期刊文献+
共找到71篇文章
< 1 2 4 >
每页显示 20 50 100
A Framework for Driver DrowsinessMonitoring Using a Convolutional Neural Network and the Internet of Things
1
作者 Muhamad Irsan Rosilah Hassan +3 位作者 Anwar Hassan Ibrahim Mohamad Khatim Hasan Meng Chun Lam Wan Mohd Hirwani Wan Hussain 《Intelligent Automation & Soft Computing》 2024年第2期157-174,共18页
One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the dri... One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the driver’s sleepiness and integrate it into a warning system.Most studies have examined how the mouth and eyelids move.However,this limits the system’s ability to identify drowsiness traits.Therefore,this study designed an Accident Detection Framework(RPK)that could be used to reduce road accidents due to sleepiness and detect the location of accidents.The drowsiness detectionmodel used three facial parameters:Yawning,closed eyes(blinking),and an upright head position.This model used a Convolutional Neural Network(CNN)consisting of two phases.The initial phase involves video processing and facial landmark coordinate detection.The second phase involves developing the extraction of frame-based features using normalization methods.All these phases used OpenCV and TensorFlow.The dataset contained 5017 images with 874 open eyes images,850 closed eyes images,723 open-mouth images,725 closed-mouth images,761 sleepy-head images,and 1084 non-sleepy head images.The dataset of 5017 images was divided into the training set with 4505 images and the testing set with 512 images,with a ratio of 90:10.The results showed that the RPK design could detect sleepiness by using deep learning techniques with high accuracy on all three parameters;namely 98%for eye blinking,96%for mouth yawning,and 97%for head movement.Overall,the test results have provided an overview of how the developed RPK prototype can accurately identify drowsy drivers.These findings will have a significant impact on the improvement of road users’safety and mobility. 展开更多
关键词 Drowsy drivers convolutional neural network OPENCV MICROPROCESSOR face detection
下载PDF
Data and Ensemble Machine Learning Fusion Based Intelligent Software Defect Prediction System
2
作者 Sagheer Abbas Shabib Aftab +3 位作者 Muhammad Adnan Khan Taher MGhazal Hussam Al Hamadi Chan Yeob Yeun 《Computers, Materials & Continua》 SCIE EI 2023年第6期6083-6100,共18页
The software engineering field has long focused on creating high-quality software despite limited resources.Detecting defects before the testing stage of software development can enable quality assurance engineers to ... The software engineering field has long focused on creating high-quality software despite limited resources.Detecting defects before the testing stage of software development can enable quality assurance engineers to con-centrate on problematic modules rather than all the modules.This approach can enhance the quality of the final product while lowering development costs.Identifying defective modules early on can allow for early corrections and ensure the timely delivery of a high-quality product that satisfies customers and instills greater confidence in the development team.This process is known as software defect prediction,and it can improve end-product quality while reducing the cost of testing and maintenance.This study proposes a software defect prediction system that utilizes data fusion,feature selection,and ensemble machine learning fusion techniques.A novel filter-based metric selection technique is proposed in the framework to select the optimum features.A three-step nested approach is presented for predicting defective modules to achieve high accuracy.In the first step,three supervised machine learning techniques,including Decision Tree,Support Vector Machines,and Naïve Bayes,are used to detect faulty modules.The second step involves integrating the predictive accuracy of these classification techniques through three ensemble machine-learning methods:Bagging,Voting,and Stacking.Finally,in the third step,a fuzzy logic technique is employed to integrate the predictive accuracy of the ensemble machine learning techniques.The experiments are performed on a fused software defect dataset to ensure that the developed fused ensemble model can perform effectively on diverse datasets.Five NASA datasets are integrated to create the fused dataset:MW1,PC1,PC3,PC4,and CM1.According to the results,the proposed system exhibited superior performance to other advanced techniques for predicting software defects,achieving a remarkable accuracy rate of 92.08%. 展开更多
关键词 Ensemble machine learning fusion software defect prediction fuzzy logic
下载PDF
Randomization Strategies in Image Steganography Techniques:A Review
3
作者 AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan 《Computers, Materials & Continua》 SCIE EI 2024年第8期3139-3171,共33页
Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into ... Image steganography is one of the prominent technologies in data hiding standards.Steganographic system performance mostly depends on the embedding strategy.Its goal is to embed strictly confidential information into images without causing perceptible changes in the original image.The randomization strategies in data embedding techniques may utilize random domains,pixels,or region-of-interest for concealing secrets into a cover image,preventing information from being discovered by an attacker.The implementation of an appropriate embedding technique can achieve a fair balance between embedding capability and stego image imperceptibility,but it is challenging.A systematic approach is used with a standard methodology to carry out this study.This review concentrates on the critical examination of several embedding strategies,incorporating experimental results with state-of-the-art methods emphasizing the robustness,security,payload capacity,and visual quality metrics of the stego images.The fundamental ideas of steganography are presented in this work,along with a unique viewpoint that sets it apart from previous works by highlighting research gaps,important problems,and difficulties.Additionally,it offers a discussion of suggested directions for future study to advance and investigate uncharted territory in image steganography. 展开更多
关键词 Information hiding image steganography randomized embedding techniques payload capacity IMPERCEPTIBILITY
下载PDF
Design and Implementation of Implanted Log Periodic Spiral PIFA in Liver
4
作者 Adham Mohamed Gamal Hemdan Khaled Badr Omar Abdelmegid Mahmoud Allam 《通讯和计算机(中英文版)》 2014年第2期203-207,共5页
关键词 肝脏 设计 螺旋 平面倒F天线 周期 植入 早期阶段 ISM频段
下载PDF
Development of Algorithm and System for Automatic Generation of Nursing Summaries from Nursing Care Plans
5
作者 Misao Miyagawa Yuko Yasuhara +3 位作者 Tetsuya Tanioka Hirokazu Ito Motoyuki Suzuki Rozzano Locsin 《Intelligent Information Management》 2014年第3期97-103,共7页
A nursing care planning system that automatically generated nursing summaries from information entered into the Psychiatric Outcome Management System (PSYCHOMS?, Tanioka et al.), was developed to enrich the content of... A nursing care planning system that automatically generated nursing summaries from information entered into the Psychiatric Outcome Management System (PSYCHOMS?, Tanioka et al.), was developed to enrich the content of nursing summaries at psychiatric hospitals, thereby reducing the workload of nurses. Preparing nursing summaries entails finding the required information in nursing records that span a long period of time and then concisely summarizing this information. This time consuming process depends on the clinical experience and writing ability of the nurse. The system described here automatically generates the text data needed for nursing summaries using an algorithm that synthesizes patient information recorded in electronic charts, the Nursing Care Plan information or the data entered for North American Nursing Diagnosis Association (NANDA) 13 domains with predetermined fixed phrases. Advantages of this system are that it enables nursing summaries to be generated automatically in real time, simplifies the process, and permits the standardization of useful nursing summaries that reflect the course of the nursing care provided and its evaluation. Use of this system to automatically generate nursing summaries will allow more nursing time to be devoted to patient care. The system is also useful because it enables nursing summaries that contain the required information to be generated regardless of who prepares them. 展开更多
关键词 NURSING SUMMARY Document NURSING CARE PLAN AUTOMATIC GENERATION PSYCHOMS
下载PDF
A Fiber Optic Sensor for the Simultaneous Measurement of Dual-parameter Based on Hydrogel-immobilized Enzyme Complex
6
作者 TONG Yilin ZHANG Yu +2 位作者 HAN Xuecai YU Kan BAO Jiaqi 《Journal of Wuhan University of Technology(Materials Science)》 SCIE EI CAS CSCD 2023年第6期1311-1318,共8页
A novel fiber optic sensor based on hydrogel-immobilized enzyme complex was developed for the simultaneous measurement of dual-parameter,the leap from a single parameter detecting fiber optic sensor to a fiber optic s... A novel fiber optic sensor based on hydrogel-immobilized enzyme complex was developed for the simultaneous measurement of dual-parameter,the leap from a single parameter detecting fiber optic sensor to a fiber optic sensor that can continuously detect two kinds of parameters was achieved.By controlling the temperature from high to low,the function of fiber sulfide sensor and fiber DCP sensor can be realized,so as to realize the continuous detection of dual-parameter.The different variables affecting the sensor performance were evaluated and optimized.Under the optimal conditions,the response curves,linear detection ranges,detection limits and response times of the dual-parameter sensor for testing sulfide and DCP were obtained,respectively.The sensor displays high selectivity,good repeatability and stability,which have good potentials in analyzing sulfide and DCP concentration of practical water samples. 展开更多
关键词 hydrogel-immobilized enzyme complex dual-parameter simultaneous measurement fiber optic sensor
下载PDF
Process Mining Discovery Techniques for Software Architecture Lightweight Evaluation Framework
