Rice is one of the most important staple crops globally.Rice plant diseases can severely reduce crop yields and,in extreme cases,lead to total production loss.Early diagnosis enables timely intervention,mitigates dise...Rice is one of the most important staple crops globally.Rice plant diseases can severely reduce crop yields and,in extreme cases,lead to total production loss.Early diagnosis enables timely intervention,mitigates disease severity,supports effective treatment strategies,and reduces reliance on excessive pesticide use.Traditional machine learning approaches have been applied for automated rice disease diagnosis;however,these methods depend heavily on manual image preprocessing and handcrafted feature extraction,which are labor-intensive and time-consuming and often require domain expertise.Recently,end-to-end deep learning(DL) models have been introduced for this task,but they often lack robustness and generalizability across diverse datasets.To address these limitations,we propose a novel end-toend training framework for convolutional neural network(CNN) and attention-based model ensembles(E2ETCA).This framework integrates features from two state-of-the-art(SOTA) CNN models,Inception V3 and DenseNet-201,and an attention-based vision transformer(ViT) model.The fused features are passed through an additional fully connected layer with softmax activation for final classification.The entire process is trained end-to-end,enhancing its suitability for realworld deployment.Furthermore,we extract and analyze the learned features using a support vector machine(SVM),a traditional machine learning classifier,to provide comparative insights.We evaluate the proposed E2ETCA framework on three publicly available datasets,the Mendeley Rice Leaf Disease Image Samples dataset,the Kaggle Rice Diseases Image dataset,the Bangladesh Rice Research Institute dataset,and a combined version of all three.Using standard evaluation metrics(accuracy,precision,recall,and F1-score),our framework demonstrates superior performance compared to existing SOTA methods in rice disease diagnosis,with potential applicability to other agricultural disease detection tasks.展开更多
Forecasting on success or failure of software has become an interesting and,in fact,an essential task in the software development industry.In order to explore the latest data on successes and failures,this research fo...Forecasting on success or failure of software has become an interesting and,in fact,an essential task in the software development industry.In order to explore the latest data on successes and failures,this research focused on certain questions such as is early phase of the software development life cycle better than later phases in predicting software success and avoiding high rework?What human factors contribute to success or failure of a software?What software practices are used by the industry practitioners to achieve high quality of software in their day-to-day work?In order to conduct this empirical analysis a total of 104 practitioners were recruited to determine how human factors,misinterpretation,and miscommunication of requirements and decision-making processes play their roles in software success forecasting.We discussed a potential relationship between forecasting of software success or failure and the development processes.We noticed that experienced participants had more confidence in their practices and responded to the questionnaire in this empirical study,and they were more likely to rate software success forecasting linking to the development processes.Our analysis also shows that cognitive bias is the central human factor that negatively affects forecasting of software success rate.The results of this empirical study also validated that requirements’misinterpretation and miscommunication were themain causes behind software systems’failure.It has been seen that reliable,relevant,and trustworthy sources of information help in decision-making to predict software systems’success in the software industry.This empirical study highlights a need for other software practitioners to avoid such bias while working on software projects.Future investigation can be performed to identify the other human factors that may impact software systems’success.展开更多
The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based ...The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based on the Internet of Health Things(IoHTs).However,data privacy and security,data management,and scalability present challenges to widespread adoption.This paper presents a comprehensive literature review that examines the authentication mechanisms utilized within IoHT,highlighting their critical roles in ensuring secure data exchange and patient privacy.This includes various authentication technologies and strategies,such as biometric and multifactor authentication,as well as the influence of emerging technologies like blockchain,fog computing,and Artificial Intelligence(AI).The findings indicate that emerging technologies offer hope for the future of IoHT security,promising to address key challenges such as scalability,integrity,privacy and other security requirements.With this systematic review,healthcare providers,decision makers,scientists and researchers are empowered to confidently evaluate the applicability of IoT in healthcare,shaping the future of this field.展开更多
This century's rapid urbanization has disrupted urban governance,sustainability,and resource management.The Internet of Things(IoT)and 5G have the potential to transform smart cities through real-time data process...This century's rapid urbanization has disrupted urban governance,sustainability,and resource management.The Internet of Things(IoT)and 5G have the potential to transform smart cities through real-time data processing,enhanced connectivity,and sustainable urban design.This study investigates the potential of 5G connectivity with the IoT's hierarchical framework to enhance public service provision,mitigate environmental effects,and optimize urban resource management.The article asserts that these technologies can enhance urban operations by tackling scalability,interoperability,and security issues.The research employs case studies from Singapore and Barcelona.The document moreover analyzes AI-driven security systems,6G networks,and the contributions of IoT and 5G to the advancement of a circular economy.The essay asserts that the growth of smart cities necessitates robust policy frameworks to guarantee equitable access,data protection,and ethical considerations.This study integrates prior research with practical experiences to tackle data-informed municipal governance and urban innovation.The importance of policy in fostering inclusive and sustainable urban futures is emphasized.展开更多
