期刊文献+
共找到842篇文章
< 1 2 43 >
每页显示 20 50 100
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
1
作者 Sunil Kumar Dilip Kumar +3 位作者 Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You 《Computers, Materials & Continua》 SCIE EI 2024年第1期31-63,共33页
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ... The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio. 展开更多
关键词 IOT a sensor device LIGHTWEIGHT CRYPTOGRAPHY block cipher smart card security and privacy
下载PDF
The Experience and Impact of a Fitbit-Based Physical Activity and Sleep Hygiene Intervention for Older Adults Experiencing Cognitive Decline
2
作者 Kate Walker Chris Griffiths +3 位作者 Jen Yates Louise Birkett-Swan Farah Hina Chee Siang Ang 《Advances in Aging Research》 CAS 2024年第3期41-59,共19页
Objectives: This study aimed to understand the experience and impact of a physical activity and sleep wrist-worn tracker (Fitbit)-based healthy lifestyle intervention for older patients attending a memory assessment s... Objectives: This study aimed to understand the experience and impact of a physical activity and sleep wrist-worn tracker (Fitbit)-based healthy lifestyle intervention for older patients attending a memory assessment service, who are experiencing cognitive impairment but do not receive a dementia diagnosis. Methods: A qualitative design was employed. Semi-structured interviews were conducted with a purposeful sample of thirteen participants recruited from a memory assessment service. Thematic analysis, that was data driven and inductive, was undertaken to analyse the data. Results: Two global themes were developed. “Understanding exercise and sleep as part of my lifestyle” was made up of themes representing how participants viewed exercise and sleep as part of their lifestyles in terms of acknowledging the positive impacts and the barriers to exercise and sleep. The second global theme “Understanding my experience of the healthy lifestyle intervention” was made up of themes that identified the positive impact of the intervention regarding improving health and wellbeing, enabling validation of proactive behaviours and motivation to engage in healthy lifestyle behaviours, so promoting positive behaviour change. Conclusion: Patients experiencing age-related cognitive impairment, applied and benefited from a healthy lifestyle Fitbit-based intervention to facilitate and promote physical activity, better sleep hygiene and healthy lifestyles. 展开更多
关键词 Cognitive Impairment Healthy Lifestyle Intervention Fitbit Health and Wellbeing Behaviour Change
下载PDF
Evidence of the Great Attractor and Great Repeller from Artificial Neural Network Imputation of Sloan Digital Sky Survey
3
作者 Christopher Cillian O’Neill 《Journal of High Energy Physics, Gravitation and Cosmology》 CAS 2024年第3期1178-1194,共17页
The Sloane Digital Sky Survey (SDSS) has been in the process of creating a 3D digital map of the Universe, since 2000AD. However, it has not been able to map that portion of the sky which is occluded by the dust gas a... The Sloane Digital Sky Survey (SDSS) has been in the process of creating a 3D digital map of the Universe, since 2000AD. However, it has not been able to map that portion of the sky which is occluded by the dust gas and stars of our own Milkyway Galaxy. This research builds on work from a previous paper that sought to impute this missing galactic information using Inpainting, polar transforms and Linear Regression ANNs. In that paper, the author only attempted to impute the data in the Northern hemisphere using the ANN model, which subsequently confirmed the existence of the Great Attractor and the homogeneity of the Universe. In this paper, the author has imputed the Southern Hemisphere and discovered a region that is mostly devoid of stars. Since this area appears to be the counterpart to the Great Attractor, the author refers to it as the Great Repeller and postulates that it is an area of physical repulsion, inline with the work of GerdPommerenke and others. Finally, the paper investigates large scale structures in the imputed galaxies. 展开更多
关键词 Artificial Neural Networks Convolutional Neural Networks SDSS ANISOTROPIES Great Attractor
下载PDF
A Framework for Driver DrowsinessMonitoring Using a Convolutional Neural Network and the Internet of Things
4