7
作者 Mahdi Sahlabadi Ravie Chandren Muniyandi +2 位作者 Zarina Shukur Faizan Qamar Syed Hussain Ali Kazmi 《Computers, Materials & Continua》 SCIE EI 2023年第3期5777-5797,共21页
This research recognizes the limitation and challenges of adaptingand applying Process Mining as a powerful tool and technique in theHypothetical Software Architecture (SA) Evaluation Framework with thefeatures and fa... This research recognizes the limitation and challenges of adaptingand applying Process Mining as a powerful tool and technique in theHypothetical Software Architecture (SA) Evaluation Framework with thefeatures and factors of lightweightness. Process mining deals with the largescalecomplexity of security and performance analysis, which are the goalsof SA evaluation frameworks. As a result of these conjectures, all ProcessMining researches in the realm of SA are thoroughly reviewed, and ninechallenges for Process Mining Adaption are recognized. Process mining isembedded in the framework and to boost the quality of the SA model forfurther analysis, the framework nominates architectural discovery algorithmsFlower, Alpha, Integer Linear Programming (ILP), Heuristic, and Inductiveand compares them vs. twelve quality criteria. Finally, the framework’s testingon three case studies approves the feasibility of applying process mining toarchitectural evaluation. The extraction of the SA model is also done by thebest model discovery algorithm, which is selected by intensive benchmarkingin this research. This research presents case studies of SA in service-oriented,Pipe and Filter, and component-based styles, modeled and simulated byHierarchical Colored Petri Net techniques based on the cases’ documentation.Processminingwithin this framework dealswith the system’s log files obtainedfrom SA simulation. Applying process mining is challenging, especially for aSA evaluation framework, as it has not been done yet. The research recognizesthe problems of process mining adaption to a hypothetical lightweightSA evaluation framework and addresses these problems during the solutiondevelopment. 展开更多
关键词 Software architecture process mining hierarchical colored petri Net architectural discovery algorithms model discovery algorithm
下载PDF
Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks
8
作者 Shayla Islam Anil Kumar Budati +2 位作者 Mohammad Kamrul Hasan Saoucene Mahfoudh Syed Bilal Hussian Shah 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期813-825,共13页
In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), ther... In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), there is no dedicated power for the users. Instead, they can transmit information by reflecting the ambientRadio Frequency (RF) signals in the spectrum. Therefore, it is essential to detect user presence in the spectrum forthe transmission of data without loss or without collision at a specific time. In this paper, the authors proposed anovel Spectrum Sensing (SS) detection technique in the Cognitive Radio (CR) spectrum, by developing the AmBC.Novel Matched Filter Detection with Inverse covariance (MFDI), Cyclostationary Feature Detection with Inversecovariance (CFDI) and Hybrid Filter Detection with Inverse covariance (HFDI) approaches are used with AmBCto detect the presence of users at low power levels. The performance of the three detection techniques is measuredusing the parameters of Probability of Detection (PD), Probability of False Alarms (Pfa), Probability of MissedDetection (Pmd), sensing time and throughput at low power or low SNR. The results show that there is a significantimprovement via the HFDI technique for all the parameters. 展开更多
关键词 Ambient backscatter communication cognitive radio MFDI CFDI HFDI
下载PDF
IoMT-Based Smart Healthcare of Elderly People Using Deep Extreme Learning Machine
9
作者 Muath Jarrah Hussam Al Hamadi +1 位作者 Ahmed Abu-Khadrah Taher M.Ghazal 《Computers, Materials & Continua》 SCIE EI 2023年第7期19-33,共15页
The Internet of Medical Things(IoMT)enables digital devices to gather,infer,and broadcast health data via the cloud platform.The phenomenal growth of the IoMT is fueled by many factors,including the widespread and gro... The Internet of Medical Things(IoMT)enables digital devices to gather,infer,and broadcast health data via the cloud platform.The phenomenal growth of the IoMT is fueled by many factors,including the widespread and growing availability of wearables and the ever-decreasing cost of sensor-based technology.There is a growing interest in providing solutions for elderly people living assistance in a world where the population is rising rapidly.The IoMT is a novel reality transforming our daily lives.It can renovate modern healthcare by delivering a more personalized,protective,and collaborative approach to care.However,the current healthcare system for outdoor senior citizens faces new challenges.Traditional healthcare systems are inefficient and lack user-friendly technologies and interfaces appropriate for elderly people in an outdoor environment.Hence,in this research work,a IoMT based Smart Healthcare of Elderly people using Deep Extreme Learning Machine(SH-EDELM)is proposed to monitor the senior citizens’healthcare.The performance of the proposed SH-EDELM technique gives better results in terms of 0.9301 accuracy and 0.0699 miss rate,respectively. 展开更多
