-
Parallel ensemble methods for causal direction inference J. Parallel Distrib. Comput. (IF 2.296) Pub Date : 2021-01-08 Yulai Zhang; Jiachen Wang; Gang Cen; Kueiming Lo
Inferring the causal direction between two variables from their observation data is one of the most fundamental and challenging topics in data science. A causal direction inference algorithm maps the observation data into a binary value which represents either x causes y or y causes x. The nature of these algorithms makes the results unstable with the change of data points. Therefore the accuracy of
-
Deep learning inspired routing in ICN using Monte Carlo Tree Search algorithm J. Parallel Distrib. Comput. (IF 2.296) Pub Date : 2021-01-06 Nitul Dutta; Shobhit K. Patel; Vadim Samusenkov; Vigneswaran D.
Information Centric Networking (ICN) provides caching strategies to improve network performance based on consumer demands from the intermediate routers. It reduces the load on content server, network traffic, and improves end-to-end delay. The content requesters use an Interest packet containing the name of data to express their needs. If such Interest packets are routed efficiently, the end to end
-
Resisting newborn attacks via shared Proof-of-Space J. Parallel Distrib. Comput. (IF 2.296) Pub Date : 2021-01-06 Shuyang Tang; Jilai Zheng; Yao Deng; Qinxiang Cao
In the cryptocurrency literature, Proof-of-Space has been a potential alternative for permissionless distributed consensus protocols not only due to its recyclable nature but also the potential to support multiple chains simultaneously. Namely, the same storage resource can be contributed to the consensus of more than one chain. However, a direct shared proof of the same storage brings about newborn
-
Tracking sentiment towards news entities from arabic news on social media Future Gener. Comput. Syst. (IF 6.125) Pub Date : 2021-01-16 Ali Al-Laith; Muhammad Shahbaz
The tracking sentiment of the news entities over time provides important information to governments and enterprises during the decision-making process. Recently, it has attracted the attention of the research community as well due to its popularity in many applications including; tracking news about elections, e-commerce, and e-governance. However, most of the work is focused on English whereas limited
-
An autonomous computation offloading strategy in Mobile Edge Computing: A deep learning-based hybrid approach J. Netw. Comput. Appl. (IF 5.57) Pub Date : 2021-01-09 Ali Shakarami; Ali Shahidinejad; Mostafa Ghobaei-Arani
The fast growth of under developing internet-based technologies has been leading to propose promising methods to handle the heterogeneous massive volume of data produced by pervasive smart equipments such as handy mobile devices. Thanks to the mentioned technologies, these mobile devices can run critical business/entertainment applications such as Augmented Reality, Virtual Reality, vehicular networks
-
Optimizing spectral efficiency based on poisson queuing model for procuring cognitive intelligence in vehicular communication Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-01 Alfred Daniel J; Karthik S; Newlin Rajkumar M
In vehicular networks, accidents and congestions constitute a significant risk due to numerous cause such as short link lifetime, spectrum competence and high mobility. Further, the shortage of spectrum is one of the significant concerns in vehicular communication. Hence, the competent supervision of spectrum utilization in vehicular networks is predominant. In vehicular communication, cognitive radio
-
Interoperable access framework for internet of things backhauled heterogeneous applications Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-06 Rayan Ayed Alsolami; Sajjad Hussain Chauhdary; Abdulrahman A. Alshdadi
Internet of Things (IoT) provides large-scale interoperable service delegations for heterogeneous users through pervasive access. The interconnection of different devices and services in an on-demand and pervasive manner provides seamless responses for different applications. However, a few interconnected devices are stuck into a resource-constraint problem due to limited access and unavailability
-
Human head pose estimation based on HF method Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-01 Anitta D; Annis Fathima A
