Results (215)
Search Parameters:
Keyword: AlgorithmsAdvanced Multiple Linear Regression Based Dark Channel Prior Applied on Dehazing Image and Generating Synthetic Haze
Haze removal is an extremely challenging task, and object detection in the hazy environment has recently gained much attention due to the popularity of autonomous driving and traffic surveillance. In this work, the authors propose a multiple linear regression haze removal model based on a widely adopted dehazing algorithm named Dark Channel Prior. Training this…
Read MoreConvolutional Neural Network Based on HOG Feature for Bird Species Detection and Classification
This work is concerned with the detection and classification of birds that have applications like monitoring extinct and migrated birds. Recent computer vision algorithms can precise this kind of task but still there are some dominant issues like low light, very little differences between subspecies of birds, etc are to be studied. As Convolution Neural…
Read MoreNode-Node Data Exchange in IoT Devices Using Twofish and DHE
Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…
Read MoreHomology Modeling of CYP6Z3 Protein of Anopheles Mosquito
The Anopheles gambiae’s CYP6Z3 protein belongs to the Cytochrome P450 family and functions in oxidation-reduction processes, many studies including our previous work on elucidating insecticide resistance genes of the Anopheles also implicated her in pyrethroid insecticide resistance. Model prediction, functional analysis, and enrichment of the target gene with triplex binding sites may become a useful…
Read MoreApplication of Piecewise Linear Approximation of the UAV Trajectory for Adaptive Routing in FANET
A significant problem of routing protocols in the Flying Ad Hoc Networks (FANET) is a significant overhead cost due to the high mobility of networking nodes. The problem is caused by a need to send information messages about locations of unmanned aerial vehicles (UAVs). In order to reduce the amount of service information, the following…
Read MoreUsing Supervised Classification Methods for the Analysis of Multi-spectral Signatures of Rice Varieties in Panama
In this article supervised classification methods for the analysis of local Panamanian rice crops using Near-Infrared (NIR) spectral signatures are assessed. Neural network ( Multilayer Perceptron-MLP) and Tree based (Decision Trees-DT and Random Forest-RF) algorithms are used as regression and supervised classification of the spectral signatures by rice varieties, against other crops and by plant…
Read MoreDesign Approach of an Electric Single-Seat Vehicle with ABS and TCS for Autonomous Driving Based on Q-Learning Algorithm
Compared to other types of autonomous vehicles, the single-seat is the simplest when designing, since its compact design makes it an option that can simplify different mechanical aspects and enhance those of greater importance such as the steering and the braking system. Likewise, the electronic and electrical design may be a great improvement on the…
Read MoreDevelopment and Improvement of Web Services Selections using Immigrants Scheme of Multi-Objective Genetic Algorithm
Quality of service is a significant part of formulating a composing of web services to satisfy the user’s request, especially when several services exist and have been implemented in the same field and functionality. The selection process of web services among many options can be taken based on the quality of service considerations, fitness parameters,…
Read MoreImproved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach
Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…
Read MoreTexture Based Image Retrieval Using Semivariogram and Various Distance Measures
In a content-based image retrieval system(CBIR) feature classification,identification, and ex- traction play an important role. The retrieval of images using a single feature is a challenging task in CBIR systems. The high retrieval rates are reported based on combining multiple features, multiple algorithms and preprocessing steps, feature classification, and segmentation because the image retrieval are…
Read MoreMethod of Technological Forecasting of Market Behaviour of R&D Products
The current concept of open innovation corresponds to the R&D products transfer model – “role changes”. One of the fundamental provisions of the model is that R&D products are considered for commercialization not only at the final stage of technological readiness, but at any of them. In today’s changing market environment, special attention is paid…
Read MoreGene Selection for Cancer Classification: A New Hybrid Filter-C5.0 Approach for Breast Cancer Risk Prediction
Despite the significant progress made in data mining technologies in recent years, breast cancer risk prediction and diagnosis at an early stage using DNA microarray technology still a real challenging task. This challenge comes especially from the high-dimensionality in gene expression data, i.e., an enormous number of genes versus a few tens of subjects (samples).…
Read MoreText Mining Techniques for Cyberbullying Detection: State of the Art
The dramatic growth of social media during the last years has been associated with the emergence of a new bullying types. Platforms such as Facebook, Twitter, YouTube, and others are now privileged ways to disseminate all kinds of information. Indeed, communicating through social media without revealing the real identity has emerged an ideal atmosphere for…
Read MoreDeep Deterministic Policy Gradients for Optimizing Simulated PoA Blockchain Networks Based on Healthcare Data Characteristics