作者 Muhamad Irsan Rosilah Hassan +3 位作者 Anwar Hassan Ibrahim Mohamad Khatim Hasan Meng Chun Lam Wan Mohd Hirwani Wan Hussain 《Intelligent Automation & Soft Computing》 2024年第2期157-174,共18页
One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the dri... One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the driver’s sleepiness and integrate it into a warning system.Most studies have examined how the mouth and eyelids move.However,this limits the system’s ability to identify drowsiness traits.Therefore,this study designed an Accident Detection Framework(RPK)that could be used to reduce road accidents due to sleepiness and detect the location of accidents.The drowsiness detectionmodel used three facial parameters:Yawning,closed eyes(blinking),and an upright head position.This model used a Convolutional Neural Network(CNN)consisting of two phases.The initial phase involves video processing and facial landmark coordinate detection.The second phase involves developing the extraction of frame-based features using normalization methods.All these phases used OpenCV and TensorFlow.The dataset contained 5017 images with 874 open eyes images,850 closed eyes images,723 open-mouth images,725 closed-mouth images,761 sleepy-head images,and 1084 non-sleepy head images.The dataset of 5017 images was divided into the training set with 4505 images and the testing set with 512 images,with a ratio of 90:10.The results showed that the RPK design could detect sleepiness by using deep learning techniques with high accuracy on all three parameters;namely 98%for eye blinking,96%for mouth yawning,and 97%for head movement.Overall,the test results have provided an overview of how the developed RPK prototype can accurately identify drowsy drivers.These findings will have a significant impact on the improvement of road users’safety and mobility. 展开更多
关键词 Drowsy drivers convolutional neural network OPENCV MICROPROCESSOR face detection
下载PDF
Validity,Reliability,and Measurement Invariance of the Thai Smartphone Application-Based Addiction Scale and Bergen Social Media Addiction Scale
5
作者 Kamolthip Ruckwongpatr Chirawat Paratthakonkun +8 位作者 Usanut Sangtongdee Iqbal Pramukti Ira Nurmala Kanokwan Angkasith Weena Thanachaisakul Jatuphum Ketchatturat Mark DGriffiths Yi-Kai Kao Chung-Ying Lin 《International Journal of Mental Health Promotion》 2024年第4期293-302,共10页
Background:In recent years,there has been increased research interest in both smartphone addiction and social media addiction as well as the development of psychometric instruments to assess these constructs.However,t... Background:In recent years,there has been increased research interest in both smartphone addiction and social media addiction as well as the development of psychometric instruments to assess these constructs.However,there is a lack of psychometric evaluation for instruments assessing smartphone addiction and social media addiction in Thailand.The present study evaluated the psychometric properties and gender measurement invariance of the Thai version of the Smartphone Application-Based Addiction Scale(SABAS)and Bergen Social Media Addiction Scale(BSMAS).Method:A total of 801 Thai university students participated in an online survey from January 2022 to July 2022 which included demographic information,SABAS,BSMAS,and the Internet Gaming Disorder Scale-Short Form(IGDS9-SF).Results:Confirmatory Factor Analyses(CFAs)found that both the SABAS and BSMAS had a one-factor structure.Findings demonstrated adequate psychometric properties of both instruments and also supported measurement invariance across genders.Moreover,scores on the SABAS and BSMAS were correlated with scores on the IGDS9-SF.Conclusion:The results indicated that the SABAS and BSMAS are useful psychometric instruments for assessing the risk of smartphone addiction and social media addiction among Thai young adults. 展开更多
关键词 Factor analysis smartphone addiction social media addiction smartphone application-based addiction scale bergen social media addiction scale psychometric validation
下载PDF
Robot-Oriented 6G Satellite-UAV Networks: Requirements, Paradigm Shifts, and Case Studies
6
作者 Peng Wei Wei Feng +2 位作者 Yunfei Chen Ning Ge Wei Xiang 《China Communications》 SCIE CSCD 2024年第2期74-84,共11页
Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) net... Networked robots can perceive their surroundings, interact with each other or humans,and make decisions to accomplish specified tasks in remote/hazardous/complex environments. Satelliteunmanned aerial vehicle(UAV) networks can support such robots by providing on-demand communication services. However, under traditional open-loop communication paradigm, the network resources are usually divided into user-wise mostly-independent links,via ignoring the task-level dependency of robot collaboration. Thus, it is imperative to develop a new communication paradigm, taking into account the highlevel content and values behind, to facilitate multirobot operation. Inspired by Wiener’s Cybernetics theory, this article explores a closed-loop communication paradigm for the robot-oriented satellite-UAV network. This paradigm turns to handle group-wise structured links, so as to allocate resources in a taskoriented manner. It could also exploit the mobility of robots to liberate the network from full coverage,enabling new orchestration between network serving and positive mobility control of robots. Moreover,the integration of sensing, communications, computing and control would enlarge the benefit of this new paradigm. We present a case study for joint mobile edge computing(MEC) offloading and mobility control of robots, and finally outline potential challenges and open issues. 展开更多
关键词 closed-loop communication mobility control satellite-UAV network structured resource allocation
下载PDF
IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems
7
作者 Dinesh Mavaluru Chettupally Anil Carie +4 位作者 Ahmed I.Alutaibi Satish Anamalamudi Bayapa Reddy Narapureddy Murali Krishna Enduri Md Ezaz Ahmed 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1487-1503,共17页
In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises e... In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises essential components such as base stations,edge servers,and numerous IIoT devices characterized by limited energy and computing capacities.The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption.The system operates in discrete time slots and employs a quasi-static approach,with a specific focus on the complexities of task partitioning and the management of constrained resources within the IIoT context.This study makes valuable contributions to the field by enhancing the understanding of resourceefficient management and task allocation,particularly relevant in real-time industrial applications.Experimental results indicate that our proposed algorithmsignificantly outperforms existing approaches,reducing queue backlog by 45.32% and 17.25% compared to SMRA and ACRA while achieving a 27.31% and 74.12% improvement in Qn O.Moreover,the algorithmeffectively balances complexity and network performance,as demonstratedwhen reducing the number of devices in each group(Ng)from 200 to 50,resulting in a 97.21% reduction in complexity with only a 7.35% increase in energy consumption.This research offers a practical solution for optimizing IIoT networks in real-time industrial settings. 展开更多
关键词 Internet of Things edge computing OFFLOADING NOMA
下载PDF
Classification and Comprehension of Software Requirements Using Ensemble Learning
8
作者 Jalil Abbas Arshad Ahmad +4 位作者 Syed Muqsit Shaheed Rubia Fatima Sajid Shah Mohammad Elaffendi Gauhar Ali 《Computers, Materials & Continua》 SCIE EI 2024年第8期2839-2855,共17页
The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human re... The software development process mostly depends on accurately identifying both essential and optional features.Initially,user needs are typically expressed in free-form language,requiring significant time and human resources to translate these into clear functional and non-functional requirements.To address this challenge,various machine learning(ML)methods have been explored to automate the understanding of these requirements,aiming to reduce time and human effort.However,existing techniques often struggle with complex instructions and large-scale projects.In our study,we introduce an innovative approach known as the Functional and Non-functional Requirements Classifier(FNRC).By combining the traditional random forest algorithm with the Accuracy Sliding Window(ASW)technique,we develop optimal sub-ensembles that surpass the initial classifier’s accuracy while using fewer trees.Experimental results demonstrate that our FNRC methodology performs robustly across different datasets,achieving a balanced Precision of 75%on the PROMISE dataset and an impressive Recall of 85%on the CCHIT dataset.Both datasets consistently maintain an F-measure around 64%,highlighting FNRC’s ability to effectively balance precision and recall in diverse scenarios.These findings contribute to more accurate and efficient software development processes,increasing the probability of achieving successful project outcomes. 展开更多
