Skip to main content

Windows

weitere Zeitschriftenartikel

Open Access 01-12-2023 | Research

An approach to application-layer DoS detection

With the massive resources and strategies accessible to attackers, countering Denial of Service (DoS) attacks is getting increasingly difficult. One of these techniques is application-layer DoS. Due to these challenges, network security has become …

Authors:
Cliff Kemp, Chad Calvert, Taghi M. Khoshgoftaar, Joffrey L. Leevy

Open Access 01-12-2023 | Research

Efficiency and optimization of government service resource allocation in a cloud computing environment

According to the connotation and structure of government service resources, data of government service resources in L city from 2019 to 2021 are used to calculate the efficiency of government service resource allocation in each county and region …

Authors:
Ya-guang Guo, Qian Yin, Yixiong Wang, Jun Xu, Leqi Zhu

01-12-2023 | Original Article

Inventive deep convolutional neural network classifier for emotion identification in accordance with EEG signals

Emotion identification is the current research concept as it obtains a significant role in interpersonal relationships and health care services. The electroencephalogram (EEG) is currently utilized in emotion identification as it captures the …

Authors:
Research Scholar Jitendra Khubani, Professor Shirish Kulkarni

01-12-2023 | Original Article

Spectral approach to localize information spread in a network using Rao’s metaheuristic variants

Understanding different aspects of information spread have been a crucial direction of research in information and social sciences. Recent studies are found to be focused on accelerating and controlling the spread of information. One such study is …

Author:
Debasis Mohapatra

Open Access 01-12-2023 | Research

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive approach is proposed in this assessment to deal with the problem of identifying new, complicated threats and the appropriate countermeasures. In …

Authors:
Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, Bijeta Seth, Deema Mohammed alsekait, Sarita Simaiya, Mounir Hamdi, Kaamran Raahemifar

01-12-2023 | Original Article

Policy analysis and data mining tools for controlling COVID-19 policies

Much research has been done on the efficacy of vaccines against the COVID-19 pandemic, but the claims have not yet been realized in the real world. This paper proposes three COVID-19 policy outcome analysis tools such as jpscore for scoring and …

Author:
Yoshiyasu Takefuji

Open Access 01-12-2023 | Research

OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure

Network Intrusion Detection Systems (NIDS) and firewalls are the de facto solutions in the modern cloud to detect cyberattacks and minimize potential hazards for tenant networks. Most of the existing firewalls, perimeter security, and middlebox …

Authors:
Prabhakar Krishnan, Kurunandan Jain, Amjad Aldweesh, P. Prabu, Rajkumar Buyya

01-12-2023 | Original Article

Machine learning-based new approach to films review

The main purpose of Sentiment Analysis (SA) is to derive useful insights from large amounts of unstructured data compiled from various sources. This analysis helps to interpret and classify textual data using different techniques applied in …

Authors:
Mustafa Abdalrassual Jassim, Dhafar Hamed Abd, Mohamed Nazih Omri

Open Access 01-12-2023 | Regular article

Temporal network analysis using zigzag persistence

This work presents a framework for studying temporal networks using zigzag persistence, a tool from the field of Topological Data Analysis (TDA). The resulting approach is general and applicable to a wide variety of time-varying graphs. For …

Authors:
Audun Myers, David Muñoz, Firas A Khasawneh, Elizabeth Munch

Open Access 01-12-2023 | Research

DU-Net-Cloud: a smart cloud-edge application with an attention mechanism and U-Net for remote sensing images and processing

In recent ages, the use of deep learning approaches to extract ground object information from remote sensing high-resolution images has attracted extensive attention in many fields. Nevertheless, due to the high similarity of features between …

Authors:
Jiayuan Kong, Yanjun Zhang

Open Access 01-12-2023 | Original article

Assessing the macroeconomic and social impacts of slow steaming in shipping: a literature review on small island developing states and least developed countries

The International Maritime Organisation (IMO) has adopted the Energy Efficiency Existing Ship Index (EEXI) and the Carbon Intensity Indicator (CII) as short term measures for decarbonisation of the shipping industry; the IMO also made the …

Authors:
Seyedvahid Vakili, Fabio Ballini, Alessandro Schönborn, Anastasia Christodoulou, Dimitrios Dalaklis, Aykut I. Ölçer

Open Access 01-12-2023 | Research

A deep learning-based model using hybrid feature extraction approach for consumer sentiment analysis

There is an exponential growth in textual content generation every day in today's world. In-app messaging such as Telegram and WhatsApp, social media websites such as Instagram and Facebook, e-commerce websites like Amazon, Google searches, news …

Authors:
Gagandeep Kaur, Amit Sharma

Open Access 01-12-2023 | Research

Examining the importance of existing relationships for co-offending: a temporal network analysis in Bogotá, Colombia (2005–2018)

This study aims to improve our understanding of criminal accomplice selection by studying the evolution of co-offending networks—i.e., networks that connect those who commit crimes together. To this end, we tested four growth mechanisms …

Authors:
Alberto Nieto, Toby Davies, Hervé Borrion

Open Access 01-12-2023 | Research

Artifact-free fat-water separation in Dixon MRI using deep learning

Chemical-shift encoded MRI (CSE-MRI) is a widely used technique for the study of body composition and metabolic disorders, where derived fat and water signals enable the quantification of adipose tissue and muscle. The UK Biobank is acquiring …

Authors:
Nicolas Basty, Marjola Thanaj, Madeleine Cule, Elena P. Sorokin, Yi Liu, E. Louise Thomas, Jimmy D. Bell, Brandon Whitcher

Open Access 01-12-2023 | Research

Artificial intelligence models for prediction of monthly rainfall without climatic data for meteorological stations in Ethiopia

Global climate change is affecting water resources and other aspects of life in many countries. Rainfall is the most significant climate element affecting the livelihood and well-being of the majority of Ethiopians. Rainfall variability has a …

Authors:
Wondmagegn Taye Abebe, Demeke Endalie

01-12-2023 | Original Article

Machine learning-based telemedicine framework to prioritize remote patients with multi-chronic diseases for emergency healthcare services

The remarkable increase in the number of patients poses challenges to healthcare providers in telemedicine systems, and certain challenges are associated with the difficulties of identifying the most urgent emergencies to save lives. Remote …

Authors:
Sara Yahya Kadum, Omar Hussein Salman, Zahraa K. Taha, Amal Bati Said, Musab A. M. Ali, Qais Saif Qassim, Mohammed Imad Aal-Nouman, Duraid Y. Mohammed, Baraa M. Al baker, Zahraa A. Abdalkareem

01-12-2023 | Original Article

Intelligent lead-based bidirectional long short term memory for COVID-19 sentiment analysis

Social media is an online platform with millions of users and is utilized to spread news, information, world events, discuss ideas, etc. During the COVID-19 pandemic, information and ideas are shared by users both officially and by citizens. Here …

Authors:
Santoshi Kumari, T. P. Pushphavathi

Open Access 01-12-2023 | Research

A combined synchronization index for evaluating collective action social media

Social media has provided a citizen voice, giving rise to grassroots collective action, where users deploy a concerted effort to disseminate online narratives and even carry out offline protests. Sometimes these collective action are aided by …

Authors:
Lynnette Hui Xian Ng, Kathleen M. Carley

01-12-2023 | Original Article

A spectral method to detect community structure based on Coulomb’s matrix

Community detection based on spectral clustering has been proved effective. However, spectral clustering is more challenging due to two significant issues: the construction of a good similarity matrix and the automatic detection of the number of …

Authors:
Brahim Laassem, Ali Idarrou, Loubna Boujlaleb, M’bark Iggane

Open Access 01-12-2023 | Original Article

Where do migrants and natives belong in a community: a Twitter case study and privacy risk analysis

Today, many users are actively using Twitter to express their opinions and to share information. Thanks to the availability of the data, researchers have studied behaviours and social networks of these users. International migration studies have …

Authors:
Jisu Kim, Francesca Pratesi, Giulio Rossetti, Alina Sîrbu, Fosca Giannotti

Open Access 01-12-2023 | Research

A methodology framework for bipartite network modeling

The graph-theoretic based studies employing bipartite network approach mostly focus on surveying the statistical properties of the structure and behavior of the network systems under the domain of complex network analysis. They aim to provide the …

Authors:
Chin Ying Liew, Jane Labadin, Woon Chee Kok, Monday Okpoto Eze

Open Access 01-12-2023 | Research

Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network

Wireless sensor networks (WSNs) are increasingly being used for data monitoring and collection purposes. Typically, they consist of a large number of sensor nodes that are used remotely to collect data about the activities and conditions of a …

Authors:
Salim Salmi, Lahcen Oughdir

Open Access 01-12-2023 | Regular article

Sustainability of Stack Exchange Q&A communities: the role of trust

Knowledge-sharing communities are fundamental elements of a knowledge-based society. Understanding how different factors influence their sustainability is of crucial importance. We explore the role of the social network structure and social trust …

Authors:
Ana Vranić, Aleksandar Tomašević, Aleksandra Alorić, Marija Mitrović Dankulov

Open Access 01-12-2023 | Original Article

Micro-Sized Pinhole Inspection with Segmented Time Reversal and High-Order Modes Cluster Lamb Waves Based on EMATs

Pinhole corrosion is difficult to discover through conventional ultrasonic guided waves inspection, particularly for micro-sized pinholes less than 1 mm in diameter. This study proposes a new micro-sized pinhole inspection method based on …

Authors:
Jinjie Zhou, Yang Hu, Xiang Li, Yang Zheng, Sanhu Yang, Yao Liu

Open Access 01-12-2023 | Research

Improved wild horse optimization with levy flight algorithm for effective task scheduling in cloud computing

Cloud Computing, the efficiency of task scheduling is proportional to the effectiveness of users. The improved scheduling efficiency algorithm (also known as the improved Wild Horse Optimization, or IWHO) is proposed to address the problems of …