The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mi...The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mining approaches to extract information from this text corpus.These proposed approaches extract meaningful and precise phrases that effectively describe the text’s information.These extracted phrases are commonly termed keyphrases.Further,these key phrases are employed to determine the different fields of study trends.Moreover,these key phrases can also be used to determine the spatiotemporal trends in the various research fields.In this research,the progress of a research field can be better revealed through spatiotemporal bibliographic trend analysis.Therefore,an effective spatiotemporal trend extraction mechanism is required to disclose textile research trends of particular regions during a specific period.This study collected a diversified dataset of textile research from 2011–2019 and different countries to determine the research trend.This data was collected from various open access journals.Further,this research determined the spatiotemporal trends using quality phrasemining.This research also focused on finding the research collaboration of different countries in a particular research subject.The research collaborations of other countries’researchers show the impact on import and export of those countries.The visualization approach is also incorporated to understand the results better.展开更多
The advent and extensive use of computer and increasing development of different technologies it is important to increase the awareness of issues related to the electronic text or text presentation on computer screen....The advent and extensive use of computer and increasing development of different technologies it is important to increase the awareness of issues related to the electronic text or text presentation on computer screen. The usage of web shows the importance of usability and readability of the web applications or sources provide by the web and web textual contents. Web application fails to encounter the user’s requirements in effective manner specially related to textual information, because the designers are unaware from some of the important factors effecting readability, reading from the screen. In this regard, this study is the continuation of the previous work that has been done for the improvement of readability, to handle the readability issues on the basis of Eye Blink for male participants and female participants. To achieve general recommendations for suitable or optimum length of text line for all type of users on the bases of eye blink. Basically during reading from the computer screen focus losses at two positions, when eye blink in the middle of text line and when text line ends. The study specifies suitable length of text line on the basis of Eye Blink, assuming three typographical variables i.e. font style, font color, font size, and with white background, which improve the overall readability or reading from computer screen. The study also shows two important things the degree of understandability and the degree of attractive appearance of different combination.展开更多
Blockchain technology,based on decentralized data storage and distributed consensus design,has become a promising solution to address data security risks and provide privacy protection in the Internet-of-Things(IoT)du...Blockchain technology,based on decentralized data storage and distributed consensus design,has become a promising solution to address data security risks and provide privacy protection in the Internet-of-Things(IoT)due to its tamper-proof and non-repudiation features.Although blockchain typically does not require the endorsement of third-party trust organizations,it mostly needs to perform necessary mathematical calculations to prevent malicious attacks,which results in stricter requirements for computation resources on the participating devices.By offloading the computation tasks required to support blockchain consensus to edge service nodes or the cloud,while providing data privacy protection for IoT applications,it can effectively address the limitations of computation and energy resources in IoT devices.However,how to make reasonable offloading decisions for IoT devices remains an open issue.Due to the excellent self-learning ability of Reinforcement Learning(RL),this paper proposes a RL enabled Swarm Intelligence Optimization Algorithm(RLSIOA)that aims to improve the quality of initial solutions and achieve efficient optimization of computation task offloading decisions.The algorithm considers various factors that may affect the revenue obtained by IoT devices executing consensus algorithms(e.g.,Proof-of-Work),it optimizes the proportion of sub-tasks to be offloaded and the scale of computing resources to be rented from the edge and cloud to maximize the revenue of devices.Experimental results show that RLSIOA can obtain higher-quality offloading decision-making schemes at lower latency costs compared to representative benchmark algorithms.展开更多
