-
Eye-Tracking Technology in Online Real Estate Rental Sci. Program. (IF 0.963) Pub Date : 2021-01-16 Jie Sun; Zhiruo Wang; Xiaoyi Dang; Yang Zhang
In China in recent years, the rental housing market has boomed, but insufficient attention has been paid to microsubject tenants in the market, and there is a lack of research results on tenants’ decision-making processes. In keeping with the characteristics of China’s accommodation-renting population, this study takes as its research object graduating students, who form an important group in the housing
-
Semisupervised Deep Embedded Clustering with Adaptive Labels Sci. Program. (IF 0.963) Pub Date : 2021-01-16 Zhikui Chen; Chaojie Li; Jing Gao; Jianing Zhang; Peng Li
Deep embedding clustering (DEC) attracts much attention due to its outperforming performance attributed to the end-to-end clustering. However, DEC cannot make use of small amount of a priori knowledge contained in data of increasing volume. To tackle this challenge, a semisupervised deep embedded clustering algorithm with adaptive labels is proposed to cluster those data in a semisupervised end-to-end
-
A Review on Multicriteria Decision Support System and Industrial Internet of Things for Source Code Transformation Sci. Program. (IF 0.963) Pub Date : 2021-01-13 Qinxia Hao; Shah Nazir; Xiaoxu Gao; Li Ma; Muhammad Ilyas
The large scale increase of communication and number of devices in the Industrial Internet of Things (IIoT) has rapidly enabled practitioners to make decisions based on multicriteria. Multicriteria decision support systems (MCDSSs) play an important role in decision-making for a particular situation based on several criteria. Making of decision based on multicriteria is the main issues for research
-
Multiclass Event Classification from Text Sci. Program. (IF 0.963) Pub Date : 2021-01-13 Daler Ali; Malik Muhammad Saad Missen; Mujtaba Husnain
Social media has become one of the most popular sources of information. People communicate with each other and share their ideas, commenting on global issues and events in a multilingual environment. While social media has been popular for several years, recently, it has given an exponential rise in online data volumes because of the increasing popularity of local languages on the web. This allows
-
Target Recognition of SAR Images Based on Complex Bidimensional Empirical Mode Decomposition Sci. Program. (IF 0.963) Pub Date : 2021-01-12 Xinying Miao; Yunlong Liu
A target recognition method for synthetic aperture radar (SAR) image based on complex bidimensional empirical mode decomposition (C-BEMD) is proposed. C-BEMD is used to decompose the original SAR image to obtain multilevel complex bidimensional intrinsic mode functions (BIMF), which reflect the two-dimensional time-frequency characteristics of the target. In the classification stage, the decomposed
-
Suspect Multifocus Image Fusion Based on Sparse Denoising Autoencoder Neural Network for Police Multimodal Big Data Analysis Sci. Program. (IF 0.963) Pub Date : 2021-01-07 Jin Wang; Yanfei Gao
In recent years, the success rate of solving major criminal cases through big data has been greatly improved. The analysis of multimodal big data plays a key role in the detection of suspects. However, the traditional multiexposure image fusion methods have low efficiency and are largely time-consuming due to the artifact effect in the image edge and other sensitive factors. Therefore, this paper focuses
-
Collaborative Filtering Recommendation Using Nonnegative Matrix Factorization in GPU-Accelerated Spark Platform Sci. Program. (IF 0.963) Pub Date : 2021-01-05 Bing Tang; Linyao Kang; Li Zhang; Feiyan Guo; Haiwu He
Nonnegative matrix factorization (NMF) has been introduced as an efficient way to reduce the complexity of data compression and its capability of extracting highly interpretable parts from data sets, and it has also been applied to various fields, such as recommendations, image analysis, and text clustering. However, as the size of the matrix increases, the processing speed of nonnegative matrix factorization
-
Three Strategies for Improving Shortest Vector Enumeration Using GPUs Sci. Program. (IF 0.963) Pub Date : 2021-01-05 Mohamed S. Esseissah; Ashraf Bhery; Sameh S. Daoud; Hatem M. Bahig
Hard Lattice problems are assumed to be one of the most promising problems for generating cryptosystems that are secure in quantum computing. The shortest vector problem (SVP) is one of the most famous lattice problems. In this paper, we present three improvements on GPU-based parallel algorithms for solving SVP using the classical enumeration and pruned enumeration. There are two improvements for