Authors:
G. Saravanan, S. Neelakandan, P. Ezhumalai, Sudhanshu Maurya

Open Access 01-12-2023 | Research

Podcasts’ effects on the EFL classroom: a socially relevant intervention

ICT tools have gained particular importance in the English as a foreign language classroom in order to promote students’ interaction, exchange of opinions, negotiation of meaning, or digital competence. Technological development and the impact of …

Authors:
Beatriz Chaves-Yuste, Cristina de-la Peña

Open Access 01-12-2023 | Research

Network intrusion detection using data dimensions reduction techniques

Due to the increasing growth of the Internet and its widespread application, the number of attacks on the network has also increased. Therefore, maintaining network security and using intrusion detection systems is of critical importance. The …

Authors:
Anita Shiravani, Mohammad Hadi Sadreddini, Hassan Nosrati Nahook

Open Access 01-12-2023 | Research

A fine-grained task scheduling mechanism for digital economy services based on intelligent edge and cloud computing

Digital economy is regarded countries as an inevitable choice to promote economic growth and provides new opportunities and new paths for the high-quality development of economy. For the Chinese market, the strong base behind cloud computing is …

Author:
Xiaoming Zhang

Open Access 01-12-2023 | Research

A lightweight convolutional neural network based on dense connection for open-pit coal mine service identification using the edge-cloud architecture

Remote sensing is an important technical tool for rapid detection of illegal mining behavior. Due to the complex features of open-pit coal mines, there are few studies about automatic extraction of open-pit coal mines. Based on Convolutional …

Authors:
Yang Liu, Jin Zhang

Open Access 01-12-2023 | Research

Enhancing correlated big data privacy using differential privacy and machine learning

Data are often correlated in real-world datasets. Existing data privacy algorithms did not consider data correlation an inherent property of datasets. This data correlation caused privacy leakages that most researchers left unnoticed. Such privacy …

Authors:
Sreemoyee Biswas, Anuja Fole, Nilay Khare, Pragati Agrawal

Open Access 01-12-2023 | Research

FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings

With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Building Information Modeling) makes full …

Authors:
Min Yang, Chengmin Ge, Xiaoran Zhao, Huaizhen Kou

Open Access 01-12-2023 | Original Article

Investigation of the Laser Powder Bed Fusion Process of Ti-6.5Al-3.5Mo-1.5Zr-0.3Si Alloy

Laser powder bed fusion (LPBF) is an advanced manufacturing technology; however, inappropriate LPBF process parameters may cause printing defects in materials. In the present work, the LPBF process of Ti-6.5Al-3.5Mo-1.5Zr-0.3Si alloy was …

Authors:
Changchun Zhang, Tingting Liu, Wenhe Liao, Huiliang Wei, Ling Zhang

Open Access 01-12-2023 | Research

Cost-based hierarchy genetic algorithm for service scheduling in robot cloud platform

Service robot cloud platform is effective method to improve the intelligence of robots. An efficient cloud service scheduling algorithm is the basis of ensuring service quality and platform concurrency. In this paper, Hierarchy Genetic Algorithm …

Authors:
Lei Yin, Jin Liu, Fengyu Zhou, Ming Gao, Ming Li

Open Access 01-12-2023 | Research

RTiSR: a review-driven time interval-aware sequential recommendation method

The emerging topic of sequential recommender (SR) has attracted increasing attention in recent years, which focuses on understanding and learning the sequential dependencies of user behaviors hidden in the user-item interactions. Previous methods …

Authors:
Xiaoyu Shi, Quanliang Liu, Yanan Bai, Mingsheng Shang

Open Access 01-12-2023 | Research

A reinforcement learning-based sleep scheduling algorithm for compressive data gathering in wireless sensor networks

Compressive data gathering (CDG) is an adequate method to reduce the amount of data transmission, thereby decreasing energy expenditure for wireless sensor networks (WSNs). Sleep scheduling integrated with CDG can further promote energy …

Authors:
Xun Wang, Hongbin Chen, Shichao Li

Open Access 01-12-2023 | Regular article

Temporal patterns of reciprocity in communication networks

Human communication, the essence of collective social phenomena ranging from small-scale organizations to worldwide online platforms, features intense reciprocal interactions between members in order to achieve stability, cohesion, and cooperation …

Authors:
Sandeep Chowdhary, Elsa Andres, Adriana Manna, Luka Blagojević, Leonardo Di Gaetano, Gerardo Iñiguez

Open Access 01-12-2023 | Research

Cloud-edge data encryption in the internet of vehicles using Zeckendorf representation

Cloud-edge data security is a key issue in the internet of vehicles (IoV), as the potential for data breaches increases as more vehicles are connected. As vehicles become smarter and more connected, the risk of unauthorized access to the data …

Authors:
Yun Wu, Liangshun Wu, Hengjin Cai

Open Access 01-12-2023 | Research

Securing medical image privacy in cloud using deep learning network

The worldwide usage of Internet of Things (IoT) applications enhanced the utilization of consumer devices, such as smartphones, computers, screening equipment used in hospitals that merely rely on imaging techniques. Numerous images got generated …

Authors:
Gayathri S, Gowri S

01-10-2023 | Research Article

Classification-oriented dawid skene model for transferring intelligence from crowds to machines

When a crowdsourcing approach is used to assist the classification of a set of items, the main objective is to classify this set of items by aggregating the worker-provided labels. A secondary objective is to assess the workers’ skill levels in …

Authors:
Jiaran Li, Richong Zhang, Samuel Mensah, Wenyi Qin, Chunming Hu

01-10-2023 | Research Article

Certificateless network coding proxy signatures from lattice

Network coding can improve the information transmission efficiency and reduces the network resource consumption, so it is a very good platform for information transmission. Certificateless proxy signatures are widely applied in information …

Authors:
Huifang Yu, Ning Wang

01-10-2023 | Research Article

SEOT: Secure dynamic searchable encryption with outsourced ownership transfer

When one enterprise acquires another, the electronic data of the acquired enterprise will be transferred to the acquiring enterprise. In particular, if the data system of acquired enterprise contains a searchable encryption mechanism, the …

Authors:
Jianwei Li, Xiaoming Wang, Qingqing Gan

01-10-2023 | Research Article

Three-dimensional quantum wavelet transforms

Wavelet transform is being widely used in the field of information processing. One-dimension and two-dimension quantum wavelet transforms have been investigated as important tool algorithms. However, three-dimensional quantum wavelet transforms …

Authors:
Haisheng Li, Guiqiong Li, Haiying Xia

01-10-2023 | Research Article

DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services

Since smartphones embedded with positioning systems and digital maps are widely used, location-based services (LBSs) are rapidly growing in popularity and providing unprecedented convenience in people’s daily lives; however, they also cause great …

Authors:
Long Li, Jianbo Huang, Liang Chang, Jian Weng, Jia Chen, Jingjing Li

01-08-2023 | Research Article

Differential privacy histogram publishing method based on dynamic sliding window

Differential privacy has recently become a widely recognized strict privacy protection model of data release. Differential privacy histogram publishing can directly show the statistical data distribution under the premise of ensuring user privacy …

Authors:
Qian Chen, Zhiwei Ni, Xuhui Zhu, Pingfan Xia

01-08-2023 | Research Article

An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities

Innovations on the Internet of Everything (IoE) enabled systems are driving a change in the settings where we interact in smart units, recognized globally as smart city environments. However, intelligent video-surveillance systems are critical to …

Authors:
Muazzam Maqsood, Sadaf Yasmin, Saira Gillani, Maryam Bukhari, Seungmin Rho, Sang-Soo Yeo

01-06-2023

Online Markov decision processes with non-oblivious strategic adversary

We study a novel setting in Online Markov Decision Processes (OMDPs) where the loss function is chosen by a non-oblivious strategic adversary who follows a no-external regret algorithm. In this setting, we first demonstrate that MDP-Expert, an …

Authors:
Le Cong Dinh, David Henry Mguni, Long Tran-Thanh, Jun Wang, Yaodong Yang

01-06-2023 | Research Article

Vehicle color recognition based on smooth modulation neural network with multi-scale feature fusion

Vehicle Color Recognition (VCR) plays a vital role in intelligent traffic management and criminal investigation assistance. However, the existing vehicle color datasets only cover 13 classes, which can not meet the current actual demand. Besides …

Authors:
Mingdi Hu, Long Bai, Jiulun Fan, Sirui Zhao, Enhong Chen

01-06-2023 | Research Article

Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform

A new meaningful image encryption algorithm based on compressive sensing (CS) and integer wavelet transformation (IWT) is proposed in this study. First of all, the initial values of chaotic system are encrypted by RSA algorithm, and then they are …

Authors:
Xiaoling Huang, Youxia Dong, Guodong Ye, Yang Shi

01-06-2023 | Research Article

Multi-dimensional information-driven many-objective software remodularization approach

Most of the search-based software remodularization (SBSR) approaches designed to address the software remodularization problem (SRP) areutilizing only structural information-based coupling and cohesion quality criteria. However, in practice apart …

Authors:
Amarjeet Prajapati, Anshu Parashar, Amit Rathee

01-06-2023 | Research Article

Forecasting technical debt evolution in software systems: an empirical study

Technical debt is considered detrimental to the long-term success of software development, but despite the numerous studies in the literature, there are still many aspects that need to be investigated for a better understanding of it. In …

Authors:
Lerina Aversano, Mario Luca Bernardi, Marta Cimitile, Martina Iammarino, Debora Montano

01-06-2023

Semi-supervised and unsupervised anomaly detection by mining numerical workflow relations from system logs

Large-scale software-intensive systems often generate logs for troubleshooting purpose. The system logs are semi-structured text messages that record the internal status of a system at runtime. In this paper, we propose ADR (Anomaly Detection by …

Authors:
Bo Zhang, Hongyu Zhang, Van-Hoang Le, Pablo Moscato, Aozhong Zhang

01-06-2023

Unavoidable deadends in deterministic partially observable contingent planning

Traditionally, a contingent plan, branching on the observations an agent obtains throughout plan execution, must reach a goal state from every possible initial state. However, in many real world problems, no such plan exists. Yet, there are plans …

Authors:
Lera Shtutland, Dorin Shmaryahu, Ronen I. Brafman, Guy Shani

01-06-2023 | Regular Paper

End-to-end residual learning-based deep neural network model deployment for human activity recognition