With the rapid development of information technology and the continuous evolution of personalized ser- vices, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover,...With the rapid development of information technology and the continuous evolution of personalized ser- vices, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the intentional/unintentional persistence of private infor- mation in different information systems. However, problems such as the cask principle of preserving pri- vate information among different information systems and the dif culty of tracing the source of privacy violations are becoming increasingly serious. Therefore, existing privacy-preserving schemes cannot pro- vide systematic privacy preservation. In this paper, we examine the links of the information life-cycle, such as information collection, storage, processing, distribution, and destruction. We then propose a the- ory of privacy computing and a key technology system that includes a privacy computing framework, a formal de nition of privacy computing, four principles that should be followed in privacy computing, ffect algorithm design criteria, evaluation of the privacy-preserving effect, and a privacy computing language. Finally, we employ four application scenarios to describe the universal application of privacy computing, and discuss the prospect of future research trends. This work is expected to guide theoretical research on user privacy preservation within open environments.展开更多
Hand gestures are a natural way for human-robot interaction.Vision based dynamic hand gesture recognition has become a hot research topic due to its various applications.This paper presents a novel deep learning netwo...Hand gestures are a natural way for human-robot interaction.Vision based dynamic hand gesture recognition has become a hot research topic due to its various applications.This paper presents a novel deep learning network for hand gesture recognition.The network integrates several well-proved modules together to learn both short-term and long-term features from video inputs and meanwhile avoid intensive computation.To learn short-term features,each video input is segmented into a fixed number of frame groups.A frame is randomly selected from each group and represented as an RGB image as well as an optical flow snapshot.These two entities are fused and fed into a convolutional neural network(Conv Net)for feature extraction.The Conv Nets for all groups share parameters.To learn longterm features,outputs from all Conv Nets are fed into a long short-term memory(LSTM)network,by which a final classification result is predicted.The new model has been tested with two popular hand gesture datasets,namely the Jester dataset and Nvidia dataset.Comparing with other models,our model produced very competitive results.The robustness of the new model has also been proved with an augmented dataset with enhanced diversity of hand gestures.展开更多
Among many safety applications enabled by Dedicated Short Range Communication (DSRC), truck platooning provides many incentives to commercial companies. This paper studies DSRC Vehicle-to-Vehicle (V2V) performance...Among many safety applications enabled by Dedicated Short Range Communication (DSRC), truck platooning provides many incentives to commercial companies. This paper studies DSRC Vehicle-to-Vehicle (V2V) performance in truck platooning scenarios through real-world experiments. Commercial DSRC equipments and semi-trailer trucks are used in this study. We mount one DSRC antenna on each side of the truck. One set of dynamic tests and a few sets of static tests are conducted to explore DSRC behaviors under different situations. From the test results, we verified some of our speculations. For example, hilly roads can affect delivery ratio and antennas mounted on opposite sides of a truck can suffer from low delivery ratio at curved roads. In addition, we also found that antennas can sometimes suffer from low delivery ratio even when the trucks are on straight roads, possibly due to reflections from the nearby terrain. Fortunately, the delivery ratio can be greatly improved by using the two side antennas alternately.展开更多
In the new era of technology,daily human activities are becoming more challenging in terms of monitoring complex scenes and backgrounds.To understand the scenes and activities from human life logs,human-object interac...In the new era of technology,daily human activities are becoming more challenging in terms of monitoring complex scenes and backgrounds.To understand the scenes and activities from human life logs,human-object interaction(HOI)is important in terms of visual relationship detection and human pose estimation.Activities understanding and interaction recognition between human and object along with the pose estimation and interaction modeling have been explained.Some existing algorithms and feature extraction procedures are complicated including accurate detection of rare human postures,occluded regions,and unsatisfactory detection of objects,especially small-sized objects.The existing HOI detection techniques are instancecentric(object-based)where interaction is predicted between all the pairs.Such estimation depends on appearance features and spatial information.Therefore,we propose a novel approach to demonstrate that the appearance features alone are not sufficient to predict the HOI.Furthermore,we detect the human body parts by using the Gaussian Matric Model(GMM)followed by object detection using YOLO.We predict the interaction points which directly classify the interaction and pair them with densely predicted HOI vectors by using the interaction algorithm.The interactions are linked with the human and object to predict the actions.The experiments have been performed on two benchmark HOI datasets demonstrating the proposed approach.展开更多
With the advancement of computer vision techniques in surveillance systems,the need for more proficient,intelligent,and sustainable facial expressions and age recognition is necessary.The main purpose of this study is...With the advancement of computer vision techniques in surveillance systems,the need for more proficient,intelligent,and sustainable facial expressions and age recognition is necessary.The main purpose of this study is to develop accurate facial expressions and an age recognition system that is capable of error-free recognition of human expression and age in both indoor and outdoor environments.The proposed system first takes an input image pre-process it and then detects faces in the entire image.After that landmarks localization helps in the formation of synthetic face mask prediction.A novel set of features are extracted and passed to a classifier for the accurate classification of expressions and age group.The proposed system is tested over two benchmark datasets,namely,the Gallagher collection person dataset and the Images of Groups dataset.The system achieved remarkable results over these benchmark datasets about recognition accuracy and computational time.The proposed system would also be applicable in different consumer application domains such as online business negotiations,consumer behavior analysis,E-learning environments,and emotion robotics.展开更多
Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a ...Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too.展开更多
Latest advancements in vision technology offer an evident impact on multi-object recognition and scene understanding.Such sceneunderstanding task is a demanding part of several technologies,like augmented reality-base...Latest advancements in vision technology offer an evident impact on multi-object recognition and scene understanding.Such sceneunderstanding task is a demanding part of several technologies,like augmented reality-based scene integration,robotic navigation,autonomous driving,and tourist guide.Incorporating visual information in contextually unified segments,convolution neural networks-based approaches will significantly mitigate the clutter,which is usual in classical frameworks during scene understanding.In this paper,we propose a convolutional neural network(CNN)based segmentation method for the recognition of multiple objects in an image.Initially,after acquisition and preprocessing,the image is segmented by using CNN.Then,CNN features are extracted from these segmented objects,and discrete cosine transform(DCT)and discrete wavelet transform(DWT)features are computed.After the extraction of CNN features and computation of classical machine learning features,fusion is performed using a fusion technique.Then,to select theminimal set of features,genetic algorithm-based feature selection is used.In order to recognize and understand the multi-objects in the scene,a neuro-fuzzy approach is applied.Once objects in the scene are recognized,the relationship between these objects is examined by employing the object-to-object relation approach.Finally,a decision tree is incorporated to assign the relevant labels to the scenes based on recognized objects in the image.The experimental results over complex scene datasets including SUN Red Green Blue-Depth(RGB-D)and Cityscapes’demonstrated a remarkable performance.展开更多
The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive...The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive information securely,researchers are combining robust cryptography and steganographic approaches.The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid(DNA)for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility.In the previous approach,DNA was used only for frame selection.If this DNA is compromised,then our frames with the hidden and unencrypted data will be exposed.Moreover the frame selected in this way were random frames,and no consideration was made to the contents of frames.Hiding data in this way introduces visible artifacts in video.In the proposed approach rather than using DNA for frame selection we have created a fakeDNA out of our data and then embedded it in a video file on intelligently selected frames called the complex frames.Using chaotic maps and linear congruential generators,a unique pixel set is selected each time only from the identified complex frames,and encrypted data is embedded in these random locations.Experimental results demonstrate that the proposed technique shows minimum degradation of the stenographic video hence reducing the very first chances of visual surveillance.Further,the selection of complex frames for embedding and creation of a fake DNA as proposed in this research have higher peak signal-to-noise ratio(PSNR)and reduced mean squared error(MSE)values that indicate improved results.The proposed methodology has been implemented in Matlab.展开更多
An assistive robot is a novel service robot, playing an important role in the society. For instance, it can amplify human power not only for the elderly and disabled to recover/rehabilitate their lost/impaired musculo...An assistive robot is a novel service robot, playing an important role in the society. For instance, it can amplify human power not only for the elderly and disabled to recover/rehabilitate their lost/impaired musculoskeletal functions but also for healthy people to perform tasks requiring large forces. Consequently, it is required to consider both accurate position control and human safety, which is the compliance. This paper deals with the robot control compliance problem based on the QNX real-time operating system. Firstly, the mechanical structure of a compliant joint on the assistive robot is designed using Solidworks. Then the parameters of the assistive robot system are identified. The software of robot control includes data acquisition and processing, and control to meet the compliance requirement of the joint control. Finally, a Hogan impedance control experiment is carried out. The experimental results prove the effectiveness of the method proposed.展开更多
