Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 10 Nov 2024Bibliometrics
research-article
Verified Model Checking for Conjunctive Positive Logic
Abstract

We formalize, in the Dafny language and verifier, a proof system PS for deciding the model checking problem of the fragment of first-order logic, denoted FO(,,), known as conjunctive positive logic (CPL). We mechanize the proofs of soundness ...

research-article
A Multi-Objective Deadline-Constrained Task Scheduling Algorithm with Guaranteed Performance in Load Balancing on Heterogeneous Networks
Abstract

Scheduling of complex workflows in heterogeneous distributed computing systems is a challenging task for their management and optimization of a direct or derived set of parametric values. With a heterogeneous environment, processors may have ...

research-article
Synthetic Data Generation System for AI-Based Diabetic Foot Diagnosis
Abstract

The paucity of readily available medical data poses a major challenge for the development of AI (artificial intelligence)-based healthcare applications and devices. To aid in overcoming this challenge, we propose a sensor-based medical time series ...

research-article
Extended Authorization Policy for Graph-Structured Data
Abstract

The high increase in the use of graph databases also for business- and privacy-critical applications demands for a sophisticated, flexible, fine-grained authorization and access control (AC) approach. Attribute-based access control (ABAC) supports ...

research-article
Studies of Norm-Based Locality Measures of Two-Dimensional Hilbert Curves
Abstract

A discrete space-filling curve provides a one-dimensional indexing or traversal of a multi-dimensional grid space. Sample applications of space-filling curves include multi-dimensional indexing methods, data structures and algorithms, parallel ...

research-article
A Model-Driven Approach for Enforcing Fine-Grained Access Control for SQL Queries
Abstract

In this paper, we propose a novel, model-driven approach for enforcing fine-grained access control (FGAC) policies when executing SQL queries. More concretely, we define a function SecQuery() that, given an FGAC policy S and an SQL select-...

research-article
Edge-Based Evolved Packet Core (EPC) Refactoring for High Speed Mobility
Abstract

The current design of long-term evolution (LTE) deploys Evolved Packet Core (EPC) components in a core network, while data traffic from User Equipment (UEs) is converged to these components. As the number of internet devices increases, this design ...

review-article
A Systematic Assessment of Numerical Association Rule Mining Methods
Abstract

In data mining, the classical association rule mining techniques deal with binary attributes; however, real-world data have a variety of attributes (numerical, categorical, Boolean). To deal with the variety of data attributes, the classical ...

research-article
Towards Regulatory-Compliant MLOps: Oravizio’s Journey from a Machine Learning Experiment to a Deployed Certified Medical Product
Abstract

Agile software development embraces change and manifests working software over comprehensive documentation and responding to change over following a plan. The ability to continuously release software has enabled a development approach where ...

research-article
Social Network Users Create Seismic Intensity Maps: An Automatic Approach of the Methodology
Abstract

Main purpose of current article is to present current state-of-the-art, regarding a methodology for producing seismic intensity maps directly and exclusively from twitter data. The methodology had been presented previously, however, the vast ...

research-article
A Novel Feature Extraction Model for Large-Scale Workload Prediction in Cloud Environment
Abstract

In an enterprise cloud environment, it is difficult to handle an extensive number of loads. Serving the request in very less time leads to resource allocation problem. It is better to have prior knowledge of the incoming loads to auto-scale the ...

research-article
Machine Learning Predictive Models for Coronary Artery Disease
Abstract

Coronary artery disease (CAD) is the commonest type of heart disease and over 80% of the deaths resulted from the diseases occurred in developing countries including Nigeria, with majority being in those victims are below 70 years of age. Though, ...

research-article
Computer Science Students’ Perceptions of Emergency Remote Teaching: An Experience Report
Abstract

In the first 6 months of 2020, the COVID-19 pandemic forced numerous universities across the globe to quickly transfer all their courses online, a response known as Emergency Remote Teaching. Courses initially designed for face to face delivery ...

research-article
CNN Architectures for Geometric Transformation-Invariant Feature Representation in Computer Vision: A Review
Abstract

One of the main challenges in machine vision relates to the problem of obtaining robust representation of visual features that remain unaffected by geometric transformations. This challenge arises naturally in many practical machine vision tasks. ...

research-article
Hausdorff Distance with Outliers and Noise Resilience Capabilities
Abstract

