Even though various wireless Net- work Access Technologies (NATs) with dif- ferent specifications and applications have been developed in the recent years, no single wireless technology alone can satisfy the any- ti...Even though various wireless Net- work Access Technologies (NATs) with dif- ferent specifications and applications have been developed in the recent years, no single wireless technology alone can satisfy the any- time, anywhere, and any service wire- less-access needs of mobile users. A real seamless wireless mobile environment is only realized by considering vertical and horizontal handoffs together. One of the major design issues in heterogeneous wireless networks is the support of Vertical Handoff (VHO). VHO occurs when a multi-interface enabled mobile terminal changes its Point of Attachment (PoA) from one type of wireless access technology to another, while maintaining an active session. In this paper we present a novel multi-criteria VHO algorithm, which chooses the target NAT based on several factors such as user preferences, system parameters, and traf- tic-types with varying Quality of Service (QoS) requirements. Two modules i.e., VHO Neces- sity Estimation (VHONE) module and target NAT selection module, are designed. Both modules utilize several "weighted" users' and system's parameters. To improve the robust- ness of the proposed algorithm, the weighting system is designed based on the concept of fuzzy linguistic variables.展开更多
As a production quality index of hematite grinding process,particle size(PS)is hard to be measured in real time.To achieve the PS estimation,this paper proposes a novel data driven model of PS using stochastic configu...As a production quality index of hematite grinding process,particle size(PS)is hard to be measured in real time.To achieve the PS estimation,this paper proposes a novel data driven model of PS using stochastic configuration network(SCN)with robust technique,namely,robust SCN(RSCN).Firstly,this paper proves the universal approximation property of RSCN with weighted least squares technique.Secondly,three robust algorithms are presented by employing M-estimation with Huber loss function,M-estimation with interquartile range(IQR)and nonparametric kernel density estimation(NKDE)function respectively to set the penalty weight.Comparison experiments are first carried out based on the UCI standard data sets to verify the effectiveness of these methods,and then the data-driven PS model based on the robust algorithms are established and verified.Experimental results show that the RSCN has an excellent performance for the PS estimation.展开更多
Objective: To explore the core acupoints and combination rules of auricular acupoint therapy for simple obesity, and to further analyze the characteristics of the prescription of auricular acupoint therapy for simple...Objective: To explore the core acupoints and combination rules of auricular acupoint therapy for simple obesity, and to further analyze the characteristics of the prescription of auricular acupoint therapy for simple obesity.Methods: Relevant clinical study literature in recent 30 years in PubMed, China Biology Medicine disc(CBM), China National Knowledge Infrastructure(CNKI), Wan Fang Database. VIP Database and TCM Online Database was retrieved, and eligible articles were selected in order to build a prescription database of auricular acupoint therapy for simple obesity. On the basis of complex network techniques, the core acupoints and combination rules of auricular acupoint therapy for simple obesity were analyzed, and the characteristics of auricular acupoint therapy for simple obesity were analyzed comprehensively.Results: There were 46 network nodes of auricular acupoint. The top 16 core acupoints for auricular acupoint therapy for simple obesity included Nèifēnmì(内分泌CO18), Pí(脾CO13), Wèi(胃CO4), Sānjiāo(三焦CO17), Jīdiǎn(饥点).Shénmén(神门TF4). Dàcháng(大肠CO7). Pízhìxià(皮质下AT4). Fèi(肺CO14). Shèn(肾CO10). Jiāogǎn(交感AH6 a), Kǒu(口CO1),Gān(肝CO12). Xiǎocháng(小肠CO6) and Nǎo(脑). The combination of auricular acupoints was mainly based on the main indications of acupoints. The analysis of auricular acupoints combination indicated that the combination of CO4 with CO18 was applied most frequently, which was followed by the combinations of CO13 with CO18 and CO13 with C04. According to the analysis of auricular acupoint stimulation methods, ear point taping and pressing with Wángbùliúxíng(王不留行,Semen Vaccariae) seeds was used frequently, which was followed by magnetic beads taping and pressing and pyonex therapy. Auricular acupoint therapy combined with acupuncture for simple obesity was used most commonly, which was followed by auricular acupoint therapy combined with catgut embedment in acupoint and simple auricular acupoint therapy.Conclusion: In this study, the core acupoints and combinations of auricular acupoint therapy for simple obesity were explored effectively, and the pressing materials and major combined intervention methods were summarized and analyzed, thus providing references and treatment thoughts in terms of the point and prescription selection of auricular acupoint therapy for simple obesity.展开更多
