temporal dependence based flow prediction that are not well suited for predictions of instantaneous flow change usually due to social emergency incidents and accidents. In this paper, we propose ...
|
Passive Gen2 radio frequency identification (RFID) tags work thanks to the utilization of line codes that balance their operation between two opposite states: absorbing RF (for energy harvesting) and reflecting RF (for backscattering/communications). Given the current RF harvesting technology, batteryless tags need to be located very close to an ac...
|
Due to resource constraints and working surroundings, many IIoT nodes are easily hacked and turn into zombies from which to launch attacks. It is challenging to detect such networked zombies. We combine federated learning (FL) and fog/edge computing to combat malicious codes. Our protocol trains a global optimized model based on distributed dataset...
|
Deep neural network (DNN) has become increasingly popular in industrial IoT scenarios. Due to high demands on computational capability, it is hard for DNN-based applications to directly run on intelligent end devices with limited resources. Computation offloading technology offers a feasible solution by offloading some computation-intensive tasks t...
|
Internet of Things (IoT) is considered as a key enabler of health informatics. IoT-enabled devices are used for in-hospital and in-home patient monitoring to collect and transfer biomedical data pertaining to blood pressure, electrocardiography (ECG), blood sugar levels, body temperature, etc. Among these devices, wearables have found their presenc...
|
This work presents an instruction-set extension to the open-source RISC-V ISA (RV32IM) dedicated to ultra-low power (ULP) software-defined wireless IoT transceivers. The custom instructions are tailored to the needs of 8/16/32-bit integer complex arithmetic typically required by quadrature modulations. The proposed extension occupies only 2 major o...
|
Interference management and power transfer can provide a significant improvement over the 5th generation mobile networks (5G) dense Internet of Things (IoT) heterogeneous networks (HetNets). In this paper, we present a novel approach to simultaneously manage inferences at the downlink (DL) and uplink (UL), and to identify opportunities for power tr...
|
Developing products and entering new markets in the Internet of Things (IoT) and industry 4.0 space are challenging because value propositions and business models are complex. IoT products are fundamentally platform products, whose embedded components can measure a disparate set of characteristics for several user types. Deciding in advance which c...
|
For most Internet-of-Things (IoT) applications, embedded processors typically execute lightweight tasks such as sensing and communication. The typical IoT program senses some information and sends them via a channel, usually a wireless channel with an RF circuit. These IoT nodes often require a system with networking capabilities and a low-power ha...
|
In this paper, we study sensing data collection of IoT devices in a sparse IoT-sensor network, using an energy-constrained Unmanned Aerial Vehicle (UAV), where the sensory data is stored in IoT devices while the IoT devices may or may not be within the transmission range of each other. We formulate two novel data collection problems to fully or par...
|
The Software Defined Network in Internet of Things (SDN-IoT) is enjoying growing popularity due to its flexibility, automaticity and programmability. However, there still lack proper permission management on SDN-IoT applications (SIApps), especially when the SIApp’s required northbound interfaces are located in multiple heterogeneous controllers wi...
|
Today's IoT devices rely on batteries, which offer stable energy storage but contain harmful chemicals. Having billions of IoT devices powered by batteries is not sustainable for the future. As an alternative, batteryless devices run on long-lived capacitors charged using energy harvesters. The small energy storage capacity of capacitors results in...
|
In Industrial Internet of Things (IIoT), a number of mutually untrusted devices with diverse computing resources and application requirements often need to work together to serve industrial production. When applying permissionless blockchain to process transactions among these devices, we are concerned with two types of fairness: mining fairness (i...
|
We develop a novel framework for efficiently and effectively discovering crowdsourced services that move in close proximity to a user over a period of time. We introduce a moving crowdsourced service model which is modelled as a moving region. We propose a deep reinforcement learning-based composition approach to select and compose moving IoT servi...
|
Cloud storage services allow data owners to outsource their potentially sensitive data (e.g., private genome data) to remote cloud servers in a ciphertext form. To enable data owners to further share the data encrypted in ciphertexts, many proxy re-encryption (PRE) schemes are proposed. However, most schemes only support single-recipient or coarse-...
|
Attribute-based authentication is considered a cornerstone component to achieve scalable fine-grained access control in the fast growing market of cloud-based services. Unfortunately, it also poses a privacy concern. Users attributes should not be linked to the users identity and spread across different organizations. To tackle this issue, several ...
|
This paper presents V-Sight, a network monitoring framework for programmable virtual networks in clouds. Network virtualization based on software-defined networking (SDN-NV) in clouds makes it possible to realize programmable virtual networks; consequently, this technology offers many benefits to cloud services for tenants. However, to the best of ...
|
Delivering cloud-like computing facilities at the network edge provides computing services with ultra-low-latency access, yielding highly responsive computing services to application requests. The concept of fog computing has emerged as a computing paradigm that adds layers of computing nodes between the edge and the cloud, also known as cloudlets,...
|
Fog computing has been advocated as an enabling technology for computationally intensive services in smart connected vehicles. Most existing works focus on analyzing the queueing and workload processing latencies associated with fog computing, ignoring the fact that wireless access latency can sometimes dominate the overall latency. This motivates ...
|
In a public blockchain system applying Proof of Work (PoW), the participants need to compete with their computing resources for reward, which is challenging for resource-limited devices. Mobile blockchain is proposed to facilitate the application of blockchain for mobile service, in which the lightweight devices can participate mining by renting re...
|
Fog computing is an emerging computing paradigm that uses processing and storage capabilities located at the edge, in the cloud, and possibly in between. Testing and benchmarking fog applications, however, is hard since runtime infrastructure will typically be in use or may not exist, yet. While approaches for the emulation of infrastructure testbe...