This Paper addresses the problem of head pose estimation. Driving assistance technology utilizes head pose estimation as an indicator for visual focus and mental attention of the driver. Head pose estimation detects head orientation with respect to the camera. Model based and appearance-based methods are the two approaches in head pose estimation. The first approach uses the facial features to create
-
Feasibility of Recurrent Neural Network for the Binary classification of Non stationary signals Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-10 T. Thaj Mary Delsy; N.M. Nandhitha; B. Sheela Rani
Spectral domain techniques are best suited for the examination of signals which are non-stationary in nature. Features extracted from spectral decomposition can be represented with statistical parameters. These features are then fed to classifiers for classifying the non-stationary signals. In this work, Recurrent Neural Network is used as the classifier for labeling signals as normal or abnormal and
-
An Educational Tool for Enhanced Mobile e-Learning for Technical Higher Education using Mobile Devices for Augmented Reality Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-16 Omnia Saidani Neffati; Roy Setiawan; P. Jayanthi; Vanithamani S; D.K. Sharma; R. Regin; Devi Mani; Sudhakar Sengan
In all dimensions of education and all subjects, Smartphones have turned out to be broadly acknowledged technology. It plays an essential task in advanced online education systems. Because of smart devices' effortlessness and extension property, it is getting to be mandatory for portable applications. This paper analyses the research on Smart Devices (SD) to incorporate visual simulation into e-learning
-
An Experimental Inquisition of Waste Heat Recovery in Electronic Component System Using Concentric Tube Heat Pipe Heat Exchanger With Different Working Fluids Under Gravity Assistance Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-16 P. Ram Kumar; M. Sivasubramanian; P. Raveendiran; P. Rajesh Kanna
In the utilizing of the waste heat in the electronic components meets the power demand and energy utilization for the industries and domestic applications. To meet out this by the understanding and optimization of the waste heat utilization by a compact and cost effective device using heat pipe heat exchanger. This paper states with the design, fabrication, development, and observation of an experimental
-
The application of modeling and simulation to public health: Assessing the quality of Agent-Based Models for obesity Simul. Model. Pract. Theory (IF 2.219) Pub Date : 2021-01-13 Philippe J. Giabbanelli; Boone Tison; James Keith
Early modeling and simulation models used in obesity research tended to be highly detailed on weight dynamics within the body or provided a very simplified view of socio-environmental influences by portraying obesity as a contagious disease (e.g., where weight directly ‘spreads’ among peers). The 2010’s have witnessed the emergence of simulations for obesity as a new interdisciplinary field of research
-
A solution algorithm for integrated production-inventory-routing of perishable goods with transshipment and uncertain demand Complex Intell. Syst. (IF 3.791) Pub Date : 2021-01-16 Peide Liu, Ayad Hendalianpour, Jafar Razmi, Mohamad Sadegh Sangari
Supply and distribution management of blood products is a challenging task due to their short lifespan. The problem is even more sophisticated considering uncertain demand for these products. This paper addresses integrated inventory-routing of blood in a supply chain network consisting of a single supplier and a group of blood centers. Transshipment among blood centers is allowed to decrease the cost
-
Data-Driven Controller Design via Finite-Horizon Dissipativity arXiv.cs.SY Pub Date : 2021-01-15 Nils Wieler; Julian Berberich; Anne Koch; Frank Allgöwer
Given a single measured trajectory of a discrete-time linear time-invariant system, we present a framework for data-driven controller design for closed-loop finite-horizon dissipativity. First, we parametrize all closed-loop trajectories using the given data of the plant and a model of the controller. We then provide an approach to validate the controller by verifying closed-loop dissipativity in the
-
Modeling and Analysis of Three Properties of Mobile Interactive Systems Based on Variable Petri Nets arXiv.cs.SY Pub Date : 2021-01-15 Ru Yang; Zhijun Ding; Changjun Jiang; MengChu Zhou
Due to the mobility and frequent disconnections, the correctness of mobile interaction systems, such as mobile robot systems and mobile payment systems, are often difficult to analyze. This paper introduces three critical properties of systems, called system connectivity, interaction soundness and data validity, and presents a related modeling and analysis method, based on a kind of Petri nets called