关键词 Ensemble learning machine learning non-functional requirements requirement engineering accuracy sliding window
下载PDF
New Antenna Array Beamforming Techniques Based on Hybrid Convolution/Genetic Algorithm for 5G and Beyond Communications
9
作者 Shimaa M.Amer Ashraf A.M.Khalaf +3 位作者 Amr H.Hussein Salman A.Alqahtani Mostafa H.Dahshan Hossam M.Kassem 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第3期2749-2767,共19页
Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up t... Side lobe level reduction(SLL)of antenna arrays significantly enhances the signal-to-interference ratio and improves the quality of service(QOS)in recent and future wireless communication systems starting from 5G up to 7G.Furthermore,it improves the array gain and directivity,increasing the detection range and angular resolution of radar systems.This study proposes two highly efficient SLL reduction techniques.These techniques are based on the hybridization between either the single convolution or the double convolution algorithms and the genetic algorithm(GA)to develop the Conv/GA andDConv/GA,respectively.The convolution process determines the element’s excitations while the GA optimizes the element spacing.For M elements linear antenna array(LAA),the convolution of the excitation coefficients vector by itself provides a new vector of excitations of length N=(2M−1).This new vector is divided into three different sets of excitations including the odd excitations,even excitations,and middle excitations of lengths M,M−1,andM,respectively.When the same element spacing as the original LAA is used,it is noticed that the odd and even excitations provide a much lower SLL than that of the LAA but with amuch wider half-power beamwidth(HPBW).While the middle excitations give the same HPBWas the original LAA with a relatively higher SLL.Tomitigate the increased HPBWof the odd and even excitations,the element spacing is optimized using the GA.Thereby,the synthesized arrays have the same HPBW as the original LAA with a two-fold reduction in the SLL.Furthermore,for extreme SLL reduction,the DConv/GA is introduced.In this technique,the same procedure of the aforementioned Conv/GA technique is performed on the resultant even and odd excitation vectors.It provides a relatively wider HPBWthan the original LAA with about quad-fold reduction in the SLL. 展开更多
关键词 Array synthesis convolution process genetic algorithm(GA) half power beamwidth(HPBW) linear antenna array(LAA) side lobe level(SLL) quality of service(QOS)
下载PDF
“Active Feedback” Fitbit-Based Physical Activity and Sleep Hygiene Intervention for Memory Assessment Service (MAS) Patients with Cognitive Deficits: Feasibility, Acceptability, Sleep Quality, Stress, and Wellbeing Outcomes
10
作者 Chris Griffiths Farah Hina +6 位作者 Chee Siang Ang Louise Birkett-Swan Casey Bonham Lauren Currell Emily Ward Natasha Stace-Wood Jessica Plumbridge 《Advances in Aging Research》 CAS 2024年第4期61-74,共14页
Research Background: Compared to the general population, people experiencing age-related cognitive decline are more likely to have low levels of physical activity and sleep problems. Sufficient physical activity and q... Research Background: Compared to the general population, people experiencing age-related cognitive decline are more likely to have low levels of physical activity and sleep problems. Sufficient physical activity and quality sleep are protective factors against cognitive decline and poor health and can improve coping with stressors. The “Active Feedback” intervention comprises a wearable activity and sleep tracker (Fitbit), access to Fitbit software healthy lifestyle software apps;one session with Memory Assessment Service (MAS) staff providing physical activity and sleep hygiene advice and two further engagement, discussion, and feedback sessions. Purpose/Aim: This study investigates the acceptability and feasibility of Active Feedback and the effect on stress, mental wellbeing, and