FileName
stringlengths
17
17
Abstract
stringlengths
163
6.01k
Title
stringlengths
12
421
S0045790615003006
The druse, an abnormal yellow/white deposit on retina, is a dominant characteristic of age-related macular degeneration (AMD) which is a retinal disorder associated with age. The early detection of drusen is useful for ophthalmologists to diagnose the patients that suffer from AMD. An automated method has been proposed...
Automated detection and segmentation of drusen in retinal fundus images
S0045790615003018
A honeypot system can be deployed to decoy and record malicious intrusions over the Internet. However, events logged by a honeypot can rapidly accumulate an enormous amount of data, which an administrator will be unable to handle. The proposed system combines episode mining and pruning, and allows an administrator to i...
Applying episode mining and pruning to identify malicious online attacks
S0045790615003031
Finding new techniques to accelerate electromagnetic (EM) simulations has become a necessity nowadays due to its frequent usage in industry. As they are mainly based on domain discretization, EM simulations require solving enormous systems of linear equations simultaneously. Available software-based solutions do not sc...
On kernel acceleration of electromagnetic solvers via hardware emulation
S0045790615003043
This paper introduces a new scheme for encrypting images with a few details based on wavelet fusion. In this scheme, the image with a few details to be encrypted is fused with another image that is rich in details utilizing the Discrete Wavelet Transform (DWT) prior to encryption. The fusion is a pre-processing step to...
Wavelet fusion for encrypting images with a few details
S0045790615003055
Signals associated with eye blinks (230–350 micro-volts) are orders of magnitude larger than electric potentials (7–20 micro-volts) generated on the scalp because of cortical activity. These and other such non-cortical biological artifacts spread across the scalp and contaminate the Electroencephalogram (EEG). We prese...
Ocular artifact suppression from EEG using ensemble empirical mode decomposition with principal component analysis
S0045790615003079
The paper introduces a new automated seizure detection model that integrates Weighted Permutation Entropy (WPE) and a Support Vector Machine (SVM) classifier model to enhance the sensitivity and precision of the detection process. The proposed system utilizes the fact that entropy based measures for the EEG segments du...
A hybrid automated detection of epileptic seizures in EEG records
S0045790615003080
A carbonating tank is continuously operated and filled with water supplied by an immersed flow injecting nozzle. At the same time, CO2 gas is introduced from the gas tank. CO2 gas can be dissolved in water and can form carbonated water with minimum production of gas bubbles depending on various process conditions. Ther...
Numerical investigation on the flow mixing feature inside a continuously carbonating process tank
S0045790615003110
We propose a novel technique for automatic classification of modulation formats/bit-rates of digitally modulated signals as well as non-data-aided (NDA) estimation of signal-to-noise ratio (SNR) in wireless networks. The proposed technique exploits modulation format, bit-rate, and SNR sensitive features of asynchron...
Automatic modulation format/bit-rate classification and signal-to-noise ratio estimation using asynchronous delay-tap sampling
S0045790615003122
Designing a lightweight, secure communication protocol for Wireless Sensor Networks (WSNs) remains a challenging issue since sensor networks are resource limited and are left unattended. Sensor nodes in WSNs are subjected to varying forms of attacks. An adversary may destroy or damage the communications done in multi-h...
Reliable anonymous secure packet forwarding scheme for wireless sensor networks
S0045790615003134
Nonlocal means (NLM)-based denoising is an efficient and simple method for image sequence denoising which has been applied successfully in many image sequence denoising applications. We extend the method for image sequence denoising using Zernike moments (ZMs) called NLM–ZMs which provides better denoising performance ...
An efficient approach for image sequence denoising using Zernike moments-based nonlocal means approach
S0045790615003146
Vehicular Cyber-Physical Systems (VCPS) are the most popular systems of the modern era due to their abilities to disseminate the safety related information to the moving vehicles on time. For efficient data dissemination, vehicles form a cluster with other vehicles in VCPS environment. But, due to high velocity and con...
Learning Automata-assisted Predictive Clustering approach for Vehicular Cyber-Physical System
S0045790615003158
In ubiquitous high-performance computing (UHPC), performing concurrent services is an important task of middleware. Because a major development effort is not easily achieved, isolating a virtual machine (VM) may be a helpful solution but will likely suffer from additional overhead costs. This challenge can also be reso...