-
Chance constrained sets approximation: A probabilistic scaling approach -- EXTENDED VERSION arXiv.cs.SY Pub Date : 2021-01-15 Martina Mammarella; Victor Mirasierra; Matthias Lorenzen; Teodoro Alamo; Fabrizio Dabbene
In this paper, a sample-based procedure for obtaining simple and computable approximations of chance-constrained sets is proposed. The procedure allows to control the complexity of the approximating set, by defining families of simple-approximating sets of given complexity. A probabilistic scaling procedure then allows to rescale these sets to obtain the desired probabilistic guarantees. The proposed
-
A Vehicles Control Model to Alleviate Traffic Instability arXiv.cs.SY Pub Date : 2021-01-15 Jiancheng Fang; Yu Xiang; Yu Huang; Yilong Cui; Wenyong Wang
While bringing convenience to people, the growing number of vehicles on road already cause inevitable traffic congestion. Some traffic congestion happen with observable reasons, but others occur without apparent reasons or bottlenecks, which referred to as phantom jams, are caused by traditional vehicle following model. In order to alleviate the traffic instability caused by phantom jam, several models
-
Real-time Power System Simulation with Hardware Devices through DNP3 in Cyber-Physical Testbed arXiv.cs.SY Pub Date : 2021-01-15 Hao Huang; C. Matthew Davis; Katherine R. Davis
Modern power grids are dependent on communication systems for data collection, visualization, and control. Distributed Network Protocol 3 (DNP3) is commonly used in supervisory control and data acquisition (SCADA) systems in power systems to allow control system software and hardware to communicate. To study the dependencies between communication network security, power system data collection, and
-
Determine Disturbance Locations in Power Grids using Bicubic 2D Interpolation on Electromechanical Wave-front Propagation Delay arXiv.cs.SY Pub Date : 2021-01-15 Shutang You
This study presents a method to locate power system disturbance using wide-area synchrophasor measurements. The merits of the proposed method include robustness and easy for visualization. In addition, the proposed method facilitates the calculation of electromechanical wave propagation speed distribution. An example of locating the disturbance and generating the propagation speed distribution is demonstrated
-
Experimental Validation of Eco-Driving and Eco-Heating Strategies for Connected and Automated HEVs arXiv.cs.SY Pub Date : 2021-01-15 Mohammad Reza Amini; Qiuhao Hu; Hao Wang; Yiheng Feng; Ilya Kolmanovsky; Jing Sun
This paper presents experimental results that validate eco-driving and eco-heating strategies developed for connected and automated vehicles (CAVs). By exploiting vehicle-to-infrastructure (V2I) communications, traffic signal timing, and queue length estimations, optimized and smoothed speed profiles for the ego-vehicle are generated to reduce energy consumption. Next, the planned eco-trajectories
-
Transmission-and-Distribution Frequency Dynamic Co-Simulation Framework for Distributed Energy Resources Frequency Response arXiv.cs.SY Pub Date : 2021-01-14 Wenbo Wang; Xin Fang; Hantao Cui; Fangxing Li
The rapid deployment of distributed energy resources (DERs) in distribution networks has brought challenges to balance the system and stabilize frequency. DERs have the ability to provide frequency regulation; however, existing dynamic frequency simulation tools-which were developed mainly for the transmission system-lack the capability to simulate distribution network dynamics with high penetrations
-
CPU Scheduling in Data Centers Using Asynchronous Finite-Time Distributed Coordination Mechanisms arXiv.cs.SY Pub Date : 2021-01-15 Andreas Grammenos; Themistoklis Charalambous; Evangelia Kalyvianaki
We propose an asynchronous iterative scheme which allows a set of interconnected nodes to distributively reach an agreement to within a pre-specified bound in a finite number of steps. While this scheme could be adopted in a wide variety of applications, we discuss it within the context of task scheduling for data centers. In this context, the algorithm is guaranteed to approximately converge to the
-
Let's Share VMs: Optimal Placement and Pricing across Base Stations in MEC Systems arXiv.cs.SY Pub Date : 2021-01-15 Marie Siew; Kun Guo; Desmond Cai; Lingxiang Li; Tony Q. S. Quek