sleep quality, and the links between these factors. Methods: An open-label patient cohort design with no control group was used. Pre-intervention, 4-week and 8-week intervention assessments were performed using participant self-report measures: Perceived Stress Scale (PSS), Warwick-Edinburgh Mental Wellbeing Scale (WEMWBS), and Sleep Conditioning Index (SCI). Twenty-five participants completed an eight-week three-session intervention (18 males and 7 females), with the age range of 66 - 84 years old, and average age of 73.8 years (SD = 5.09). Fifteen participants had a diagnosis of MCI, ten participants did not. Results: There were non-significant improvements in SCI scores from 21.0 (SD = 8.84) to 21.6 (SD = 6.20) at 8 weeks, PSS scores from 17.5 (SD = 5.89) to 17.0 (SD = 6.20) at 8 weeks, and WEMWBS scores from 46.9 (SD = 9.23) to 48.8 (SD = 9.69) at 8 weeks. There were negative correlations between WEMWBS and PSS. Conclusion: Active Feedback intervention was found to be feasible and acceptable. Active Feedback could be enhanced to include motivational interviewing and goal setting. 展开更多
关键词 Fitbit TRACKER MCI Exercise INSOMNIA Physical Activity Wearables SLEEP
下载PDF
An Implementation of Multiscale Line Detection and Mathematical Morphology for Efficient and Precise Blood Vessel Segmentation in Fundus Images
11
作者 Syed Ayaz Ali Shah Aamir Shahzad +4 位作者 Musaed Alhussein Chuan Meng Goh Khursheed Aurangzeb Tong Boon Tang Muhammad Awais 《Computers, Materials & Continua》 SCIE EI 2024年第5期2565-2583,共19页
Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when deal... Diagnosing various diseases such as glaucoma,age-related macular degeneration,cardiovascular conditions,and diabetic retinopathy involves segmenting retinal blood vessels.The task is particularly challenging when dealing with color fundus images due to issues like non-uniformillumination,low contrast,and variations in vessel appearance,especially in the presence of different pathologies.Furthermore,the speed of the retinal vessel segmentation system is of utmost importance.With the surge of now available big data,the speed of the algorithm becomes increasingly important,carrying almost equivalent weightage to the accuracy of the algorithm.To address these challenges,we present a novel approach for retinal vessel segmentation,leveraging efficient and robust techniques based on multiscale line detection and mathematical morphology.Our algorithm’s performance is evaluated on two publicly available datasets,namely the Digital Retinal Images for Vessel Extraction dataset(DRIVE)and the Structure Analysis of Retina(STARE)dataset.The experimental results demonstrate the effectiveness of our method,withmean accuracy values of 0.9467 forDRIVE and 0.9535 for STARE datasets,aswell as sensitivity values of 0.6952 forDRIVE and 0.6809 for STARE datasets.Notably,our algorithmexhibits competitive performance with state-of-the-art methods.Importantly,it operates at an average speed of 3.73 s per image for DRIVE and 3.75 s for STARE datasets.It is worth noting that these results were achieved using Matlab scripts containing multiple loops.This suggests that the processing time can be further reduced by replacing loops with vectorization.Thus the proposed algorithm can be deployed in real time applications.In summary,our proposed system strikes a fine balance between swift computation and accuracy that is on par with the best available methods in the field. 展开更多
关键词 Line detector vessel detection LOCALIZATION mathematical morphology image processing
下载PDF
Helping People and Changing the World with CS
12
作者 Sukyoung Ryu 《计算机教育》 2024年第3期17-19,共3页
What should academic institutions be doing in order to benefit students,the community at large,and society in the new era?Particularly,as computing is impacting all aspects of human society,it also brings many challen... What should academic institutions be doing in order to benefit students,the community at large,and society in the new era?Particularly,as computing is impacting all aspects of human society,it also brings many challenges and opportunities for the academic departments of computer science.Some of these challenges include the increasing impact of software on society,issues involving privacy and data abuse,and ethical issues concerning AI.Towards addressing these challenges,the Korea Advanced Institute of Science and Technology(KAIST)leverages its position as an educator in order to train the future computing workforce to be more aware of these issues.To achieve this goal,KAIST mainly adopts three strategies:Combining science&technology and humanities together;putting academy and industry together;training software experts while making them understand people and the world. 展开更多