Face image analysis is one among several important cues in computer vision.Over the last five decades,methods for face analysis have received immense attention due to large scale applications in various face analysis ...Face image analysis is one among several important cues in computer vision.Over the last five decades,methods for face analysis have received immense attention due to large scale applications in various face analysis tasks.Face parsing strongly benefits various human face image analysis tasks inducing face pose estimation.In this paper we propose a 3D head pose estimation framework developed through a prior end to end deep face parsing model.We have developed an end to end face parts segmentation framework through deep convolutional neural networks(DCNNs).For training a deep face parts parsing model,we label face images for seven different classes,including eyes,brows,nose,hair,mouth,skin,and back.We extract features from gray scale images by using DCNNs.We train a classifier using the extracted features.We use the probabilistic classification method to produce gray scale images in the form of probability maps for each dense semantic class.We use a next stage of DCNNs and extract features from grayscale images created as probability maps during the segmentation phase.We assess the performance of our newly proposed model on four standard head pose datasets,including Pointing’04,Annotated Facial Landmarks in the Wild(AFLW),Boston University(BU),and ICT-3DHP,obtaining superior results as compared to previous results.展开更多
Virtual reality is an emerging field in the whole world.The problem faced by people today is that they are more indulged in indoor technology rather than outdoor activities.Hence,the proposed system introduces a fitne...Virtual reality is an emerging field in the whole world.The problem faced by people today is that they are more indulged in indoor technology rather than outdoor activities.Hence,the proposed system introduces a fitness solution connecting virtual reality with a gaming interface so that an individual can play first-person games.The system proposed in this paper is an efficient and cost-effective solution that can entertain people along with playing outdoor games such as badminton and cricket while sitting in the room.To track the human movement,sensors Micro Processor Unit(MPU6050)are used that are connected with Bluetoothmodules andArduino responsible for sending the sensor data to the game.Further,the sensor data is sent to a machine learning model,which detects the game played by the user.The detected game will be operated on human gestures.A publicly available dataset named IM-Sporting Behaviors is initially used,which utilizes triaxial accelerometers attached to the subject’s wrist,knee,and below neck regions to capture important aspects of human motion.The main objective is that the person is enjoying while playing the game and simultaneously is engaged in some kind of sporting activity.The proposed system uses artificial neural networks classifier giving an accuracy of 88.9%.The proposed system should apply to many systems such as construction,education,offices and the educational sector.Extensive experimentation proved the validity of the proposed system.展开更多
Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global mortality.This study addresses the pressing issue of brain tumor classification using Mag...Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global mortality.This study addresses the pressing issue of brain tumor classification using Magnetic resonance imaging(MRI).It focuses on distinguishing between Low-Grade Gliomas(LGG)and High-Grade Gliomas(HGG).LGGs are benign and typically manageable with surgical resection,while HGGs are malignant and more aggressive.The research introduces an innovative custom convolutional neural network(CNN)model,Glioma-CNN.GliomaCNN stands out as a lightweight CNN model compared to its predecessors.The research utilized the BraTS 2020 dataset for its experiments.Integrated with the gradient-boosting algorithm,GliomaCNN has achieved an impressive accuracy of 99.1569%.The model’s interpretability is ensured through SHapley Additive exPlanations(SHAP)and Gradient-weighted Class Activation Mapping(Grad-CAM++).They provide insights into critical decision-making regions for classification outcomes.Despite challenges in identifying tumors in images without visible signs,the model demonstrates remarkable performance in this critical medical application,offering a promising tool for accurate brain tumor diagnosis which paves the way for enhanced early detection and treatment of brain tumors.展开更多
基金the Begum Rokeya University,Rangpur,and the United Arab Emirates University,UAE for partially supporting this work。
文摘Rice is one of the most important staple crops globally.Rice plant diseases can severely reduce crop yields and,in extreme cases,lead to total production loss.Early diagnosis enables timely intervention,mitigates disease severity,supports effective treatment strategies,and reduces reliance on excessive pesticide use.Traditional machine learning approaches have been applied for automated rice disease diagnosis;however,these methods depend heavily on manual image preprocessing and handcrafted feature extraction,which are labor-intensive and time-consuming and often require domain expertise.Recently,end-to-end deep learning(DL) models have been introduced for this task,but they often lack robustness and generalizability across diverse datasets.To address these limitations,we propose a novel end-toend training framework for convolutional neural network(CNN) and attention-based model ensembles(E2ETCA).This framework integrates features from two state-of-the-art(SOTA) CNN models,Inception V3 and DenseNet-201,and an attention-based vision transformer(ViT) model.The fused features are passed through an additional fully connected layer with softmax activation for final classification.The entire process is trained end-to-end,enhancing its suitability for realworld deployment.Furthermore,we extract and analyze the learned features using a support vector machine(SVM),a traditional machine learning classifier,to provide comparative insights.We evaluate the proposed E2ETCA framework on three publicly available datasets,the Mendeley Rice Leaf Disease Image Samples dataset,the Kaggle Rice Diseases Image dataset,the Bangladesh Rice Research Institute dataset,and a combined version of all three.Using standard evaluation metrics(accuracy,precision,recall,and F1-score),our framework demonstrates superior performance compared to existing SOTA methods in rice disease diagnosis,with potential applicability to other agricultural disease detection tasks.
基金supported by the BK21 FOUR(Fostering Outstanding Universities for Research)funded by the Ministry of Education and National Research Foundation of Korea.