In this paper, we focus on the robust adaptive synchronization between two coupled chaotic neural networks with all the parameters unknown and time-varying delay. In order to increase the robustness of the two coupled...In this paper, we focus on the robust adaptive synchronization between two coupled chaotic neural networks with all the parameters unknown and time-varying delay. In order to increase the robustness of the two coupled neural networks, the key idea is that a sliding-mode-type controller is employed. Moreover, without the estimate values of the network unknown parameters taken as an updating object, a new updating object is introduced in the constructing of controller. Using the proposed controller, without any requirements for the boundedness, monotonicity and differentiability of activation functions, and symmetry of connections, the two coupled chaotic neural networks can achieve global robust synchronization no matter what their initial states are. Finally, the numerical simulation validates the effectiveness and feasibility of the proposed technique.展开更多
The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks ...The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks (WSNs). In the duty cycle-based WSNs, the network lifetime is improved and the network transmission is increased as compared to conventional routing protocols. In this study, the active period of the duty cycle is divided into slots that can minimize the idle listening problem. The slot scheduling technique helps determine the most efficient node that uses the active period. The proposed routing protocol uses the opportunistic concept to minimize the sender waiting problem. Therefore, the forwarder set will be selected according to the node's residual active time and energy. Further, the optimum routing path is selected to achieve the minimum forwarding delay from the source to the destination. Simulation analysis reveals that the proposed routing scheme outperforms existing schemes in terms of the average transmission delay, energy consumption, and network throughput.展开更多
Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal d...Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal discharges.Gaining more detailed information on brain network alterations can help us to further understand the mechanisms of epilepsy and pave the way for brain network-based precise therapeutic approaches in clinical practice.An increasing number of advanced neuroimaging techniques and electrophysiological techniques such as diffusion tensor imaging-based fiber tra ctography,diffusion kurtosis imaging-based fiber tractography,fiber ball imagingbased tra ctography,electroencephalography,functional magnetic resonance imaging,magnetoencephalography,positron emission tomography,molecular imaging,and functional ultrasound imaging have been extensively used to delineate epileptic networks.In this review,we summarize the relevant neuroimaging and neuroelectrophysiological techniques for assessing structural and functional brain networks in patients with epilepsy,and extensively analyze the imaging mechanisms,advantages,limitations,and clinical application ranges of each technique.A greater focus on emerging advanced technologies,new data analysis software,a combination of multiple techniques,and the construction of personalized virtual epilepsy models can provide a theoretical basis to better understand the brain network mechanisms of epilepsy and make surgical decisions.展开更多
Highway traffic safety is an issue confronting developing countries and those of industrialized nations. Nigeria, as a developing country, has been experiencing unusually high traffic related injury and fatality rates...Highway traffic safety is an issue confronting developing countries and those of industrialized nations. Nigeria, as a developing country, has been experiencing unusually high traffic related injury and fatality rates. In order to commence combating highway safety problems in Nigeria, the first task is to identify the major contributing factors; however, Nigeria has no reliable and comprehensive database of traffic accidents and casualties. Consequently, the Delphi technique was utilized in generating the required data such as number of registered automobiles, number of licensed drivers, and annual fatality count for modeling and forecasting accident rates in Nigeria. A Bayesian network model was developed and used, with the data obtained from Delphi process, to demonstrate possible traffic safety responses to different scenarios of changes in the Nigerian socio-political culture. Although the Delphi technique and the Bayesian network model only estimate the accident and safety data, those methods can be a realistic option when those data are not available, especially for the developing countries. As a result, the major accident contributors have been identified and the top three contributors-road condition, DUI (driving under the influence) and reckless driving-are policy related. The Nigerian traffic safety outlook would improve significantly if the existing laws and policies can be enforced, even at a very moderate level.展开更多
The global stability problem of Takagi-Sugeno(T-S) fuzzy Hopfield neural networks(FHNNs) with time delays is investigated.Novel LMI-based stability criteria are obtained by using Lyapunov functional theory to guar...The global stability problem of Takagi-Sugeno(T-S) fuzzy Hopfield neural networks(FHNNs) with time delays is investigated.Novel LMI-based stability criteria are obtained by using Lyapunov functional theory to guarantee the asymptotic stability of the FHNNs with less conservatism.Firstly,using both Finsler's lemma and an improved homogeneous matrix polynomial technique,and applying an affine parameter-dependent Lyapunov-Krasovskii functional,we obtain the convergent LMI-based stability criteria.Algebraic properties of the fuzzy membership functions in the unit simplex are considered in the process of stability analysis via the homogeneous matrix polynomials technique.Secondly,to further reduce the conservatism,a new right-hand-side slack variables introducing technique is also proposed in terms of LMIs,which is suitable to the homogeneous matrix polynomials setting.Finally,two illustrative examples are given to show the efficiency of the proposed approaches.展开更多
Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads t...Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads to lower the lifetime of WSN. For that, it raises the need to develop energy efficient solutions to keep WSN functioning for the longest period of time. Due to the fact that most of the nodes energy is spent on data transmission, many routing techniques in the literature have been proposed to expand the network lifetime such as the Online Maximum Lifetime heuristics (OML) and capacity maximization (CMAX). In this paper, we introduce an efficient priority based routing power management heuristic in order to increase both coverage and extend lifetime by managing the power at the sensor level. We accomplished that by setting priority metric in addition to dividing the node energy into two ratios;one for the sensor node originated data and the other part is for data relays from other sensors. This heuristic, which is called pERPMT (priority Efficient Routing Power Management Technique), has been applied to two well know routing techniques. Results from running extensive simulation runs revealed the superiority of the new methodology pERPMT over existing heuristics. The pEPRMT increases the lifetime up to 77% and 54% when compared to OML and CMAX respectively.展开更多
This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the second...This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques.展开更多
Considering the environmental protection, forest fire becomes a more and more serious problem and requires more concerns. This paper provides an efficient method for fire monitoring and detection in forests using wire...Considering the environmental protection, forest fire becomes a more and more serious problem and requires more concerns. This paper provides an efficient method for fire monitoring and detection in forests using wireless sensor network technology. The proposed technique estimates the location of a sensor node based on the current set of hop-count values, which are collected through the anchor nodes’ broadcast. Our algorithm incorporates two salient features;grid-based output and event-triggering mechanism, to improve the accuracy while reducing the power consumption. Through the computer simulation, the output region obtained from our algorithm can always cover the target node. In addition, the algorithm was implemented and tested with a set of Crossbow sensors. Experimental results demonstrated the high feasibility and worked well in real environment.展开更多
Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended a...Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended area with non-rechargeable batteries. Power management can be done by different methods of routing protocols. The proposed Reliable Rim Routing (3R) technique is based on hybrid routing protocol for homogeneous and heterogeneous system for WSNs to ameliorate the performance of the overall system. In 3R, total node deployment area can be multipart in terms of rim and in each rim, and some of the sensor nodes transmit their sensed data directly to base station, and meanwhile remaining sensor nodes send the data through clustering technique to base station like SEP. Proposed 3R technique implementation proves its enhanced WSNs lifetime of 70% energy consumption and 40% throughput compared with existing protocols. Simulation and evaluation results outperformed in terms of energy consumption with increased throughput and network lifetime.展开更多
The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It ...The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It will effect in a large number of applications such as smart living, smart home, healthcare systems, smart manufacturing, environment monitoring, and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially hybrid techniques that can be applied with healthcare applications in IoT environment.展开更多
DRASTIC is a very simple and common model used for the assessment of groundwater to contamination.This model is widely used across the world in various hydrogeological environments for groundwater vulnerability assess...DRASTIC is a very simple and common model used for the assessment of groundwater to contamination.This model is widely used across the world in various hydrogeological environments for groundwater vulnerability assessment.The Ohio Water Well Association(OWWA)developed DRASTIC model in 1987.Over the years,several modifications have been made in this model as per the need of the regional assessment of groundwater to contamination.This model has fixed weights for its parameters and fixed ratings for the sub-parameters under the main parameters.The weights and ratings of DRASTIC parameters were fixed on the basis of Delphi network technique,which is the best technique for the consensus-building of experts,but it lacks scientific explanations.Over the years,several optimization techniques have been used to optimize these weights and ratings.This work intends to present a critical analysis of decision optimization techniques used to get the optimum values of weights and ratings.The inherent pros and cons and the optimization challenges associated with these techniques have also been discussed.The finding of this study is that the application of MCDA optimization techniques used to optimize the weights and ratings of DRASTIC model to assess the vulnerability of groundwater depend on the availability of hydrogeological data,the pilot study area and the level of required accuracy for earmarking the vulnerable regions.It is recommended that one must choose the appropriate MCDA technique for the particular region because unnecessary complex structure for optimization process takes more time,efforts,resources,and implementation costs.展开更多