-
HOVA-FPPM: Flexible Periodic Pattern Mining in Time Series Databases Using Hashed Occurrence Vectors and Apriori Approach Sci. Program. (IF 0.963) Pub Date : 2021-01-04 Muhammad Fasih Javed; Waqas Nawaz; Kifayat Ullah Khan
Finding flexible periodic patterns in a time series database is nontrivial due to irregular occurrence of unimportant events, which makes it intractable or computationally intensive for large datasets. There exist various solutions based on Apriori, projection, tree, and other techniques to mine these patterns. However, the existence of constant size tree structure, i.e., suffix tree, with extra information
-
A Crossover Comparison of the Sensitivity and the Specificity between BIS and AEP in Predicting Unconsciousness in General Anesthesia Sci. Program. (IF 0.963) Pub Date : 2020-12-29 Haitao Yang; Guan Wang; Jinxia Gao; Jie Liu
Background. There is an increasing concern of awareness and recall during general anesthesia for both the patient and the anesthetist. The bispectral index (BIS) is used to assess the level of sedation and depth of anesthesia and detect consciousness in different anesthetic drugs. Middle-latency auditory evoked potentials (AEPs) also quantify action of anesthetic drugs and detect the transition from
-
AIoT-Based Smart Bin for Real-Time Monitoring and Management of Solid Waste Sci. Program. (IF 0.963) Pub Date : 2020-12-29 Aniqa Bano; Ikram Ud Din; Asma A. Al-Huqail
In the current time, the immense growth in population creates unhygienic environment for the citizen of a society with respect to waste generation. This rapid generation of waste leads to various infectious diseases in the environment. As followed by the traditional municipal system, in our surroundings, we can see over flooding of solid waste in the garbage bins. Solid waste management is a pivotal
-
An Intelligent IoT Based Healthcare System Using Fuzzy Neural Networks Sci. Program. (IF 0.963) Pub Date : 2020-12-28 Kashif Hameed; Imran Sarwar Bajwa; Shabana Ramzan; Waheed Anwar; Akmal Khan
Healthcare facilities in modern age are key challenge especially in developing countries where remote areas face lack of high-quality hospitals and medical experts. As artificial intelligence has revolutionized various fields of life, health has also benefited from it. The existing architecture of store-and-forward method of conventional telemedicine is facing some problems, some of which are the need
-
Scale Adaptive Feature Pyramid Networks for 2D Object Detection Sci. Program. (IF 0.963) Pub Date : 2020-12-22 Lifei He; Ming Jiang; Ryutarou Ohbuchi; Takahiko Furuya; Min Zhang; Pengfei Li
Object detection is one of the core tasks in computer vision. Object detection algorithms often have difficulty detecting objects with diverse scales, especially those with smaller scales. To cope with this issue, Lin et al. proposed feature pyramid networks (FPNs), which aim for a feature pyramid with higher semantic content at every scale level. The FPN consists of a bottom-up pyramid and a top-down
-
Gaussian Kernel Fuzzy C-Means Algorithm for Service Resource Allocation Sci. Program. (IF 0.963) Pub Date : 2020-12-19 Wei Jiang; Xi Fang; Jianmei Ding
With respect to the cluster problem of the evaluation information of mass customers in service management, a cluster algorithm of new Gaussian kernel FCM (fuzzy C-means) is proposed based on the idea of FCM. First, the paper defines a Euclidean distance formula between two data points and makes them cluster adaptively based on the distance classification approach and nearest neighbors in deleting relative
-
Flowchart-Based Cross-Language Source Code Similarity Detection Sci. Program. (IF 0.963) Pub Date : 2020-12-18 Feng Zhang; Guofan Li; Cong Liu; Qian Song
Source code similarity detection has various applications in code plagiarism detection and software intellectual property protection. In computer programming teaching, students may convert the source code written in one programming language into another language for their code assignment submission. Existing similarity measures of source code written in the same language are not applicable for the
-
Improved Chaos-Based Cryptosystem for Medical Image Encryption and Decryption Sci. Program. (IF 0.963) Pub Date : 2020-12-18 Mohamed Gafsi; Nessrine Abbassi; Mohamed Ali Hajjaji; Jihene Malek; Abdellatif Mtibaa