文摘Forecasting on success or failure of software has become an interesting and,in fact,an essential task in the software development industry.In order to explore the latest data on successes and failures,this research focused on certain questions such as is early phase of the software development life cycle better than later phases in predicting software success and avoiding high rework?What human factors contribute to success or failure of a software?What software practices are used by the industry practitioners to achieve high quality of software in their day-to-day work?In order to conduct this empirical analysis a total of 104 practitioners were recruited to determine how human factors,misinterpretation,and miscommunication of requirements and decision-making processes play their roles in software success forecasting.We discussed a potential relationship between forecasting of software success or failure and the development processes.We noticed that experienced participants had more confidence in their practices and responded to the questionnaire in this empirical study,and they were more likely to rate software success forecasting linking to the development processes.Our analysis also shows that cognitive bias is the central human factor that negatively affects forecasting of software success rate.The results of this empirical study also validated that requirements’misinterpretation and miscommunication were themain causes behind software systems’failure.It has been seen that reliable,relevant,and trustworthy sources of information help in decision-making to predict software systems’success in the software industry.This empirical study highlights a need for other software practitioners to avoid such bias while working on software projects.Future investigation can be performed to identify the other human factors that may impact software systems’success.
文摘The digital revolution era has impacted various domains,including healthcare,where digital technology enables access to and control of medical information,remote patient monitoring,and enhanced clinical support based on the Internet of Health Things(IoHTs).However,data privacy and security,data management,and scalability present challenges to widespread adoption.This paper presents a comprehensive literature review that examines the authentication mechanisms utilized within IoHT,highlighting their critical roles in ensuring secure data exchange and patient privacy.This includes various authentication technologies and strategies,such as biometric and multifactor authentication,as well as the influence of emerging technologies like blockchain,fog computing,and Artificial Intelligence(AI).The findings indicate that emerging technologies offer hope for the future of IoHT security,promising to address key challenges such as scalability,integrity,privacy and other security requirements.With this systematic review,healthcare providers,decision makers,scientists and researchers are empowered to confidently evaluate the applicability of IoT in healthcare,shaping the future of this field.
文摘This century's rapid urbanization has disrupted urban governance,sustainability,and resource management.The Internet of Things(IoT)and 5G have the potential to transform smart cities through real-time data processing,enhanced connectivity,and sustainable urban design.This study investigates the potential of 5G connectivity with the IoT's hierarchical framework to enhance public service provision,mitigate environmental effects,and optimize urban resource management.The article asserts that these technologies can enhance urban operations by tackling scalability,interoperability,and security issues.The research employs case studies from Singapore and Barcelona.The document moreover analyzes AI-driven security systems,6G networks,and the contributions of IoT and 5G to the advancement of a circular economy.The essay asserts that the growth of smart cities necessitates robust policy frameworks to guarantee equitable access,data protection,and ethical considerations.This study integrates prior research with practical experiences to tackle data-informed municipal governance and urban innovation.The importance of policy in fostering inclusive and sustainable urban futures is emphasized.
文摘The research volume increases at the study rate,causing massive text corpora.Due to these enormous text corpora,we are drowning in data and starving for information.Therefore,recent research employed different text mining approaches to extract information from this text corpus.These proposed approaches extract meaningful and precise phrases that effectively describe the text’s information.These extracted phrases are commonly termed keyphrases.Further,these key phrases are employed to determine the different fields of study trends.Moreover,these key phrases can also be used to determine the spatiotemporal trends in the various research fields.In this research,the progress of a research field can be better revealed through spatiotemporal bibliographic trend analysis.Therefore,an effective spatiotemporal trend extraction mechanism is required to disclose textile research trends of particular regions during a specific period.This study collected a diversified dataset of textile research from 2011–2019 and different countries to determine the research trend.This data was collected from various open access journals.Further,this research determined the spatiotemporal trends using quality phrasemining.This research also focused on finding the research collaboration of different countries in a particular research subject.The research collaborations of other countries’researchers show the impact on import and export of those countries.The visualization approach is also incorporated to understand the results better.