关键词 ICT ML FN DELM SH-EDELM
下载PDF
One-Class Arabic Signature Verification: A Progressive Fusion of Optimal Features
10
作者 Ansam A.Abdulhussien Mohammad F.Nasrudin +1 位作者 Saad M.Darwish Zaid A.Alyasseri 《Computers, Materials & Continua》 SCIE EI 2023年第4期219-242,共24页
Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection.It is also a popular biometric authentication technology in forensic and com... Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection.It is also a popular biometric authentication technology in forensic and commercial transactions due to its various advantages,including noninvasiveness,user-friendliness,and social and legal acceptability.According to the literature,extensive research has been conducted on signature verification systems in a variety of languages,including English,Hindi,Bangla,and Chinese.However,the Arabic Offline Signature Verification(OSV)system is still a challenging issue that has not been investigated as much by researchers due to the Arabic script being distinguished by changing letter shapes,diacritics,ligatures,and overlapping,making verification more difficult.Recently,signature verification systems have shown promising results for recognizing signatures that are genuine or forgeries;however,performance on skilled forgery detection is still unsatisfactory.Most existing methods require many learning samples to improve verification accuracy,which is a major drawback because the number of available signature samples is often limited in the practical application of signature verification systems.This study addresses these issues by presenting an OSV system based on multifeature fusion and discriminant feature selection using a genetic algorithm(GA).In contrast to existing methods,which use multiclass learning approaches,this study uses a oneclass learning strategy to address imbalanced signature data in the practical application of a signature verification system.The proposed approach is tested on three signature databases(SID)-Arabic handwriting signatures,CEDAR(Center of Excellence for Document Analysis and Recognition),and UTSIG(University of Tehran Persian Signature),and experimental results show that the proposed system outperforms existing systems in terms of reducing the False Acceptance Rate(FAR),False Rejection Rate(FRR),and Equal Error Rate(ERR).The proposed system achieved 5%improvement. 展开更多
关键词 Offline signature verification biometric system feature fusion one-class classifier
下载PDF
Personality Assessment Based on Natural Stream of Thoughts Empowered with Machine Learning
11
作者 Mohammed Salahat Liaqat Ali +1 位作者 Taher M.Ghazal Haitham M.Alzoubi 《Computers, Materials & Continua》 SCIE EI 2023年第7期1-17,共17页
Knowing each other is obligatory in a multi-agent collaborative environment.Collaborators may develop the desired know-how of each other in various aspects such as habits,job roles,status,and behaviors.Among different... Knowing each other is obligatory in a multi-agent collaborative environment.Collaborators may develop the desired know-how of each other in various aspects such as habits,job roles,status,and behaviors.Among different distinguishing characteristics related to a person,personality traits are an effective predictive tool for an individual’s behavioral pattern.It has been observed that when people are asked to share their details through questionnaires,they intentionally or unintentionally become biased.They knowingly or unknowingly provide enough information in much-unbiased comportment in open writing about themselves.Such writings can effectively assess an individual’s personality traits that may yield enormous possibilities for applications such as forensic departments,job interviews,mental health diagnoses,etc.Stream of consciousness,collected by James Pennbaker and Laura King,is one such way of writing,referring to a narrative technique where the emotions and thoughts of the writer are presented in a way that brings the reader to the fluid through the mental states of the narrator.More-over,computationally,various attempts have been made in an individual’s personality traits assessment through deep learning algorithms;however,the effectiveness and reliability of results vary with varying word embedding techniques.This article proposes an empirical approach to assessing personality by applying convolutional networks to text documents.Bidirectional Encoder Representations from Transformers(BERT)word embedding technique is used for word vector generation to enhance the contextual meanings. 展开更多
关键词 Personality traits convolutional neural network deep learning word embedding
下载PDF
Reliability Verification and Practical Effectiveness Evaluation of the Nursing Administration Analysis Formulae Based on PSYCHOMS^(■)
12
作者 Misao Miyagawa Kaori Katou +5 位作者 Yuko Yasuhara Kazuyuki Matsumoto Motoyuki Suzuki Takako Takebayashi Tetsuya Tanioka Rozzano Locsin 《Health》 2014年第21期3013-3021,共9页