In the medical sector, the digital image is multimedia data that contain secret information. However, designing an efficient secure cryptosystem to protect the confidential images in sharing is a challenge. In this work, we propose an improved chaos-based cryptosystem to encrypt and decrypt rapidly secret medical images. A complex chaos-based PRNG is suggested to generate a high-quality key that presents
-
Selection of In-Domain Bilingual Sentence Pairs Based on Topic Information Sci. Program. (IF 0.963) Pub Date : 2020-12-15 Bin Li; Jianmin Yao
The performance of a machine translation system (MTS) depends on the quality and size of the training data. How to extend the training dataset for the MTS in specific domains with effective methods to enhance the performance of machine translation needs to be explored. A method for selecting in-domain bilingual sentence pairs based on the topic information is proposed. With the aid of the topic relevance
-
Software Piracy Awareness, Policy, and User Perspective in Educational Institutions Sci. Program. (IF 0.963) Pub Date : 2020-12-11 Zitian Liao; Shah Nazir; Anwar Hussain; Habib Ullah Khan; Muhammad Shafiq
Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive rights of the developer in the form of an individual or organization as described in the relevant sale agreement (license). Owing to the evolution in software development and Internet
-
A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks Sci. Program. (IF 0.963) Pub Date : 2020-12-11 Muhammad Haleem Junejo; Ab Al-Hadi Ab Rahman; Riaz Ahmed Shaikh; Kamaludin Mohamad Yusof; Imran Memon; Hadiqua Fazal; Dileep Kumar
The Internet of things (IoT) and advancements of wireless technology have evolved intelligent transport systems to integrate billion of smart objects ready to connect to the Internet. The modern era of the Internet of things (IoT) has brought significant development in vehicular ad hoc networks (VANETs) which transformed the conventional VANET into the Internet of Vehicle (IoV) to improve road safety
-
Continuous Trust Evaluation of Power Equipment and Users Based on Risk Measurement Sci. Program. (IF 0.963) Pub Date : 2020-12-11 Congcong Shi; Jiaxuan Fei; Xiaojian Zhang; Qigui Yao; Jie Fan
In power Internet of Things environment, the existing border-based protection system and the “one-time authentication, one-time authorization, and long-term effective” approach are difficult to deal with the threat of attacks from internal and external devices and users with legal authority. In order to solve the problem of authorized access of power equipment and users, combined with behavior risk
-
MQHD: Dynamic Load Balancing Method for Energy-Aware Storage Systems Sci. Program. (IF 0.963) Pub Date : 2020-12-07 Xiaoling Xie
Aiming at the problem that some disks of energy-aware storage systems are easily overloaded, a dynamic load balancing method based on multiqueue and heat degree (MQHD) is proposed. According to data popularity, MQHD divides data into multiple least recently used (LRU) queues by data access frequency and access temporal locality and uses heat degree to measure the load pressure brought by each data
-
Intelligent Detection and Recovery of Missing Electric Load Data Based on Cascaded Convolutional Autoencoders Sci. Program. (IF 0.963) Pub Date : 2020-12-07 Xin Wang; Yuanyi Chen; Wei Ruan; Qiang Gao; Guode Ying; Li Dong
Under the background of Energy Internet, the ever-growing scale of the electric power system has brought new challenges and opportunities. Numerous categories of measurement data, as the cornerstone of communication, play a crucial role in the security and stability of the system. However, the present sampling and transmission equipment inevitably suffers from data missing, which seriously degrades
-
An Efficient Skewed Line Segmentation Technique for Cursive Script OCR Sci. Program. (IF 0.963) Pub Date : 2020-12-04 Saud Malik; Ahthasham Sajid; Arshad Ahmad; Ahmad Almogren; Bashir Hayat; Muhammad Awais; Kyong Hoon Kim
Segmentation of cursive text remains the challenging phase in the recognition of text. In OCR systems, the recognition accuracy of text is directly dependent on the quality of segmentation. In cursive text OCR systems, the segmentation of handwritten Urdu language text is a complex task because of the context sensitivity and diagonality of the text. This paper presents a line segmentation algorithm
-