In mobile edge computing (MEC) systems, users offload computationally intensive tasks to edge servers at base stations. However, with unequal demand across the network, there might be excess demand at some locations and underutilized resources at other locations. To address such load-unbalanced problem in MEC systems, in this paper we propose virtual machines (VMs) sharing across base stations. Specifically
-
Transactive Framework for Dynamic Energy Storage Allocation for Critical Load Management arXiv.cs.SY Pub Date : 2021-01-14 Arnab Dey; Vivek Khatana; Ankur Mani; Murti V. Salapaka
With the increased penetration of Distributed Energy Resources and Renewable Energy Systems (RES), the conventional distribution grid is advancing towards a transactive framework supervised by a distribution system operator (DSO). However, the inherent uncertainty of RES poses a challenge in meeting the power demand of critical infrastructures in the microgrid unless sufficient battery energy storage
-
Constraint Handling in Continuous-Time DDP-Based Model Predictive Control arXiv.cs.SY Pub Date : 2021-01-15 Jean-Pierre Sleiman; Farbod Farshidian; Marco Hutter
The Sequential Linear Quadratic (SLQ) algorithm is a continuous-time variant of the well-known Differential Dynamic Programming (DDP) technique with a Gauss-Newton Hessian approximation. This family of methods has gained popularity in the robotics community due to its efficiency in solving complex trajectory optimization problems. However, one major drawback of DDP-based formulations is their inability
-
Interaction-Aware Behavior Planning for Autonomous Vehicles Validated with Real Traffic Data arXiv.cs.SY Pub Date : 2021-01-15 Jinning Li; Liting Sun; Wei Zhan; Masayoshi Tomizuka
Autonomous vehicles (AVs) need to interact with other traffic participants who can be either cooperative or aggressive, attentive or inattentive. Such different characteristics can lead to quite different interactive behaviors. Hence, to achieve safe and efficient autonomous driving, AVs need to be aware of such uncertainties when they plan their own behaviors. In this paper, we formulate such a behavior
-
Scalable Learning of Safety Guarantees for Autonomous Systems using Hamilton-Jacobi Reachability arXiv.cs.SY Pub Date : 2021-01-15 Sylvia Herbert; Jason J. Choi; Suvansh Qazi; Marsalis Gibson; Koushil Sreenath; Claire J. Tomlin
Autonomous systems like aircraft and assistive robots often operate in scenarios where guaranteeing safety is critical. Methods like Hamilton-Jacobi reachability can provide guaranteed safe sets and controllers for such systems. However, often these same scenarios have unknown or uncertain environments, system dynamics, or predictions of other agents. As the system is operating, it may learn new knowledge
-
A Recurrent Neural Network Approach to Roll Estimation for Needle Steering arXiv.cs.SY Pub Date : 2021-01-13 Maxwell Emerson; James M. Ferguson; Tayfun Efe Ertop; Margaret Rox; Josephine Granna; Michael Lester; Fabien Maldonado; Erin A. Gillaspie; Ron Alterovitz; Robert J. Webster III.; Alan Kuntz
Steerable needles are a promising technology for delivering targeted therapies in the body in a minimally-invasive fashion, as they can curve around anatomical obstacles and hone in on anatomical targets. In order to accurately steer them, controllers must have full knowledge of the needle tip's orientation. However, current sensors either do not provide full orientation information or interfere with
-
Zadeh's Centenary Int. J. Comput. Commun. Control (IF 2.093) Pub Date : 2021-01-17 Ioan DZITAC
This is the introductory paper in a special issue on fuzzy logic dedicated to the centenary of the birth of Lotfi A. Zadeh published by International Journal of Computers Communications & Control (IJCCC). In 1965, Lotfi A. Zadeh published in the journal „Information and Control” the article titled „Fuzzy sets”, which today reaches over 117 thousand citations. The total sum of citations for all his
-
From Classical Logic to Fuzzy Logic and Quantum Logic: A General View Int. J. Comput. Commun. Control (IF 2.093) Pub Date : 2021-01-14 Sorin Nadaban
The aim of this article is to offer a concise and unitary vision upon the algebraic connections between classical logic and its generalizations, such as fuzzy logic and quantum logic. The mathematical concept which governs any kind of logic is that of lattice. Therefore, the lattices are the basic tools in this presentation. The Hilbert spaces theory is important in the study of quantum logic and it