Blockchain technology has proven to be the best solution for digital data storage today, which is decentralized and interconnected via cryptography. Many consensus algorithms can be options for implementation. One of them is the PoA consensus algorithm, which is proven to provide high performance and fault tolerance. Blockchain has been implemented in many sectors, including…
Read MoreA Recommendation Approach in Social Learning Based on K-Means Clustering
E-learning, among the most prominent modes of learning, offers learners the opportunity to attend online courses. To improve the quality of online learning, social learning through social networks promotes interaction and collaboration among learners. As part of the learning process management in these environments, the implementation of recommendation systems facilitates the provision of content adapted…
Read MoreAn Enhanced Artificial Intelligence-Based Approach Applied to Vehicular Traffic Signs Detection and Road Safety Enhancement
The paper treats a problem for detection and recognition objects in computer vision sector, where researchers recommended OpenCV software and development tool, it’s several and better-remembered library resource for isolating, detecting, and recognition of particular objects, what we would find an appropriate system for detecting and recognition traffic roads signs. The robustness with optimization is…
Read MoreData Aggregation, Gathering and Gossiping in Duty-Cycled Multihop Wireless Sensor Networks subject to Physical Interference
Data aggregation, gathering and gossiping are all vital communication tasks in wireless sensor networks (WSNs). When all networking devices are always active, scheduling algorithms for these communication tasks have been extensively investigated under both the protocol and physical interference models. However, wireless devices usually switch between the sleep state and the active state for the…
Read MoreClassification of Wing Chun Basic Hand Movement using Virtual Reality for Wing Chun Training Simulation System
To create a Virtual Reality (VR) system for Wing Chun’s basic hand movement training, capturing, and classifying movement data is an important step. The main goal of this paper is to find the best possible method of classifying hand movement, particularly Wing Chun’s basic hand movements, to be used in the VR training system. This…
Read MoreIndoor Positioning System using WKNN and LSTM Combined via Ensemble Learning
Indoor positioning system (IPS) has become a high demand research field to be developed and has made considerable progress in recent years. Wi-Fi fingerprinting is the most promising technique that produces an acceptable result. However, despite the large amount of research that has been done using Wi-Fi fingerprinting, only a few Wi-Fi based IPS in…
Read MoreAutonomous Robot Path Construction Prototype Using Wireless Sensor Networks
The use of wireless sensor networks (WSN) can be a valuable contribution in disaster situations or life-threatening exploration. Using wireless mobile robots, it is possible to explore vast areas without human intervention. However, the wireless network coverage that can keep mobile robots connected to the base station / gateway is a major limitation. With this…
Read MorePredicting Student Academic Performance Using Data Mining Techniques
There is a crisis in basic education during this pandemic which affected everyone worldwide, we see that teaching and learning have gone online which has effected student performance. Student’s academic performance needs to be predicted to help an instructor identify struggling students more easily and giving teachers a proactive chance to come up with supplementary…
Read MoreEfficient and Scalable Ant Colony Optimization based WSN Routing Protocol for IoT
IoT integrates and connects intelligent devices or objects with varied architectures and resources. The number of IoT devices is growing exponentially. Due to the massive wave of IoT objects, their diversity and heterogeneity among their architectures, the existing communication protocols for wireless networks become ineffective in the context of IoT. Wireless Sensor Network (WSN) has…
Read MoreSentiment Analysis in English Texts
The growing popularity of social media sites has generated a massive amount of data that attracted researchers, decision-makers, and companies to investigate people’s opinions and thoughts in various fields. Sentiment analysis is considered an emerging topic recently. Decision-makers, companies, and service providers as well-considered sentiment analysis as a valuable tool for improvement. This research paper…
Read MoreElasticity Based Med-Cloud Recommendation System for Diabetic Prediction in Cloud Computing Environment
Day to day huge medical data have been accumulating for diabetic diseases. The complexity of storing, processing ,analyzing and predicting the data related to diabetics is not so easy for healthcare professionals .The prediction of accurate results also has the limitation due to scale of data increasing worldwide for patients, symptoms and test results .In…
Read MoreA Computational Modelling and Algorithmic Design Approach of Digital Watermarking in Deep Neural Networks
In this paper we propose an algorithmic approach for Convolutional Neural Network (CNN) for digital watermarking which outperforms the existing frequency domain techniques in all aspects including security along with the criteria in the neural networks such as conditions embedded, and types of watermarking attack. This research addresses digital watermarking in deep neural networks and…
Read More