关键词 COMPUTING KAIST Privacy and data abuse Ethical issues
下载PDF
ThyroidNet:A Deep Learning Network for Localization and Classification of Thyroid Nodules
13
作者 Lu Chen Huaqiang Chen +6 位作者 Zhikai Pan Sheng Xu Guangsheng Lai Shuwen Chen Shuihua Wang Xiaodong Gu Yudong Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期361-382,共22页
Aim:This study aims to establish an artificial intelligence model,ThyroidNet,to diagnose thyroid nodules using deep learning techniques accurately.Methods:A novel method,ThyroidNet,is introduced and evaluated based on... Aim:This study aims to establish an artificial intelligence model,ThyroidNet,to diagnose thyroid nodules using deep learning techniques accurately.Methods:A novel method,ThyroidNet,is introduced and evaluated based on deep learning for the localization and classification of thyroid nodules.First,we propose the multitask TransUnet,which combines the TransUnet encoder and decoder with multitask learning.Second,we propose the DualLoss function,tailored to the thyroid nodule localization and classification tasks.It balances the learning of the localization and classification tasks to help improve the model’s generalization ability.Third,we introduce strategies for augmenting the data.Finally,we submit a novel deep learning model,ThyroidNet,to accurately detect thyroid nodules.Results:ThyroidNet was evaluated on private datasets and was comparable to other existing methods,including U-Net and TransUnet.Experimental results show that ThyroidNet outperformed these methods in localizing and classifying thyroid nodules.It achieved improved accuracy of 3.9%and 1.5%,respectively.Conclusion:ThyroidNet significantly improves the clinical diagnosis of thyroid nodules and supports medical image analysis tasks.Future research directions include optimization of the model structure,expansion of the dataset size,reduction of computational complexity and memory requirements,and exploration of additional applications of ThyroidNet in medical image analysis. 展开更多
关键词 ThyroidNet deep learning TransUnet multitask learning medical image analysis
下载PDF
Strengths,weaknesses,opportunities,and threats(SWOT)analysis of supercapacitors:A review 被引量:3
14
作者 Pragati A.Shinde Qaisar Abbas +3 位作者 Nilesh R.Chodankar Katsuhiko Ariga Mohammad Ali Abdelkareem Abdul Ghani Olabi 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2023年第4期611-638,共28页
The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environment... The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environmental pollution.Due to their intermittent nature,these green and sustainable sources require appropriate energy storage systems.Amongst different energy storage technologies,electrochemical energy storage devices,particularly supercapacitors(SCs),have fascinated global attention for their utilization in electric vehicles,power supports,portable electronics,and many others application requiring electric energy devices for their operation.Thus,the growth of SCs in the commercial market has squeezed requirements,and further developments are obligatory for their effective industrialization.In the meantime,SCs also face technical complications and contests for their introduction in industrial settings because of their low energy density and high Levelized cost.The present study combines core strengths,weaknesses,opportunities,and threats(SWOT)analysis of SCs with new perspectives and recent ideas.The challenges and the future progressive prospects of SCs are also presented in detail.This review will afford consistent direction and new superhighways for the further development of SCs as standalone and complementary energy storage systems. 展开更多
关键词 SUPERCAPACITORS Energy storage Strengths OPPORTUNITIES
下载PDF
Experimental investigation and flow analysis of clear-water scour around pier and abutment in proximity 被引量:1
15
作者 Mohammad Saeed Fakhimjoo Abdollah Ardeshir +1 位作者 Kourosh Behzadian Hojat Karami 《Water Science and Engineering》 EI CAS CSCD 2023年第1期94-105,共12页