-
Noncommutative Logic Systems with Applications in Management and Engineering Int. J. Comput. Commun. Control (IF 2.093) Pub Date : 2020-11-25 Horia-Nicolai L. Teodorescu; Mike HM Teodorescu
Zadeh's (min-max, standard) fuzzy logic and various other logics are commutative, but natural language has nuances suggesting the premises are not equal, with premises contributing to the conclusion according to their prominency. Therefore, we suggest variants of salience-based, noncommutative and non-associative fuzzy logic (prominence logic) that may better model natural language and reasoning when
-
My Early Researches on Fuzzy Set and Fuzzy Logic Int. J. Comput. Commun. Control (IF 2.093) Pub Date : 2020-11-30 Yong Shi
This paper presents the author’s works on fuzzy sets and fuzzy systems in early 1980’s to celebrate the 100-year birthday of Lotfi A. Zadeh. They were originally published in Chinese. The first part of the paper is about an isomorphic theorem on fuzzy subgroups and fuzzy series of invariant subgroups, which could be a theoretical basis when the multiple-valued computer system will be reconsidered or
-
Information Volume of Fuzzy Membership Function Int. J. Comput. Commun. Control (IF 2.093) Pub Date : 2021-01-17 Jixiang Deng; Yong Deng
Fuzzy membership function plays an important role in fuzzy set theory. However, how to measure the information volume of fuzzy membership function is still an open issue. The existing methods to determine the uncertainty of fuzzy membership function only measure the first-order information volume, but do not take higher-order information volume into consideration. To address this issue, a new information
-
Bibliometric Analysis of Fuzzy Logic Research in International Scientific Databases Int. J. Comput. Commun. Control (IF 2.093) Pub Date : 2021-01-17 Valentin Radu; Florin Radu; Alina Iuliana Tabirca; Silviu Ilie Saplacan; Ramona Lile
The purpose of this study is to explore the Web of Science Database (WOS) and review the significant contributions to the research of Fuzzy Logic or Fuzzy Sets theory from the beginning to the present. This study analyzes the most eminent authors, institutions, countries, and journals in Fuzzy Logic research by applying science mapping methods and bibliometric measures. Also, we paid attention to link
-
V2V Routing in VANET Based on Fuzzy Logic and Reinforcement Learning Int. J. Comput. Commun. Control (IF 2.093) Pub Date : 2021-01-17 Wanli Zhang; Xiaoying Yang; Qixiang Song; Liang Zhao
To ensure the transmission quality of real-time communications on the road, the research of routing protocol is crucial to improve effectiveness of data transmission in Vehicular Ad Hoc Networks (VANETs). The existing work Q-Learning based routing algorithm, QLAODV, is studied and its problems, including slow convergence speed and low accuracy, are found. Hence, we propose a new routing algorithm FLHQRP
-
Soft Computing Techniques and Their Applications in Intel-ligent Industrial Control Systems: A Survey Int. J. Comput. Commun. Control (IF 2.093) Pub Date : 2021-01-17 Zheng Wu; Huchang Liao; Keyu Lu; Edmundas Kazimieras Zavadskas
Soft computing involves a series of methods that are compatible with imprecise information and complex human cognition. In the face of industrial control problems, soft computing techniques show strong intelligence, robustness and cost-effectiveness. This study dedicates to providing a survey on soft computing techniques and their applications in industrial control systems. The methodologies of soft
-
Blind signcryption scheme based on hyper elliptic curves cryptosystem Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-16 Shamsher Ullah, Nizamud Din
In modern cryptography, the Discrete Logarithm Problem (DLP) plays a vital role, but a classical computer cannot efficiently solve it. Nowadays, the Hyper Elliptic Curve Discrete Logarithm Problem (HECDLP) of Genus two (G2) widely used in industry and also a research field of hot interest. This paper presents a novel blind signcryption scheme based on Hyper Elliptic Curves having properties of confidentiality
-
A uniformization-based approach to preserve individuals’ privacy during process mining analyses Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-16 Edgar Batista, Agusti Solanas
Process Mining is a set of techniques that aim at discovering, monitoring and improving real processes by using logs of events created and stored by corporate information systems. The growing use of information and communication technologies and the imminent wide deployment of the Internet of Things enable the massive collection of events, which are going to be studied so as to improve all kinds of
