Results (242)
Search Parameters:
Keyword: NetworksUsing the Neural Network to Diagnose the Severity of Heart Disease in Patients Using General Specifications and ECG Signals Received from the Patients
Nowadays, heart diseases cause the maximum death in the world. Also, due to the noticeable increase of heart diseases, studying this field is one of the important matters in medical community. Therefore, this study tries to benefit using information in data base of cardiac arrhythmia and employ arterial intelligent and neural network, in order to…
Read MoreInvestment of Classic Deep CNNs and SVM for Classifying Remote Sensing Images
Feature extraction is an important process in image classification for achieving an efficient accuracy for the classification learning models. One of these methods is using the convolution neural networks. The use of the trained classic deep convolution neural networks as features extraction gives a considerable results in the remote sensing images classification models. So, this…
Read MoreCNN-LSTM Based Model for ECG Arrhythmias and Myocardial Infarction Classification
ECG analysis is commonly used by medical practitioners and cardiologists for monitoring cardiac health. A high-performance automatic ECG classification system is a challenging area because there is difficulty in detecting and clustering various waveforms in the signal, especially in the manual analysis of electrocardiogram (ECG) signals. In this paper, an accurate (ECG) classification and monitoring…
Read MoreAdvances in Optimisation Algorithms and Techniques for Deep Learning
In the last decade, deep learning(DL) has witnessed excellent performances on a variety of problems, including speech recognition, object recognition, detection, and natural language processing (NLP) among many others. Of these applications, one common challenge is to obtain ideal parameters during the training of the deep neural networks (DNN). These typical parameters are obtained by…
Read MoreBayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis.…
Read MoreA Review of RPL Objective Function based Enhancement Approaches
Since the release of of the IPv6 Routing protocol for Low-Power and Lossy Networks by the IETF ROLL working group, several enhancement schemes were proposed. In fact, They aim to extend the network lifetime, reduce congestion, mitigate end to end delay and moderate energy consumption. In fact, considering the vast area of Low-Power and Lossy…
Read MoreDetailed Security Evaluation of ARANz, ARAN and AODV Protocols
Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…
Read MoreConvolutional Neural Network Based Classification of Patients with Pneumonia using X-ray Lung Images
Analysis and classification of lung diseases using X-ray images is a primary step in the procedure of pneumonia diagnosis, especially in a critical period as pandemic of COVID-19 that is type of pneumonia. Therefore, an automatic method with high accuracy of classification is needed to perform classification of lung diseases due to the increasing number…
Read MoreAnalysis of Security-Reliability Trade-off for Multi-hop Cognitive Relaying Protocol with TAS/SC Technique
This paper studies a trade-off between security (intercept probability (IP)) and reliability (outage probability (OP)) for a multi-hop decode-and-forward (DF) relaying protocol in an underlay cognitive radio network, in presence of a multi-antenna eavesdropper. In the considered protocol, all primary and secondary terminals are equipped with multiple antennas, and they employ transmit antenna selection (TAS)…
Read MoreLearning the Influence between Partially Observable Processes using Scorebased Structure Learning
The difficulty of learning the underlying structure between processes is a common task found throughout the sciences, however not much work is dedicated towards this problem. In this paper, we attempt to use the language of structure learning to address learning the dynamic influence network between partially observable processes represented as dynamic Bayesian networks. The…
Read MoreThe Effects of Transmission Power and Modulation Schemes on the Performance of WBANs in on-Body Medical Applications
Wireless Body Area Networks support the operation within multiple frequency bands. Thus, they can be integrated in several applications, one of which is on-body medical monitoring applications, as concerned in this paper. Therefore, the purpose of this study is to present the impact of transmission power and both of Differential Binary Phase Shift Keying and…
Read MoreA Method for Detecting Human Presence and Movement Using Impulse Radar
Using non-invasive and non-contact sensors to measure a person’s presence or movement helps improve the quality of life for both healthy people and patients. In this paper, a method of measuring the presence and motion of a person is proposed by utilizing UWB Impulse Radar, which is low power consumption and safe to radiate to…
Read MoreA Review on Cross-Layer Design Approach in WSN by Different Techniques
Wireless Sensor Networks (WSN) include a large number of sensor nodes that are connected to each other with the limitations in energy sources, battery life, memory, mobility and computational capacity. Since the traditional layered architecture was appropriate only for the wired network. It works within a strict boundary that leads to more energy usage as…