Local scour around bridge piers and abutments is one of the most significant causes of bridge failure.Despite a plethora of studies on scour around individual bridge piers or abutments,few studies have focused on the ... Local scour around bridge piers and abutments is one of the most significant causes of bridge failure.Despite a plethora of studies on scour around individual bridge piers or abutments,few studies have focused on the joint impact of a pier and an abutment in proximity to one another on scour.This study conducted laboratory experiments and flow analyses to examine the interaction of piers and abutments and their effect on clear-water scour.The experiments were conducted in a rectangular laboratory flume.They included 18 main tests(with a combination of different types of piers and abutments)and five control tests(with individual piers or abutments).Three pier types(a rectangular pier with a rounded edge,a group of three cylindrical piers,and a single cylindrical pier)and two abutment types(a wingewall abutment and a semicircular abutment)were used.An acoustic Doppler velocimeter was used to measure the three-dimensional flow velocity for analyses of streamline,velocity magnitude,vertical velocity,and bed shear stress.The results showed that the velocity near the pier and abutment increased by up to 80%.The maximum scour depth around the abutment increased by up to 19%.In contrast,the maximum scour depth around the pier increased significantly by up to l71%.The presence of the pier in the vicinity of the abutment led to an increase in the scour hole volume by up to 87%relative to the case with a solitary abutment.Empirical equations were also derived to accurately estimate the maximum scour depth at the pier adjacent to the abutment. 展开更多
关键词 ABUTMENT ADV Bridge scour Laboratory experiment Maximum scour depth PIER
下载PDF
New Approaches to the Prognosis and Diagnosis of Breast Cancer Using Fuzzy Expert Systems
16
作者 Elias Ayinbila Apasiya Abdul-Mumin Salifu Peter Awon-Natemi Agbedemnab 《Journal of Computer and Communications》 2024年第5期151-169,共19页
Breast cancer remains a significant global health challenge, necessitating effective early detection and prognosis to enhance patient outcomes. Current diagnostic methods, including mammography and MRI, suffer from li... Breast cancer remains a significant global health challenge, necessitating effective early detection and prognosis to enhance patient outcomes. Current diagnostic methods, including mammography and MRI, suffer from limitations such as uncertainty and imprecise data, leading to late-stage diagnoses. To address this, various expert systems have been developed, but many rely on type-1 fuzzy logic and lack mobile-based applications for data collection and feedback to healthcare practitioners. This research investigates the development of an Enhanced Mobile-based Fuzzy Expert system (EMFES) for breast cancer pre-growth prognosis. The study explores the use of type-2 fuzzy logic to enhance accuracy and model uncertainty effectively. Additionally, it evaluates the advantages of employing the python programming language over java for implementation and considers specific risk factors for data collection. The research aims to dynamically generate fuzzy rules, adapting to evolving breast cancer research and patient data. Key research questions focus on the comparative effectiveness of type-2 fuzzy logic, the handling of uncertainty and imprecise data, the integration of mobile-based features, the choice of programming language, and the creation of dynamic fuzzy rules. Furthermore, the study examines the differences between the Mamdani Inference System and the Sugeno Fuzzy Inference method and explores challenges and opportunities in deploying the EMFES on mobile devices. The research identifies a critical gap in existing breast cancer diagnostic systems, emphasizing the need for a comprehensive, mobile-enabled, and adaptable solution by developing an EMFES that leverages Type-2 fuzzy logic, the Sugeno Inference Algorithm, Python Programming, and dynamic fuzzy rule generation. This study seeks to enhance early breast cancer detection and ultimately reduce breast cancer-related mortality. 展开更多
关键词 EMFES Breast Cancer Type-2 Fl Soft Computing Membership Functions Fuzzy Set Fuzzy Rules Risk Factors.