|
Workflow scheduling in cloud environments has become a significant topic in both commercial and industrial applications. However, it is still an extraordinarily challenge to generate effective and economical scheduling schemes under the deadline constraint especially for the large scale workflow applications. To address the issue, this paper invest...
|
Cloud computing has promoted the success of Internet of Things (IoT) with offering abundant storage and computation resources where the data from IoT sensors can be remotely outsourced to the cloud servers, whereas storing, exchanging and processing data collected through IoT sensors via centralised or decentralised cloud servers make cloud-based I...
|
In recent years, edge computing has attracted significant attention because it can effectively support many delay-sensitive applications. Despite such a salient feature, edge computing also faces many challenges, especially for efficiency and security, because edge devices are usually heterogeneous and may be untrustworthy. To address these challen...
|
The population of cloud computing greatly facilitates the sharing of explosively generated image today. While benefiting from the convenient of cloud, the privacy protection mechanism that commonly applied in cloud service makes the spreading of illegal and harmful data very hard to be detected or controlled. Such a realistic threat should be serio...
|
Broadcast encryption provides a promising technique of data access control for specified users in cloud computing. A data uploader can generate a ciphertext for a set of chosen users such that only the intended users are able to learn the data content. However, with the rapidly increasing of collaboration between users, it is desired to extend the ...
|
Tubulin is a promising target for designing anti-cancer drugs. Identification of hotspots in multifunctional Tubulin protein provides insights for new drug discovery. Although machine learning techniques have shown significant results in prediction, they fail to identify the hotspots corresponding to a particular biological function. This paper pre...
|
Linear discriminant analysis (LDA) is a classical statistical machine-learning method, which aims to find a linear data transformation increasing class discrimination in an optimal discriminant subspace. Traditional LDA sets assumptions related to the Gaussian class distributions and single-label data annotations. In this article, we propose a new ...
|
Cross-manifold clustering is an extreme challenge learning problem. Since the low-density hypothesis is not satisfied in cross-manifold problems, many traditional clustering methods failed to discover the cross-manifold structures. In this article, we propose multiple flat projections clustering (MFPC) for cross-manifold clustering. In our MFPC, th...
|
This article proposes a novel modeling method for the stochastic nonlinear degradation process by using the relevance vector machine (RVM), which can describe the nonlinearity of degradation process more flexibly and accurately. Compared with the existing methods, where degradation processes are modeled as the Wiener process with a nonlinear drift ...
|
A traveling salesman problem (CTSP) as a generalization of the well-known multiple traveling salesman problem utilizes colors to distinguish the accessibility of individual cities to salesmen. This work formulates a precedence-constrained CTSP (PCTSP) over hypergraphs with asymmetric city distances. It is capable of modeling the problems with opera...
|
With the dramatic increase of dimensions in the data representation, extracting latent low-dimensional features becomes of the utmost importance for efficient classification. Aiming at the problems of weakly discriminating marginal representation and difficulty in revealing the data manifold structure in most of the existing linear discriminant met...
|
Active learning (AL) improves the generalization performance for the current classification hypothesis by querying labels from a pool of unlabeled data. The sampling process is typically assessed by an informative, representative, or diverse evaluation policy. However, the policy, which needs an initial labeled set to start, may degenerate its perf...
|
Unsupervised domain adaptation (UDA) aims at learning a classifier for an unlabeled target domain by transferring knowledge from a labeled source domain with a related but different distribution. Most existing approaches learn domain-invariant features by adapting the entire information of the images. However, forcing adaptation of domain-specific ...
|
When a multiobjective evolutionary algorithm based on decomposition (MOEA/D) is applied to solve problems with discontinuous Pareto front (PF), a set of evenly distributed weight vectors may lead to many solutions assembling in boundaries of the discontinuous PF. To overcome this limitation, this article proposes a mechanism of resetting weight vec...
|
Autonomous learning algorithms operate in an online fashion in dealing with data stream mining, where minimum computational complexity is a desirable feature. For such applications, parsimonious learning machines (PALMs) are suitable candidates due to their structural simplicity. However, these parsimonious algorithms depend upon predefined thresho...
|
By training different models and averaging their predictions, the performance of the machine-learning algorithm can be improved. The performance optimization of multiple models is supposed to generalize further data well. This requires the knowledge transfer of generalization information between models. In this article, a multiple kernel mutual lea...
|
Predicting attention-modulated brain responses is a major area of investigation in brain-computer interface (BCI) research that aims to translate neural activities into useful control and communication commands. Such studies involve collecting electroencephalographic (EEG) data from subjects to train classifiers for decoding users' mental states. H...
|
This article explores the problem of semisupervised affinity matrix learning, that is, learning an affinity matrix of data samples under the supervision of a small number of pairwise constraints (PCs). By observing that both the matrix encoding PCs, called pairwise constraint matrix (PCM) and the empirically constructed affinity matrix (EAM), expre...
|
Passwords are pervasively used to authenticate users' identities in mobile apps. To secure passwords against attacks, protection is applied to the password authentication protocol (PAP). The implementation of the protection scheme becomes an important factor in protecting PAP against attacks. We focus on two basic protection in Android, i.e., SSL/T...
|
Andriod malware poses a serious threat to users privacy, money, equipment and file integrity. A series of data-driven malware detection methods were proposed. However, there exist two key challenges for these methods: (1) how to learn effective feature representation from raw data; (2) how to reduce the dependence on the prior knowledge or human la...
|
In this paper, we consider an Internet-of-Things (IoT) network that supports two types of devices, namely static devices (SDs) and dynamic devices (DDs), with multiple channels. The notion of power-domain non-orthogonal multiple access (NOMA) is applied so that DDs can not only dynamically change channels, but also transmit signals with a high powe...