In psychiatric hospitals, the ratios between patients versus physician and patients versus nurse are low as compared to those in general hospitals. Furthermore, usages of electronic medical records are also low so tha... In psychiatric hospitals, the ratios between patients versus physician and patients versus nurse are low as compared to those in general hospitals. Furthermore, usages of electronic medical records are also low so that nurse administrators are limited in their ability to compile, analyze, and generate patient care staffing information for their administrative use. Psychiatric nurse administrators anticipate the development of a nursing administration analysis system that could perform personnel data simulation, manage information on nursing staff, and manage ward/ practice operations. Responding to this situation, the authors developed a nursing administration analysis system utilizing formulae from the Psychiatric Outcome Management System, PSYCHOMS&reg;to aid nurse administrators. Such formulae are awaiting patent approval. The purpose of this study was to examine the validity of the formulae and the Structured Query Language (SQL) statement, and its practical effectiveness of analyzing data. The study findings showed that two kinds of computation expressions—a classification and extraction were able to display required information desired by nurse administrators. Moreover, significant information critical to assigning staff was validated to ensure high quality of nursing care according to the function and characteristic of the hospital ward. 展开更多
关键词 Analysis Formulae Nursing Administration Analysis Psychiatric Hospital PSYCHOMS^(■)
下载PDF
Early Detection of Autism in Children Using Transfer Learning
13
作者 Taher M.Ghazal Sundus Munir +3 位作者 Sagheer Abbas Atifa Athar Hamza Alrababah Muhammad Adnan Khan 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期11-22,共12页
Autism spectrum disorder(ASD)is a challenging and complex neurodevelopment syndrome that affects the child’s language,speech,social skills,communication skills,and logical thinking ability.The early detection of ASD ... Autism spectrum disorder(ASD)is a challenging and complex neurodevelopment syndrome that affects the child’s language,speech,social skills,communication skills,and logical thinking ability.The early detection of ASD is essential for delivering effective,timely interventions.Various facial features such as a lack of eye contact,showing uncommon hand or body movements,bab-bling or talking in an unusual tone,and not using common gestures could be used to detect and classify ASD at an early stage.Our study aimed to develop a deep transfer learning model to facilitate the early detection of ASD based on facial fea-tures.A dataset of facial images of autistic and non-autistic children was collected from the Kaggle data repository and was used to develop the transfer learning AlexNet(ASDDTLA)model.Our model achieved a detection accuracy of 87.7%and performed better than other established ASD detection models.Therefore,this model could facilitate the early detection of ASD in clinical practice. 展开更多
关键词 Autism spectrum disorder convolutional neural network loss rate transfer learning AlexNet deep learning
下载PDF
MEC-IoT-Healthcare: Analysis and Prospects
14
作者 Hongyuan Wang Mohammed Dauwed +4 位作者 Imran Khan Nor Samsiah Sani Hasmila Amirah Omar Hirofumi Amano Samih M.Mostafa 《Computers, Materials & Continua》 SCIE EI 2023年第6期6219-6250,共32页
Physical sensors,intelligent sensors,and output recommenda-tions are all examples of smart health technology that can be used to monitor patients’health and change their behavior.Smart health is an Internet-of-Things... Physical sensors,intelligent sensors,and output recommenda-tions are all examples of smart health technology that can be used to monitor patients’health and change their behavior.Smart health is an Internet-of-Things(IoT)-aware network and sensing infrastructure that provides real-time,intelligent,and ubiquitous healthcare services.Because of the rapid development of cloud computing,as well as related technologies such as fog computing,smart health research is progressively moving in the right direction.Cloud,fog computing,IoT sensors,blockchain,privacy and security,and other related technologies have been the focus of smart health research in recent years.At the moment,the focus in cloud and smart health research is on how to use the cloud to solve the problem of enormous health data and enhance service performance,including cloud storage,retrieval,and calculation of health big data.This article reviews state-of-the-art edge computing methods that has shifted to the collection,transmission,and calculation of health data,which includes various sensors and wearable devices used to collect health data,various wireless sensor technologies,and how to process health data and improve edge performance,among other things.Finally,the typical smart health application cases,blockchain’s application in smart health,and related privacy and security issues were reviewed,as well as future difficulties and potential for smart health services.The comparative analysis provides a reference for the the mobile edge computing in healthcare systems. 展开更多