Vehicular Social Networks(VSNs)is the bridge of social networks and Vehicular Ad-Hoc Networks(VANETs).VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicl...Vehicular Social Networks(VSNs)is the bridge of social networks and Vehicular Ad-Hoc Networks(VANETs).VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle(V2V)and Vehicle-to-Infrastructure(V2I)communication protocols.Vehicular Named Data Networking(VNDN)is an auspicious communication paradigm for the challenging VSN environment since it can optimize content dissemination by decoupling contents from their physical locations.However,content dissemination and caching represent crucial challenges in VSNs due to short link lifetime and intermittent connectivity caused by vehicles’high mobility.Our aim with this paper is to improve content delivery and cache hit ratio,as well as decrease the transmission delay between end-users.In this regard,we propose a novel hybrid VNDN-VSN forwarding technique based on social communities,which allows requester vehicles to easily find the most suitable forwarder or producer among the community members in their neighborhood area.Furthermore,we introduce an effective caching mechanism by dividing the content store into two parts,one for community private contents and the second one for public contents.Simulation results show that our proposed forwarding technique can achieve a favorable performance compared with traditional VNDN,in terms of data delivery ratio,average data delivery delay,and cache hit ratio.展开更多
As far as the present state is concerned in detecting the behavioral pattern of humans(subject)using morphological image processing,a considerable portion of the study has been conducted utilizing frontal vision data ...As far as the present state is concerned in detecting the behavioral pattern of humans(subject)using morphological image processing,a considerable portion of the study has been conducted utilizing frontal vision data of human faces.The present research work had used a side vision of human-face data to develop a theoretical framework via a hybrid analytical model approach.In this example,hybridization includes an artificial neural network(ANN)with a genetic algorithm(GA).We researched the geometrical properties extracted from side-vision human-face data.An additional study was conducted to determine the ideal number of geometrical characteristics to pick while clustering.The close vicinity ofminimum distance measurements is done for these clusters,mapped for proper classification and decision process of behavioral pattern.To identify the data acquired,support vector machines and artificial neural networks are utilized.A method known as an adaptiveunidirectional associative memory(AUTAM)was used to map one side of a human face to the other side of the same subject.The behavioral pattern has been detected based on two-class problem classification,and the decision process has been done using a genetic algorithm with best-fit measurements.The developed algorithm in the present work has been tested by considering a dataset of 100 subjects and tested using standard databases like FERET,Multi-PIE,Yale Face database,RTR,CASIA,etc.The complexity measures have also been calculated under worst-case and best-case situations.展开更多
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy...Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.展开更多
One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks ba...One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.展开更多
文摘Even though various wireless Net- work Access Technologies (NATs) with dif- ferent specifications and applications have been developed in the recent years, no single wireless technology alone can satisfy the any- time, anywhere, and any service wire- less-access needs of mobile users. A real seamless wireless mobile environment is only realized by considering vertical and horizontal handoffs together. One of the major design issues in heterogeneous wireless networks is the support of Vertical Handoff (VHO). VHO occurs when a multi-interface enabled mobile terminal changes its Point of Attachment (PoA) from one type of wireless access technology to another, while maintaining an active session. In this paper we present a novel multi-criteria VHO algorithm, which chooses the target NAT based on several factors such as user preferences, system parameters, and traf- tic-types with varying Quality of Service (QoS) requirements. Two modules i.e., VHO Neces- sity Estimation (VHONE) module and target NAT selection module, are designed. Both modules utilize several "weighted" users' and system's parameters. To improve the robust- ness of the proposed algorithm, the weighting system is designed based on the concept of fuzzy linguistic variables.