|
The increasing demand for wireless connectivity and the emergence of the notion of the Internet of Everything require new communication paradigms that will ultimately enable a plethora of new applications and new disruptive technologies. In this context, the present contribution investigates the use of the recently introduced intelligent reflecting...
|
In medical field, previous patients' cases are extremely private as well as intensely valuable to current disease diagnosis. Therefore, how to make full use of precious cases while not leaking out patients' privacy is a leading and promising work especially in future privacy-preserving intelligent medical period. In this paper, we investigate how t...
|
Driving behaviors are highly relevant to automotive statuses and on-board safety, which offer compelling shreds of evidence for mobility as a service (MaaS) providers to develop personalized rental prices and insurance products. However, the direct dissemination of driving behaviors may lead to violations of identity and location privacy. In this p...
|
It is a challenging task to deploy lightweight security protocols in resource-constrained IoT applications. A hardware-oriented lightweight authentication protocol based on device signature generated during voltage over-scaling (VOS) was recently proposed to address this issue. VOS-based authentication employs the computation unit such as adder...
|
Mobile edge computing (MEC) is a promising technique to alleviate the energy limitation of Internet of things (IoT) devices, as it can offload local computing tasks to the edge server through a cellular network. By leveraging extreme value theory (EVT), this work proposes a priority-differentiated offloading strategy that takes into account the str...
|
One of the major challenges for Internet-of-Things applications is that the existing cellular technologies do not support the uplink IoT traffic in an energy-efficient manner. There are two principal ways for serving the uplink IoT traffic: grant-based (i.e., scheduled) and grant-free (i.e., random access). Grant-based access provides fine-grained ...
|
With the development of the Internet of Things, trust has become a limited factor in the integration of heterogeneous IoT networks. In this regard, we use the combination of blockchain technology and SDN/NFV to build a heterogeneous IoT network resource management model based on the consortium chain. In order to solve the efficiency problem caused ...
|
This work enables mobile user authentication via finger inputs on ubiquitous surfaces leveraging low-cost physical vibration. The system we proposed extends finger-input authentication beyond touch screens to any solid surface for IoT devices (e.g., smart access systems and IoT appliances). Unlike passcode or biometrics-based solutions, it integrat...
|
Sensor systems have the potential to make abstract science phenomena concrete for K–12 students. Internet of Things (IoT) sensor systems provide a variety of benefits for modern classrooms, creating the opportunity for global data production, orienting learners to the opportunities and drawbacks of distributed sensor and control systems, and reduci...
|
Nowadays, IoT systems can better satisfy the service requirements of users with effectively utilizing edge computing resources. Designing an appropriate pricing scheme is critical for users to obtain the optimal computing resources at a reasonable price and for service providers to maximize profits. This problem is complicated with incomplete infor...
|
With more than 75 billions of objects connected by 2025, Internet of Things (IoT) is the catalyst for the digital revolution, contributing to the generation of big amounts of (transient) data, which calls into question the storage and processing performance of the conventional cloud. Moving storage resources at the edge can reduce the data retrieva...
|
Barrier coverage scheduling is an energy conservation scheme in which a subset of sensor nodes with overlapped sensing area (also called barrier) is activated to meet the key Quality of Service (QoS) requirements such as energy-efficiency, coverage, and connectivity. However, sudden and unexpected node failures in a barrier due to security attacks ...
|
We investigate massive access in the Internet-ofThings (IoT) relying on multi-pair two-way amplify-and-forward (AF) relay systems using massive multiple-input multiple-output (MIMO). We utilize the approximate message passing (AMP) algorithm for joint device activity detection and channel estimation. Furthermore, we analyze the achievable rates for...
|
In this paper, we propose and study an energy-efficient trajectory optimization scheme for unmanned aerial vehicle (UAV) assisted Internet of Things (IoT) networks. In such networks, a single UAV is powered by both solar energy and charging stations (CSs), resulting in sustainable communication services, while avoiding energy outage. In particular,...
|
Cloud Data Centers (CDCs) have become a vital computing infrastructure for enterprises. However, CDCs consume substantial energy due to the increased demand for computing power, especially for the Internet of Things (IoT) applications. Although a great deal of research in green resource allocation algorithms have been proposed to reduce the energy ...
|
We propose a novel generic trust management framework for crowdsourced IoT services. The framework exploits a multi-perspective trust model that captures the inherent characteristics of crowdsourced IoT services. Each perspective is defined by a set of attributes that contribute to the perspective’s influence on trust. The attributes are fed into a...
|
Computationally expensive applications, including machine learning, chemical simulations, and financial modeling, are promising candidates for noisy intermediate scale quantum (NISQ) computers. In these problems, one important challenge is mapping a quantum circuit onto NISQ hardware while satisfying physical constraints of an underlying quantum ar...
|
The failure of complex artificial intelligence (AI) systems seems ubiquitous. To provide a model to describe these shortcomings, we define complexity in terms of a system's sensors and the number of environments or situations in which it performs. The complexity is not looked at in terms of the difficulty of design, but in the final performance of ...
|
With convenient Internet access and ubiquitous high-quality sensors in end-user devices, a growing number of content consumers are engaging in the content creation process. Meanwhile, mobile edge computing (MEC) can provision distributed computing resources for local data processing. The MEC-enhanced video crowdsourcing application will gather user...
|
Point clouds are the most general data representations of real and abstract objects, and have a wide variety of applications in many science and engineering fields. Point clouds also provide the most scalable multi-resolution composition for geometric structures. Although point cloud learning has shown remarkable results in shape estimation and sem...
|
Cloud Data Centers (CDCs) have become a vital computing infrastructure for enterprises. However, CDCs consume substantial energy due to the increased demand for computing power, especially for the Internet of Things (IoT) applications. Although a great deal of research in green resource allocation algorithms have been proposed to reduce the energy ...