Human activity recognition is a theme commonly explored in computer vision. Its applications in various domains include monitoring systems, video processing, robotics, and healthcare sector, etc. Activity recognition is a difficult task since …

Authors:
Alok Negi, Krishan Kumar

01-06-2023 | Original Paper

(Some) algorithmic bias as institutional bias

In this paper I argue that some examples of what we label ‘algorithmic bias’ would be better understood as cases of institutional bias. Even when individual algorithms appear unobjectionable, they may produce biased outcomes given the way that …

Author:
Camila Hernandez Flowerman

Open Access 01-05-2023

Madusa: mobile application demo generation based on usage scenarios

Mobile applications have grown rapidly in size. This dramatic increases in size and complexity make mobile applications less accessible to a broader scope of users. The prevailing approach for better accessibility of mobile applications is to …

Authors:
Jaehyung Lee, Hangyeol Cho, Woosuk Lee

01-05-2023

Detecting distributed denial of service (DDoS) in SD-IoT environment with enhanced firefly algorithm and convolution neural network

The Internet of Things (IoT) devices have become part of today’s human life and the amplified use of smart phones as well as number of IoT devices in everyday life has made network security more important. These IoT devices are less secure and …

Authors:
N. Sivanesan, K. S. Archana

01-05-2023

Terahertz Plasmonic Sensor based on bulk Dirac Semimetals

A terahertz plasmonic sensor based on parallel bulk Dirac semimetals (BDSs) is proposed and numerically investigated in this paper. The physical origin of the sensor is induced by the electromagnetically induced reflectance (EIR)-like effect …

Authors:
Huawei Zhuang, Wei Ding, Honghao Tan, Changbin Tian, Fanmin Kong

01-05-2023

Numerical Computation of Partial Differential Equations by Hidden-Layer Concatenated Extreme Learning Machine

Extreme learning machine (ELM) is a type of randomized neural networks originally developed for linear classification and regression problems in the mid-2000s, and has recently been extended to computational partial differential equations (PDE).

Authors:
Naxian Ni, Suchuan Dong

01-05-2023

Proximal Quasi-Newton Method for Composite Optimization over the Stiefel Manifold

In this paper, we consider the composite optimization problems over the Stiefel manifold. A successful method to solve this class of problems is the proximal gradient method proposed by Chen et al. (SIAM J Optim 30:210–239, 2020.

Authors:
Qinsi Wang, Wei Hong Yang

01-05-2023

Quasi Non-Negative Quaternion Matrix Factorization with Application to Color Face Recognition

To address the non-negativity dropout problem of quaternion models, a novel quasi non-negative quaternion matrix factorization (QNQMF) model is presented for color image processing. To implement QNQMF, the quaternion projected gradient algorithm …

Authors:
Yifen Ke, Changfeng Ma, Zhigang Jia, Yajun Xie, Riwei Liao

01-04-2023

Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning

A successful DDoS attack disables systems and causes huge economic losses, which is every company’s worst fear. The goal of IT security is to avoid this worst-case situation. Anomaly detection is one of the most imperative currently. However …

Authors:
Yufan Feng, Changda Wang

01-04-2023

Corrector-Predictor Interior-Point Method With New Search Direction for Semidefinite Optimization

In this paper, we present a new corrector-predictor interior-point method for solving semidefinite optimization. We use an algebraic equivalent transformation of the centering equation of the system which defines the central path. The algebraic …

Author:
B. Kheirfam

Open Access 01-04-2023

Polarization independent silicon on calcium fluoride-based MIR optical modulator

Efficient mid-infrared (MIR) optical modulator is reported and numerically analyzed for both the transverse electric (TE) and transverse magnetic (TM) polarized modes. The proposed design is based on the silicon-on-calcium-fluoride platform with …

Authors:
Ahmed El-Sayed Abd-Elkader, B. M. Younis, Mohamed Farhat O. Hameed, Salah S. A. Obayya

01-04-2023 | Research

A novel technique for secure transmission of two channels using a single optical pulse position modulated signal for free space optical communication

We propose a novel all-optical technique for the transmission of multiple channels over a single optical carrier by employing pulse position modulation (PPM). The proposed technique partly solves the issue of low spectral efficiency associated …

Authors:
Salman Ghafoor, Abdulah Jeza Aljohani, Jawad Mirza, Awais Khan, Shahid Bashir

01-04-2023 | Cover Story

PEM Fuel Cell Application - From Component to System

Hydrogen will play an essential role for the sustainable mobility of the future. Fuel cells complement pure battery-electric mobility in cases where heavy vehicles need to travel long distances. The attractiveness of this sustainable form of …

Authors:
Mathias Reum, Benjamin Daniel

01-04-2023

An Efficient Adaptive Meta Learning Model Based VNFs Affinity for Resource Prediction Optimization in Virtualized Networks

In today’s cloud environments, diverse and massive data is growing exponentially. This requires efficient prediction mechanisms to support automatic resource allocation and management. These mechanisms enable anticipating resource consumption …

Authors:
Asma Bellili, Nadjia Kara

01-04-2023

Truncated and Sparse Power Methods with Partially Updating for Large and Sparse Higher-Order PageRank Problems

Higher-order Markov chain plays an important role in analyzing a variety of stochastic processes over time in multi-dimensional spaces. One of the important applications is the study of higher-order PageRank problem. The truncated power method …

Authors:
Jun Huang, Gang Wu

Open Access 01-04-2023

Exploring occupational aspirations of school-age children by fluid intelligence, gender and grade

The present study explored the occupational aspirations of school-age children (N = 394) comparing differences by gender, level of intelligence and grade level. Results indicated that girls’ aspirations were more realistic, intrinsically …

Author:
Łukasz Nikel

01-04-2023

Effects of Impact Location, Impact Angle and Impact Speed on Head Injury Risk of Vietnamese Pedestrian Hit by a Sedan

This paper employed finite-element simulation together with a human body model (HBM) — THUMS to study the head injury risk of a pedestrian involved in a frontal impact with a sedan car. While previous studies have gained an intensive understanding …

Authors:
Ly Hung Anh, Phu Thuong Luu Nguyen, Ngo Anh Vu

Open Access 01-04-2023 | Original Article

A systemic framework of energy efficiency in schools: experiences from six European countries

Schools are complex physical and social institutions within national education systems. They account for significant energy consumption and like other buildings can demonstrate inefficient patterns of energy use. Poor energy performance of …

Authors:
Dmitry Brychkov, Gary Goggins, Edelle Doherty, Natalia Romero, Nadine Roudil, Antonella Di Trani, Abhigyan Singh, Sander Smit, Eilish McLoughlin, Raquel de Castro Rodrigues Lima, Suzan Marie Günbay, Branca Arthur Delmonte, Achim Hill, Christine Domegan, Eoghan Clifford

01-04-2023 | Original Article

Microstructural characterization of lime modified bagasse ash blended expansive clays using digital image analysis

In the field practice, industrial wastes are recommended for use in construction to achieve both environmental and economic benefits. A novel technique of supplementing lime to the black cotton soil stabilized with bagasse ash is adopted to …

Authors:
Polapala Sai Pradeep, Muthukumar Mayakrishnan

Open Access 01-04-2023 | Research Article

Practical aspects of designing background-oriented schlieren (BOS) experiments for vortex measurements

Setup-related aspects of background-oriented schlieren (BOS) experiments are discussed focusing on a sensitivity parameter S, which represents the relation between light deflection and resulting BOS signal, and the geometric blur. An analytic …

Authors:
Clemens Schwarz, Johannes N. Braukmann

Open Access 01-04-2023 | Research Article

Vortex ring state of a shrouded rotor: an experimental survey

Shrouded rotors have been extensively used in the rotorcraft industry, for example, in compound helicopters for auxiliary propulsion, hovercraft, helicopter tail rotors (Mouille 1970 ; Vuillet and Morelli 1986 ), fan in wing aircraft and vertical …

Authors:
David J. Pickles, Daniele Zagaglia, Angela Busse, Richard B. Green

01-04-2023 | Research Article

Characterization of a high-pressure flame facility using high-speed chemiluminescence and OH LIF imaging

The combustor and turbine inlet pressures of modern aviation and power-generation gas turbine engines can vary between 30 and 50 bar. Innovative diagnostic methods are needed to understand the complex thermo-physical processes taking place under …

Authors:
Will Swain, Yejun Wang, Pradeep Parajuli, Matthew Hay, Ahmad Saylam, Thomas Dreier, Christof Schulz, Waruna Kulatilaka

01-04-2023 | Original Paper

Structural characteristics of landslide failure boundaries using three-dimensional point clouds: a case study of the Zhaobiyan landslide, China

Rock landslide failure boundaries contain large amounts of rock mass structure information, providing many details that help researchers understand the causes of landslide failure. Taking the Zhaobiyan (ZBY) landslide triggered by the 2008 MS 8.0 …

Authors:
Shenghua Cui, Yufei Liang, Xiangjun Pei, Luguang Luo, Qingwen Yang, Ling Zhu

Open Access 01-04-2023 | Original Article

Investigating pathways to a net-zero emissions building sector in the European Union: what role for the energy efficiency first principle?