基金Projects(61603393,61741318)supported in part by the National Natural Science Foundation of ChinaProject(BK20160275)supported by the Natural Science Foundation of Jiangsu Province,China+1 种基金Project(2015M581885)supported by the Postdoctoral Science Foundation of ChinaProject(PAL-N201706)supported by the Open Project Foundation of State Key Laboratory of Synthetical Automation for Process Industries of Northeastern University,China
文摘As a production quality index of hematite grinding process,particle size(PS)is hard to be measured in real time.To achieve the PS estimation,this paper proposes a novel data driven model of PS using stochastic configuration network(SCN)with robust technique,namely,robust SCN(RSCN).Firstly,this paper proves the universal approximation property of RSCN with weighted least squares technique.Secondly,three robust algorithms are presented by employing M-estimation with Huber loss function,M-estimation with interquartile range(IQR)and nonparametric kernel density estimation(NKDE)function respectively to set the penalty weight.Comparison experiments are first carried out based on the UCI standard data sets to verify the effectiveness of these methods,and then the data-driven PS model based on the robust algorithms are established and verified.Experimental results show that the RSCN has an excellent performance for the PS estimation.
基金Supported by special program of scientific research in Traditional Chinese Medicine in 2015(201507003)National Natural Science Foundation of China(81674081)~~
文摘Objective: To explore the core acupoints and combination rules of auricular acupoint therapy for simple obesity, and to further analyze the characteristics of the prescription of auricular acupoint therapy for simple obesity.Methods: Relevant clinical study literature in recent 30 years in PubMed, China Biology Medicine disc(CBM), China National Knowledge Infrastructure(CNKI), Wan Fang Database. VIP Database and TCM Online Database was retrieved, and eligible articles were selected in order to build a prescription database of auricular acupoint therapy for simple obesity. On the basis of complex network techniques, the core acupoints and combination rules of auricular acupoint therapy for simple obesity were analyzed, and the characteristics of auricular acupoint therapy for simple obesity were analyzed comprehensively.Results: There were 46 network nodes of auricular acupoint. The top 16 core acupoints for auricular acupoint therapy for simple obesity included Nèifēnmì(内分泌CO18), Pí(脾CO13), Wèi(胃CO4), Sānjiāo(三焦CO17), Jīdiǎn(饥点).Shénmén(神门TF4). Dàcháng(大肠CO7). Pízhìxià(皮质下AT4). Fèi(肺CO14). Shèn(肾CO10). Jiāogǎn(交感AH6 a), Kǒu(口CO1),Gān(肝CO12). Xiǎocháng(小肠CO6) and Nǎo(脑). The combination of auricular acupoints was mainly based on the main indications of acupoints. The analysis of auricular acupoints combination indicated that the combination of CO4 with CO18 was applied most frequently, which was followed by the combinations of CO13 with CO18 and CO13 with C04. According to the analysis of auricular acupoint stimulation methods, ear point taping and pressing with Wángbùliúxíng(王不留行,Semen Vaccariae) seeds was used frequently, which was followed by magnetic beads taping and pressing and pyonex therapy. Auricular acupoint therapy combined with acupuncture for simple obesity was used most commonly, which was followed by auricular acupoint therapy combined with catgut embedment in acupoint and simple auricular acupoint therapy.Conclusion: In this study, the core acupoints and combinations of auricular acupoint therapy for simple obesity were explored effectively, and the pressing materials and major combined intervention methods were summarized and analyzed, thus providing references and treatment thoughts in terms of the point and prescription selection of auricular acupoint therapy for simple obesity.
基金Project supported by the National Natural Science Foundation of China (Grant No 60674026)the Key Project of Chinese Ministryof Education (Grant No 107058)+1 种基金the Jiangsu Provincial Natural Science Foundation of China (Grant No BK2007016)the Jiangsu Provincial Program for Postgraduate Scientific Innovative Research of Jiangnan University (Grant No CX07B 116z)
文摘In this paper, we focus on the robust adaptive synchronization between two coupled chaotic neural networks with all the parameters unknown and time-varying delay. In order to increase the robustness of the two coupled neural networks, the key idea is that a sliding-mode-type controller is employed. Moreover, without the estimate values of the network unknown parameters taken as an updating object, a new updating object is introduced in the constructing of controller. Using the proposed controller, without any requirements for the boundedness, monotonicity and differentiability of activation functions, and symmetry of connections, the two coupled chaotic neural networks can achieve global robust synchronization no matter what their initial states are. Finally, the numerical simulation validates the effectiveness and feasibility of the proposed technique.