A Robust Authentication Algorithm for Medical Images Based on Fractal Brownian Model and Visual Cryptography Sci. Program. (IF 0.963) Pub Date : 2020-12-04 Sun Tiankai; Wang Xingyuan; Jiang Daihong; Lin Da; Ding Bin; Li Dan
In this paper, we aimed to discuss the security authentication requirements of medical images in the medical network, and a security authentication method is designed based on fractal and visual cryptography. Based on the discrete fractal Brownian random field model, the gray-level statistical information and spatial structure information of medical images is fully mined. The gray distribution of medical
-
Inferring Ties in Social IoT Using Location-Based Networks and Identification of Hidden Suspicious Ties Sci. Program. (IF 0.963) Pub Date : 2020-12-01 Nauman Ali Khan; Sihai Zhang; Wuyang Zhou; Ahmad Almogren; Ikram Ud Din; Muhammad Asif
Stochastic Internet of Things (IoT)-based communication behavior of the progressing world is tremendously impacting social networks. The growth of social networks helps to quantify the effect on the Social Internet of Things (SIoT). Multiple existences of two persons at several geographical locations in different time frames hint to predict the social connection. We investigate the extent to which
-
The Prediction Analysis of Peer-to-Peer Lending Platforms Default Risk Based on Comparative Models Sci. Program. (IF 0.963) Pub Date : 2020-11-29 Haifeng Guo; Ke Peng; Xiaolei Xu; Shuai Tao; Zhen Wu
This paper examines the determinants of platform default risk using machine learning methods, including comprehensive models, and thus compares these models’ predictive abilities. To test platform’s default risk, this paper constructs three types of variables, which reflect a platform’s operating characteristics, customer feedback, and compliance capability. We find that the abnormal return tends to
-
Optimal Policy Learning for Disease Prevention Using Reinforcement Learning Sci. Program. (IF 0.963) Pub Date : 2020-11-28 Zahid Alam Khan; Zhengyong Feng; M. Irfan Uddin; Noor Mast; Syed Atif Ali Shah; Muhammad Imtiaz; Mahmoud Ahmad Al-Khasawneh; Marwan Mahmoud
Diseases can have a huge impact on the quality of life of the human population. Humans have always been in the quest to find strategies to avoid diseases that are life-threatening or affect the quality of life of humans. Effective use of resources available to human to control different diseases has always been critical. Researchers are recently more interested to find AI-based solutions to control
-
CirBiTree: Citrullination Site Inference Based on a Fuzzy Neural Network and Flexible Neural Tree Sci. Program. (IF 0.963) Pub Date : 2020-11-28 Chuandong Song; Haifeng Wang
Emerging evidence demonstrates that post-translational modification plays an important role in several human complex diseases. Nevertheless, considering the inherent high cost and time consumption of classical and typical in vitro experiments, an increasing attention has been paid to the development of efficient and available computational tools to identify the potential modification sites in the level
-
Detecting Citrus in Orchard Environment by Using Improved YOLOv4 Sci. Program. (IF 0.963) Pub Date : 2020-11-25 Wenkang Chen; Shenglian Lu; Binghao Liu; Guo Li; Tingting Qian
Real-time detection of fruits in orchard environments is one of crucial techniques for many precision agriculture applications, including yield estimation and automatic harvesting. Due to the complex conditions, such as different growth periods and occlusion among leaves and fruits, detecting fruits in natural environments is a considerable challenge. A rapid citrus recognition method by improving
-
The Abnormal Detection for Network Traffic of Power IoT Based on Device Portrait Sci. Program. (IF 0.963) Pub Date : 2020-11-24 Jiaxuan Fei; Qigui Yao; Mingliang Chen; Xiangqun Wang; Jie Fan
The construction of power Internet of things is an important development direction for power grid enterprises. Although power Internet of things is a kind of network, it is denser than the ordinary Internet of things points and more complex equipment types, so it has higher requirements for network security protection. At the same time, due to the special information perception and transmission mode
-
Moving Window Differential Evolution Independent Component Analysis-Based Operational Modal Analysis for Slow Linear Time-Varying Structures Sci. Program. (IF 0.963) Pub Date : 2020-11-23 Yongshuo Zong; Jinling Chen; Siyi Tao; Cheng Wang; Jianbing Xiahou