关键词 IOT mobile-edge computing cloud computing E-HEALTH
下载PDF
Guest Editorial:Special issue on advances in representation learning for computer vision
15
作者 Andrew Beng Jin Teoh Thian Song Ong +1 位作者 Kian Ming Lim Chin Poo Lee 《CAAI Transactions on Intelligence Technology》 SCIE EI 2024年第1期1-3,共3页
Deep learning has been a catalyst for a transformative revo-lution in machine learning and computer vision in the past decade.Within these research domains,methods grounded in deep learning have exhibited exceptional ... Deep learning has been a catalyst for a transformative revo-lution in machine learning and computer vision in the past decade.Within these research domains,methods grounded in deep learning have exhibited exceptional performance across a spectrum of tasks.The success of deep learning methods can be attributed to their capability to derive potent representations from data,integral for a myriad of downstream applications.These representations encapsulate the intrinsic structure,fea-tures,or latent variables characterising the underlying statistics of visual data.Despite these achievements,the challenge per-sists in effectively conducting representation learning of visual data with deep models,particularly when confronted with vast and noisy datasets.This special issue is a dedicated platform for researchers worldwide to disseminate their latest,high-quality articles,aiming to enhance readers'comprehension of the principles,limitations,and diverse applications of repre-sentation learning in computer vision. 展开更多
关键词 SPITE computer REPRESENTATION
下载PDF
Smart Energy Management System Using Machine Learning
16
作者 Ali Sheraz Akram Sagheer Abbas +3 位作者 Muhammad Adnan Khan Atifa Athar Taher M.Ghazal Hussam Al Hamadi 《Computers, Materials & Continua》 SCIE EI 2024年第1期959-973,共15页
Energy management is an inspiring domain in developing of renewable energy sources.However,the growth of decentralized energy production is revealing an increased complexity for power grid managers,inferring more qual... Energy management is an inspiring domain in developing of renewable energy sources.However,the growth of decentralized energy production is revealing an increased complexity for power grid managers,inferring more quality and reliability to regulate electricity flows and less imbalance between electricity production and demand.The major objective of an energy management system is to achieve optimum energy procurement and utilization throughout the organization,minimize energy costs without affecting production,and minimize environmental effects.Modern energy management is an essential and complex subject because of the excessive consumption in residential buildings,which necessitates energy optimization and increased user comfort.To address the issue of energy management,many researchers have developed various frameworks;while the objective of each framework was to sustain a balance between user comfort and energy consumption,this problem hasn’t been fully solved because of how difficult it is to solve it.An inclusive and Intelligent Energy Management System(IEMS)aims to provide overall energy efficiency regarding increased power generation,increase flexibility,increase renewable generation systems,improve energy consumption,reduce carbon dioxide emissions,improve stability,and reduce energy costs.Machine Learning(ML)is an emerging approach that may be beneficial to predict energy efficiency in a better way with the assistance of the Internet of Energy(IoE)network.The IoE network is playing a vital role in the energy sector for collecting effective data and usage,resulting in smart resource management.In this research work,an IEMS is proposed for Smart Cities(SC)using the ML technique to better resolve the energy management problem.The proposed system minimized the energy consumption with its intelligent nature and provided better outcomes than the previous approaches in terms of 92.11% accuracy,and 7.89% miss-rate. 展开更多
关键词 Intelligent energy management system smart cities machine learning
下载PDF
Behavioral response of tilapia (Oreochromis niloticus) to acute ammonia stress monitored by computer vision 被引量:7
17
作者 徐建瑜 苗香雯 +1 位作者 刘鹰 崔绍荣 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE EI CAS CSCD 2005年第8期812-816,共5页