-
Cross-domain trust management mechanism for internet of things systems Peer-to-Peer Netw. Appl. (IF 2.793) Pub Date : 2021-01-16 Xu Wu
A large of smart nodes is connected in Internet of Things (IoT). These nodes in IoT often are resource-constrained nodes, so they have a greater need to collaborate with other nodes for performing advanced service and applications. When there are many providers who can provide similar collaboration service, a collaboration requestor (CR) node will have to make the decision of the “best” collaboration
-
Towards an Interpretable Deep Learning Model for Mobile Malware Detection and Family Identification Comput. Secur. (IF 3.579) Pub Date : 2021-01-17 Giacomo Iadarola; Fabio Martinelli; Francesco Mercaldo; Antonella Santone
Mobile devices are pervading everyday activities of our life. Each day we store a plethora of sensitive and private information in smart devices such as smartphones or tablets, which are typically equipped with an always-on internet connection. These information are of interest for malicious writers that are developing more and more aggressive harmful code for stealing sensitive and private information
-
Security in Microservice-Based Systems: A Multivocal Literature Review Comput. Secur. (IF 3.579) Pub Date : 2021-01-16 Anelis Pereira-Vale; Eduardo B. Fernandez; Raúl Monge; Hernán Astudillo; Gastón Márquez
Microservices define an architectural style that conceives systems as a suite of modular, independent and scalable services. While application design is now simpler, designing secure applications is in general harder than for monolithic applications and the current literature offers little orientation to architects and developers regarding solutions. This article describes the design and results of
-
Hardware-Based Solutions for Trusted Cloud Computing Comput. Secur. (IF 3.579) Pub Date : 2021-01-16 Oualid Demigha; Ramzi Larguet
The increasing number of threats targeting cloud computing and the exploitation of specifically privileged software vulnerabilities have pushed the security managers of cloud service providers to deploy hardware-based solutions. These solutions can offer better hardware-assisted security features for a broad range of computing platforms including both CISC and RISC architecture families in datacenters
-
Feature analysis for data-driven APT-related malware discrimination Comput. Secur. (IF 3.579) Pub Date : 2021-01-16 Luis Francisco Martín Liras; Adolfo Rodríguez de Soto; Miguel A. Prada
Advanced Persistent Threats (APTs) have become a major concern for IT security professionals around the world. These attacks are characterized by the use of both highly sophisticated, evasive and cautious human and technical resources. It is very common to notice the combined use of different malware in long APT campaigns. This fact makes it interesting to investigate the malware that has been used
-
A dynamic multi-period general routing problem arising in postal service and parcel delivery systems Comput. Oper. Res. (IF 3.424) Pub Date : 2020-12-24 Demetrio Laganà; Gilbert Laporte; Francesca Vocaturo
Postal and courier companies are under the pressure of minimizing operational costs while meeting requests for increasingly high service levels. We model their delivery problem as a dynamic multi-period general routing problem (DMPGRP) with the aim of minimizing the total cost over a given planning horizon. In most modern delivery systems, fluctuating demand volumes dynamically reveal themselves over
-
Just-in-time scheduling for a distributed concrete precast flow shop system Comput. Oper. Res. (IF 3.424) Pub Date : 2021-01-05 Fuli Xiong; Mengling Chu; Zhi Li; Yao Du; Linting Wang
This paper focuses on the distributed concrete precast flow shop scheduling problem to minimize total weighted earliness and tardiness. It is crucial for a precast manufacturer to schedule jobs effectively to meet shipping dates because of tight due date, limited inventory capacity and huge tardiness penalties. In order to respond quickly to customer demands, many concrete precast manufacturers have
-
Time-dependent multi-depot green vehicle routing problem with time windows considering temporal-spatial distance Comput. Oper. Res. (IF 3.424) Pub Date : 2021-01-05 Houming Fan; Yueguang Zhang; Panjun Tian; Yingchun Lv; Hao Fan