In order to identify time-varying transient modal parameters only from nonstationary vibration response measurement signals for slow linear time-varying (SLTV) structures which are weakly damped, a moving window differential evolution (DE) independent component analysis- (ICA-) based operational modal analysis (OMA) method is proposed in this paper. Firstly, in order to overcome the problems in traditional
-
Software Defect Prediction Based on Fuzzy Weighted Extreme Learning Machine with Relative Density Information Sci. Program. (IF 0.963) Pub Date : 2020-11-19 Shang Zheng; Jinjing Gai; Hualong Yu; Haitao Zou; Shang Gao
To identify software modules that are more likely to be defective, machine learning has been used to construct software defect prediction (SDP) models. However, several previous works have found that the imbalanced nature of software defective data can decrease the model performance. In this paper, we discussed the issue of how to improve imbalanced data distribution in the context of SDP, which can
-
Bayesian-Based Search Decision Framework and Search Strategy Analysis in Probabilistic Search Sci. Program. (IF 0.963) Pub Date : 2020-11-18 Liang Yu; Da Lin
In this paper, a sequence decision framework based on the Bayesian search is proposed to solve the problem of using an autonomous system to search for the missing target in an unknown environment. In the task, search cost and search efficiency are two competing requirements because they are closely related to the search task. Especially in the actual search task, the sensor assembled by the searcher
-
A Graphical Programming Language and Its Supporting Tool for Insect Intelligent Building Sci. Program. (IF 0.963) Pub Date : 2020-11-16 Wenjie Chen; Qiliang Yang; Shuo Zhao; Jianchun Xing; Qizhen Zhou
The emerging Insect Intelligent Building (I2B) platform is pioneering a new realm in intelligent buildings. I2B has a distributed and decentralized network structure with intelligent nodes, and the key enabler is an application (APP) that functions to process information from intelligent nodes and accomplish complex control tasks in a decentralized network. To develop APPs for I2B, a proper programming
-
Particle Swarm Optimization in the Presence of Malicious Users in Cognitive IoT Networks with Data Sci. Program. (IF 0.963) Pub Date : 2020-11-11 Noor Gul; Muhammad Sajjad Khan; Su Min Kim; Marc St-Hilaire; Ihsan Ullah; Junsu Kim
With the increasing applications in the domains of ubiquitous and context-aware computing, Internet of Things (IoT) is gaining importance. The study to efficiently exploit and manage a spectrum resources for industrial IoT (IIoT) applications is currently in the interest of research community. As increasing number of IIoT devices is heading towards the future-connected society with the cost of high
-
Cooperative Business Intelligence Model Using a Multiagent Platform Sci. Program. (IF 0.963) Pub Date : 2020-11-11 Mohamed O. Khozium; Norah S. Farooqi
Modern companies wish to utilize business intelligence (BI) to track and analyze their courses of action. Many BI applications serve this purpose at many levels, starting from documenting and charting and ending with analytics and decision support systems, which are considered a sufficient complement to consultancy and management resources. However, the contemporaneous BI software is missing two functionalities
-
HPM: A Hybrid Model for User’s Behavior Prediction Based on N-Gram Parsing and Access Logs Sci. Program. (IF 0.963) Pub Date : 2020-11-06 Sonia Setia; Verma Jyoti; Neelam Duhan
The continuous growth of the World Wide Web has led to the problem of long access delays. To reduce this delay, prefetching techniques have been used to predict the users’ browsing behavior to fetch the web pages before the user explicitly demands that web page. To make near accurate predictions for users’ search behavior is a complex task faced by researchers for many years. For this, various web
-
Location-Constrained Virtual Machine Placement (LCVP) Algorithm Sci. Program. (IF 0.963) Pub Date : 2020-11-06 Zhenpeng Liu; Jiahuan Lu; Nan Su; Bin Zhang; Xiaofei Li
Virtual machine (VM) placement is the current day research topic in cloud computing area. In order to solve the problem of imposing location constraints on VMs to meet their requirements in the process of VM placement, the location-constrained VM placement (LCVP) algorithm is proposed in this paper. In LCVP, each VM can only be placed onto one of the specified candidate physical machines (PMs) with