European Union (EU) legislation is increasingly embracing the energy efficiency first (EE1st) principle. This principle seeks to prioritise energy efficiency measures whenever these involve lower costs to society than generators, networks and …

Authors:
Tim Mandel, Lukas Kranzl, Eftim Popovski, Frank Sensfuß, Andreas Müller, Wolfgang Eichhammer

01-04-2023 | Original Paper

Experimental study on pressure stimulated current response characteristics during damage evolution of water-bearing coal samples

The damage and rupture behavior of water-bearing coal induced by coal mining disturbance can lead to large-scale rock engineering instability and engineering geological disasters. In order to study the influence of water on the pressure stimulated …

Authors:
Tiancheng Shan, Zhonghui Li, Xin Zhang, Xin Zhou, Chao Cai, He Tian, Zeng Ding, Quancong Zhang, Zesheng Zang, Muhammad Ali

Open Access 01-04-2023 | Research Article

Time-resolved determination of velocity fields on the example of a simple water channel flow, using a real-time capable FPGA-based camera platform

Field Programmable Gate Arrays (FPGAs) have become a widely available computational resource for real-time image processing and can be used in time-critical optical process measurements. In this study, we investigate the applicability of the …

Authors:
Tino Steinmetz, Martin Schaeper, André Kleinwächter, Jonas Otto, Andreas Richter, Ralf Poosch, Nils Damaschke

21-03-2023 | Special Section Paper

Synthesizing verified components for cyber assured systems engineering

Safety-critical systems such as avionics need to be engineered to be cyber resilient meaning that systems are able to detect and recover from attacks or safely shutdown. As there are few development tools for cyber resiliency, designers rely on …

Authors:
Eric Mercer, Konrad Slind, Isaac Amundson, Darren Cofer, Junaid Babar, David Hardin

21-03-2023 | Research Article

Potential application of a novel building-integrated solar facade water heating system in a subtropical climate: A case study for school canteen

The design and potential application analysis of the novel solar-absorbing integrated facade module and its corresponding building-integrated solar facade water heating system are presented in this study. Compared with the conventional building …

Authors:
Wenjie Liu, Xinwen Liu, Chongchao Pan, Chunying Li, Woonming Lau, Yuanli Lyu

21-03-2023 | Original Paper

Improving Tilted Foundations Over Soft Clay Using Micropiles: Numerical Analysis

Micropiles can be a suitable option for tilted foundations of inclined buildings standing on soft clay, where other options, such as soil injection, are either unavailable or considered to be inappropriate. In the past, the design parameters of …

Authors:
Walid El Kamash, Hany El Naggar

21-03-2023

Construction of node- and link-fault-tolerant virtual backbones in wireless networks

In wireless sensor networks (WSNs), the virtual backbone (VB) consists of a subset of nodes, which are responsible for routing tasks. Fault-tolerant VBs are desirable for overcoming the effects of node or link failure in WSNs. Usually, a …

Authors:
Jiarong Liang, Weijian Zeng, Xiaojiang Du

21-03-2023 | PHYSICOCHEMICAL MEASUREMENTS

Phase-Spectral Ellipsometry Method for Nondestructive Control of the Chemical Composition of thin Metal-Oxide Heterostructures

The problem of insufficient accuracy, informativeness and efficiency of recognition of the structure and composition of inhomogeneous surface layers of thin metal-oxide heterostructures during nondestructive testing by spectral optical methods is …

Authors:
D. N. Tyurin, V. A. Kotenev

Open Access 21-03-2023 | Regular Paper

BPF: a novel cluster boundary points detection method for static and streaming data

Data points situated near a cluster boundary are called boundary points and they can represent useful information about the process generating this data. The existing methods of boundary points detection cannot differentiate boundary points from …

Authors:
Vijdan Khalique, Hiroyuki Kitagawa, Toshiyuki Amagasa

21-03-2023 | Original Paper

Combined heat and power economic dispatch problem with binary method using flower pollination algorithm and differential evolution

Nowadays, the need for electrical energy became crucial in the world. The co-generation plants, which simultaneously produce electrical and heat energies, are one of the alternative solutions to supply people and industry with both energies. The …

Authors:
Mohamed Arezki Mellal, Marwa Khitous, Meriem Zemmouri

20-03-2023 | Optimization

A solution method to maximal covering location problem based on chemical reaction optimization (CRO) algorithm

The maximal covering location problem refers to the problem of finding an optimal placement of given number of facilities to a network. The objective is to maximize the total demands of the covered population within some constraints. Several …

Authors:
Md. Shymon Islam, Md. Rafiqul Islam

20-03-2023 | Research

ABCD_Harmonizer: An Open-source Tool for Mapping and Controlling for Scanner Induced Variance in the Adolescent Brain Cognitive Development Study

Data from multisite magnetic resonance imaging (MRI) studies contain variance attributable to the scanner that can reduce statistical power and potentially bias results if not appropriately managed. The Adolescent Cognitive Brain Development …

Authors:
Jonathan A. Dudley, Thomas C. Maloney, John O. Simon, Gowtham Atluri, Sarah L. Karalunas, Mekibib Altaye, Jeffery N. Epstein, Leanne Tamm

Open Access 20-03-2023 | Originalarbeiten/Originals

Effect of generator torque ripple optimization on a geared wind turbine drivetrain

In this paper, the load effect of torque ripple reduction of a wind turbine generator is analyzed on the high-speed shaft gear stage and high-speed shaft bearings, which are the nearest components to the generator. Two generator designs with …

Authors:
Diederik van Binsbergen, Mostafa Valavi, Amir R. Nejad, Jan Helsen

20-03-2023 | Originalarbeiten/Originals

Fleet-wide analytics on field data targeting condition and lifetime aspects of wind turbine drivetrains

Drivetrain failures result in the largest downtime per failure among the different turbine components. To minimize O&M costs, it is therefore essential to be able to anticipate failure events sufficiently in advance such that scheduled maintenance …

Authors:
Pieter-Jan Daems, Cédric Peeters, Jens Matthys, Timothy Verstraeten, Jan Helsen

20-03-2023

Ship detection with deep learning: a survey

Ship detection plays a pivotal role in efficient marine monitoring, port management, and safe navigation. However, the development of ship detection techniques is vastly behind other detection techniques, such as face detection, pedestrian …

Authors:
Meng Joo Er, Yani Zhang, Jie Chen, Wenxiao Gao

20-03-2023 | Regular contribution

Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer

Understanding the business logic of the application helps to detect the race conditions in web applications. There is no logic-aware approach for detecting race conditions. Current solutions can detect only a few race conditions or they have false …

Authors:
Mitra Alidoosti, Alireza Nowroozi, Ahmad Nickabadi

Open Access 20-03-2023 | Original Research

Auctions of failed banks: an analysis of losing bidders

Between 2007 and 2013, the Federal Deposit Insurance Corporation (FDIC) used purchase and assumption (P&A) as a resolution method to auction 492 failed institutions to healthy banks. While existing studies reveal positive value effects on winning …

Author:
Tim M. Zhou

20-03-2023

Cross Domain Heterogeneous Signcryption Scheme with Equality Test for WBAN

The rapid development of wireless sensors has accelerated the popularity of wireless body area network (WBAN). WBAN use multiple sensors to collect the patient’s body data, and the data is transferred to the medical cloud for processing and …

Authors:
Ming Luo, Yusi Pei, Minrong Qiu

20-03-2023

A Localized Feature Description Means Assisting Diabetic Macular Edema Detection and Classification

Heretofore schemes highly rely on complex feature characterization modules assisting the detection and classification of Diabetic Macular Edema (DME). DME encompasses intrinsic local variations that need to be analyzed for treatment. Accordingly …

Authors:
K. R. Remya, M. N. Giriprasad, M. S. Sudhakar

20-03-2023

The Effectiveness of Using an Internet App for Repair Work Requests: A Case Study of a Hospital

Developing a management process suitable for medical industry apps may facilitate a rapid response to internal maintenance demand changes and make the operational model run smoother and more conveniently for the management of small organizations …

Authors:
Ping-Liang Chen, Hsin-Mei Lin, Hung-Chih Lai

20-03-2023

Mobility Aware-Task Scheduling and Virtual Fog for Offloading in IoT-Fog-Cloud Environment

The Internet of Things (IoT) is an emerging technology that provides services to any smart device at any place. Due to the large volume of data and dynamicity, the IoT environment faces challenges in terms of overloading and energy consumption. To …

Authors:
Khaled M. Matrouk, Amer D. Matrouk

20-03-2023 | Original Article

New unified score functions and similarity measures for non-standard fuzzy numbers: an extended TOPSIS method addressing risk attitudes

In this study, we propose a new form of score function for both intuitionistic and picture fuzzy sets, which we term the weighted average membership function. By inserting both refusal and neutrality degrees for picture fuzzy sets, we extend the …

Authors:
Hande Günay Akdemir, Hale Gonce Kocken

20-03-2023

A Novel Hybrid Grasshopper Optimization Algorithm for Numerical and Engineering Optimization Problems

When solving practical optimization problems by metaheuristic algorithms (MAs), an important issue is how to balance exploration and exploitation. This article develops a novel hybrid grasshopper optimization algorithm (HGOA) to solve the above …

Authors:
Lingyun Deng, Sanyang Liu

20-03-2023

Comparative analysis of deep-learning-based models for hourly bus passenger flow forecasting

An efficient transportation system is conducive to maintaining traffic flow and safety. Passenger flow forecasting (PFF), an area of traffic forecasting, is a key part of the efficient transportation system. In recent years, deep-learning-based …

Authors:
Yu Zhang, Xiaodan Wang, Jingjing Xie, Yun Bai

19-03-2023

Model-based and model-free deep features fusion for high performed human gait recognition

In the last decade, the need for a non-contact biometric model for recognizing candidates has increased, especially after the pandemic of COVID-19 appeared and spread worldwide. This paper presents a novel deep convolutional neural network (CNN) …

Authors:
Reem N. Yousef, Abeer T. Khalil, Ahmed S. Samra, Mohamed Maher Ata

18-03-2023 | Research Paper

Beyond Reconstruction: What Leads to Satisfaction in Post-Disaster Recovery?