A virtualization approach to develop middleware for ubiquitous high performance computing
S0045790615003171
This paper proposes an accelerating correlation-based image alignment using CPUs for time-critical applications in automatic optical inspection (AOI). In order to improve computation efficiency, the image pyramid search scheme is combined with the parallel computation. The image pyramid search scheme is employed first ...
An accelerating CPU based correlation-based image alignment for real-time automatic optical inspection
S0045790615003183
Improving image resolution by refining hardware is usually expensive and/or time consuming. A critical challenge is to optimally balance the trade-off among image resolution, Signal-to-Noise Ratio (SNR), and acquisition time. Super-resolution (SR), an off-line approach for improving image resolution, is free from these...
A performance comparison among different super-resolution techniques
S0045790615003195
Enhancing the throughput of cognitive radio network in the presence of malicious cognitive radio user (MCRU) is addressed in this paper. We have considered the impact of MCRU on the sensing performance and achievable throughput of secondary network during two phases, namely, sensing phase (SP) and secondary user transm...
Enhancing the throughput of cognitive radio networks through malevolent presence
S0045790615003201
Interactive image segmentation aims to extract user-specified regions from the background. In this paper, an efficient two-stage region merging based method is proposed for interactive image segmentation. An image is first over-segmented into many super-pixels using a bottom-up method. The color histogram is exploited ...
An efficient two-stage region merging method for interactive image segmentation
S0045790615003213
The wireless sensor networks deployed in hostile environments suffer from a high rate of node failures. Such failures may convert a fully-connected sensor network into multiple disjoint sub-networks, leading to the network partition problem. The placement of relay nodes is the only way to restore the lost connectivity ...
Relay node placement to heal partitioned wireless sensor networks
S0045790615003225
Cellular Automata (CA) are of interest in several research areas and there are many available serial implementations of CA. However, there are relatively few studies analyzing in detail High Performance Computing (HPC) implementations of CA which allow research on large systems. Here, we present a parallel implementati...
Performance analysis of Cellular Automata HPC implementations
S0045790615003237
This paper presents a method to predict the milling cutting force and cutting coefficient for aluminum 6060-T6 which is a general commercial alloy with 170–190 MPa of tensile strength, and is the most commonly used for anodizing and providing extra protection if needed. We introduce two cutting force prediction methods...
Investigation of milling cutting forces and cutting coefficient for aluminum 6060-T6
S0045790615003389
A nonlinear pull-in behavior analysis of a cantilever nano-actuator was carried out and an Euler–Bernoulli beam model was used in the examination of the fringing field and the surface and Casimir force effects in this study. In general, the analysis of an electrostatic device is difficult and usually complicated b...
Surface effect on dynamic characteristics of the electrostatically nano-beam actuator
S0045790615003420
With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Language) has become the widely used de facto standard for managing access to open and distributed service-based environments like Web services. However, like any other policy language, XACML has complex syntax, which makes the...
From model-driven specification to design-level set-based analysis of XACML policies
S0045790615003444
This paper presents a novel methodology for improving efficiency and power consumption of networks-on-chip (NoCs). The proposed approach applies queue length considerations of a modified version of RED algorithm. Moreover, a stochastic learning-automata-based algorithm has been used to optimize the threshold values req...
A novel power efficient adaptive RED-based flow control mechanism for networks-on-chip
S0045790615003468
Set Partitioning In Hierarchical Tree (SPIHT) is considered one of the most important algorithms for reducing the size of the vision data collected by the sensor node within wireless multimedia sensor network (WMSN). The traditional SPIHT algorithm suffers from image coders complexity due to large memory requirement. T...
A modified listless strip based SPIHT for wireless multimedia sensor networks
S0045790615003481
In order to reduce aquaculture risks and optimize the operation of water quality management in prawn engineering culture ponds, this paper proposes a novel water temperature forecasting model based on empirical mode decomposition (EMD) and back-propagation neural network (BPNN). First, the original water temperature da...
Multi-scale prediction of water temperature using empirical mode decomposition with back-propagation neural networks
S0045790615003493
Code Division Multiple Access, which allows multiple users to access and transmit data over wireless channel simultaneously, is implemented using different code assignment schemes including Pair-wise Code Assignment. In this paper, the existing pair-wise code assignment procedure is enhanced and a new such scheme is pr...