Read MoreMachine Learning for Network Intrusion Detection Based on SVM Binary Classification Model
Recently, the number of connected machines around the worldwide has become very large, generating a huge amount of data either to be stored or to be communicated. Data protection is a concern for all institutions, it is difficult to manage the masses of data that are susceptible to multiple threats. In this work, we present…
Read MoreHuman-Robot Multilingual Verbal Communication – The Ontological knowledge and Learning-based Models
In their verbal interactions, humans are often afforded with language barriers and communication problems and disabilities. This problem is even more serious in the fields of education and health care for children with special needs. The use of robotic agents, notably humanoids integrated within human groups, is a very important option to face these limitations.…
Read MoreArtificial Intelligence Approach for Target Classification: A State of the Art
The classification of static or mobile objects, from a signal or an image containing information as to their structure or their form, constitutes a constant concern of specialists in the electronic field. The remarkable progress made in past years, particularly in the development of neural networks and artificial intelligence systems, has further accentuated this trend.…
Read MoreA CNN-based Differential Image Processing Approach for Rainfall Classification
With the aim of preventing hydro-geological risks and overcoming the problems of current rain gauges, this paper proposes a low-complexity and cost-effective video rain gauge. In particular, in this paper the authors propose a new approach to rainfall classification based on image processing and video matching process employing convolutional neural networks (CNN). The system consists…
Read MoreDistributed Microphone Arrays, Emerging Speech and Audio Signal Processing Platforms: A Review
Given ubiquitous digital devices with recording capability, distributed microphone arrays are emerging recording tools for hands-free communications and spontaneous tele-conferencings. However, the analysis of signals recorded with diverse sampling rates, time delays, and qualities by distributed microphone arrays is not straightforward and entails important considerations. The crucial challenges include the unknown/changeable geometry of distributed arrays,…
Read MoreDeep Learning Model for A Driver Assistance System to Increase Visibility on A Foggy Road
For many years, a lot of researches have been made to develop Advanced Driver Assistance Systems (ADAS) that are based on integrated systems. The main objective is to help drivers. Hence, keeping them safe under different driving conditions. Visibility for drivers remains the biggest problem faced on the road in an atmosphere of fog. In…
Read MoreCluster Centroid-Based Energy Efficient Routing Protocol for WSN-Assisted IoT
Wireless sensor network is highly resource constrained, where energy efficiency and network lifetime plays a major role for its sustenance. As the sensor nodes are battery operated and deployed in hostile environments, either recharging or replacement of batteries in sensor nodes is not possible after its deployment in inaccessible areas. In such condition, energy is…
Read MoreDynamic Decision-Making Process in the Opportunistic Spectrum Access
We investigate in this paper many problems related to the decision-making process in the Cognitive Radio (CR), where a Secondary User (SU) tries to maximize its opportunities by finding the most vacant channel. Recently, Multi-Armed Bandit (MAB) problems attracted the attention to help a single SU, in the context of CR, makes an optimal decision…
Read MoreMalware Classification Based on System Call Sequences Using Deep Learning
Malware has always been a big problem for companies, government agencies, and individuals because people still use it as a primary tool to influence networks, applications, and computer operating systems to gain unilateral benefits. Until now, malware detection with heuristic and signature-based methods are still struggling to keep up with the evolution of malware. Machine…
Read MoreA Survey on 3D Hand Skeleton and Pose Estimation by Convolutional Neural Network
Restoring, estimating the fully 3D hand skeleton and pose from the image data of the captured sensors/cameras applied in many applications of computer vision and robotics: human-computer interaction; gesture recognition, interactive games, Computer-Aided Design (CAD), sign languages, action recognition, etc. These are applications that flourish in Virtual Reality and Augmented Reality (VR/AR) technologies. Previous survey…
Read MoreA Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization
Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…
Read MoreNon Parallelism and Cayley-Menger Determinant in Submerged Localization
This research paper portraits the technique to determine location of submerged nodes with Cayley-Menger determinant and associated problems with non-parallel states. Cayley-Menger determinant is considered to be the usual means to determine the coordinates of the nodes with a single node where the plane of beacon i.e. beacon’s surfing plane and the plane created by…
Read More