文摘The duty cycling process involves turning a radio into an active and dormant state for conserving energy. It is a promising approach for designing routing protocols for a resource-constrained Wireless Sensor Networks (WSNs). In the duty cycle-based WSNs, the network lifetime is improved and the network transmission is increased as compared to conventional routing protocols. In this study, the active period of the duty cycle is divided into slots that can minimize the idle listening problem. The slot scheduling technique helps determine the most efficient node that uses the active period. The proposed routing protocol uses the opportunistic concept to minimize the sender waiting problem. Therefore, the forwarder set will be selected according to the node's residual active time and energy. Further, the optimum routing path is selected to achieve the minimum forwarding delay from the source to the destination. Simulation analysis reveals that the proposed routing scheme outperforms existing schemes in terms of the average transmission delay, energy consumption, and network throughput.
基金supported by the Natural Science Foundation of Sichuan Province of China,Nos.2022NSFSC1545 (to YG),2022NSFSC1387 (to ZF)the Natural Science Foundation of Chongqing of China,Nos.CSTB2022NSCQ-LZX0038,cstc2021ycjh-bgzxm0035 (both to XT)+3 种基金the National Natural Science Foundation of China,No.82001378 (to XT)the Joint Project of Chongqing Health Commission and Science and Technology Bureau,No.2023QNXM009 (to XT)the Science and Technology Research Program of Chongqing Education Commission of China,No.KJQN202200435 (to XT)the Chongqing Talents:Exceptional Young Talents Project,No.CQYC202005014 (to XT)。
文摘Epilepsy can be defined as a dysfunction of the brain network,and each type of epilepsy involves different brain-network changes that are implicated diffe rently in the control and propagation of interictal or ictal discharges.Gaining more detailed information on brain network alterations can help us to further understand the mechanisms of epilepsy and pave the way for brain network-based precise therapeutic approaches in clinical practice.An increasing number of advanced neuroimaging techniques and electrophysiological techniques such as diffusion tensor imaging-based fiber tra ctography,diffusion kurtosis imaging-based fiber tractography,fiber ball imagingbased tra ctography,electroencephalography,functional magnetic resonance imaging,magnetoencephalography,positron emission tomography,molecular imaging,and functional ultrasound imaging have been extensively used to delineate epileptic networks.In this review,we summarize the relevant neuroimaging and neuroelectrophysiological techniques for assessing structural and functional brain networks in patients with epilepsy,and extensively analyze the imaging mechanisms,advantages,limitations,and clinical application ranges of each technique.A greater focus on emerging advanced technologies,new data analysis software,a combination of multiple techniques,and the construction of personalized virtual epilepsy models can provide a theoretical basis to better understand the brain network mechanisms of epilepsy and make surgical decisions.
文摘Highway traffic safety is an issue confronting developing countries and those of industrialized nations. Nigeria, as a developing country, has been experiencing unusually high traffic related injury and fatality rates. In order to commence combating highway safety problems in Nigeria, the first task is to identify the major contributing factors; however, Nigeria has no reliable and comprehensive database of traffic accidents and casualties. Consequently, the Delphi technique was utilized in generating the required data such as number of registered automobiles, number of licensed drivers, and annual fatality count for modeling and forecasting accident rates in Nigeria. A Bayesian network model was developed and used, with the data obtained from Delphi process, to demonstrate possible traffic safety responses to different scenarios of changes in the Nigerian socio-political culture. Although the Delphi technique and the Bayesian network model only estimate the accident and safety data, those methods can be a realistic option when those data are not available, especially for the developing countries. As a result, the major accident contributors have been identified and the top three contributors-road condition, DUI (driving under the influence) and reckless driving-are policy related. The Nigerian traffic safety outlook would improve significantly if the existing laws and policies can be enforced, even at a very moderate level.
基金Project supported by the National Natural Science Foundation of China (Grant No. 60974004)the Natural Science Foundation of Jilin Province,China (Grant No. 201115222)
文摘The global stability problem of Takagi-Sugeno(T-S) fuzzy Hopfield neural networks(FHNNs) with time delays is investigated.Novel LMI-based stability criteria are obtained by using Lyapunov functional theory to guarantee the asymptotic stability of the FHNNs with less conservatism.Firstly,using both Finsler's lemma and an improved homogeneous matrix polynomial technique,and applying an affine parameter-dependent Lyapunov-Krasovskii functional,we obtain the convergent LMI-based stability criteria.Algebraic properties of the fuzzy membership functions in the unit simplex are considered in the process of stability analysis via the homogeneous matrix polynomials technique.Secondly,to further reduce the conservatism,a new right-hand-side slack variables introducing technique is also proposed in terms of LMIs,which is suitable to the homogeneous matrix polynomials setting.Finally,two illustrative examples are given to show the efficiency of the proposed approaches.