|
Cloud-assisted Internet of Medical Things (IoMT) is becoming an emerging paradigm in the healthcare domain, which involves collection, storage and usage of the medical data. Considering the confidentiality and accessibility of the outsourced data, secure and fine-grained data sharing is a crucial requirement for the patients. Attribute-based encryp...
|
Edge computing has emerged as a new paradigm to bring cloud applications closer to users for increased performance. Unlike back-end cloud systems which consolidate their resources in a centralized data center location with virtually unlimited capacity, edge-clouds comprise distributed resources at various computation spots, each with very limited c...
|
To increase the flexibility and the dynamism of communication networks, Software Defined Networking (SDN) has emerged as the challenging approach to decouple control and data planes, using a logically centralized controller able to manage the underlying network resources. However, traditional network solutions can not be always used in SDN. In this...
|
With the rapid development of bioinformatics and the availability of genetic sequencing technologies, genomic data has been used to facilitate personalized medicine. Cloud computing, features as low cost, rich storage and rapid processing can precisely respond to the challenges brought by the emergence of massive genomic data. Considering the secur...
|
As a promising technology in the development of human healthcare services, the wireless body area networks (WBANs) technology has attracted widespread attention in recent years from both industry and academia. However, due to the sensitiveness of the medical system and the capability limitation of the wearable devices, security, privacy, and effici...
|
In contrast to the traditional cloud-based IoT structure, which imposes high computation and storage demands on the central cloud server, edge computing can process data at the network edge. In this paper, we present an edge computing data storage protocol employing the blockchain and the group signature, where the blockchain works as the trusted t...
|
Fine-grained access control schemes are commonly used in cloud computing. In this type of schemes, each data item is given its own access control policy. The entity that wants to access the data item needs to provide its credentials to a policy enforcer. In a cloud environment, normally, the policy enforcer is not the owner of the data. The access ...
|
In this letter, we discuss the security weakness of Wang et al.'s attribute-based data sharing scheme, in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (TIFS) (DOI: 10.1109/TIFS.2016.2549004). Through designing two concrete attacks, we identify two serious security flaws in their scheme. 1) First, we show that their scheme is insecure bec...
|
This work takes as a starting point a collection of patterns for engineering software for the cloud and tries to find how they are regarded and adopted by professionals. Existing literature assessed the adoption of cloud computing with a focus on business and technological aspects and fall short in grasping a holistic view of the underlying approac...
|
This paper proposes a backup resource allocation model that provides a probabilistic protection for primary physical machines in a cloud provider to minimize the required total capacity. When any random failure occurs, workloads are transferred to preplanned and dedicated backup physical machines for prompt recovery. In the proposed model, a probab...
|
Cloud computing enables enterprises and individuals to outsource and share their data. This way, cloud computing eliminates the heavy workload of local information infrastructure. Attribute-based encryption has become a promising solution for encrypted data access control in clouds due to the ability to achieve one-to-many encrypted data shari...
|
Broadcast encryption provides a promising technique of data access control for specified users in cloud computing. A data uploader can generate a ciphertext for a set of chosen users such that only the intended users are able to learn the data content. However, with the rapidly increasing of collaboration between users, it is desired to extend the ...
|
Nowadays, more and more computation-intensive scientific applications with diverse needs are migrating to cloud computing systems. However, the cloud systems alone cannot meet applications' requirements at all times with the increasing demands from users. Therefore, the multi-cloud systems that can provide scalable storage and computing resources b...
|
The elasticity of cloud resources allow cloud clients to expand and shrink their demand of resources dynamically over time. However, fluctuations in the resource demands and pre-defined size of virtual machines (VMs) lead to lack of resource utilization, load imbalance and excessive power consumption. To address these issues and to improve the perf...
|
With the widespread use of cloud emails and frequent reports on large-scale email leakage events, a security property so-called forward secrecy becomes desirable and indispensable for both individuals and cloud email service providers to strengthen the security of cloud email systems. However, due to the failure to meet the security and practicalit...
|
Motivation: Identifying differentially expressed genes (DEGs) in transcriptome data is a very important task. However, performances of existing DEG methods vary significantly for data sets measured in different conditions and no single statistical or machine learning model for DEG detection perform consistently well for data sets of different trait...
|
A significant amount of distributed photovoltaic (PV) generation is invisible to distribution system operators since it is behind the meter on customer premises and not directly monitored by the utility. The generation essentially adds an unknown varying negative demand to the system, which causes additional uncertainty in determining the total loa...
|
Wireless charging is an attractive technology that often promises increased mobility for electrical devices. However, commonly-available wireless charging systems are generally intolerant to misalignment between the charger and the receiving device due to the need for inductive coupling between the two, defeating the promise of mobility. Many techn...
|
A swarm of Autonomous Underwater Vehicles (AUVs) can provide richer spatial-temporal information than the traditional single-robot system, which can be used for underwater mapping, exploration, target tracking, among others. However, the limitation of AUVs’ battery cannot support persistent services, which restricts AUVs’ operating range and missio...
|
Intelligent reflecting surface (IRS) is an enabling technology to engineer the radio signal propagation in wireless networks. By smartly tuning the signal reflection via a large number of low-cost passive reflecting elements, IRS is capable of dynamically altering wireless channels to enhance the communication performance. It is thus expected that ...
|
With advances in wireless power transfer techniques, Battery-Free Wireless Sensor Networks (BF-WSNs) which can support long-term applications, has been attracting increasing interests in recent years. Unfortunately, the problem of Minimum Latency Aggregation Scheduling (MLAS) is not well studied in BF-WSNs. Existing works always have a rigid assump...