Many studies have shown that economic and political freedom better predict overall satisfaction than income or material consumption. However, in the context of post-disaster reconstruction, whether freedom of choice in reconstruction is a better …

Authors:
Ratna K. Shrestha, Raunak Shrestha, Sara Shneiderman, Jeevan Baniya

18-03-2023

Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm

Nowadays, supermarkets and retail stores all use software systems with databases to store customer transactions. Over time, the volume of data is also increasing and it contributes a lot of hidden value in this data warehouse, mining data from …

Authors:
Duy Thanh Tran, Jun-Ho Huh

18-03-2023

An agent-based simulation approach to investigate the shift of Switzerland’s inland freight transport from road to rail

Most of today’s inland freight transport in Switzerland is operated on the road system. In this study, an innovative agent-based simulation approach is developed to investigate the potential shift from road to rail. In a first step, future freight …

Authors:
Ihab Kaddoura, David Masson, Thomas Hettinger, Merlin Unterfinger

18-03-2023 | Research Article

Understanding the role of institutions in the multiple streams approach through the recognition of the diaspora as a development agent in Cameroon

This article examines the potential contribution of the diaspora to development in Cameroon. It illuminates the role of institutional dynamics within the Multiple Streams Approach (MSA). Drawing on the concept of problem compatibility, this …

Author:
Léger Félix Ntienjom Mbohou

18-03-2023 | ORIGINAL ARTICLE

Cloud-based 3D printing service allocation models for mass customization

Due to easy access, faster production, and on-demand printing, the applications of 3D printing are proliferating and reaching the mass customization level where individuals can print their self-design products. Many service providers emerge and …

Authors:
Kai Kang, Bing Qing Tan, Ray Y. Zhong

18-03-2023 | ORIGINAL PAPER

Electrochemical, structural and thermal studies of poly (ethyl methacrylate) (PEMA)-based ion conductor for electrochemical double-layer capacitor application

Solid polymer electrolyte based on poly (ethyl methacrylate) (PEMA) and lithium bis(trifluoromethanesulfonyl) imide (LiTFSI) was prepared for electrochemical double-layer capacitor (EDLC) application. Incorporation of 50 wt% LiTFSI elevated the …

Authors:
Siew Ching Yek, H. K. Jun, Chiam-Wen Liew

Open Access 18-03-2023 | Original Article

Matching method for mutated veneer sheet images using gray-level co-occurrence matrix features

This paper studies the tracking of wooden veneer sheets by matching their respective wet and dry colour images. The tracking of veneer sheets has proved to be a challenging task due to random mutations during processing in terms of color changes …

Author:
Jyrki Savolainen

18-03-2023

Similarity-Based Hybrid Algorithms for Link Prediction Problem in Social Networks

In this study, we propose two hybrid algorithms for link prediction problem in static networks that combine the benefits of both local and global scoring methods, with the objective of compensating the weaknesses of each approach using two …

Authors:
Hassen Mohamed Kerkache, Lamia Sadeg-Belkacem, Fatima Benbouzid-Si Tayeb

18-03-2023

Testing the effects of a TRIZ invention instruction program on creativity beliefs, creativity, and invention teaching self-efficacy

The purpose of this study was to develop an invention instruction program based on the Theory of Inventive Problem Solving (TRIZ) for preservice invention teachers and test the effects of the program on teachers’ creativity beliefs, creativity …

Author:
Su Jin Park

Open Access 18-03-2023 | Regular Contribution

Cyber range design framework for cyber security education and training

The need for effective training of cyber security personnel working in critical infrastructures and in the corporate has brought attention to the evolution of Cyber Ranges (CRs) as learning and training tools. Although CRs have been organized for …

Authors:
M. N. Katsantonis, A. Manikas, I. Mavridis, D. Gritzalis

18-03-2023 | Original Paper

Comprehensive energy and economic transient analysis of an off-grid hydrogen car-integrated zero energy building

In this study, for the first time, an off-grid zero-energy building with hydrogen energy storage integrated with two hydrogen cars is simulated and analyzed transiently. Regarding the novelties, for the first time, two types of wind turbines are …

Authors:
Sajad Maleki Dastjerdi, Milad Arzani

18-03-2023 | ORIGINAL ARTICLE

Estimation of the droplet detachment frequency using SSAS and PSD techniques in GMAW process under different transfer modes

This paper proposed a dynamic control of gas metal arc welding GMAW process to operate in a short-circuiting mode and free-flight modes (mixed, globular, and spray); the GMAW modeling was based on a nonlinear state-space model of five variables.

Authors:
Omar Fethi Benaouda, Mohamed Mezaache, Mohamed Bouchakour, Azzedine Bendiabdellah

18-03-2023 | Original Research

Defining priorities areas for biodiversity conservation and trading forest certificates in the Cerrado biome in Brazil

Habitat loss and natural vegetation fragmentation are significant causes of global biodiversity decline, impacting plant and animal species negatively. This issue is worrisome in the private areas of Cerrado in Brazil, which is the second-largest …

Authors:
Samuel Fernando Schwaida, Rejane Ennes Cicerelli, Tati de Almeida, Edson Eyji Sano, Carlos Henrique Pires, Ana Paula Marques Ramos

18-03-2023 | Original Paper

Where Relational Commons Take Place: The City and its Social Infrastructure as Sites of Commoning

Commons enjoy recognition as an alternative to the dichotomy of state and market. In contrast to liberal market theorists who frame the commons as resource-based, we build on alternative and critical conceptions that describe the commons as …

Authors:
Christof Brandtner, Gordon C. C. Douglas, Martin Kornberger

17-03-2023 | Original Paper

An Experimental Study of Water Saturation Effect on Chipping Efficiency of a Chisel Pick in Cutting Some Low- and Medium-Strength Rocks

Water saturation of rock plays an important role in chipping efficiency and productivity of mechanical excavators. In this study, small-scale linear rock-cutting experiments were performed with a chisel pick on five sandstones, four gypsums, and …

Authors:
Hadi Bejari, Jafar Khademi Hamidi

17-03-2023 | Regular contribution

TENET: a new hybrid network architecture for adversarial defense

Deep neural network (DNN) models are widely renowned for their resistance to random perturbations. However, researchers have found out that these models are indeed extremely vulnerable to deliberately crafted and seemingly imperceptible …

Authors:
Omer Faruk Tuna, Ferhat Ozgur Catak, M. Taner Eskil

17-03-2023 | Application of soft computing

A practical study of active disturbance rejection control for rotary flexible joint robot manipulator

This research presents a practical study of active disturbance rejection control law (ADRC) for the control of robotic manipulators in the presence of uncertainties. The control objective of the proposed control law is to track the trajectory …

Authors:
Hazrat Bilal, Baoqun Yin, Muhammad Shamrooz Aslam, Zeeshan Anjum, Avinash Rohra, Yizhen Wang

17-03-2023 | ORIGINAL ARTICLE

Design and evaluation of algorithms for stacking irregular 3D objects using an automated material handling system

A good stacking method can increase the packaging utility rate and reduce production costs. Much research has focused on 2D arrangements for rectangular, circular, or irregular shapes and regularly shaped 3D objects such as rectangular boxes.

Authors:
Ming-Cheng Ko, Sheng-Jen Hsieh

Open Access 17-03-2023

Numerical Simulations of Gas Burner Experiments in a Residential Structure with HVAC System

Controlled fire experiments using a gas burner were previously conducted in a purpose-built, two-story, moderately air-tight residential structure to understand the effect of a heating, ventilating, and air conditioning (HVAC) system and door …

Authors:
Dushyant M. Chaudhari, Craig Weinschenk, Jason E. Floyd

17-03-2023 | Original Paper

Dwelling in borderlands: a conversation between two science teachers-researchers

Inspired by Freire’s principle of dialogue, in this article we present a series of dialogues and critical syntheses between a science teacher-researcher with 35 years of experience and an early-career science teacher-researcher. We explore being …

Authors:
Cristiano B. Moura, Andreia Guerra

17-03-2023 | Original Research Article

An Investigation of the Thermal Treatment Effects on the Structural, Morphological, and Optical Properties of Hydrothermally Synthesized Hexagonal Molybdenum Oxide Micro-Rods

Hexagonal molybdenum oxide (h-MoO3) micro-rods were synthesized through a facile hydrothermal method. Thermogravimetric and differential thermal analysis (TGA-DTA) of the sample, over temperatures ranging from 30°C to 700°C, was carried out to …

Authors:
C. Rakhi, K. C. Preetha

17-03-2023 | Original Article

Extraction and characterization of novel cellulosic biofiber from peduncle of Areca catechu L. biowaste for sustainable biocomposites

The use of readily available natural resources and wastes has become critical for achieving industrial sustainability. The current study focuses on the extraction and characterization of cellulosic Areca catechu fruit peduncle fibers (ACFPFs) from …

Authors:
Joseph Selvi Binoj, Mariatti Jaafar, Bright Brailson Mansingh, Govindarajan Bharathiraja

17-03-2023

Stacked Deep Learning Framework for Edge-Based Intelligent Threat Detection in IoT Network

Cyber-attacks on Internet of Things (IoT) devices are becoming increasingly common due to the rapidly growing number of connected devices and the lack of security measures in many of these devices. Attackers can exploit these flaws using the …

Authors:
D. Santhadevi, B. Janet

16-03-2023 | Optimization

Chicken swarm optimization with an enhanced exploration–exploitation tradeoff and its application

The chicken swarm optimization (CSO) is a novel swarm intelligence algorithm, which mimics the hierarchal order and foraging behavior in the chicken swarm. However, like other population-based algorithms, CSO also suffers from slow convergence and …

Authors:
Yingcong Wang, Chengcheng Sui, Chi Liu, Junwei Sun, Yanfeng Wang

16-03-2023 | Application of soft computing

Using fuzzy reasoning to improve redundancy elimination for data deduplication in connected environments

The Internet of Things is ushering in the era of connected environments where the number and diversity of data sources (devices and sensors) are inevitably increasing the size of the data that need to be stored locally (at the edge device level) …

Authors:
Sylvana Yakhni, Joe Tekli, Elio Mansour, Richard Chbeir

16-03-2023 | Application of soft computing

Design of GRT feature approximation-based segmentation and DCNN weed classification for effective yield estimation and fertilizer regulation

The issue of weed classification in paddy fields has received extensive research. There are various methods for resolving the weed classification issue. These methods use color, texture and binary features in classifying the weed image in the …

Authors:
M. Vaidhehi, C. Malathy

16-03-2023

A Novel Binary Artificial Jellyfish Search Algorithm for Solving 0–1 Knapsack Problems

The knapsack problem is an NP-hard combinatorial optimization problem for which it is difficult to find a polynomial-time solution. Many researchers have used metaheuristic algorithms that find a near-optimal solution in a reasonable amount of …