-
Operation Efficiency Evaluation of the China-Europe Freight Train Based on Grey Cross-Efficiency DEA Sci. Program. (IF 0.963) Pub Date : 2020-10-31 Jun Zhang; Jianpeng Chang; Ping Lin; Minzi Song; Yanqiu Gong
The China-Europe Freight Train (CEFT) serves as an important carrier and platform for international economic cooperation and international trade circulation between China and Europe. Since it worked, its actual operation and development have been affected by many factors, but the level of its actual operating efficiency and the main affecting factors of CEFT have been difficult to find, which has severely
-
An Intelligent, Secure, and Smart Home Automation System Sci. Program. (IF 0.963) Pub Date : 2020-10-29 Rizwan Majeed; Nurul Azma Abdullah; Imran Ashraf; Yousaf Bin Zikria; Muhammad Faheem Mushtaq; Muhammad Umer
The idea of a smart home is getting attention for the last few years. The key challenges in a smart home are intelligent decision making, secure identification, and authentication of the IoT devices, continuous connectivity, data security, and privacy issues. The existing systems are targeting one or two of these issues whereas a smart home automation system that is not only secure but also has intelligent
-
A Facial Expression Recognition Method Using Improved Capsule Network Model Sci. Program. (IF 0.963) Pub Date : 2020-10-27 Yifeng Zhao; Deyun Chen
Aiming at the problem of facial expression recognition under unconstrained conditions, a facial expression recognition method based on an improved capsule network model is proposed. Firstly, the expression image is normalized by illumination based on the improved Weber face, and the key points of the face are detected by the Gaussian process regression tree. Then, the 3dmms model is introduced. The
-
A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks Sci. Program. (IF 0.963) Pub Date : 2020-10-26 Tao Peng; Jierong Liu; Guojun Wang; Qin Liu; Jianer Chen; Jiawei Zhu
The popularity of the modern smart devices and mobile social networks (MSNs) brings mobile users better experiences and services by taking advantage of location-aware capabilities. Location sharing, as an important function of MSNs, has attracted attention with growing popularity. While the users get great benefits and conveniences from MSNs, they also have high concerns about the privacy of location
-
Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions Sci. Program. (IF 0.963) Pub Date : 2020-10-26 Sahar Shah; Mahnoor Khan; Ahmad Almogren; Ihsan Ali; Lianwen Deng; Heng Luo; Muazzam A. Khan
In recent years, cloud computing has gained massive popularity in information technology and the industrial Internet of things. It provides facilities to the users over the wireless channel. Many surveys have been carried out in cloud security and privacy. The existing survey papers do not specify the classifications on the basis of cloud computing components. Therefore, they fail to provide the techniques
-
Fast Path Planning for On-Water Automatic Rescue Intelligent Robot Based on Constant Thrust Artificial Fluid Method Sci. Program. (IF 0.963) Pub Date : 2020-10-21 Yongqiang Qi; Yi Ke
In this paper, fast path planning of on-water automatic rescue intelligent robot is studied based on the constant thrust artificial fluid method. First, a three-dimensional environment model is established, and then the kinematics equation of the robot is given. The constant thrust artificial fluid method based on the isochronous interpolation method is proposed, and a novel algorithm of constant thrust
-
An Approach of Spectra Standardization and Qualitative Identification for Biomedical Materials Based on Terahertz Spectroscopy Sci. Program. (IF 0.963) Pub Date : 2020-10-21 Chenjun Shi; Ji Zhu; Mingqian Xu; Xu Wu; Yan Peng
Terahertz time-domain spectroscopy (THz-TDS) systems are widely used to obtain fingerprint spectra of many different biomedical substances, and thus the identification of different biological materials, medicines, or dangerous chemicals can be realized. However, the spectral data for the same substance obtained from different THz-TDS systems may have distinct differences because of differences in system
-
Use of Big Data Tools and Industrial Internet of Things: An Overview Sci. Program. (IF 0.963) Pub Date : 2020-10-21 Yingzi Wang; Muhammad Nazir Jan; Sisi Chu; Yue Zhu