|
In wireless network virtualization processes, load imbalance in substrate nodes and substrate links may significantly reduce the number of virtual network requests served by a substrate network. In addition, load imbalance also impairs resource utilization and increases embedding cost of the virtual networks. To tackle these issues, this work propo...
|
This paper presents a part of our ground-breaking work on evaluation of buildings in terms of wireless friendliness at the building-design stage. The main goal is to devise building design practices that provide for a good performance of wireless networks deployed in buildings. In this paper, the interference gain (IG) and power gain (PG) are defin...
|
Wireless virtualization has emerged as one of the efficient ways to overcome numerous wireless networking challenges such as RF resource sharing. RF spectrum sharing in wireless networks focuses on increasing the usage efficiency of radio frequency (RF) spectrum with its increasing demand. To reduce uncertainties that accompany the spectrum sharing...
|
Minimized and nearly deterministic end-to-end latency facilitates real-time data acquisition and actuator control. In addition, defined latency is an integral part of quality oriented service in order to get closer to the reliability of wired networks and at the same time take advantage of wireless networking. This paper introduces a QoS routing pr...
|
This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...
|
This article proposes indirect/direct learning control schemes for wireless sensor and mobile robot networks to cover an environment according to the density function, which is the distribution of an important quantity within the environment. When stationary sensors cooperate with mobile robots, the density estimation can be enhanced by using nonst...
|
Clustering is one of the popular methods for improving energy efficiency in wireless sensor networks. In most of the existing fuzzy approaches, the CHs are selected first, and then clusters are generated, but this may lead to uneven distribution of the sensor nodes in the clusters. In this article, the clusters are generated using the famous Fuzzy ...
|
A subranging analog-to-digital converter (ADC) with reference-embedded comparators (RECs) is proposed. By adjusting the bias current and/or body voltage of the REC’s input differential pair, the REC offset can be adjusted to a specific voltage equal to a reference voltage referred to henceforth as the embedded reference. For the ADC’s coarse stage,...
|
A class of multi-resonant RF filtering stage that exhibits a multi-band bandpass filtering transfer function with embedded in-band notches is presented. It is derived from the application of a composed lowpass-to-multi-passband/multi-stopband frequency transformation that converts the normalized lowpass prototype into the proposed multi-passband/mu...
|
In this paper, we present an Online Learning Artificial Neural Network (ANN) model that is able to predict the performance of tasks in lower frequency levels and safely optimize real-time embedded systems' power saving operations. The proposed ANN model is supported by feature selection, which provides the most relevant variables to describe shared...
|
Just-in-time (JIT) bug prediction is an effective quality assurance activity that identifies whether a code commit will introduce bugs into the mobile app, aiming to provide prompt feedback to practitioners for priority review. Since collecting sufficient labeled bug data is not always feasible for some mobile apps, one possible approach is to leve...
|
As a class of context-aware systems, context-aware service recommendation aims to bind high-quality services to users while taking into account their context requirements, including invocation time, location, social profiles, connectivity, and so on. However, current CASR approaches are not scalable with the huge amount of service data (QoS and con...
|
Knowledge graph (KG) embedding aims to study the embedding representation to retain the inherent structure of KGs. Graph neural networks (GNNs), as an effective graph representation technique, have shown impressive performance in learning graph embedding. However, KGs have an intrinsic property of heterogeneity, which contains various types of enti...
|
Modern mobile OSes support to display Web pages in the native apps, which we call embedded Web pages. In this paper, we conduct, to the best of our knowledge, the first measurement study on browsing embedded Web pages on Android. Our study on 22,521 popular Android apps shows that 57.9% and 73.8% of apps embed Web pages on two popular app markets: ...
|
Learning node representations in a network has a wide range of applications. Most of the existing work focuses on improving the performance of the learned node representations by designing advanced network embedding models. In contrast to these work, this article aims to provide some understanding of the rationale behind the existing network embedd...
|
In wireless network virtualization processes, load imbalance in substrate nodes and substrate links may significantly reduce the number of virtual network requests served by a substrate network. In addition, load imbalance also impairs resource utilization and increases embedding cost of the virtual networks. To tackle these issues, this work propo...
|
This paper presents a unified power flow algorithm for large and complex mixed AC/DC power systems based on the partitioning of power grids, a version of the two-level Newton method, and the modified nodal analysis formulation. Partitioning significantly increases numerical efficiency without altering the accuracy of the power flow solution. This a...
|
Measurement error is a crucial factor that determines the accuracy of state estimation (SE). Conventional estimators have fixed models, and can yield optimal performance only when the measurement error statistics exactly meet the assumptions. In reality, however, the error distribution is usually unknown and time-varying, resulting in suboptimal st...
|
Load frequency control (LFC) of modern power systems tends to employ open communication networks to transmit measurement/control signals. Under a limited network bandwidth, the continuous and high-sampling-rate signal transmission will be prone to degradation of the LFC performance through network congestion. This brief proposes a decentralized con...
|
Fifth harmonic voltages and currents have been measured in some extra high voltage (EHV) power transmission systems. This paper contains a discussion and explanation of this phenomenon. The emphasis is on the impact of overexcitation of power transformers in EHV systems. Examples of measurements taken in 500 kV substations are illustrated and r...
|
This brief investigates the problems of stability and stabilization of the fractional-order power system with time delay. The models of the fractional-order nonlinear and linearized delayed power system are established, respectively. Based on the theory of the fractional calculus and the Lyapunov functional technique, the relevant stability criteri...
|
Grid integration of solar photovoltaic (PV) systems has been escalating in recent years, with two main motivations: reducing greenhouse gas emission and minimizing energy cost. However, the intermittent nature of solar PV generated power can significantly affect the grid voltage stability. Therefore, intermittent solar PV power generation and uncer...