Authors:
Gülnur Yildizdan, Emine Baş

16-03-2023

Multimodal feature selection from microarray data based on Dempster–Shafer evidence fusion

Microarray data have a crucial role in identifying and classifying different types of cancer tissues. In cancer research, high dimensional of microarray datasets has always caused problems in the design of classifiers. Thus, microarray data before …

Authors:
Nadia Nekouie, Morteza Romoozi, Mahdi Esmaeili

16-03-2023

Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation

The objective of this study was to examine the roles that organizational security climate and perceived costs and rewards of compliance play in predicting the extent to which people endorse compliance or violation of specific information security …

Authors:
Ricardo R. Brooks, Kevin J. Williams, So-Yun Lee

16-03-2023

Reliability Based Workflow Scheduling on Cloud Computing with Deadline Constraint

Distributed computing workflow is an effective paradigm to express a range of applications with cloud computing platforms for scientific research explorations. One of the most difficult application areas of cloud computing technology is task …

Authors:
Savita Khurana, Gaurav Sharma, Manni Kumar, Nitin Goyal, Bhanu Sharma

16-03-2023

A Novel Hybrid Optic Disc Detection and Fovea Localization Method Integrating Region-Based Convnet and Mathematical Approach

Optic disc (OD), fovea, and blood vessels are major anatomical structures in a fundus image. In retinal image processing, automated detection of structural parts is crucial in analyzing image patterns and abnormalities caused by eye diseases such …

Authors:
Barış Dinç, Yasin Kaya

16-03-2023 | Original Research Article

Sputter-Deposited Nano-porous ZnO Electrode for Highly Efficient Optoelectronic and Solid-State Energy Storage Devices

The present work demonstrates a direct sputtering synthesis approach for a nano-porous ZnO electrode on indium tin oxide (ITO) substrate. Various sophisticated material characterization analytical tools confirmed successful growth of the …

Authors:
Gaurav Malik, Satyendra Kumar Mourya, Ananya Garg, Priyanka, Ramesh Chandra

16-03-2023 | Original Paper

A hybrid C-GSA optimization routing algorithm for energy-efficient wireless sensor network

Power saving is the fundamental concern in designing of the routing algorithms for wireless sensor networks (WSNs). In the present optimized energy-efficient routing protocol (OEERP), some sensor nodes (residual nodes) are discarded without being …

Authors:
Sanjeev Kumar, Richa Agrawal

16-03-2023 | Regular Paper

Towards intelligent database systems using clusters of SQL transactions

Transactions are the bread-and-butter of database management system (DBMS) industry. When you check your bank balance, pay bill, or move money from saving to chequing account, transactions are involved. That transactions are self-similar—whether …

Author:
Arunprasad P. Marathe

16-03-2023 | Research Article-Computer Engineering and Computer Science

Tetrolet Transform and Dual Dictionary Learning-Based Single Image Fog Removal

The removal of fog or haze from video frames and images has been a major focus in the area of computer vision since fog has a detrimental effect on monitoring and surveillance systems, as well as on the recognition of scene objects and other …

Authors:
Manas Sarkar, Priyanka Sarkar Rakshit, Ujjwal Mondal, Debashis Nandi

Open Access 16-03-2023 | Full Research Article

Monotonic crack propagation in a notched polymer matrix composite reinforced with continuous fiber and printed by material extrusion

The study presents the crack mouth opening and propagation of cracks in a composite material printed by material extrusion subjected to monotonic loading. The composite material is made out of a nylon matrix (with embedded short carbon …

Authors:
Jorge Guillermo Díaz-Rodríguez, Alberto David Pertúz-Comas, Caleb Josué Ariza González, Daniel David Garcia López, William Pinto Hernández

15-03-2023 | Original Paper

Using RGBD cameras for classifying learning and teacher interaction through postural attitude

Globally the improvement and evaluation of the academic performance of students has been a priority, however the way in which the quality of learning process is evaluated within the classroom is based on traditional methods such as grades or …

Authors:
Mauricio Hincapié, Christian Andrés Díaz, Alejandro Valencia-Arias, David Güemes-Castorena, Manuel Contero

15-03-2023 | Original Empirical Research

What is the impact of a conflict delisting on firm value? An investigation of the role of conflict and firm characteristics

Negotiations between manufacturers and retailers often go sour. In an attempt to stand their ground, firms increasingly exercise coercive power and decide to delist products until the conflict is resolved. Using an event study, this paper provides …

Authors:
Marleen Hermans, Néomie Raassens, Kathleen Cleeren

15-03-2023 | Metals & corrosion

Microstructure evolution, deformation behavior and processing performance of TNM TiAl alloy

The hot compression test, with a true strain of 0.9, was carried out at a temperature of 1100–1250 °C and a strain rate of 0.001–1 s−1 by a Gleeble3800 thermal simulation testing machine for the as-cast TNM alloy. The stress–strain curves were …

Authors:
Gang Yang, Xiangjun Xu, Guojian Hao, Yuewen Zhai, Huizhen Wang, Yongfeng Liang, Junpin Lin

15-03-2023

Full-Scale Experimental Study on the Integrity of Tempered Glass Protected by Different Sprinkler Systems in High-Rise Building Fire

Tempered glass is a building material often used in curtain walls and windows of high-rise buildings. Tempered glass is easily damaged by high temperature and thermal radiation in a fire, creating a channel for flame spread. The breakage mechanism …

Authors:
Dong Wang, Xiaoyu Ju, Jia Gui, Yaqiang Jiang, Zhizuan Zhou, Xiaodong Zhou, Junjun Liu, Lizhong Yang

Open Access 15-03-2023 | Original Article

DeepHAR: a deep feed-forward neural network algorithm for smart insole-based human activity recognition

Health monitoring, rehabilitation, and fitness are just a few domains where human activity recognition can be applied. In this study, a deep learning approach has been proposed to recognise ambulation and fitness activities from data collected by …

Authors:
Luigi D’Arco, Haiying Wang, Huiru Zheng

Open Access 15-03-2023 | Original Article

An efficient edge/cloud medical system for rapid detection of level of consciousness in emergency medicine based on explainable machine learning models

Emergency medicine (EM) is one of the attractive research fields in which researchers investigate their efforts to diagnose and treat unforeseen illnesses or injuries. There are many tests and observations are involved in EM. Detection of the …

Authors:
Nora El-Rashidy, Ahmed Sedik, Ali I. Siam, Zainab H. Ali

Open Access 15-03-2023

CH-Bench: a user-oriented benchmark for systems for efficient distant reading (design, performance, and insights)

Data science deals with the discovery of information from large volumes of data. The data studied by scientists in the humanities include large textual corpora. An important objective is to study the ideas and expectations of a society regarding …

Authors:
Jens Willkomm, Markus Raster, Martin Schäler, Klemens Böhm

Open Access 15-03-2023 | Regular Contribution

From zero-shot machine learning to zero-day attack detection

Machine learning (ML) models have proved efficient in classifying data samples into their respective categories. The standard ML evaluation methodology assumes that test data samples are derived from pre-observed classes used in the training …

Authors:
Mohanad Sarhan, Siamak Layeghy, Marcus Gallagher, Marius Portmann

15-03-2023

Engaged learning during distraction: a case study of successful working moms in distance education

Adult learners are a significant proportion of distance learners and many of these students are working mothers. Several instructional design models center the learner, and this requires understanding the learner needs, strengths, and context.

Authors:
Anne Fensie, Teri St. Pierre, Jennifer Jain, Asli Sezen-Barrie

Open Access 15-03-2023 | Editorial

Reflecting on Freire: a praxis of radical love and critical hope for science education

In this introductory manuscript, we present our vision for this special issue as a space for cultivating collective becomings in/with love, critical hope, and solidarity. We also contemplate our intentions and goals for putting together a special …

Authors:
Betzabé Torres Olave, Sara Tolbert, Alejandra Frausto Aceves

14-03-2023 | Original Article

CovTiNet: Covid text identification network using attention-based positional embedding feature fusion

Covid text identification (CTI) is a crucial research concern in natural language processing (NLP). Social and electronic media are simultaneously adding a large volume of Covid-affiliated text on the World Wide Web due to the effortless access to …

Authors:
Md. Rajib Hossain, Mohammed Moshiul Hoque, Nazmul Siddique, Iqbal H. Sarker

14-03-2023 | Original Article

New models developed for detection of misconceptions in physics with artificial intelligence

Students’ misconceptions of various topics in physics have been investigated by many researchers. The detection of misconceptions is very difficult and takes a long time as a human being. Our aim in the study carried out is to determine the …

Authors:
Mustafa Umut Demirezen, Ozgur Yilmaz, Elif Ince

14-03-2023

Nonlinearity in the causality and systemic risk spillover between the OPEC oil and GCC equity markets: a pre- and post-financial crisis analysis

This paper investigates the effects of pre- and post-global financial crisis shocks on the dependence structure and systemic risk between the return series of the Organization of the Petroleum Exporting Countries (OPEC) oil price and the Gulf …

Authors:
Emmanuel Joel Aikins Abakah, Aviral Kumar Tiwari, Imhotep Paul Alagidede, Shawkat Hammoudeh

Open Access 14-03-2023

Kahoot! and its effect on financial accounting marks at the university

New technologies have led to digital educational tools to improve learning. Game-Based Learning makes it possible to test whether there is a positive impact on official grades. We have collected the scores of the Kahoot! games, the marks of the …

Authors:
Esther Ortiz-Martínez, Jose Manuel Santos-Jaén, Salvador Marín-Hernández

Open Access 14-03-2023

Enhancing adolescent reasoning skills through a video game program

Much research has been done on the benefits of video games in a physical education context (Camunas-Vega & Alcaide-Risoto, 2020; Fang et al., 2020). However, little attention has so far been paid to the effectiveness of commercial video games …

Authors:
Carlos Merino-Campos, Héctor del-Castillo, Isabel Pascual-Gómez

14-03-2023 | Original Article

Enhancing dynamic mode decomposition workflow with in situ visualization and data compression

Modern computational science and engineering applications are being improved by advances in scientific machine learning. Data-driven methods such as dynamic mode decomposition (DMD) can extract coherent structures from spatio-temporal data …

Authors:
Gabriel F. Barros, Malú Grave, José J. Camata, Alvaro L. G. A. Coutinho

14-03-2023 | Original Paper

A stochastic geometric programming approach for power allocation in wireless networks

In this paper, we consider the power allocation problem for 5 G wireless networks using massive multiple input multiple output technologies. Two non-linear optimization models are considered to maximize the worst user signal-to-interference noise …

Authors:
Pablo Adasme, Abdel Lisser

14-03-2023

Value Implications of REITing and De-REITing*

We explore the determinants and value implications of publicly traded real estate companies converting to real estate investment trusts (REITs), which we term REITing, and publicly-traded REITs giving up their REIT status, termed de-REITing.