文摘Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads to lower the lifetime of WSN. For that, it raises the need to develop energy efficient solutions to keep WSN functioning for the longest period of time. Due to the fact that most of the nodes energy is spent on data transmission, many routing techniques in the literature have been proposed to expand the network lifetime such as the Online Maximum Lifetime heuristics (OML) and capacity maximization (CMAX). In this paper, we introduce an efficient priority based routing power management heuristic in order to increase both coverage and extend lifetime by managing the power at the sensor level. We accomplished that by setting priority metric in addition to dividing the node energy into two ratios;one for the sensor node originated data and the other part is for data relays from other sensors. This heuristic, which is called pERPMT (priority Efficient Routing Power Management Technique), has been applied to two well know routing techniques. Results from running extensive simulation runs revealed the superiority of the new methodology pERPMT over existing heuristics. The pEPRMT increases the lifetime up to 77% and 54% when compared to OML and CMAX respectively.
文摘This study develops an Enhanced Threshold Based Energy Detection approach(ETBED)for spectrum sensing in a cognitive radio network.The threshold identification method is implemented in the received signal at the secondary user based on the square law.The proposed method is implemented with the signal transmission of multiple outputs-orthogonal frequency division multiplexing.Additionally,the proposed method is considered the dynamic detection threshold adjustments and energy identification spectrum sensing technique in cognitive radio systems.In the dynamic threshold,the signal ratio-based threshold is fixed.The threshold is computed by considering the Modified Black Widow Optimization Algorithm(MBWO).So,the proposed methodology is a combination of dynamic threshold detection and MBWO.The general threshold-based detection technique has different limitations such as the inability optimal signal threshold for determining the presence of the primary user signal.These limitations undermine the sensing accuracy of the energy identification technique.Hence,the ETBED technique is developed to enhance the energy efficiency of cognitive radio networks.The projected approach is executed and analyzed with performance and comparison analysis.The proposed method is contrasted with the conventional techniques of theWhale Optimization Algorithm(WOA)and GreyWolf Optimization(GWO).It indicated superior results,achieving a high average throughput of 2.2 Mbps and an energy efficiency of 3.8,outperforming conventional techniques.
文摘Considering the environmental protection, forest fire becomes a more and more serious problem and requires more concerns. This paper provides an efficient method for fire monitoring and detection in forests using wireless sensor network technology. The proposed technique estimates the location of a sensor node based on the current set of hop-count values, which are collected through the anchor nodes’ broadcast. Our algorithm incorporates two salient features;grid-based output and event-triggering mechanism, to improve the accuracy while reducing the power consumption. Through the computer simulation, the output region obtained from our algorithm can always cover the target node. In addition, the algorithm was implemented and tested with a set of Crossbow sensors. Experimental results demonstrated the high feasibility and worked well in real environment.
文摘Sensor nodes are mainly shielded in the field with limited power supply. In Wireless Sensor Networks, there must be a requirement of an efficient power management, because sensor nodes are deployed in unman attended area with non-rechargeable batteries. Power management can be done by different methods of routing protocols. The proposed Reliable Rim Routing (3R) technique is based on hybrid routing protocol for homogeneous and heterogeneous system for WSNs to ameliorate the performance of the overall system. In 3R, total node deployment area can be multipart in terms of rim and in each rim, and some of the sensor nodes transmit their sensed data directly to base station, and meanwhile remaining sensor nodes send the data through clustering technique to base station like SEP. Proposed 3R technique implementation proves its enhanced WSNs lifetime of 70% energy consumption and 40% throughput compared with existing protocols. Simulation and evaluation results outperformed in terms of energy consumption with increased throughput and network lifetime.