下载PDF
Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm
17
作者 V.Joseph Raymond R.Jeberson Retna Raj 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2147-2163,共17页
Android devices are popularly available in the commercial market at different price levels for various levels of customers.The Android stack is more vulnerable compared to other platforms because of its open-source na... Android devices are popularly available in the commercial market at different price levels for various levels of customers.The Android stack is more vulnerable compared to other platforms because of its open-source nature.There are many android malware detection techniques available to exploit the source code andfind associated components during execution time.To obtain a better result we create a hybrid technique merging static and dynamic processes.In this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing system.In the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given approach.The Android Sensitive Permission is one major key point to be considered while detecting malware.We select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or benign.Thefinal goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate. 展开更多
关键词 Zero-day exploit hybrid analysis principal component analysis supervised learning smart cities
下载PDF
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network:Architectures,enabling technologies,and opportunities
18
作者 Jinfang Jiang Chuan Lin +3 位作者 Guangjie Han Adnan MAbu-Mahfouz Syed Bilal Hussain Shah Miguel Martínez-García 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1351-1362,共12页
The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communi... The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communication protocols.This brings forth new methods and models to fuse the information yielded by the various industrial plant elements and generates emerging security challenges that we have to face,providing ad-hoc functions for scheduling and guaranteeing the network operations.Recently,the large development of SoftwareDefined Networking(SDN)and Artificial Intelligence(AI)technologies have made feasible the design and control of scalable and secure IIoT networks.This paper studies how AI and SDN technologies combined can be leveraged towards improving the security and functionality of these IIoT networks.After surveying the state-of-the-art research efforts in the subject,the paper introduces a candidate architecture for AI-enabled Software-Defined IIoT Network(AI-SDIN)that divides the traditional industrial networks into three functional layers.And with this aim in mind,key technologies(Blockchain-based Data Sharing,Intelligent Wireless Data Sensing,Edge Intelligence,Time-Sensitive Networks,Integrating SDN&TSN,Distributed AI)and improve applications based on AISDIN are also discussed.Further,the paper also highlights new opportunities and potential research challenges in control and automation of IIoT networks. 展开更多
关键词 Industrial internet of things(IIoT) Industry 4.0 Artificial intelligence(AI) Machine intelligence Software-defined networking(SDN)
下载PDF
A Hybrid Ensemble Learning Approach Utilizing Light Gradient Boosting Machine and Category Boosting Model for Lifestyle-Based Prediction of Type-II Diabetes Mellitus
19
作者 Mahadi Nagassou Ronald Waweru Mwangi Euna Nyarige 《Journal of Data Analysis and Information Processing》 2023年第4期480-511,共32页
Addressing classification and prediction challenges, tree ensemble models have gained significant importance. Boosting ensemble techniques are commonly employed for forecasting Type-II diabetes mellitus. Light Gradien... Addressing classification and prediction challenges, tree ensemble models have gained significant importance. Boosting ensemble techniques are commonly employed for forecasting Type-II diabetes mellitus. Light Gradient Boosting Machine (LightGBM) is a widely used algorithm known for its leaf growth strategy, loss reduction, and enhanced training precision. However, LightGBM is prone to overfitting. In contrast, CatBoost utilizes balanced base predictors known as decision tables, which mitigate overfitting risks and significantly improve testing time efficiency. CatBoost’s algorithm structure counteracts gradient boosting biases and incorporates an overfitting detector to stop training early. This study focuses on developing a hybrid model that combines LightGBM and CatBoost to minimize overfitting and improve accuracy by reducing variance. For the purpose of finding the best hyperparameters to use with the underlying learners, the Bayesian hyperparameter optimization method is used. By fine-tuning the regularization parameter values, the hybrid model effectively reduces variance (overfitting). Comparative evaluation against LightGBM, CatBoost, XGBoost, Decision Tree, Random Forest, AdaBoost, and GBM algorithms demonstrates that the hybrid model has the best F1-score (99.37%), recall (99.25%), and accuracy (99.37%). Consequently, the proposed framework holds promise for early diabetes prediction in the healthcare industry and exhibits potential applicability to other datasets sharing similarities with diabetes. 展开更多
关键词 Boosting Ensemble Learning Category Boosting Light Gradient Boosting Machine
下载PDF
Delay-CJ:A novel cryptojacking covert attack method based on delayed strategy and its detection 被引量:1
20
作者 Guangquan Xu Wenyu Dong +6 位作者 Jun Xing Wenqing Lei Jian Liu Lixiao Gong Meiqi Feng Xi Zheng Shaoying Liu 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1169-1179,共11页
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once beca... Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored. 展开更多
关键词 Cryptojacking Evasion techniques Delayed strategy Cryptocurrency mining Behavior-based detection
下载PDF
上一页 1 2 43 下一页 到第
使用帮助 返回顶部