|
Linear power supplies (LPSs) are widely used in fields including measurement systems, radiofrequency systems, medical applications, nuclear power plants, and spacecraft electronics. Electrolytic capacitors are used in a variety of devices because of their small size, low cost, and large capacity. During the use of electrolytic capacitor, it is very...
|
Multi-voltage domains are urgently needed in modern SoCs, while existing solutions such as switched DC-DC converter, switched capacitor converter and low-dropout regulator (LDO) do not generate multi-voltage domains conveniently and inexpensively. This paper presents a highly-efficient fully-integrated power management strategy to provide the ...
|
Power quality is an important concern for practical microgrid (MG) applications due to the widespread use of non-linear loads, and it is characterised by the implicit trade-off between voltage quality in the MG nodes and harmonic current sharing between distributed generators (DGs). Active and passive filters can be used to address this problem...
|
The switching operations of circuit breakers and disconnectors in substations can generate very fast transients, including transient earth voltage rise and intense electromagnetic radiation, causing severe disturbance of on-site electronic devices in substations and seriously affecting the development of smart power equipment. The power supply of a...
|
The state estimation algorithm estimates the values of the state variables based on the measurement model described as the system of equations. Prior to applying the state estimation algorithm, the existence and uniqueness of the solution of the underlying system of equations is determined through the observability analysis. If a unique solutio...
|
This paper discusses the impact of discrete secondary controllers on the dynamic response of power systems. The idea of the paper originates from the observation that there is a range of values, from few tens of seconds to few minutes, of the execution cycles of conventional automatic generation control (AGC) that leads to a limit cycle. Below ...
|
The heterogeneity of today’s Web sources requires information retrieval (IR) systems to handle multi-modal queries. Such queries define a user’s information needs by different data modalities, such as keywords, hashtags, user profiles, and other media. Recent IR systems answer such a multi-modal query by considering it as a set of separate uni-moda...
|
Graph node embedding aims at learning a vector representation for all nodes given a graph. It is a central problem in many machine learning tasks (e.g., node classification, recommendation, community detection). The key problem in graph node embedding lies in how to define the dependence to neighbors. Existing approaches specify (either explicitly ...
|
In this paper, we report our discovery on named entity distribution in a general word embedding space, which helps an open definition on multilingual named entity definition rather than previous closed and constraint definition on named entities through a named entity dictionary, which is usually derived from human labor and replies on schedule...
|
Most recent semi-supervised video object segmentation (VOS) methods rely on fine-tuning deep convolutional neural networks online using the given mask of the first frame or predicted masks of subsequent frames. However, the online fine-tuning process is usually time-consuming, limiting the practical use of such methods. We propose a directional dee...
|
Big data processing systems, such as Hadoop and Spark, usually work in large-scale, highly-concurrent, and multi-tenant environments that can easily cause hardware and software malfunctions or failures, thereby leading to performance degradation. Several systems and methods exist to detect big data processing systems’ performance degradation, perfo...
|
In this paper, a video service enhancement strategy is investigated under an edge-cloud collaboration framework, where video caching and delivery decisions are made in the cloud and edge respectively. We aim to guarantee the user fairness in terms of video coding rate under statistical delay constraint and edge caching capacity constraint. A hy...
|
Given a target binary function, the binary code search retrieves top-K similar functions in the repository, and similar functions represent that they are compiled from the same source codes. Searching binary code is particularly challenging due to large variations of compiler tool-chains and options and CPU architectures, as well as thousands o...
|
Robust road boundary extraction and completion play an important role in providing guidance to all road users and supporting high-definition (HD) maps. The significant challenges remain in remarkable and accurate road boundary recovery from poor road boundary conditions. This paper presents a novel deep learning framework, named BoundaryNet, to...
|
The supply-demand matching (SDM) strategy is an important part of the transaction mechanism design of cloud manufacturing (CMfg) platforms, which has a significant impact on the evolution trend of cloud manufacturing ecosystems (CMEs). To help CMfg platform operators choose the appropriate SDM strategy, first, the evolution process of the CME was q...
|
Computation partitioning is an important technique to improve the application performance by selectively offloading some computations from the mobile devices to the nearby edge cloud. In a dynamic environment in which the network bandwidth to the edge cloud may change frequently, the partitioning of the computation needs to be updated according...
|
With the enormous growth of wireless technology, and location acquisition techniques, a huge amount of spatio-temporal traces are being accumulated. This dataset facilitates varied location-aware services and helps to take real-life decisions. Efficiently handling and processing spatio-temporal queries are necessary to respond in real-time. Process...
|
Cross-Cloud Federation (CCF) enables resource exchange among multiple, heterogeneous Cloud Service Providers (CSPs) to support the composition of services (workflow) hosted by different providers. CCF participation can either be fixed, or the types of services that can be used are limited to reduce the potential risk of service failure or secur...
|
Vehicular cloud computing has emerged as a promising solution to fulfill users’ demands on processing computation-intensive applications in modern driving environments. Such applications are commonly represented by graphs consisting of components and edges. However, encouraging vehicles to share resources poses significant challenges owing to users...
|
We develop WiDE, a WiFi-distance estimation based group profiling system using LightGBM. Given the uploaded WiFi information by users, WiDE can automatically learn powerful hidden features from the proposed features for between-person distance estimation, and infer group membership with the estimated distance. For each group, WiDE classifies the mo...
|
This paper presents an asset health index (HI) prediction methodology for high voltage transmission overhead lines (OHLs) using supervised machine learning and structured, unambiguous visual inspections. We propose a framework for asset HI predictions to determine the technical condition of individual OHL towers to improve grid reliability in a cos...
|
Dynamic Security Assessment for the future power system is expected to be increasingly complicated with the higher level penetration of renewable energy sources and the widespread deployment of power electronic devices, which drive new dynamic phenomena. As a result, the increasing complexity and the severe computational bottleneck in real time ope...
