期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Isolation Enhancement in a Compact Four-Element MIMO Antenna for Ultra-Wideband Applications
1
作者 Awais Khan Shahid Bashir +3 位作者 Salman Ghafoor Hatem Rmili Jawad Mirza Ammar Ahmad 《Computers, Materials & Continua》 SCIE EI 2023年第4期911-925,共15页
Mutual coupling reduction or isolation enhancement in antenna arrays is an important area of research as it severely affects the performance of an antenna.In this paper,a new type of compact and highly isolated Multip... Mutual coupling reduction or isolation enhancement in antenna arrays is an important area of research as it severely affects the performance of an antenna.In this paper,a new type of compact and highly isolated Multiple-Input-Multiple-Output(MIMO)antenna for ultra-wideband(UWB)applications is presented.The design consists of four radiators that are orthogonally positioned and confined to a compact 40×40×0.8 mm3 space.The final antenna design uses an inverted L shape partial ground to produce an acceptable reflection coefficient(S11<−10 dB)in an entire UWB band(3.1–10.6)giga hertz(GHz).Moreover,the inter-element isolation has also been enhanced to>20 db for majority of the UWB band.The antenna was fabricated and tested with the vector network analyzer(VNA)and in an anechoic chamber for scattering parameters and radiation patterns.Furthermore,different MIMO diversity performance metrics are also measured to validate the proposed model.The simulation results and the experimental results from the constructed model agree quite well.The proposed antenna is compared with similar designs in recently published literature for various performance metrics.Because of its low envelope correlation coefficient(ECC<0.1),high diversity gain(DG>9.99 dB),peak gain of 4.6 dB,reduced channel capacity loss(CCL<0.4 b/s/Hz),and average radiation efficiency of over 85%,the proposed MIMO antenna is ideally suited for practical UWB applications. 展开更多
关键词 Multiple input multiple output antennas envelope correlation coefficient defected ground structure ultra wide band diversity gain
下载PDF
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
2
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
下载PDF
Performance Enhancement of Praseodymium Doped Fiber Amplifiers 被引量:1
3
作者 Abdullah G.Alharbi Jawad Mirza +1 位作者 Mehak Raza Salman Ghafoor 《Computers, Materials & Continua》 SCIE EI 2022年第12期5411-5422,共12页
In this paper,we report a simulation study on the performance enhancement of Praseodymium doped silica fiber amplifiers(PDFAs)in O-band(1270-1350 nm)in terms of small signal gain,power conversion efficiency(PCE),and o... In this paper,we report a simulation study on the performance enhancement of Praseodymium doped silica fiber amplifiers(PDFAs)in O-band(1270-1350 nm)in terms of small signal gain,power conversion efficiency(PCE),and output optical power by employing bidirectional pumping.The PDFA performance is examined by optimizing the length of Praseodymium doped silica fiber(PDF),its mode-field diameter(MFD)and the concentration of Pr^(3+).A small-signal peak gain of 56.4 dB,power conversion efficiency(PCE)of 47%,and output optical power of around 1.6 W(32 dBm)is observed at optimized parameters for input signal wavelength of 1310 nm.Minimum noise figure(NF)of 4.1 dB is observed at input signal wavelength of 1310 nm.Moreover,the effect of varying the pump wavelength and pump power on output optical power of the amplifier and amplified spontaneous emission(ASE)noise is also investigated,respectively.Finally,the impact of ion-ion interaction(up-conversion effect)on small-signal gain of the amplifier is also studied by considering different values of up-conversion coefficient. 展开更多
关键词 Praseodymium-doped fiber doped fiber amplifiers optical amplification mode field diameter noise figure
下载PDF
Neural Machine Translation Models with Attention-Based Dropout Layer
4
作者 Huma Israr Safdar Abbas Khan +3 位作者 Muhammad Ali Tahir Muhammad Khuram Shahzad Muneer Ahmad Jasni Mohamad Zain 《Computers, Materials & Continua》 SCIE EI 2023年第5期2981-3009,共29页
In bilingual translation,attention-based Neural Machine Translation(NMT)models are used to achieve synchrony between input and output sequences and the notion of alignment.NMT model has obtained state-of-the-art perfo... In bilingual translation,attention-based Neural Machine Translation(NMT)models are used to achieve synchrony between input and output sequences and the notion of alignment.NMT model has obtained state-of-the-art performance for several language pairs.However,there has been little work exploring useful architectures for Urdu-to-English machine translation.We conducted extensive Urdu-to-English translation experiments using Long short-term memory(LSTM)/Bidirectional recurrent neural networks(Bi-RNN)/Statistical recurrent unit(SRU)/Gated recurrent unit(GRU)/Convolutional neural network(CNN)and Transformer.Experimental results show that Bi-RNN and LSTM with attention mechanism trained iteratively,with a scalable data set,make precise predictions on unseen data.The trained models yielded competitive results by achieving 62.6%and 61%accuracy and 49.67 and 47.14 BLEU scores,respectively.From a qualitative perspective,the translation of the test sets was examined manually,and it was observed that trained models tend to produce repetitive output more frequently.The attention score produced by Bi-RNN and LSTM produced clear alignment,while GRU showed incorrect translation for words,poor alignment and lack of a clear structure.Therefore,we considered refining the attention-based models by defining an additional attention-based dropout layer.Attention dropout fixes alignment errors and minimizes translation errors at the word level.After empirical demonstration and comparison with their counterparts,we found improvement in the quality of the resulting translation system and a decrease in the perplexity and over-translation score.The ability of the proposed model was evaluated using Arabic-English and Persian-English datasets as well.We empirically concluded that adding an attention-based dropout layer helps improve GRU,SRU,and Transformer translation and is considerably more efficient in translation quality and speed. 展开更多