Authors:
David Ling, Sugata Ray, Alan Tidwell, Luqi Xu

14-03-2023

A Novel Human Activity Recognition Model for Smartphone Authentication

The use of cell phones has dramatically expanded and developed into a daily habit in the current day. Additionally, consumers have started using a variety of smartphone applications, including social media apps, invoicing apps, and sensitive apps …

Authors:
P. R. Vinod, A. Anitha

14-03-2023 | RESEARCH

An intelligent optimized cyclone intensity prediction framework using satellite images

Weather prediction is the hottest topic in remote sensing to understand natural disasters and their intensity in an early stage. But in many cases, the typical imaging models have resulted in less forecasting rate. Hence, to overcome this problem …

Authors:
C. Kishor Kumar Reddy, P. R. Anisha, Marlia Mohd Hanafiah, Y. V. S. S. Pragathi, B. V. Ramana Murthy, R. Madana Mohana

Open Access 14-03-2023

Body Uneasiness and Dissatisfaction Among Lesbian, Gay, Bisexual, and Heterosexual Persons

Authors:
Laura Muzi, Nicola Nardelli, Gabriele Naticchioni, Claudia Mazzeschi, Roberto Baiocco, Vittorio Lingiardi

13-03-2023 | Research Article

Rapid CO2-laser scribing fabrication of an electrochemical sensor for the direct detection of Pb2+ and Cd2+

Laser-induced graphene (LIG) is a highly promising preparation material for electrochemical sensors; however, its preparation speed and nanomaterial modification steps significantly limit its mass production. Herein, this study proposed a new …

Authors:
Guanglei Chu, Yanyan Zhang, Zhongrui Zhou, Weixuan Zeng, Dongfei Chen, Siping Yu, Jiemin Wang, Yemin Guo, Xia Sun, Ming Li

13-03-2023

Spider wasp optimizer: a novel meta-heuristic optimization algorithm

This work presents a new nature-inspired meta-heuristic algorithm named spider wasp optimization (SWO) algorithm, which is based on replicating the hunting, nesting, and mating behaviors of the female spider wasps in nature. This proposed …

Authors:
Mohamed Abdel-Basset, Reda Mohamed, Mohammed Jameel, Mohamed Abouhawwash

13-03-2023 | Original Article

Gracilaria corticata red seaweed mediate biosynthesis of silver nanoparticles: larvicidal, neurotoxicity, molecular docking analysis, and ecofriendly approach

Effective vector management avoiding exposing the population of beneficial insects that are not the goal at risk is needed to combat the rising worldwide burden of mosquito-borne diseases. Insect sterility techniques, seaweed-mediated bio nano …

Authors:
Selvam Naveenkumar, Chinnaperumal Kamaraj, Chinnasamy Ragavendran, Mariyappan Vaithiyalingam, Vimal Sugumar, Kasi Marimuthu

13-03-2023 | Application of soft computing

A novel image protection cryptosystem with only permutation stage: multi-shuffling process

In this paper, a novel cryptosystem with just a multi-shuffling process which is highly interactive to differentiate initial conditions is developed. The proposed system replaces the fundamental and well known in cryptography, confusion–diffusion …

Authors:
Shih-Yu Li, Benalcázar Hernández Miguel Angel

13-03-2023

Machine learning-based models for the qualitative classification of potassium ferrocyanide using electrochemical methods

Iron is one of the trace elements that plays a vital role in the human immune system, especially against variants of SARS-CoV-2 virus. Electrochemical methods are convenient for the detection due to the simplicity of instrumentation available for …

Authors:
Devrim Kayali, Nemah Abu Shama, Suleyman Asir, Kamil Dimililer

13-03-2023

Design of Controllers for Finite-Time Robust Stabilization of Inertial Delayed Neural Networks with External Disturbances

This paper studies the problem of finite-time robust stabilization of inertial delayed neural networks with external disturbances. The finite-time stability research of inertial neural networks can be applied to important fields such as secure …

Authors:
Nan Hong, Wei Zhang, Zichuan Zhou, Ruihong Xiu

Open Access 13-03-2023

Scheduling IDK classifiers with arbitrary dependences to minimize the expected time to successful classification

This paper introduces and evaluates a general construct for trading off accuracy and overall execution duration in classification-based machine perception problems—namely, the generalized IDK classifier cascade. The aim is to select the optimal …

Authors:
Tarek Abdelzaher, Kunal Agrawal, Sanjoy Baruah, Alan Burns, Robert I. Davis, Zhishan Guo, Yigong Hu

13-03-2023

An Adaptive Optimized Schizophrenia Electroencephalogram Disease Prediction Framework

Electroencephalogram (EEG) signal analysis has become an interesting and required area in the medical industry to analyze brain function for different diseases. But, the EEG signal’s noise features might degrade the signal prediction's exactness …

Authors:
Varun Gupta, Abhas Kanungo, Nitin Kumar Saxena, Pankaj Kumar, Parvin Kumar

13-03-2023 | Original Research Article

Fabrication and Description of Amorphous Ge33Se47Sn20 Films for Optical Applications

We report the fabrication of a semiconductor thin layer of ternary chalcogenide, Ge33Se47Sn20, utilizing a thermal evaporation technique for optical applications. The chemical composition and crystal structure studies on Ge33Se47Sn20 thin films …

Authors:
A. M. Hassanien, A. A. A. Darwish, Saleem I. Qashou, A. A. Atta, Tariq A. Altalhi

Open Access 13-03-2023 | Original Article

CatSight, a direct path to proper multi-variate time series change detection: perceiving a concept drift through common spatial pattern

Detecting changes in data streams, with the data flowing continuously, is an important problem which Industry 4.0 has to deal with. In industrial monitoring, the data distribution may vary after a change in the machine’s operating point; this …

Authors:
Arantzazu Flórez, Itsaso Rodríguez-Moreno, Arkaitz Artetxe, Igor García Olaizola, Basilio Sierra

13-03-2023

Dimensional decision covariance colony predation algorithm: global optimization and high−dimensional feature selection

The colony Predation Algorithm (CPA) has been proven to be one of the heuristic algorithms that can efficiently solve global optimization problems. Balancing the paradox between exploration and exploitation capabilities while mitigating premature …

Authors:
Boyang Xu, Ali Asghar Heidari, Zhennao Cai, Huiling Chen

13-03-2023

A domain name management system based on account-based consortium blockchain

Due to the functionality for mapping domain names to IP addresses, the Domain Name System (DNS) is a critical component of the running of the Internet. However, the current DNS receives many criticisms. For instance, its centralized architecture …

Authors:
Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao, Guiyi Wei

12-03-2023 | Original Article

MCMSTClustering: defining non-spherical clusters by using minimum spanning tree over KD-tree-based micro-clusters

Clustering is a technique for statistical data analysis and is widely used in many areas where class labels are not available. Major problems related to clustering algorithms are handling high-dimensional, imbalanced, and/or varying-density …

Author:
Ali Şenol

12-03-2023

Multi-view Multi-modal Approach Based on 5S-CNN and BiLSTM Using Skeleton, Depth and RGB Data for Human Activity Recognition

Recognition of human activity is a challenging issue, especially in the presence of multiple actions and multiple scenarios. Therefore, in this paper, multi-view multi-modal based human action recognition (HAR) is proposed. Here, initially, motion …

Authors:
Rahul Kumar, Shailender Kumar

12-03-2023

A Novel Multi-Hop Clustering Routing Algorithm Based on Particle Swarm Optimization for Wireless Sensors Networks

Since wireless sensor network have a finite amount of energy, lowering network energy consumption and prolonging the life of the network are essential considerations for WSN applications. A novel multi-hop clustering routing algorithm based on …

Authors:
Yu Xiuwu, Zhou Zixiang, Peng Wei, Liu Yong

12-03-2023 | Original Article

Indoor thermal management of a public transport with phase change material (PCM)

In many developing countries in the tropical region, 3-wheeler vehicles are one of the most common means of transportation for low- and middle-income people. As the 3-wheeler vehicle is small in size, open on both sides, and the engine is placed …

Authors:
Hasibuzzaman Mahmud, Mufrad Islam, Muhammad Ershad Jaman Khan, Dewan Hasan Ahmed

12-03-2023 | Application of soft computing

Swarm-based hybrid optimization algorithms: an exhaustive analysis and its applications to electricity load and price forecasting

In this work, we intend to propose multiple hybrid algorithms with the idea of giving a choice to the particles of a swarm to update their position for the next generation. To implement this concept, Cuckoo Search Algorithm (CSA), Grey Wolf …

Authors:
Rahul Kottath, Priyanka Singh, Anirban Bhowmick

12-03-2023

Trustworthy artificial intelligence in Alzheimer’s disease: state of the art, opportunities, and challenges

Medical applications of Artificial Intelligence (AI) have consistently shown remarkable performance in providing medical professionals and patients with support for complex tasks. Nevertheless, the use of these applications in sensitive clinical …

Authors:
Shaker El-Sappagh, Jose M. Alonso-Moral, Tamer Abuhmed, Farman Ali, Alberto Bugarín-Diz

11-03-2023

A Novel Optimized Perturbation-Based Machine Learning for Preserving Privacy in Medical Data

In recent times, providing privacy to the medical dataset has been the biggest issue in medical applications. Since, in hospitals, the patient's data are stored in files, the files must be secured properly. Thus, different machine learning models …