Reducing distribution costs is one of the effective ways for logistics enterprises to improve their core competitiveness. Aiming at the multi-depot vehicle routing problem under the time-varying road network, this paper proposes an integer programming model with the minimum total costs by comprehensively considering the fixed costs of vehicles, penalty costs on earliness and tardiness, fuel costs and
-
Strategic IT alignment Projects. Towards Good Governance Comput. Stand. Interfaces (IF 2.809) Pub Date : 2021-01-09 Francisco Maciá Pérez; José Vicente Berna Martinez; Iren Lorenzo Fonseca
The senior management of organisations frequently perceive IT Projects as merely technological in nature. They fail to realise that in reality, the mission of IT is to provide technology-based support to business processes that can be key to the organisation. This lack of understanding means that these IT projects are not aligned with the business objectives and that investments in resources and personnel
-
Learning hierarchical face representation to enhance HCI among medical robots Future Gener. Comput. Syst. (IF 6.125) Pub Date : 2021-01-11 Dianmin Sun; Honghua Zhao; Tao Song; Aiqin Liu; Jinling Cheng; Zhi Liu; Xin Zhao
In this paper, we propose a hierarchical framework for face recognition by learning deep representation. In order to exploit key patches for face recognition, we separate the entire image into several patches including eyes, nose, and mouth. A binary facegrid is generated to indicate the accurate position of the key patches in face image. The patches are fed into the hierarchical framework to learn
-
Distributed and Dynamic Service Placement in Pervasive Edge Computing Networks IEEE Trans. Parallel Distrib. Syst. (IF 2.6) Pub Date : 2020-12-21 Zhaolong Ning; Peiran Dong; Xiaojie Wang; Shupeng Wang; Xiping Hu; Song Guo; Tie Qiu; Bin Hu; Ricky Y. K. Kwok
The explosive growth of mobile devices promotes the prosperity of novel mobile applications, which can be realized by service offloading with the assistance of edge computing servers. However, due to limited computation and storage capabilities of a single server, long service latency hinders the continuous development of service offloading in mobile networks. By supporting multi-server cooperation
-
E2bird: Enhanced Elastic Batch for Improving Responsiveness and Throughput of Deep Learning Services IEEE Trans. Parallel Distrib. Syst. (IF 2.6) Pub Date : 2020-12-28 Weihao Cui; Quan Chen; Han Zhao; Mengze Wei; Xiaoxin Tang; Minyi Guo
We aim to tackle existing problems about deep learning serving on GPUs in the view of the system. GPUs have been widely adopted to serve online deep learning-based services that have stringent QoS(Quality-of-Service) requirements. However, emerging deep learning serving systems often result in poor responsiveness and low throughput of the inferences that damage user experience and increase the number
-
Medical IoT system platform and elderly patients’ femoral shaft fracture nursing Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-07 Weiwei Liu; Kun Yao
Femoral stem fractures are generally considered in young patients. Still, they have reviewed 24 cases in patients over 60 years of age who have been treated with locking nails, usually by the closed method. Women with shallow speed injuries, but despite this, 14 fractures were significantly crushed. The incidence of complications is 54%, and the perioperative mortality rate 17%. Most problems are with
-
Power flow control based on bidirectional converter for hybrid power generation system using microcontroller Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-10 K. Bharathi; M. Sasikumar
Energy flow management of photovoltaic (PV) based ON-Grid system using BDC converter is analysed and implemented in this paper. The intermittent nature of renewable energies makes the unstable operation of utility grid system. In order to ensure the stable operation of the utility grid system and to support smart grid functionalities, there is the requirement of power electronics participation is high
-
Privacy preserving and data transpiration in multiple cloud using secure and robust data access management algorithm Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-10 E. Ezhilarasan; M. Dinakaran
Nowadays, privacy preserving is playing important role in cloud computing where content based privacy is challengeable task in un-trusted cloud environment. Based on literature studies, the method has key complexities and access polices authentication issues. The system need to concentrate to bring strong encryption function and efficient key distribution polices to meet future challenges. The method