Analysis and enhancement of pair-wise code assignment scheme used in Code Division Multiple Access protocol
S0045790615003511
Spectrum allocation scheme in cognitive radio networks (CRNs) becomes complex when multiple CR users concomitantly need to be allocated new and suitable bands once the primary user returns. Most existing schemes focus on the gain of individual users, ignoring the effect of an allocation on other users and rely on the ‘...
Modeling multiuser spectrum allocation for cognitive radio networks
S0045790615003547
This study examines a multicore processor based on a system-on-chip (SoC) and configured by a Tensilica Xtensa® LX2. The multicore processor is a heterogeneous, configurable dual-core processor. In this study, one core was used as the host to control the processor chip, and the other was used as a slave to extend digit...
A novel memory management method for multi-core processors
S0045790615003559
In this paper, we propose a client-based solution to detect “evil twin” attacks in wireless local area networks (WLANs). An evil twin is a kind of rogue Wi-Fi access point (AP) which has the same SSID name as a legitimate one and is set up by an attacker. After a victim associates his device with an evil twin, an attac...
A client-side detection mechanism for evil twins
S0045790615003560
To improve the precision of low-cost, vehicle-mounted global position system (GPS), this paper presents the multi-source information fusion algorithm of vehicle navigation, which is based on the interacting multiple model (IMM). Considering vehicle kinematics and dynamic characteristics, as well as its braking capacity...
Interacting multiple model for improving the precision of vehicle-mounted global position system
S0045790615003572
The problem of Support Vector Machines (SVM) tuning parameters (i.e., model selection) has been paramount in the last years, mainly because of the high computational burden for SVM training step. In this paper, we address this problem by introducing a recently developed evolutionary-based algorithm called Social-Spider...
Social-Spider Optimization-based Support Vector Machines applied for energy theft detection
S0045790615003584
We consider turbo coded multi-carrier double space–time transmit diversity (DSTTD) system that employs orthogonal frequency division multiplexing (OFDM) for the transmission of acoustic signals in underwater communication, where acoustic interference and ambient noise are the major channel deficiencies. DSTTD employs t...
Mitigating ambient noise and multi-path propagation in underwater communication using the DSTTD-OFDM system
S0045790615003596
We present a watermarking algorithm to synchronously transmit Gong-Che notation musical scores and their musical instrument digital interface (MIDI) information. Our algorithm transforms the MIDI information into a binary sequence, which is used to form watermarking data. This watermark is embedded into the Gong-Che no...
Synchronous transmission of a Gong-Che notation musical score and its MIDI information
S0045790615003602
This paper presents multi-quantized local binary patterns for facial gender classification. For encoding the gray level difference (GLD) between a reference pixel and its neighbors, local binary pattern employs a binary quantization which retains the sign of GLD but discards the magnitude information. To improve the di...
Multi-quantized local binary patterns for facial gender classification
S0045790615003626
In this paper, a novel architecture of Vedic multiplier with ‘Urdhava-tiryakbhyam’ methodology for 16 bit multiplier and multiplicand is proposed with the use of compressor adders. Equations for each bit of 32 bit resultant are calculated distinctly and compressor adders are used to implement these equations. They are ...
A novel high-speed approach for 16 × 16 Vedic multiplication with compressor adders
S0045790615003638
In view of the fact that objects with different natures usually respond differently to the same external stimulus, this paper proposes a no-reference image quality assessment based on gradient histogram response (GHR). GHR is the gradient histogram variation of an image object under a local transform. In the metric, th...
No-reference image quality assessment based on gradient histogram response
S0045790615003663
This paper proposes a novel unambiguous correlation function for composite binary offset carrier (CBOC) signal tracking based on partial correlations. In the proposed scheme, first, we partition sub-carriers of the CBOC signal into partial sub-carriers, and subsequently, we obtain partial correlations by correlating th...
A novel unambiguous composite binary offset carrier(6,1,1/11) tracking based on partial correlations
S0045790615003675
Hierarchical clustering technique is an effectual topology control methodology in Wireless Sensor Networks (WSNs). This technique is used to increase the life time of the network by reducing the number of transmissions towards the base station. We propose and validate a new routing protocol termed as Sleep-awake Energy...
Sleep-awake energy efficient distributed clustering algorithm for wireless sensor networks
S0045790615003705
The present study integrates information system engineering and management methodologies to solve a real-life case problem. We develop an agricultural product recommendation service on a mobile platform, and then to understand users’ acceptance to confirm that it can be used to solve the problem. For consumers, making ...