文摘The advent and extensive use of computer and increasing development of different technologies it is important to increase the awareness of issues related to the electronic text or text presentation on computer screen. The usage of web shows the importance of usability and readability of the web applications or sources provide by the web and web textual contents. Web application fails to encounter the user’s requirements in effective manner specially related to textual information, because the designers are unaware from some of the important factors effecting readability, reading from the screen. In this regard, this study is the continuation of the previous work that has been done for the improvement of readability, to handle the readability issues on the basis of Eye Blink for male participants and female participants. To achieve general recommendations for suitable or optimum length of text line for all type of users on the bases of eye blink. Basically during reading from the computer screen focus losses at two positions, when eye blink in the middle of text line and when text line ends. The study specifies suitable length of text line on the basis of Eye Blink, assuming three typographical variables i.e. font style, font color, font size, and with white background, which improve the overall readability or reading from computer screen. The study also shows two important things the degree of understandability and the degree of attractive appearance of different combination.
基金supported by the Project of Science and Technology Research Program of Chongqing Education Commission of China(No.KJZD-K202401105)High-Quality Development Action Plan for Graduate Education at Chongqing University of Technology(No.gzljg2023308,No.gzljd2024204)+1 种基金the Graduate Innovation Program of Chongqing University of Technology(No.gzlcx20233197)Yunnan Provincial Key R&D Program(202203AA080006).
文摘Blockchain technology,based on decentralized data storage and distributed consensus design,has become a promising solution to address data security risks and provide privacy protection in the Internet-of-Things(IoT)due to its tamper-proof and non-repudiation features.Although blockchain typically does not require the endorsement of third-party trust organizations,it mostly needs to perform necessary mathematical calculations to prevent malicious attacks,which results in stricter requirements for computation resources on the participating devices.By offloading the computation tasks required to support blockchain consensus to edge service nodes or the cloud,while providing data privacy protection for IoT applications,it can effectively address the limitations of computation and energy resources in IoT devices.However,how to make reasonable offloading decisions for IoT devices remains an open issue.Due to the excellent self-learning ability of Reinforcement Learning(RL),this paper proposes a RL enabled Swarm Intelligence Optimization Algorithm(RLSIOA)that aims to improve the quality of initial solutions and achieve efficient optimization of computation task offloading decisions.The algorithm considers various factors that may affect the revenue obtained by IoT devices executing consensus algorithms(e.g.,Proof-of-Work),it optimizes the proportion of sub-tasks to be offloaded and the scale of computing resources to be rented from the edge and cloud to maximize the revenue of devices.Experimental results show that RLSIOA can obtain higher-quality offloading decision-making schemes at lower latency costs compared to representative benchmark algorithms.
文摘With the rapid development of information technology and the continuous evolution of personalized ser- vices, huge amounts of data are accumulated by large internet companies in the process of serving users. Moreover, dynamic data interactions increase the intentional/unintentional persistence of private infor- mation in different information systems. However, problems such as the cask principle of preserving pri- vate information among different information systems and the dif culty of tracing the source of privacy violations are becoming increasingly serious. Therefore, existing privacy-preserving schemes cannot pro- vide systematic privacy preservation. In this paper, we examine the links of the information life-cycle, such as information collection, storage, processing, distribution, and destruction. We then propose a the- ory of privacy computing and a key technology system that includes a privacy computing framework, a formal de nition of privacy computing, four principles that should be followed in privacy computing, ffect algorithm design criteria, evaluation of the privacy-preserving effect, and a privacy computing language. Finally, we employ four application scenarios to describe the universal application of privacy computing, and discuss the prospect of future research trends. This work is expected to guide theoretical research on user privacy preservation within open environments.
文摘Hand gestures are a natural way for human-robot interaction.Vision based dynamic hand gesture recognition has become a hot research topic due to its various applications.This paper presents a novel deep learning network for hand gesture recognition.The network integrates several well-proved modules together to learn both short-term and long-term features from video inputs and meanwhile avoid intensive computation.To learn short-term features,each video input is segmented into a fixed number of frame groups.A frame is randomly selected from each group and represented as an RGB image as well as an optical flow snapshot.These two entities are fused and fed into a convolutional neural network(Conv Net)for feature extraction.The Conv Nets for all groups share parameters.To learn longterm features,outputs from all Conv Nets are fed into a long short-term memory(LSTM)network,by which a final classification result is predicted.The new model has been tested with two popular hand gesture datasets,namely the Jester dataset and Nvidia dataset.Comparing with other models,our model produced very competitive results.The robustness of the new model has also been proved with an augmented dataset with enhanced diversity of hand gestures.