Big data is ever playing an important role in the industry as well as many other organizations. With the passage of time, the volume of data is increasing. This increase will create huge bulk of data which needs proper tools and techniques to handle its management and organization. Different techniques and tools are being used to properly handle the management of data. A detailed report of these techniques
-
Evaluating the Role of Big Data in IIOT-Industrial Internet of Things for Executing Ranks Using the Analytic Network Process Approach Sci. Program. (IF 0.963) Pub Date : 2020-10-20 Xiaoqun Liao; Mohammad Faisal; Qing QingChang; Amjad Ali
Due to the enhancements of Internet of Things (IoT) and sensors deployments, the production of big data in Industrial Internet of Things (IIoT) is increased. The accessing and processing of big data become a challenging issue due to the limited storage space, computational time, networking, and IoT devices end. IoT and big data are well thought-out to be the key concepts when describing new information
-
Chinese Microblog Sentiment Detection Based on CNN-BiGRU and Multihead Attention Mechanism Sci. Program. (IF 0.963) Pub Date : 2020-10-15 Hong Qiu; Chongdi Fan; Jie Yao; Xiaohan Ye
With the rapid development of the Internet, Weibo has gradually become one of the commonly used social tools in society at present. We can express our opinions on Weibo anytime and anywhere. Weibo is widely used and people can express themselves freely on it; thus, the amount of comments on Weibo has become extremely large. In order to count up the attitudes of users towards a certain event, Weibo
-
Urban Traffic Signal Control Based on Multiobjective Joint Optimization Sci. Program. (IF 0.963) Pub Date : 2020-10-15 Yongrong Wu; Yijie Zhou; Yanming Feng; Yutian Xiao; Shaojie He; Junsheng Zhou; Tianhe Ren; Jinling Chen; Mingsong Chen; Jianbing Xiahou; Fan Lin
This paper proposes two algorithms for signal timing optimization of single intersections, namely, microbial genetic algorithm and simulated annealing algorithm. The basis of the optimization of these two algorithms is the original timing scheme of the SCATS, and the optimized parameters are the average delay of vehicles and the capacity. Experiments verify that these two algorithms are, respectively
-
Research on Multifeature Data Routing Strategy in Deduplication Sci. Program. (IF 0.963) Pub Date : 2020-10-14 Qinlu He; Genqing Bian; Bilin Shao; Weiqi Zhang
Deduplication is a popular data reduction technology in storage systems which has significant advantages, such as finding and eliminating duplicate data, reducing data storage capacity required, increasing resource utilization, and saving storage costs. The file features are a key factor that is used to calculate the similarity between files, but the similarity calculated by the single feature has
-
A New Approach for Enhancing the Services of the 5G Mobile Network and IOT-Related Communication Devices Using Wavelet-OFDM and Its Applications in Healthcare Sci. Program. (IF 0.963) Pub Date : 2020-10-10 Mordecai F. Raji; JianPing Li; Amin Ul Haq; Victor Ejianya; Jalaluddin Khan; Asif Khan; Mudassir Khalil; Amjad Ali; Ghufran A. khan; Mohammad Shahid; Bilal Ahamad; Amit Yadav; Imran Memon
The heart of the current wireless communication systems (including 5G) is the Fourier transform-based orthogonal frequency division multiplex (OFDM). Over time, a lot of research has proposed the wavelet transform-based OFDM as a better replacement of Fourier in the physical layer solutions because of its performance and ability to support network-intensive applications such as the Internet of Things
-
Ant Colony Optimization-Based Streaming Feature Selection: An Application to the Medical Image Diagnosis Sci. Program. (IF 0.963) Pub Date : 2020-10-07 Labiba Gillani Fahad; Syed Fahad Tahir; Waseem Shahzad; Mehdi Hassan; Hani Alquhayz; Rabia Hassan
Irrelevant and redundant features increase the computation and storage requirements, and the extraction of required information becomes challenging. Feature selection enables us to extract the useful information from the given data. Streaming feature selection is an emerging field for the processing of high-dimensional data, where the total number of attributes may be infinite or unknown while the
-
Big Data, Scientific Programming, and Its Role in Internet of Industrial Things: A Decision Support System Sci. Program. (IF 0.963) Pub Date : 2020-10-06 Ju Li; Muhammad Nazir Jan; Mohammad Faisal