Using a modified ELECTRE method for an agricultural product recommendation service on a mobile device
S0045790615003924
This work studies a digital hardware implementation of a radial basis function neural network (RBF NN) Firstly, the architecture of the RBF NN, which consists of an input layer, a hidden layer of nonlinear processing neurons with Gaussian function, an output layer and a learning mechanism, is presented. The supervising...
Digital hardware implementation of a radial basis function neural network
S0045790615003936
In underwater acoustic sensor networks, long baseline localization for autonomous underwater vehicles (AUVs) requires distance estimation that always encounters severe problems: (a) Time-synchronization is hard to achieve in underwater environment, which baffles ranging methods based on the synchronized time. (b) Long ...
Self-localization of autonomous underwater vehicles with accurate sound travel time solution
S0045790615004115
This paper aims to develop a location-based services supported Dr.What-Info system, i.e. a master multi-agent system on what the information is, using Google maps and an image recognition technology as a tourism information provider and as a route planner for tourists. Users can have great fun during vacation travels t...
A location-based services and Google maps-based information master system for tour guiding
S0045790615004127
The ever growing needs of Big Data applications are demanding challenging capabilities which cannot be handled easily by traditional systems, and thus more and more organizations are adopting High Performance Computing (HPC) to improve scalability and efficiency. Moreover, Big Data frameworks like Hadoop need to be ada...
Analysis and evaluation of MapReduce solutions on an HPC cluster
S0045790615004139
A new recurrent wavelet fuzzy neural network (RWFNN) with adaptive learning rates is proposed to control the rotor position on the axial direction of a thrust magnetic bearing (TMB) mechanism in this study. First, the dynamic analysis of the TMB with differential driving mode (DDM) is derived. Because the dynamic chara...
Application of a recurrent wavelet fuzzy-neural network in the positioning control of a magnetic-bearing mechanism
S0045790615004140
This paper proposes a robust particle filter to deal with incomplete sensor data to predict the user’s routes and represents users’ movements using a dynamic Bayesian network model that patterns the user’s spatiotemporal routine. The proposed particle filter includes robust particle generation to supplement any incorre...
Robust route inference and representation for uncertain sensor data
S0045790615004152
Various signaling techniques have been considered for I/O interconnects at 25 Gb/s or higher. However, they either suffer from high baud rate, as in the case of NRZ, or an excess signal-to-noise ratio penalty, as in the case of PAM-4. To overcome these problems, a four-phase shifted sinusoid symbol (PSS-4) signaling me...
PSS4: Four-Phase Shifted Sinusoid Symbol Signaling for High Speed I/O interconnects
S0045790615004176
With the development of the Internet of Things (IoT), more and more devices that have diverse computing and communication capabilities are interconnected. For multimedia multicast in the IoT, a fixed flow rate cannot meet the quality-of-service requirements of heterogeneous devices and each device may not get the infor...
A distributed algorithm for inter-layer network coding-based multimedia multicast in Internet of Things
S0045790615004231
This paper presents an important step towards the standardization of research works on Optical Character Recognition in Persian language. It describes the formations of a standard handwritten database, including isolated digits, isolated signs, multi-digit numbers, numerical strings, courtesy amounts, and postal codes....
Handwriting recognition of digits, signs, and numerical strings in Persian
S0045790615004243
As a typical media access protocol, S-MAC has drawn much attention in the past decades. However, most of the attention focuses on energy efficiency, but fails to guarantee QoS performance. Firstly, we develop one state machines model and elaborate on the states’ transition processes of S-MAC. Secondly, combining our st...
Performance analysis and simulation verification of S-MAC for wireless sensor networks
S0045790615004267
An economical and portable on-line motor condition monitoring system based on an advanced microprocessor with a graphic user interface for abnormality detection is described. Both electrical and vibrational signal analysis for fault detection of motors were applied. A Cortex-M4 microcontroller and its built-in high spe...
On-line motor condition monitoring system for abnormality detection
S0045790615004279
Embedding secret information into a cover media and extracting the information and the image without any distortion is known as reversible watermarking (RW). This paper analyzes the performance of hybrid local prediction error-based RW using difference expansion (DE). The cover medical image is split into non-overlappi...
Hybrid local prediction error-based difference expansion reversible watermarking for medical images
S0045790615004292
Decimal arithmetic circuits, based on IEEE-754-2008 standard, commonly use 10-bit densely-packed-decimal (DPD) encoding of three binary-coded-decimal (BCD) digits. Binary-coded-chiliad (BCC) encoding, as storage (arithmetic) efficient as DPD (BCD), equivalently packs three BCD digits. No unpacking/packing to/from BCD (...
