A Multi-Objective Deadline-Constrained Task Scheduling Algorithm with Guaranteed Performance in Load Balancing on Heterogeneous Networks
Scheduling of complex workflows in heterogeneous distributed computing systems is a challenging task for their management and optimization of a direct or derived set of parametric values. With a heterogeneous environment, processors may have ...
Synthetic Data Generation System for AI-Based Diabetic Foot Diagnosis
The paucity of readily available medical data poses a major challenge for the development of AI (artificial intelligence)-based healthcare applications and devices. To aid in overcoming this challenge, we propose a sensor-based medical time series ...
Extended Authorization Policy for Graph-Structured Data
The high increase in the use of graph databases also for business- and privacy-critical applications demands for a sophisticated, flexible, fine-grained authorization and access control (AC) approach. Attribute-based access control (ABAC) supports ...
Edge-Based Evolved Packet Core (EPC) Refactoring for High Speed Mobility
The current design of long-term evolution (LTE) deploys Evolved Packet Core (EPC) components in a core network, while data traffic from User Equipment (UEs) is converged to these components. As the number of internet devices increases, this design ...
A Systematic Assessment of Numerical Association Rule Mining Methods
In data mining, the classical association rule mining techniques deal with binary attributes; however, real-world data have a variety of attributes (numerical, categorical, Boolean). To deal with the variety of data attributes, the classical ...
Towards Regulatory-Compliant MLOps: Oravizio’s Journey from a Machine Learning Experiment to a Deployed Certified Medical Product
Agile software development embraces change and manifests working software over comprehensive documentation and responding to change over following a plan. The ability to continuously release software has enabled a development approach where ...
Social Network Users Create Seismic Intensity Maps: An Automatic Approach of the Methodology
Main purpose of current article is to present current state-of-the-art, regarding a methodology for producing seismic intensity maps directly and exclusively from twitter data. The methodology had been presented previously, however, the vast ...
A Novel Feature Extraction Model for Large-Scale Workload Prediction in Cloud Environment
In an enterprise cloud environment, it is difficult to handle an extensive number of loads. Serving the request in very less time leads to resource allocation problem. It is better to have prior knowledge of the incoming loads to auto-scale the ...
Machine Learning Predictive Models for Coronary Artery Disease
- L. J. Muhammad,
- Ibrahem Al-Shourbaji,
- Ahmed Abba Haruna,
- I. A. Mohammed,
- Abdulkadir Ahmad,
- Muhammed Besiru Jibrin
Coronary artery disease (CAD) is the commonest type of heart disease and over 80% of the deaths resulted from the diseases occurred in developing countries including Nigeria, with majority being in those victims are below 70 years of age. Though, ...
Computer Science Students’ Perceptions of Emergency Remote Teaching: An Experience Report
In the first 6 months of 2020, the COVID-19 pandemic forced numerous universities across the globe to quickly transfer all their courses online, a response known as Emergency Remote Teaching. Courses initially designed for face to face delivery ...
CNN Architectures for Geometric Transformation-Invariant Feature Representation in Computer Vision: A Review
One of the main challenges in machine vision relates to the problem of obtaining robust representation of visual features that remain unaffected by geometric transformations. This challenge arises naturally in many practical machine vision tasks. ...
Hausdorff Distance with Outliers and Noise Resilience Capabilities
For years, the Hausdorff distance (HD) has been an indispensable tool to address computer vision and pattern recognition problems. Compared with other metrics, HD incorporates critical details of objects (position and shapes) to output reasonable ...
A Theoretical and Experimental Comparison of Large-Scale Join Algorithms in Spark
Currently, the estimated amount of data created daily have reached the threshold of petabytes or even zettabytes globally. It is no wonder that traditional data processing technologies cannot process and manage extremely large volumes of such ...
An Anatomization Model for Farmer Data Collections
Smart farming is one of the big concepts that are regarding in the world. It is a development technique for modern agricultures. It generally emphasizes the use of data sensors and data communication technologies in conjunction with an appropriate ...
Cervical Cytology Classification Using PCA and GWO Enhanced Deep Features Selection
Cervical cancer is one of the most deadly and common diseases among women worldwide. It is completely curable if diagnosed in an early stage, but the tedious and costly detection procedure makes it unviable to conduct population-wise screening. ...
Improved RPL Protocol for Low-Power and Lossy Network for IoT Environment
The routing protocol for low-power and lossy networks (RPL) has gained considerable popularity in the research community with the advent of the Internet of Things (IoT), primarily because of its versatility to cope with various network topologies ...
Training Neural Networks on Top of Support Vector Machine Models for Classifying Fingerprint Images
We propose to train neural networks on top of support vector machine (SVM) classifiers learned from various visual features for efficiently classifying fingerprint images. Real datasets of fingerprint images are collected from students at the Can ...
Text Region Identification in Indian Street Scene Images Using Stroke Width Transform and Support Vector Machine
Detecting the presence of text in street scene images is a very crucial task for many applications and its complexity may vary from script to script due to the unique characteristics of each script. A technique to detect and localize text written ...
CoviChain: A Blockchain Based Framework for Nonrepudiable Contact Tracing in Healthcare Cyber-Physical Systems During Pandemic Outbreaks
With the world facing the new virus SARS-CoV-2, many countries have introduced instant Internet applications to identify people carrying the infection. Internet-of-Medical-Things (IoMT) have proven useful in collecting medical data as well in ...
Change Detection and Patch Analysis of Sundarban Forest During 1975–2018 Using Remote Sensing and GIS Data
In the present study, change detection of Sundarban forest has been analyzed over the last 43 years (1975–2018) using Normalized Difference Vegetation Index (NDVI). Spectral indices like NDVI method are more superior as compared with the other ...
A Review of Machine Learning Classification Using Quantum Annealing for Real-World Applications
Optimizing the training of a machine learning pipeline helps in reducing training costs and improving model performance. One such optimizing strategy is quantum annealing, which is an emerging computing paradigm that has shown potential in ...
Security and Reliability of Safety-Critical RTOS
Real-Time Operating System (RTOS) presents a computing environment with the ability to react to events within a strictly-defined period. Modern domain-specific (e.g., aerospace, industrial control, defense, and medical) embedded systems include ...
Cross-Layer Design Approaches in Underwater Wireless Sensor Networks: A Survey
The research in Underwater Wireless Sensor Networks (UWSNs) has gained momentum over the last two decades owing to the vast applications it supports like environmental monitoring, underwater exploration, disaster prevention, military, navigation ...