关键词 Natural language processing neural machine translation word embedding ATTENTION PERPLEXITY selective dropout regularization URDU PERSIAN Arabic BLEU
下载PDF
Recurrent Convolutional Neural Network MSER-Based Approach for Payable Document Processing 被引量:1
5
作者 Suliman Aladhadh Hidayat Ur Rehman +1 位作者 Ali Mustafa Qamar Rehan Ullah Khan 《Computers, Materials & Continua》 SCIE EI 2021年第12期3399-3411,共13页
A tremendous amount of vendor invoices is generated in the corporate sector.To automate the manual data entry in payable documents,highly accurate Optical Character Recognition(OCR)is required.This paper proposes an e... A tremendous amount of vendor invoices is generated in the corporate sector.To automate the manual data entry in payable documents,highly accurate Optical Character Recognition(OCR)is required.This paper proposes an end-to-end OCR system that does both localization and recognition and serves as a single unit to automate payable document processing such as cheques and cash disbursement.For text localization,the maximally stable extremal region is used,which extracts a word or digit chunk from an invoice.This chunk is later passed to the deep learning model,which performs text recognition.The deep learning model utilizes both convolution neural networks and long short-term memory(LSTM).The convolution layer is used for extracting features,which are fed to the LSTM.The model integrates feature extraction,modeling sequence,and transcription into a unified network.It handles the sequences of unconstrained lengths,independent of the character segmentation or horizontal scale normalization.Furthermore,it applies to both the lexicon-free and lexicon-based text recognition,and finally,it produces a comparatively smaller model,which can be implemented in practical applications.The overall superior performance in the experimental evaluation demonstrates the usefulness of the proposed model.The model is thus generic and can be used for other similar recognition scenarios. 展开更多
关键词 Character recognition text spotting long short-term memory recurrent convolutional neural networks
下载PDF
Thermally stratified flow of hybrid nanofluids with radiative heat transport and slip mechanism: multiple solutions
6
作者 Rai Sajjad Saif Hashim +1 位作者 Maria Zaman Muhammad Ayaz 《Communications in Theoretical Physics》 SCIE CAS CSCD 2022年第1期142-151,共10页
Research on flow and heat transfer of hybrid nanofluids has gained great significance due to their efficient heat transfer capabilities.In fact,hybrid nanofluids are a novel type of fluid designed to enhance heat tran... Research on flow and heat transfer of hybrid nanofluids has gained great significance due to their efficient heat transfer capabilities.In fact,hybrid nanofluids are a novel type of fluid designed to enhance heat transfer rate and have a wide range of engineering and industrial applications.Motivated by this evolution,a theoretical analysis is performed to explore the flow and heat transport characteristics of Cu/Al_(2)O_(3) hybrid nanofluids driven by a stretching/shrinking geometry.Further,this work focuses on the physical impacts of thermal stratification as well as thermal radiation during hybrid nanofluid flow in the presence of a velocity slip mechanism.The mathematical modelling incorporates the basic conservation laws and Boussinesq approximations.This formulation gives a system of governing partial differential equations which are later reduced into ordinary differential equations via dimensionless variables.An efficient numerical solver,known as bvp4c in MATLAB,is utilized to acquire multiple(upper and lower)numerical solutions in the case of shrinking flow.The computed results are presented in the form of flow and temperature fields.The most significant findings acquired from the current study suggest that multiple solutions exist only in the case of a shrinking surface until a critical/turning point.Moreover,solutions are unavailable beyond this turning point,indicating flow separation.It is found that the fluid temperature has been impressively enhanced by a higher nanoparticle volume fraction for both solutions.On the other hand,the outcomes disclose that the wall shear stress is reduced with higher magnetic field in the case of the second solution.The simulation outcomes are in excellent agreement with earlier research,with a relative error of less than 1%. 展开更多
关键词 multiple numerical solutions hybrid nanofluids thermal radiation thermal stratification slip conditions heat transfer
原文传递
Developing Engagement in the Learning Management System Supported by Learning Analytics
7
作者 Suraya Hamid Shahrul Nizam Ismail +1 位作者 Muzaffar Hamzah Asad W.Malik 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期335-350,共16页