Conditional speculative mixed decimal/binary adders via binary-coded-chiliad encoding
S0045790615004309
Sample variations are one of the main problems associated with speaker recognition. Most approaches use multiple templates in the gallery database. But, this requires enormous memory space. In order to minimize classification errors and intra-class variations, adaptive online and offline template update methods using v...
Efficient online and offline template update mechanisms for speaker recognition
S0045790615004310
In this paper, a distributed base station cooperation-based handover management method is proposed for WiMAX Point-to-Multi-Point networks to provide quality of service to handover nodes. Moreover, a delay reduction method is proposed to reduce the packet delivery delays during handover. A Call Admission Control (CAC) ...
Handover management framework for WiMAX Point-to-Multi-Point networks
S0045790615004322
This paper proposes an alternative for building a data hiding algorithm into digital images. The method is based on chaos theory and the least significant bit technique for embedding a secret message in a image. Specifically the Bernoulli’s chaotic maps are used, to perform the following processes: (i) encrypt the bits...
A steganographic method using Bernoulli’s chaotic maps
S0045790615004334
Graphical abstract The system bifurcation diagrams for x 1 are shown for harmonic excitation force F ˜ = (a) 1.14 × 10−3, (b) 0.1, (c) 1.0 and (d) 2.0, respectively. There are two intervals of nonlinear motion at 0 < η < 0.006 and 1.248 ≦ η ≦ 2.0, respectively when harmonic excitation force ( F ˜ ) increases to 2.0. Im...
Numerical computation and nonlinear dynamic analysis of ultrasonic cutting system
S0045790615004346
In this paper, we present a set of server selection schemes that includes all crucial components of resources available at each relevant node of the network to reach at the server selection decision and at the same time attempts to maximise the system-wide resource utilisation. First in the series, a server-centric sch...
Server selection schemes for service-oriented computing in mobile pervasive environment
S0045790615004371
The clarity and accuracy of echocardiography images are greatly reduced by speckle noise. Noise suppression, however, is difficult to achieve without also obscuring both rapidly moving structures and object edges. This research seeks to address these challenges by introducing a novel filtering framework based on tempor...
Echocardiography noise reduction using sparse representation
S0045790615004395
This study developed a Kinect microphone array-based method for the voice-based control of humanoid robot exhibitions through speech and speaker recognition. A support vector machine (SVM), a Gaussian mixture model (GMM), and dynamic time warping (DTW) were used for speaker verification, speaker identification, and spe...
Kinect microphone array-based speech and speaker recognition for the exhibition control of humanoid robots
S0045790615004401
Removal of noise and restoration of images has been one of the most interesting researches in the field of image processing in the past few years. Existing filter-based methods can remove image noise; however, they cannot preserve image quality and information such as lines and edges. The proposed noise reduction image...
Noise free image restoration using hybrid filter with adaptive genetic algorithm
S0045790615004413
In cognitive wireless network, throughput scheduling optimization under interference temperature constraints has attracted more attentions in recent years. A lot of works have been investigated on it with different scenarios. However, these solutions have either high computational complexity or relatively poor performa...
Throughput optimization in cognitive wireless network based on clone selection algorithm
S0045790615004449
This paper analyzes the performance of spectrum-sensing-based energy detection (ED) in cognitive radio networks (CRNs) over generalized fading channels. The fading channel is modeled by the extended generalized-K (EGK) distribution. Exact and accurate analytical expressions for the average detection probability with di...
Spectrum-sensing in cognitive radio networks over composite multipath/shadowed fading channels
S0045790615004450
The analysis of the surface Electrocardiogram (ECG) is the most extended non-invasive technique in cardiological diagnosis. The ectopic beats are heart beats remarkably different to the normal beat morphology that provoke serious disturbances in electrocardiographic analysis. These beats are very common in atrial fibri...
An efficient method for ECG beat classification and correction of ectopic beats
S0045790615004474
This study developed an air supply station for air-powered scooters. The station comprised mechanical and electrical systems. The key components of the mechanical system were a high-power air compressor, low-pressure cylinder, pneumatic boosting cylinder, high-pressure accumulator, and target tank. The electrical syste...