文摘The Internet of Things (IoT) describes the future where every day physical objects will be connected to the internet and be able to identify themselves to other devices. IoT is a new revolution of the Internet and It will effect in a large number of applications such as smart living, smart home, healthcare systems, smart manufacturing, environment monitoring, and smart logistics. This paper provides integration, summarizes and surveys some of the security techniques especially hybrid techniques that can be applied with healthcare applications in IoT environment.
文摘DRASTIC is a very simple and common model used for the assessment of groundwater to contamination.This model is widely used across the world in various hydrogeological environments for groundwater vulnerability assessment.The Ohio Water Well Association(OWWA)developed DRASTIC model in 1987.Over the years,several modifications have been made in this model as per the need of the regional assessment of groundwater to contamination.This model has fixed weights for its parameters and fixed ratings for the sub-parameters under the main parameters.The weights and ratings of DRASTIC parameters were fixed on the basis of Delphi network technique,which is the best technique for the consensus-building of experts,but it lacks scientific explanations.Over the years,several optimization techniques have been used to optimize these weights and ratings.This work intends to present a critical analysis of decision optimization techniques used to get the optimum values of weights and ratings.The inherent pros and cons and the optimization challenges associated with these techniques have also been discussed.The finding of this study is that the application of MCDA optimization techniques used to optimize the weights and ratings of DRASTIC model to assess the vulnerability of groundwater depend on the availability of hydrogeological data,the pilot study area and the level of required accuracy for earmarking the vulnerable regions.It is recommended that one must choose the appropriate MCDA technique for the particular region because unnecessary complex structure for optimization process takes more time,efforts,resources,and implementation costs.
文摘Vehicular Social Networks(VSNs)is the bridge of social networks and Vehicular Ad-Hoc Networks(VANETs).VSNs are promising as they allow the exchange of various types of contents in large-scale through Vehicle-to-Vehicle(V2V)and Vehicle-to-Infrastructure(V2I)communication protocols.Vehicular Named Data Networking(VNDN)is an auspicious communication paradigm for the challenging VSN environment since it can optimize content dissemination by decoupling contents from their physical locations.However,content dissemination and caching represent crucial challenges in VSNs due to short link lifetime and intermittent connectivity caused by vehicles’high mobility.Our aim with this paper is to improve content delivery and cache hit ratio,as well as decrease the transmission delay between end-users.In this regard,we propose a novel hybrid VNDN-VSN forwarding technique based on social communities,which allows requester vehicles to easily find the most suitable forwarder or producer among the community members in their neighborhood area.Furthermore,we introduce an effective caching mechanism by dividing the content store into two parts,one for community private contents and the second one for public contents.Simulation results show that our proposed forwarding technique can achieve a favorable performance compared with traditional VNDN,in terms of data delivery ratio,average data delivery delay,and cache hit ratio.
文摘As far as the present state is concerned in detecting the behavioral pattern of humans(subject)using morphological image processing,a considerable portion of the study has been conducted utilizing frontal vision data of human faces.The present research work had used a side vision of human-face data to develop a theoretical framework via a hybrid analytical model approach.In this example,hybridization includes an artificial neural network(ANN)with a genetic algorithm(GA).We researched the geometrical properties extracted from side-vision human-face data.An additional study was conducted to determine the ideal number of geometrical characteristics to pick while clustering.The close vicinity ofminimum distance measurements is done for these clusters,mapped for proper classification and decision process of behavioral pattern.To identify the data acquired,support vector machines and artificial neural networks are utilized.A method known as an adaptiveunidirectional associative memory(AUTAM)was used to map one side of a human face to the other side of the same subject.The behavioral pattern has been detected based on two-class problem classification,and the decision process has been done using a genetic algorithm with best-fit measurements.The developed algorithm in the present work has been tested by considering a dataset of 100 subjects and tested using standard databases like FERET,Multi-PIE,Yale Face database,RTR,CASIA,etc.The complexity measures have also been calculated under worst-case and best-case situations.
基金partly supported by the University of Malaya Impact Oriented Interdisci-plinary Research Grant under Grant IIRG008(A,B,C)-19IISS.
文摘Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management.
文摘One of the significant challenges that smart grid networks face is cyber-security. Several studies have been conducted to highlight those security challenges. However, the majority of these surveys classify attacks based on the security requirements, confidentiality, integrity, and availability, without taking into consideration the accountability requirement. In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication. We also propose new classifications for the detection and countermeasure techniques and describe existing techniques under each category. Finally, we discuss challenges and future research directions.