For years, the Hausdorff distance (HD) has been an indispensable tool to address computer vision and pattern recognition problems. Compared with other metrics, HD incorporates critical details of objects (position and shapes) to output reasonable ...

research-article
A Theoretical and Experimental Comparison of Large-Scale Join Algorithms in Spark
Abstract

Currently, the estimated amount of data created daily have reached the threshold of petabytes or even zettabytes globally. It is no wonder that traditional data processing technologies cannot process and manage extremely large volumes of such ...

research-article
An Anatomization Model for Farmer Data Collections
Abstract

Smart farming is one of the big concepts that are regarding in the world. It is a development technique for modern agricultures. It generally emphasizes the use of data sensors and data communication technologies in conjunction with an appropriate ...

research-article
Cervical Cytology Classification Using PCA and GWO Enhanced Deep Features Selection
Abstract

Cervical cancer is one of the most deadly and common diseases among women worldwide. It is completely curable if diagnosed in an early stage, but the tedious and costly detection procedure makes it unviable to conduct population-wise screening. ...

research-article
Improved RPL Protocol for Low-Power and Lossy Network for IoT Environment
Abstract

The routing protocol for low-power and lossy networks (RPL) has gained considerable popularity in the research community with the advent of the Internet of Things (IoT), primarily because of its versatility to cope with various network topologies ...

research-article
Training Neural Networks on Top of Support Vector Machine Models for Classifying Fingerprint Images
Abstract

We propose to train neural networks on top of support vector machine (SVM) classifiers learned from various visual features for efficiently classifying fingerprint images. Real datasets of fingerprint images are collected from students at the Can ...

research-article
Machine Learning-Based Anxiety Detection in Older Adults Using Wristband Sensors and Context Feature
Abstract

This paper explores a novel method for anxiety detection in older adults using simple wristband sensors such as electrodermal activity (EDA) and photoplethysmogram (PPG) and a context-based feature. The proposed method for anxiety detection ...

research-article
Text Region Identification in Indian Street Scene Images Using Stroke Width Transform and Support Vector Machine
Abstract

Detecting the presence of text in street scene images is a very crucial task for many applications and its complexity may vary from script to script due to the unique characteristics of each script. A technique to detect and localize text written ...

research-article
CoviChain: A Blockchain Based Framework for Nonrepudiable Contact Tracing in Healthcare Cyber-Physical Systems During Pandemic Outbreaks
Abstract

With the world facing the new virus SARS-CoV-2, many countries have introduced instant Internet applications to identify people carrying the infection. Internet-of-Medical-Things (IoMT) have proven useful in collecting medical data as well in ...

research-article
D2D NOMA Groupcast in 5G Heterogeneous Networks
Abstract

In traditional 5G latency-driven assignment methodologies, a radio carrier’s numerology is typically fixed for any given QoS flow, as directed by the QoS requirements. Unfortunately, a drawback to 5G’s radio carrier numerology assignment approach ...

research-article
Efficient Hardware Implementation of Decision Tree Training Accelerator
Abstract

In this paper, a serial architecture for acceleration and implementation of Decision Tree (DT) training algorithm has been proposed. This architecture is compatible with 32-bit integer as well as fixed-point training data. In the worst case ...

research-article
Change Detection and Patch Analysis of Sundarban Forest During 1975–2018 Using Remote Sensing and GIS Data
Abstract

In the present study, change detection of Sundarban forest has been analyzed over the last 43 years (1975–2018) using Normalized Difference Vegetation Index (NDVI). Spectral indices like NDVI method are more superior as compared with the other ...

research-article
A Review of Machine Learning Classification Using Quantum Annealing for Real-World Applications
Abstract

Optimizing the training of a machine learning pipeline helps in reducing training costs and improving model performance. One such optimizing strategy is quantum annealing, which is an emerging computing paradigm that has shown potential in ...

review-article
Security and Reliability of Safety-Critical RTOS
Abstract

Real-Time Operating System (RTOS) presents a computing environment with the ability to react to events within a strictly-defined period. Modern domain-specific (e.g., aerospace, industrial control, defense, and medical) embedded systems include ...

research-article
Cross-Layer Design Approaches in Underwater Wireless Sensor Networks: A Survey
Abstract

The research in Underwater Wireless Sensor Networks (UWSNs) has gained momentum over the last two decades owing to the vast applications it supports like environmental monitoring, underwater exploration, disaster prevention, military, navigation ...

Comments