System design and mechatronics of an air supply station for air-powered scooters
S0045790615004498
The scalability of Network-on-Chip (NoC) designs has become a rising concern as we enter the manycore era. Multicast support represents a particular yet relevant case within this context, mainly due to the poor performance of NoCs in the presence of this type of traffic. Multicast techniques are typically evaluated usi...
Characterization and modeling of multicast communication in cache-coherent manycore processors
S0045790615004735
This paper proposes two architectures, including an Opportunistic Large Array Concentric Routing Algorithm with Geographic Relay Nodes (OLACRA-GRN) architecture, and an Opportunistic Large Array Concentric Routing Algorithm with Relay Nodes (OLACRA-RN) architecture. First, the OLACRA-GRN architecture with the geographi...
Opportunistic large array concentric routing algorithms with relay nodes for wireless sensor networks
S0045790615004747
Wireless sensor networks comprise nodes with limited power supply. The dense deployment of nodes on a terrain for monitoring the environment causes contention in wireless channels that leads to interference and high energy consumption. The topology of the network changes frequently because of failure of nodes, addition...
Survey on state scheduling-based topology control in unattended wireless sensor networks
S0045790615004760
The joint multipath routing and Network Coding (NC) method has been shown to improve the reliability and energy efficiency of multi-hop-relay wireless sensor networks (WSNs). However, NC is a kind of “all-or-nothing” code: the destination node cannot decode any information unless it successfully receives as many NC cod...
A reliable data transmission scheme based on compressed sensing and network coding for multi-hop-relay wireless sensor networks
S0045790615004772
Extracting river information from remote sensing images is of great importance in the investigation and monitoring of water resources and navigation of ships. In order to extract the river target from remote sensing images more accurately, a method based on image decomposition and distance regularized CV (Chan–Ves...
Automatic river target detection from remote sensing images based on image decomposition and distance regularized CV model
S0045790616000021
A graph grammar is a formal tool for providing rigorous but intuitive ways to define visual languages. Based on an existing graph grammar, this paper proposes new context-sensitive graph grammar formalism called the Extension of Edge-based Graph Grammar, or E-EGG. The E-EGG introduces new mechanisms into grammatical sp...
Bidirectional transformation between BPMN and BPEL with graph grammar
S0045790616000033
Recognition of age-separated face images is a challenging and open research problem. In this paper we propose a facial asymmetry based matching-score space (MSS) approach for recognition of age-separated face images. Motivated by its discriminatory information, we evaluate facial asymmetry across small and large tempor...
The role of facial asymmetry in recognizing age-separated face images
S0045790616000057
The scale-free topology is robust when confronted with random faults, but it is fragile when confronted with selective remove attacks. In this paper, we propose a new scale-free topology model which has both fault-tolerance against random faults and intrusion-tolerance against selective remove attacks at the same time....
A scale-free topology model with fault-tolerance and intrusion-tolerance in wireless sensor networks
S0045790616000069
In this paper, the performance of a turbo coded, triply-Polarized multiple-input multiple-output (MIMO) aided Code Division Multiple Access (CDMA) is investigated for Stanford University Interim (SUI) and Long-term Evolution (LTE) channel model specifications. The minimum mean square error algorithm based on ordered...
Performance of turbo coded triply-Polarized MIMO–CDMA system for downlink communication
S0045790616000070
In wireless LANs (WLANs), handover is usually performed based on either signal power or congestion level. However, considering only the congestion level could be insufficient for handover since it may cause traffic loss. Therefore, besides the load of access points (APs), it is necessary to consider the physical condit...
Physical constraint and load aware seamless handover for IPTV in wireless LANs
S0045790616000094
Due to intra-flow and inter-flow interference problems, the throughput performance decreases dramatically in a multi-hop wireless network. These two kinds of bandwidth unfair sharing problems could cause serious collisions and congestion, hence affecting the performance of multi-hop wireless networks. That is to say, d...
Inter-flow fairness support and enhanced video quality delivery over multi-hop wireless networks
S0045790616000100
This paper proposes a face recognition system based on a steerable pyramid transform (SPT) and local binary pattern (LBP) for e-Health secured login. In an e-Health framework, patients are sometimes unable to identify themselves by traditional login modalities such as username and password. Automatic face recognition c...
Steerable pyramid transform and local binary pattern based robust face recognition for e-health secured login
S0045790616000112
High concentration photovoltaic (HCPV) modules employing high-efficiency III–V solar cells promise greater system-level efficiency than conventional photovoltaic (PV) systems. Nevertheless, the output power of an HCPV system is very sensitive to rapidly fluctuating tracking errors and weather patterns. The fractional o...