-
An efficient image segmentation and classification of lung lesions in pet and CT image fusion using DTWT incorporated SVM Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-10 R. Mohana Priya; P. Venkatesan
Automatic segmentation and classification of fused lung Computed Tomography (CT) and Positron Emission Tomography (PET) images is presented. This system consists of four basic stages: 1). Lung image fusion process; 2). Segmentation of fused lung CT/PET images; 3). Post pre-processing; 4). Classification of fused lung images. In the first step, the lung image fusion process is made by deep learning
-
Differential spectrum access for next generation data traffic in massive-IoT Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-10 T. Prem Jacob; A. Pravin; Manikandan Ramachandran; Fadi Al-Turjman
The demand for Massive Internet of Things (mIoT) have largely increased as it is used in many applications by many users. mIoT witnessed a widespread due to its low latency and throughput requirement while being able to provide an outstanding connectivity coverage. To transmit such a massive data, the mIoT adopt the ultra-reliable and low latency communication (URLLC) for improved network performance
-
Detection of attacks in IoT sensors networks using machine learning algorithm Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-02 Pradeep Bedi; Shivlal Mewada; Rasmbabu Arjunarao Vatti; Chaitanya Singh; Kanwalvir Singh Dhindsa; Muruganantham Ponnusamy; Ranjana Sikarwar
Assault and peculiar location on the Internet of Things (IoT) framework is an increasing worry in the IoT region. By the expanded IoT foundation utilization in every area, assaults, and dangers in these frameworks are likewise developing proportionately. Malicious control, Spying, Forswearing of Service, Scan, Data Type Probing, Wrong setup, and malicious operation are such assaults and irregularities
-
Simulation of basketball motion image resolution based on FPGA and gaussian mixture model Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-07 Aijun Liu
Basketball shooting thrown assumes an essential function in the Free-Basketball. A serious problem to play any of the tosses to the right, untimely to prepare all of the accounts. And prepared to not regularly excessively to tenacious. The point of this article is to change the free bio-feedback control. Elements of the elbow and the shoulder will be determined by the frame preparation strategy with
-
Embedded IoT system and functional recovery of sports spinal cord injury Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-07 Yuxia Wang
The ultimate goal of clinical review, including clinical reviews and Spinal Cord Injury (SCI), is to improve the general ability of people who live and continue to work for SCI. Neurological rehab does not usually turn into adequate rest. The main outcome assessments aimed at in these approaches are the actual scenarios to be developed concerning SCI. Technology: The global set of tasks currently enters
-
IoT based smart agrotech system for verification of Urban farming parameters Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-14 Amit Kumer Podder; Abdullah Al Bukhari; Sayemul Islam; Sujon Mia; Mazin Abed Mohammed; Nallapaneni Manoj Kumar; Korhan Cengiz; Karrar Hameed Abdulkareem
The recent seen intelligent technologies like the internet of things (IoT), computer vision etc. facilitates farming activities and also provides flexible farm operations. On the other side, farming has become feasible even in urban areas, especially building roofs, open gardens, and indoor agriculture. In this context, farm management and appropriate monitoring of farm parameters are now indispensable
-
Design of Parallel Computing System for Embedded Network Distributed Load Tasks Microprocess. Microsyst. (IF 1.161) Pub Date : 2021-01-15 Heqing Huang; Xiaohui Xu; Chunling Tang
Parallel computing is a type of computational construction in which multiple processors perform multiple small calculations at once and a whole large and complex set of problems. Dynamic simulation and real-world data modeling are required to achieve a similar level of parallel computation are critical. Co-calculation provides integration and saves time and money. Parallel computation can only be arranged
Contents have been reproduced by permission of the publishers.