|
Real-time forecasting of the financial time-series data is challenging for many machine learning (ML) algorithms. First, many ML models operate offline, where they need a batch of data, which may not be available during training. Besides, due to a fixed architecture of the majority of the offline-based ML models, they suffer to deal with the uncert...
|
Stochastic unit commitment is an efficient method for grid operation in the presence of significant uncertainties.An example is an operation during a predicted hurricane with uncertain line out-ages.However, the solution quality comes at the cost of substantial computational burden, which makes its adoption challenging.This paper evaluates some pos...
|
This work aims to enhance our fundamental understanding of how the measurement setup used to generate training and testing datasets affects the accuracy of the machine learning algorithms that attempt solving electromagnetic inversion problems solely from data. A systematic study is carried out on a one-dimensional semi-inverse electromagnetic prob...
|
? Proper training is essential to achieve reliable pattern recognition (PR) based myoelectric control.
? The amount of training is commonly determined by experience.
? The purpose of this study is to provide an offline validation method that makes the offline performance transferable to online control and find the proper amount of training tha...
|
Traffic control optimization is a challenging task for various traffic centers around the world and the majority of existing approaches focus only on developing adaptive methods under normal (recurrent) traffic conditions. Optimizing the control plans when severe incidents occur still remains an open problem, especially when a high number of lanes ...
|
? Curriculum learning (CL) is a training strategy that trains a machine learning model from easier data to harder data, which imitates the meaningful learning order in human curricula.
? As an easy-to-use plug-in, the CL strategy has demonstrated its power in improving the generalization capacity and convergence rate of various models in a wide r...
|
? Wafer test is carried out after integrated circuits (IC) fabrication to screen out bad dies.
? In addition, the results can be used to identify problems in the fabrication process and improve manufacturing yield.
? However, the wafer test itself may induce defects to otherwise good dies.
? Test-induced defects not only hurt overall manufact...
|
Real-World face recognition in unconstrained scenarios is still a major challenge for biometrics. The reasons are manifold. Among them is the fact that gallery (stored) enrolled face images are usually captured in controlled settings, using a predefined arrangement of subjects and capture devices, whereas the probes (test images) are captured in qu...
|
Digital image processing deals with the manipulation of digital images through a digital computer. It is a subfield of signal and systems but focus particularly on images. DIP focuses on developing a computer system that is able to perform processing on an image. The input of that system is a digital image and the system process that image using ef...
|
The IoT allows objects to be sensed or controlled remotely across existinginfrastructure, creating opportunities for more direct integration of the physical world into computer-based systems, and resulting in improved efficiency, accuracy and economic benefit in addition to reduced human intervention. The Internet of Things (IoT) i...
|
Library management system will allow fast transaction flow for the library
It also provide immediate and long term benefits to library in traceability and security
The barcode technology is slowly getting replaced by the RFID technology
The library across the globe started to use RFID to speed up the self check in/out processes to theft and to e...
|
Library management system will allow fast transaction flow for the library
It also provide immediate and long term benefits to library in traceability and security
The barcode technology is slowly getting replaced by the RFID technology
The library across the globe started to use RFID to speed up the self check in/out processes to theft and to e...
|
Library management system will allow fast transaction flow for the library
It also provide immediate and long term benefits to library in traceability and security
The barcode technology is slowly getting replaced by the RFID technology
The library across the globe started to use RFID to speed up the self check in/out processes to theft and to e...
|
The increase in urbanization and traffic congestion creates an urgent need to operate our transportation systems with maximum efficiency. One of the most cost-effective measures for dealing with this problem is traffic signal control. Traffic Signal Control is a system for synchronizing the timing of any number of traffic signals in an area, with t...
|
“GSM Based DC Motor Speed Control” implements the emerging applications of the GSM technology. Using GSM networks, a control system has been proposed that will act as an embedded system which can monitor and control appliances and other devices locally using built-in input and output peripherals.
Remotely the system allows the user to effectively ...
|
Digital media archives are increasing to colossal proportions in the world today, which includes audio, video and images An Image refers as a picture produced on an electronic display .A digital image is a numeric representation of a two-dimensional image. Digital image processing refers to processing of digital images by using digital computers. N...
|
Skin lesion is defined as a superficial growth or patch of the skin that is visually different than its surrounding area. Skin lesions appear for many reasons such as the symptoms indicative of diseases, birthmarks, allergic reactions, and so on. Skin lesions can be generally group into two categories namely primary and secondary skin lesions. Prim...
|
The Blind person navigation system can be used in house, hospitals where the blind people are living. The system consists of indoor transmitter section and blind person receiver section. The transmitter section is kept in the indoor and receiver section given to blind person. Whenever the Li-Fi receiver receives the data from transmitter section, i...
|
HFSS provides automatic, accurate, and efficient solutions to overcome these challenges, making it the ultimate tool of choice for antenna simulation. Basic performance characterization such as return loss, input impedance, gain, directivity and a variety of polarization characteristics can be analyzed in HFSS. Key post-processing features such as ...
|
A crowd is something beyond a simple sum of individuals. It has collective characteristics which could be described in general terms such as ‘angry crowd’, ‘peaceful crowd’. A crowd can assume different and complex behaviors as those expected by their individuals.
Understanding crowd behavior helps in designing pedestrian facilities, for major la...
|
Software testing is an integral part of software development process. Software testing is analyzing a system or a component by providing defined inputs and comparing them with the desired outputs to check the discrepancies between the desired and actual outputs and correct them. Basically software testing can be divided into two categories.