A performance evaluation model of a high concentration photovoltaic module with a fractional open circuit voltage-based maximum power point tracking algorithm
S0045790616000136
This paper proposes a face recognition system based on a steerable pyramid transform (SPT) and local binary pattern (LBP) for e-Health secured login. In an e-Health framework, patients are sometimes unable to identify themselves by traditional login modalities such as username and password. Automatic face recognition c...
Image and medical annotations using non-homogeneous 2D ruler learning models
S0045790616000148
Botnet is one of the most serious threats to cyber security as it provides a distributed platform for several illegal activities. Regardless of the availability of numerous methods proposed to detect botnets, still it is a challenging issue as botmasters are continuously improving bots to make them stealthier and evade...
Botnet detection via mining of traffic flow characteristics
S0045790616300015
Switching Devices such as IGBT used in Pulse Width Modulation (PWM) Inverter feeding an induction motor often suffer from different types of incipient faults like improper contact points, poor connections and problematic solder joints. These are due to ageing or prolonged operation in unfriendly environments. These fau...
A combined image processing and Nearest Neighbor Algorithm tool for classification of incipient faults in induction motor drives
S0045790616300027
In this paper, we consider the performance of a cellular uplink (UL) multi-user feedback multiple-input multiple-output (MIMO) system assisted by joint transmitter-receiver (Tx-Rx) design and polarization-multiplexing (PM). PM is realized with the aid of dual and triply-polarized antennas. At the transmitter, we take a...
Performance of uplink feedback MIMO system using joint transmitter-receiver and polarization-multiplexing
S0045790616300039
The Binary Offset Carrier (BOC) modulated signals have been introduced in global navigation satellite systems (GNSS). They possess good frequency compatibility with existing Binary Phase Shift Keying (BPSK) signal. However, this type of modulation creates multiple side peaks in auto correlation function. Therefore it i...
Improving tracking accuracy with subcarrier assistance and code monitoring for BOC modulated signal
S0045790616300040
Modeling traffic flow and gathering accurate traffic congestion information are two challenging problems in smart transportation systems. Most of the traffic flow models and velocity estimation methodologies that have been proposed so far gather the data from GPS-equipped smart phones and extract the flow model based o...
A battery-friendly data acquisition model for vehicular speed estimation
S0045790616300052
In recent years, exchanging data has become far easier with the rapidly growing popularity and increased mobility of mobile devices. However, data exchange between mobile devices is performed as a peer-to-peer communication. Each mobile device that serves as a candidate has a whole range of hardware statuses which may ...
Optimal mobile device selection for round-robin data exchange via adaptive multi-criteria decision analysis
S0045790616300064
Next-generation wireless technology supports notably high data rates and smart hand-held devices together with data processing, which creates a great challenge for moving these contents from server to client. The classical issue of mobile data synchronization for high-speed data networks can be addressed through Softwa...
An improved database synchronization mechanism for mobile data using software-defined networking control
S0045790616300088
Network-on-Chips (NoCs) have become the mainstream for Chip Multi-Processors (CMPs) design. Multicast, a one-to-many communication pattern, is widely used in barrier/clock synchronization, multithreading programs and cache coherence protocols for CMPs. Even though several multicast routing algorithms have been proposed...
An adaptive partition-based multicast routing scheme for mesh-based Networks-on-Chip
S0045790616300106
In this paper, an improved particle swarm optimization guidance (IPSOG) is proposed. The particle swarm optimization guidance (PSOG) is presented to solve nonlinear and dynamic missile guidance problems. However, the miss distance (MD) tends to be large. The objective function of the relative distance in the PSOG leads...
The design of particle swarm optimization guidance using a line-of-sight evaluation method
S0045790616300131
Digital watermarking based biometric images protecting has been an active research focus. In this paper, we propose a face image protection scheme based on semi-fragile self-recoverable watermarking. Authentication watermark is generated from the singular value decomposition (SVD) coefficients for each image block, and...
Semi-fragile self-recoverable watermarking scheme for face image protection
S0045790616300143
Computational complexity and power consumption are prominent issues in wireless telemonitoring applications involving physiological signals. Because of its energy-efficient data reduction procedure, compressed sensing (CS) emerged as a promising framework to address these challenges. In this work, a multi-channel CS fr...