Big data is a challenging issue as its volume, shape, and size need to be modified in order to extract important information for a specific purpose. The amount of data is rising with the passage of time. This increase in volume can be a challenging issue to analyze the data for smooth industry and the Internet of things. Several tools, techniques, and mechanisms are available to support the handling
-
Fuzzy Principal Component Analysis Model on Evaluating Innovation Service Capability Sci. Program. (IF 0.963) Pub Date : 2020-09-30 Hui Wu; Xiao-min Gu
This article mainly evaluates the regional innovation service capacity through the TOPSIS method. Firstly, a regional collaborative innovation network is constructed and the Yangtze River Delta region is selected for analysis. Secondly, an evaluation index is constructed for innovation service capability, fuzzy principal component analysis is used to refine quantitative and qualitative index data of
-
Short-Term Infectious Diarrhea Prediction Using Weather and Search Data in Xiamen, China Sci. Program. (IF 0.963) Pub Date : 2020-09-30 Zhijin Wang; Yaohui Huang; Bingyan He; Ting Luo; Yongming Wang; Yonggang Fu
Infectious diarrhea has high morbidity and mortality around the world. For this reason, diarrhea prediction has emerged as an important problem to prevent and control outbreaks. Numerous studies have built disease prediction models using large-scale data. However, these methods perform poorly on diarrhea data. To address this issue, this paper proposes a parsimonious model (PM), which takes historical
-
A Machine Learning Gateway for Scientific Workflow Design Sci. Program. (IF 0.963) Pub Date : 2020-09-29 Brian Broll; Umesh Timalsina; Péter Völgyesi; Tamás Budavári; Ákos Lédeczi
The paper introduces DeepForge, a gateway to deep learning for scientific computing. DeepForge provides an easy to use, yet powerful visual/textual interface to facilitate the rapid development of deep learning models by novices as well as experts. Utilizing a cloud-based infrastructure, built-in version control, and multiuser collaboration support, DeepForge promotes reproducibility and ease of access
-
A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities Sci. Program. (IF 0.963) Pub Date : 2020-09-27 Fenglei Deng; Jian Wang; Bin Zhang; Chao Feng; Zhiyuan Jiang; Yunfei Su
In recent years, increased attention is being given to software quality assurance and protection. With considerable verification and protection schemes proposed and deployed, today’s software unfortunately still fails to be protected from cyberattacks, especially in the presence of insecure organization of heap metadata. In this paper, we aim to explore whether heap metadata could be corrupted and
-
Hybrid MPI and CUDA Parallelization for CFD Applications on Multi-GPU HPC Clusters Sci. Program. (IF 0.963) Pub Date : 2020-09-25 Jianqi Lai; Hang Yu; Zhengyu Tian; Hua Li
Graphics processing units (GPUs) have a strong floating-point capability and a high memory bandwidth in data parallelism and have been widely used in high-performance computing (HPC). Compute unified device architecture (CUDA) is used as a parallel computing platform and programming model for the GPU to reduce the complexity of programming. The programmable GPUs are becoming popular in computational
-
AGNES-SMOTE: An Oversampling Algorithm Based on Hierarchical Clustering and Improved SMOTE Sci. Program. (IF 0.963) Pub Date : 2020-09-23 Xin Wang; Yue Yang; Mingsong Chen; Qin Wang; Qin Qin; Hua Jiang; Huijiao Wang
Aiming at low classification accuracy of imbalanced datasets, an oversampling algorithm—AGNES-SMOTE (Agglomerative Nesting-Synthetic Minority Oversampling Technique) based on hierarchical clustering and improved SMOTE—is proposed. Its key procedures include hierarchically cluster majority samples and minority samples, respectively; divide minority subclusters on the basis of the obtained majority subclusters;
-
Touch: A Textual Programming Language for Developing APPs of Insect Intelligent Building Sci. Program. (IF 0.963) Pub Date : 2020-09-18 Wenjie Chen; Qiliang Yang; Ziyan Jiang; Jianchun Xing; Qianchuan Zhao; Qizhen Zhou; Deshuai Han
Insect intelligent building (I2B) is a novel decentralized, flat-structured intelligent building platform with excellent flexibility and scalability. I2B allows users to develop applications that include control strategies for efficiently managing and controlling buildings. However, developing I2B APPs (applications) is considered a challenging and complex task due to the complex structural features
Contents have been reproduced by permission of the publishers.