The behavioral responses of a tilapia (Oreochromis niloticus) school to low (0.13 mg/L), moderate (0.79 mg/L) and high (2.65 mg/L) levels of unionized ammonia (UIA) concentration were monitored using a computer vision... The behavioral responses of a tilapia (Oreochromis niloticus) school to low (0.13 mg/L), moderate (0.79 mg/L) and high (2.65 mg/L) levels of unionized ammonia (UIA) concentration were monitored using a computer vision system. The swimming activity and geometrical parameters such as location of the gravity center and distribution of the fish school were calculated continuously. These behavioral parameters of tilapia school responded sensitively to moderate and high UIA concen-tration. Under high UIA concentration the fish activity showed a significant increase (P<0.05), exhibiting an avoidance reaction to high ammonia condition, and then decreased gradually. Under moderate and high UIA concentration the school’s vertical location had significantly large fluctuation (P<0.05) with the school moving up to the water surface then down to the bottom of the aquarium alternately and tending to crowd together. After several hours’ exposure to high UIA level, the school finally stayed at the aquarium bottom. These observations indicate that alterations in fish behavior under acute stress can provide important in-formation useful in predicting the stress. 展开更多
关键词 Ammonia stress TILAPIA Computer vision AQUACULTURE
下载PDF
ADCP application for long-term monitoring of coastal water 被引量:4
18
作者 YOSHIOKA Hiroshi TAKAYAMA Tomotsuka SERIZAWA Shigeatsu 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2005年第1期95-100,共6页
Three kind of application of ADCP is reported for long-term monitoring in coastal sea.(1)The routine monitoring of water qualities. The water quality and ADCP echo data (600 kHz) observed in the long-term are analgzed... Three kind of application of ADCP is reported for long-term monitoring in coastal sea.(1)The routine monitoring of water qualities. The water quality and ADCP echo data (600 kHz) observed in the long-term are analgzed at MT (Marine Tower) Station of Kansai International Airport in the Osaka Bay, Japan. The correlation between the turbidity and echo intensity in the surface layer is not good because air bubbles generated by breaking wave are not detected by the turbidity meter, but detected well by ADCP. When estimating the turbidity consists of plankton population from echo intensity, the effect of bubbles have to be eliminated. (2) Monitoring stirring up of bottom sediment. The special observation was carried out by using following two ADCP in the Osaka Bay, One ADCP was installed upward on the sea. The other ADCP was hanged downward at the gate type stand about 3 m above from the bottom. At the spring tide, high echo intensities indicating the stirring up of bottom sediment were observed. (3) The monitoring for the boundary condition of water mixing at an estuary. In summer season, the ADCP was set at the mouth of Tanabe Bay in Wakayama Prefecture, Japan. During the observation, water temperature near the bottom showed remarkable falls with interval of about 5-7 d. When the bottom temperature fell, the inflow current with low echo intensity water appears at the bottom layer in the ADCP record. It is concluded that when occasional weak northeast wind makes weak coastal upwelling at the mouth of the bay, the combination of upwelling with internal tidal flow causes remarkable water exchange and dispels the red tide. 展开更多
关键词 ADCP echo intensity monitoring coastal water red tide stirring up
下载PDF
SOME DISCRETE NONLINEAR INEQUALITIES AND APPLICATIONS TO DIFFERENCE EQUATIONS 被引量:3
19
作者 Cheung Wing-Sum Ma Qing-Hua Josip Pecaric 《Acta Mathematica Scientia》 SCIE CSCD 2008年第2期417-430,共14页
In this article, the authors establish some new nonlinear difference inequalities in two independent variables, which generalize some existing results and can be used as handy tools in the study of qualitative as well... In this article, the authors establish some new nonlinear difference inequalities in two independent variables, which generalize some existing results and can be used as handy tools in the study of qualitative as well as quantitative properties of solutions of certain classes of difference equations. 展开更多
关键词 Discrete Gronwll-Bellman-Ou-Iang type inequalities a Priori bound difference equation boundary value problems
下载PDF
Protecting Against Address Space Layout Randomisation (ASLR) Compromises and Return-to-Libc Attacks Using Network Intrusion Detection Systems 被引量:2
20
作者 David J Day Zheng-Xu Zhao 《International Journal of Automation and computing》 EI 2011年第4期472-483,共12页
Writable XOR executable (W⊕X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits [1] . However, they have not proved to be a panacea [1 ... Writable XOR executable (W⊕X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits [1] . However, they have not proved to be a panacea [1 3] , and so other mechanisms, such as stack guards and prelinking, have been introduced. In this paper, we show that host-based protection still does not offer a complete solution. To demonstrate the protection inadequacies, we perform an over the network brute force return-to-libc attack against a preforking concurrent server to gain remote access to a shell. The attack defeats host protection including W⊕X and ASLR. We then demonstrate that deploying a network intrusion detection systems (NIDS) with appropriate signatures can detect this attack efficiently. 展开更多
关键词 Buffer overflow stack overflow intrusion detection systems (IDS) signature rules return-to-libc attack pre-forking.
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部