Weighted mixed-norm minimization based joint compressed sensing recovery of multi-channel electrocardiogram signals
S0045790616300155
This study analyzes the vibration signals of fault induction motors for establishing an intelligent motor fault diagnosis system by using an extension neural network (ENN). Extension theory and a neural network (NN) are combined to construct the motor fault diagnosis system, which identifies the most likely fault types...
Fault analysis and diagnosis system for induction motors
S0045790616300167
Energy efficiency (EE) maximization with limited interference to the primary user (PU) is one of the primary concerns in cognitive radio networks (CRNs). To achieve this objective, we first propose an algorithm to select less spatially-correlated secondary users (SUs) to lessen the shadowing effect in wireless environm...
Optimal resource allocation for soft decision fusion-based cooperative spectrum sensing in cognitive radio networks
S0045790616300179
In this paper, we propose a Parzen window entropy based spectrum sensing algorithm for enhancing the signal-to-noise ratio (SNR) wall of cognitive radio primary user detection. We compute the information entropy using a non-parametric Kernel Density Estimation (KDE) method. Single node sensing is extended to cooperativ...
Parzen window entropy based spectrum sensing in cognitive radio
S0045790616300180
Wireless body area networks (WBANs) consist of tiny sensors that enable monitoring the health status of a person. quality of service (QoS) is a major challenge for WBANs due to the importance of vital sign information. Therefore, many QoS-based medium access control (MAC) protocols and technologies have been developed ...
Design and implementation of a new quality of service-aware cross-layer medium access protocol for wireless body area networks
S0045790616300192
To solve the problems of long time delay and low reliability in existing systems, a Two-level Load-balance Monitoring Strategy (TLLBMS) is proposed in this paper. In monitoring terminal level, based on customizable System-on-Chip A2F500, monitoring terminals implement parallel Principal Component Analysis and Independe...
A remote electrocardiogram monitoring system with good swiftness and high reliablility
S0045790616300222
Extreme Learning Machine (ELM) proposes a non-iterative training method for Single Layer Feedforward Neural Networks that provides an effective solution for classification and prediction problems. Its hardware implementation is an important step towards fast, accurate and reconfigurable embedded systems based on neural...
Hardware implementation of real-time Extreme Learning Machine in FPGA: Analysis of precision, resource occupation and performance
S0045790616300246
Nowadays intelligent and pervasive environments are characterized by a great number of devices and sensors that develop continuously and capture enormous amounts of data. Designing a context-aware system able to provide the most tailored services to users according to their behaviors, preferences and needs is still a r...
A smart system to manage the context evolution in the Cultural Heritage domain
S0045790616300258
Feature selection is a well-studied problem in the areas of pattern recognition and artificial intelligence. Apart from reducing computational cost and time, a good feature subset is also imperative in improving the classification accuracy of automated classifiers. In this work, a wrapper-based feature selection approa...
An enhanced harmony search based algorithm for feature selection: Applications in epileptic seizure detection and prediction
S0045790616300271
In this paper, we propose a cross-layer framework for joint routing and rate adaptation in multi-rate, Multi-Channel, Multi-Radio (MCMR) infrastructure Wireless Mesh Networks (WMNs). These networks use MCMR capabilities of mesh routers to achieve high performance. However, the MCMR nodes introduce interference in the m...
A cross-layer framework for joint routing and rate adaptation in infrastructure Wireless Mesh Networks
S0045790616300283
Homeland security represents one of the most relevant application contexts for smart cities, attracting the interest of both authorities and the research community. In case of a crisis event occurring in the urban area, authorities are responsible for effectively managing response operations. A critical challenge in em...
A cloud-based architecture for emergency management and first responders localization in smart city environments
S0045790616300295
This paper presents a reconfigurable fault tolerant routing for Networks-on-Chip organized into hierarchical units. In case of link faults or failure of switches, the proposed approach enables the online adaptation of routing locally within each unit while deadlock freedom is globally ensured in the network. Experiment...
Reconfigurable fault tolerant routing for networks-on-chip with logical hierarchy
S0045790616300301
X-ray angiography images are widely used to identify irregularities in the vascular system. Because of their high spatial resolution and the large amount of images generated daily, coding of X-ray angiography images is becoming essential. This paper proposes a diagnostically lossless coding method based on automatic se...
Diagnostically lossless coding of X-ray angiography images based on background suppression