• Ma...
|
The recent incorporation of new Data Mining and Machine Learning services within Cloud Computing providers is empowering users with extremely comprehensive data analysis tools including all the advantages of this type of environment. Providers of Cloud Computing services for Data Mining publish the descriptions and definitions in many formats and o...
|
The traditional single minimum support data mining algorithm has some problems, such as too much space occupied by data, resulting in insufficient accuracy of the algorithm, which is difficult to meet the needs of the development of the times. Therefore, an intrusion data mining algorithm based on multiple minimum support is proposed. First, the fe...
|
The goal of our work is to discover dominant objects in a very general setting where only a single un labeled image is given. This is far more challenge than typical co-localization or weakly-supervised localization tasks. To tackle this problem, we propose a simple but effective pattern mining-based method, called Object Location Mining (OLM), whi...
|
Understanding complex biological phenomena involves answering complex biomedical questions on multiple biomolecular information simultaneously, which are expressed through multiple genomic and proteomic semantic annotations scattered in many distributed and heterogeneous data sources; such heterogeneity and dispersion hamper the biologists’ ability...
|
ALTEC defined and developed a framework with the main aim to process a big amount of data allowing a seamless connection between the collected information and the analyses performed by end users.This is the ASDP environment, that allows to organize data in the most adapt domain data store in order to have data ready for complex analyses. In particu...
|
Heterogeneous information networks (HINs) are usually used to model information systems with multi-type objects and relations. In contrast, graphs that have a single type of nodes and edges, are often called homogeneous graphs. Measuring similarities among objects is an important task in data mining applications, such as web search, link prediction...
|
The advancement of several significant technologies, such as artificial intelligence, cyber intelligence, and machine learning, has made big data penetrate not only into the industry and academic field but also our daily life along with a variety of cyber-enabled applications. In this article, we focus on a deep correlation mining method in heterog...
|
In recent decades, mobile or the Internet of Thing(IoT) devices are dramatically increasing in many domains and applications. Thus, a massive amount of data is generated and produced.
Those collected data contain a large amount of in-teresting information (i.e., interestingness, weight, frequency, or uncertainty), and most of the existing and gen...
|
This paper we propose a security patrolling robot that uses night vision camera for securing any premises. The robotic vehicle moves at particular intervals and is equipped with night vision camera and sound sensors. It uses a predefined line to follow its path while patrolling. It stops at particular points and moves to next points if sound are de...
|
Ridesharing is a mobility concept in which a trip is shared by a vehicle’s driver and one or more passengers called riders. Ridesharing is considered as a more environmentally friendly alternative to single driver commutes in pollution-creating vehicles on overcrowded streets. In this paper, we present the core of a new strategy of the ridesharing ...
|
The recent scientific advances in understanding the hierarchical nature of the lithosphere and its dynamics based on systematic monitoring and evidence of its space-energy similarity at global, regional, and local scales did result the design of reproducible inter mediate term middle-range earthquake prediction technique. The real-time experimental...
|
Recently, fake news is shared via social networks and makes wrong rumors more diffusible. This problem is serious because the wrong rumor sometimes makes social damage by deceived people. Fact-checking is a solution to measure the credibility of news articles. However the process usually takes a long time and it is hard to make it before their diff...
|
This is an online auction web site aimed at taking the auction to the fingertips of aspiring bidders there by opening up the doors of the "OPEN Auction House' to a wider cross section of Art Lovers and Antique Collectors. This site also acts as an open forum where buyers and sellers can come together and exchange their products. The site makes sure...
|
Recently, fake news is shared via social networks and makes wrong rumors more diffusible. This problem is serious because the wrong rumor sometimes makes social damage by deceived people. Fact-checking is a solution to measure the credibility of news articles. However the process usually takes a long time and it is hard to make it before their diff...
|
With the explosive growth of mobile data demand, the fifth generation (5G) mobile network would exploit the enormous amount of spectrum in the millimeter wave (mmWave) bands to greatly increase communication capacity. There are fundamental differences between mmWave communications and existing other communication systems, in terms of high propagati...
|
Machine learning techniques have been widely used for abnormality detection in medical images. Chest X-ray images (CXR) are among the non-invasive diagnostic tools used to detect various disease pathologies. The ambiguous anatomical structure of soft tissues is one of the major challenges for segregating normal and abnormal images. The main objecti...
|
With the advancementofweb technology and its growth, there is huge volume of data present in the web for internet users and a lot of data is generated too. Internet has become a platform for online learning, exchanging ideasandsharing opinions. Social networkingsiteslike Twitter, Face book, Google are rapidly gaining popularity as they allow people...
|
In this digital world, transferring sensitive data electronically has become inevitable. The objective of this work is to hide and retrieve confidential information in image mosaics. The photo mosaic approach has been used for the creation of the mosaic and the least significant bit (LSB) technique has been adopted for the embedding of the hidden i...
|
In this project, an online auction system is presented. It has a very large potential market of sellers and buyers. An On Line Transaction Processing (OLTP) database model structure is, therefore, desirable. The project involves the design and implementation of an online auction system. The analysis stage is performed first for the case study. Proj...
|
Cloud computing enables users to remove the necessity of the need of local hardware architecture, which removes the burden of the users from high computation costs. Therefore, it has attracted much attention and research has been conducted heavily on it. To protect users’ privacy, data is usually encrypted prior to being sent to the cloud server. A...
|
Cloud computing systems fail in complex and unexpected ways, due to unexpected combinations of events and interactions between hardware and software components. Fault injection is an effective means to bring out these failures in a controlled environment. However, fault injection experiments produce massive amounts of data, and manually analyzing t...
|
Distributed cloud computing environments rely on sophisticated communication and sharing paradigms for ease of access, information processing, and analysis. The challenging characteristic of such cloud computing environments is the concurrency and access as both the service provider and end-user rely on the common sharing platform. In this manuscri...
|