Learning analytics is an emerging technique of analysing student par-ticipation and engagement.The recent COVID-19 pandemic has significantly increased the role of learning management systems(LMSs).LMSs previously only... Learning analytics is an emerging technique of analysing student par-ticipation and engagement.The recent COVID-19 pandemic has significantly increased the role of learning management systems(LMSs).LMSs previously only complemented face-to-face teaching,something which has not been possible between 2019 to 2020.To date,the existing body of literature on LMSs has not analysed learning in the context of the pandemic,where an LMS serves as the only interface between students and instructors.Consequently,productive results will remain elusive if the key factors that contribute towards engaging students in learning are notfirst identified.Therefore,this study aimed to perform an exten-sive literature review with which to design and develop a student engagement model for holistic involvement in an LMS.The required data was collected from an LMS that is currently utilised by a local Malaysian university.The model was validated by a panel of experts as well as discussions with students.It is our hope that the result of this study will help other institutions of higher learning determine factors of low engagement in their respective LMSs. 展开更多
关键词 Engagement analysis learning analytics learning management system student engagement
下载PDF
Dates Fruit Recognition: From Classical Fusion to Deep Learning
8
作者 Khaled Marji Alresheedi Suliman Aladhadh +1 位作者 Rehan Ullah Khan Ali Mustafa Qamar 《Computer Systems Science & Engineering》 SCIE EI 2022年第1期151-166,共16页
There are over 200 different varieties of dates fruit in the world.Interestingly,every single type has some very specific features that differ from the others.In recent years,sorting,separating,and arranging in automa... There are over 200 different varieties of dates fruit in the world.Interestingly,every single type has some very specific features that differ from the others.In recent years,sorting,separating,and arranging in automated industries,in fruits businesses,and more specifically in dates businesses have inspired many research dimensions.In this regard,this paper focuses on the detection and recognition of dates using computer vision and machine learning.Our experimental setup is based on the classical machine learning approach and the deep learning approach for nine classes of dates fruit.Classical machine learning includes the Bayesian network,Support Vector Machine,Random Forest,and Multi-Layer Perceptron(MLP),while the Convolutional Neural Network is used for the deep learning set.The feature set includes Color Layout features,Fuzzy Color and Texture Histogram,Gabor filtering,and the Pyramid Histogram of the Oriented Gradients.The fusion of various features is also extensively explored in this paper.The MLP achieves the highest detection performance with an F-measure of 0.938.Moreover,deep learning shows better accuracy than the classical machine learning algorithms.In fact,deep learning got 2%more accurate results as compared to the MLP and the Random forest.We also show that classical machine learning could give increased classification performance which could get close to that provided by deep learning through the use of optimized tuning and a good feature set. 展开更多
关键词 features Deep SEPARATING
下载PDF
Cloud authorization: exploring techniques and approach towards effective access control framework 被引量:3
9
作者 Rahat MASOOD Muhammad Awais SHIBLI Yumna GHAZI Ayesha KANWAL Arshad ALI 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第2期297-321,共25页
Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main probl... Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main problems in this regard is that of authorization in the Cloud environment, which is the focus of our research. In this paper, we present a systematic analysis of the existing authorization solutions in Cloud and evaluate their effectiveness against well-established industrial standards that conform to the unique access control require- ments in the domain. Our analysis can benefit organizations by helping them decide the best authorization technique for deployment in Cloud; a case study along with simulation re- sults is also presented to illustrate the procedure of using our qualitative analysis for the selection of an appropriate tech- nique, as per Cloud consumer requirements. From the results of this evaluation, we derive the general shortcomings of the extant access control techniques that are keeping them from providing successful authorization and, therefore, widely adopted by the Cloud community. To that end, we enumer- ate the features an ideal access control mechanisms for the Cloud should have, and combine them to suggest the ultimate solution to this major security challenge - access control as a service (ACaaS) for the software as a service (SaaS) layer. We conclude that a meticulous research is needed to incorpo- rate the identified authorization features into a generic ACaaS framework that should be adequate for providing high level of extensibility and security by integrating multiple accesscontrol models. 展开更多
关键词 AUTHORIZATION access control software as a ser-vice extensible access control markup language identity &access management cloud security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部