Authors:
Jayanti Dansana, Manas Ranjan Kabat, Prasant Kumar Pattnaik

11-03-2023

Going digital: implications for firm value and performance

We examine firm value and performance implications of the growing trend of nontechnology companies engaging in activities relating to digital technologies. We measure digital activities in firms based on the disclosure of digital words in the …

Authors:
Wilbur Chen, Suraj Srinivasan

Open Access 11-03-2023 | Original Paper

Analysis of the Scale of Global Human Needs and Opportunities for Sustainable Catalytic Technologies

We analyzed the enormous scale of global human needs, their carbon footprint, and how they are connected to energy availability. We established that most challenges related to resource security and sustainability can be solved by providing …

Authors:
Teona Taseska, Wanqing Yu, Madeleine K. Wilsey, Connor P. Cox, Ziyi Meng, Soraya S. Ngarnim, Astrid M. Müller

Open Access 11-03-2023 | ORIGINAL ARTICLE

Ladle pouring process parameter and quality estimation using Mask R-CNN and contrast-limited adaptive histogram equalisation

Deep learning in computer vision is becoming increasingly popular and useful for tracking object movement in many application areas, due to data collection burgeoning from the rise of the Internet of Things (IoT) and Big Data. So far, computer …

Authors:
Callum O’Donovan, Ivan Popov, Grazia Todeschini, Cinzia Giannetti

10-03-2023 | Original Article

Study on the methods of feature extraction based on electromyographic signal classification

Electromyography (EMG) is a form of biological information, which is used in many fields to help people study human muscle movement, especially in the study of bionic hands. EMG signals can be used to explain the activity at a certain moment …

Authors:
Xiaoyan Zhang, Mengru Zhang

10-03-2023 | Research Paper

An efficient iterated greedy algorithm for a multi-objective no-wait flow shop problem with sequence dependent setup times

In this article, we address the m-machine no-wait flow shop scheduling problem with sequence dependent setup times. The objective is to minimize total tardiness subject to an upper bound on makespan. Although these constraints and performance …

Authors:
Fernando Siqueira de Almeida, Marcelo Seido Nagano

10-03-2023 | Regular Paper

Side-channel analysis against ANSSI’s protected AES implementation on ARM: end-to-end attacks with multi-task learning

In 2019, ANSSI released a protected software implementation of AES running on an STM32 platform with ARM Cortex-M architecture, publicly available on Github. The release of the code was shortly followed by a first paper written by Bronchain and …

Authors:
Loïc Masure, Rémi Strullu

Open Access 10-03-2023 | Topical Collection: Processing and Applications of Superalloys

Effect of Alloying on the Microstructure, Phase Stability, Hardness, and Partitioning Behavior of a New Dual-Superlattice Nickel-Based Superalloy

A novel γ–γ′–γ″ dual-superlattice superalloy, with promising mechanical properties up to elevated temperatures was recently reported by Mignanelli et al. (in: Proceedings of the 9th International Symposium on Superalloy 718 & Derivatives: Energy …

Authors:
C. Rodenkirchen, A. K. Ackerman, P. M. Mignanelli, A. Cliff, G. J. Wise, P. Breul, J. O. Douglas, P. A. J. Bagot, M. P. Moody, M. Appleton, M. P. Ryan, M. C. Hardy, S. Pedrazzini, H. J. Stone

10-03-2023

Forecasting Future Monthly Patient Volume using Deep Learning and Statistical Models

The variety of diseases is increasing day by day, and the demand for hospitals, especially for emergency and radiology units, is also increasing. As in other units, it is necessary to prepare the radiology unit for the future, to take into account …

Authors:
Zeydin Pala, Ramazan Atıcı, Erkan Yaldız

10-03-2023

Secure Multi-Party Computation for Personalized Human Activity Recognition

Calibrating Human Activity Recognition (HAR) models to end-users with Transfer Learning (TL) often yields significant accuracy improvements. Such TL is by design done based on very personal data collected by sensors worn close to the human body.

Authors:
David Melanson, Ricardo Maia, Hee-Seok Kim, Anderson Nascimento, Martine De Cock

Open Access 10-03-2023 | Original Article

A co-evolutionary algorithm with elite archive strategy for generating diverse high-quality satellite range schedules

Satellite range scheduling, a multi-constrained combinatorial optimization problem, is crucial to guaranteeing the normal operation and application of onboard satellites. Traditional methods are dedicated to finding one optimal schedule, having …

Authors:
Minghui Xiong, Wei Xiong, Zheng Liu

Open Access 10-03-2023 | Original Article

Fire and smoke precise detection method based on the attention mechanism and anchor-free mechanism

Substantial natural environmental damage and economic losses are caused by fire. For this problem, automatic fire-smoke detection and identification are needed. Fire-smoke detection methods based on vision still suffer from significant challenges …

Authors:
Yu Sun, Jian Feng

10-03-2023

Using machine learning to predict factors affecting academic performance: the case of college students on academic probation

This study aims to employ the supervised machine learning algorithms to examine factors that negatively impacted academic performance among college students on probation (underperforming students). We used the Knowledge Discovery in Databases …

Authors:
Lamees Al-Alawi, Jamil Al Shaqsi, Ali Tarhini, Adil S. Al-Busaidi

10-03-2023 | Original Article

Multi-scale discriminant representation for generic palmprint recognition

Palmprint shows great potential in biometric-based security due to its advantages of great stability, easy collection, and high accuracy. However, with insufficient training samples, how to extract discriminative features applicable in various …

Authors:
Lingli Yu, Qian Yi, Kaijun Zhou

10-03-2023 | Original Article

Parameter optimization of chaotic system using Pareto-based triple objective artificial bee colony algorithm

Chaotic map is a kind of discrete chaotic system. The existing chaotic maps suffer from optimal parameters in terms of chaos measurements. In this study, a novel approach of optimization of parametric chaotic map (PCM) using triple objective …

Authors:
Abdurrahim Toktas, Uğur Erkan, Deniz Ustun, Xingyuan Wang

09-03-2023 | Special Issue

Cloud-based solution approach for a large size logistics network planning

During the last two decades, due to environmental laws and the competitive environment, the formulation of effective closed-loop supply chain networks has attracted researchers’ attention. On the other hand, although there are many metaheuristics …

Authors:
Ehsan Yadegari, Elham Jelodari Mamaghani, Maryam Afghah, Mohsen Abdoli, Amir Daneshvar

09-03-2023

Using property rights to fight crime: the Khaya Lam project

Despite it being legal in South Africa to acquire a title deed to a government-issued home, roughly 20 million South Africans do not hold title to their property. Millions of homes are eligible to have ownership transferred from the government to …

Author:
Kerianne Lawson

09-03-2023 | Focus

A hybrid multimedia image encryption technique using singular value decomposition-linear sparsity regularization (SVD-LSR)

The benefits and drawbacks of the SVD-based multimedia image watermarking system are discussed in this paper. To get a suitable video frame for embedding a watermark in this study, key frame selection is initially affected to the video sequence.

Authors:
M. Hema, S. Prayla Shyry

09-03-2023

Double Graph Attention Networks for Visual Semantic Navigation

Artificial Intelligence (AI) based on knowledge graphs has been invested in realizing human intelligence like thinking, learning, and logical reasoning. It is a great promise to make AI-based systems not only intelligent but also knowledgeable. In …

Authors:
Yunlian Lyu, Mohammad Sadegh Talebi

09-03-2023 | Original Article

DeepPress: guided press release topic-aware text generation using ensemble transformers

Guided text generation is one of the key issues when it comes to creating human-like artificial intelligence writing machines. Humans can use their writing skills depending on the topic of the text and the pieces of information they want to …

Authors:
Abir Rahali, Moulay A. Akhloufi

09-03-2023 | S.I.: Applications and Techniques in Cyber Intelligence (ATCI2022)

The evaluation of an active soft waist exoskeleton for repetitive lifting task

This study is to determine how a lightweight active soft waist exoskeleton (ASWE) reduces the oxygen consumption and activity of lower back muscles of the wearer performing the repetitive lifting tasks. The heavy and frequent manual lifting …

Authors:
Liang Yang, Chenxi Qu, Peng Yin, Jiliang Lv, Shengguan Qu

09-03-2023 | Regular Paper

Sliding window-based approximate triangle counting with bounded memory usage

Streaming graph analysis is gaining importance in various fields due to the natural dynamicity in many real graph applications. However, approximately counting triangles in real-world streaming graphs with duplicate edges and sliding window model …

Authors:
Xiangyang Gou, Lei Zou

08-03-2023 | Data analytics and machine learning

Class-biased sarcasm detection using BiLSTM variational autoencoder-based synthetic oversampling

Recent research works have established the importance of sarcasm detection in the domain of sentiment analysis. Automatic sarcasm detection using social media data is a challenging task in the presence of imbalanced classes. Real-life social media …

Authors:
Sankhadeep Chatterjee, Saranya Bhattacharjee, Kushankur Ghosh, Asit Kumar Das, Soumen Banerjee

08-03-2023 | Topical Collection: 19th Conference on Defects (DRIP XIX)

Trench-Filling Epitaxy of Germanium on (001) Silicon Enhanced Using [100]-Oriented Patterns

This paper reports trench-filling epitaxy of Ge on (001) Si using [100]-oriented patterns, which is effective to fill the micron-deep trench in a short growth time. As a starting substrate, a trench with a width of about 0.6 µm and a depth of …

Authors:
Kota Kato, Kazuki Motomura, Jose A. Piedra-Lorenzana, Mohd Faiz Bin Amin, Takeshi Hizawa, Tetsuya Nakai, Yasuhiko Ishikawa

08-03-2023

Integrated Signing Procedure Based Data Transfer Security and Authentication Framework for Internet of Things Applications

There is a consistent rise in the usage of sensory devices while framing up the Internet-of-Things (IoT), which generates a large portion of data and increases exponential security concerns. IoT vision aims to provide maximum coverage among the …

Authors:
Nasreen Fathima, Reshma Banu, G. F. Ali Ahammed

Premium Partner