文摘Among many safety applications enabled by Dedicated Short Range Communication (DSRC), truck platooning provides many incentives to commercial companies. This paper studies DSRC Vehicle-to-Vehicle (V2V) performance in truck platooning scenarios through real-world experiments. Commercial DSRC equipments and semi-trailer trucks are used in this study. We mount one DSRC antenna on each side of the truck. One set of dynamic tests and a few sets of static tests are conducted to explore DSRC behaviors under different situations. From the test results, we verified some of our speculations. For example, hilly roads can affect delivery ratio and antennas mounted on opposite sides of a truck can suffer from low delivery ratio at curved roads. In addition, we also found that antennas can sometimes suffer from low delivery ratio even when the trucks are on straight roads, possibly due to reflections from the nearby terrain. Fortunately, the delivery ratio can be greatly improved by using the two side antennas alternately.
基金supported by Priority Research Centers Program through NRF funded by MEST(2018R1A6A1A03024003)the Grand Information Technology Research Center support program IITP-2020-2020-0-01612 supervised by the IITP by MSIT,Korea.
文摘In the new era of technology,daily human activities are becoming more challenging in terms of monitoring complex scenes and backgrounds.To understand the scenes and activities from human life logs,human-object interaction(HOI)is important in terms of visual relationship detection and human pose estimation.Activities understanding and interaction recognition between human and object along with the pose estimation and interaction modeling have been explained.Some existing algorithms and feature extraction procedures are complicated including accurate detection of rare human postures,occluded regions,and unsatisfactory detection of objects,especially small-sized objects.The existing HOI detection techniques are instancecentric(object-based)where interaction is predicted between all the pairs.Such estimation depends on appearance features and spatial information.Therefore,we propose a novel approach to demonstrate that the appearance features alone are not sufficient to predict the HOI.Furthermore,we detect the human body parts by using the Gaussian Matric Model(GMM)followed by object detection using YOLO.We predict the interaction points which directly classify the interaction and pair them with densely predicted HOI vectors by using the interaction algorithm.The interactions are linked with the human and object to predict the actions.The experiments have been performed on two benchmark HOI datasets demonstrating the proposed approach.
基金This research was supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education(No.2018R1D1A1A02085645)Also,this work was supported by the KoreaMedical Device Development Fund grant funded by the Korean government(the Ministry of Science and ICT,the Ministry of Trade,Industry and Energy,the Ministry of Health&Welfare,theMinistry of Food and Drug Safety)(Project Number:202012D05-02).
文摘With the advancement of computer vision techniques in surveillance systems,the need for more proficient,intelligent,and sustainable facial expressions and age recognition is necessary.The main purpose of this study is to develop accurate facial expressions and an age recognition system that is capable of error-free recognition of human expression and age in both indoor and outdoor environments.The proposed system first takes an input image pre-process it and then detects faces in the entire image.After that landmarks localization helps in the formation of synthetic face mask prediction.A novel set of features are extracted and passed to a classifier for the accurate classification of expressions and age group.The proposed system is tested over two benchmark datasets,namely,the Gallagher collection person dataset and the Images of Groups dataset.The system achieved remarkable results over these benchmark datasets about recognition accuracy and computational time.The proposed system would also be applicable in different consumer application domains such as online business negotiations,consumer behavior analysis,E-learning environments,and emotion robotics.
文摘Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too.
基金This research was supported by a grant(2021R1F1A1063634)of the Basic Science Research Program through the National Research Foundation(NRF)funded by the Ministry of Education,Republic of Korea.
文摘Latest advancements in vision technology offer an evident impact on multi-object recognition and scene understanding.Such sceneunderstanding task is a demanding part of several technologies,like augmented reality-based scene integration,robotic navigation,autonomous driving,and tourist guide.Incorporating visual information in contextually unified segments,convolution neural networks-based approaches will significantly mitigate the clutter,which is usual in classical frameworks during scene understanding.In this paper,we propose a convolutional neural network(CNN)based segmentation method for the recognition of multiple objects in an image.Initially,after acquisition and preprocessing,the image is segmented by using CNN.Then,CNN features are extracted from these segmented objects,and discrete cosine transform(DCT)and discrete wavelet transform(DWT)features are computed.After the extraction of CNN features and computation of classical machine learning features,fusion is performed using a fusion technique.Then,to select theminimal set of features,genetic algorithm-based feature selection is used.In order to recognize and understand the multi-objects in the scene,a neuro-fuzzy approach is applied.Once objects in the scene are recognized,the relationship between these objects is examined by employing the object-to-object relation approach.Finally,a decision tree is incorporated to assign the relevant labels to the scenes based on recognized objects in the image.The experimental results over complex scene datasets including SUN Red Green Blue-Depth(RGB-D)and Cityscapes’demonstrated a remarkable performance.
基金Taif University Researchers Supporting Project number(TURSP-2020/98),Taif University,Taif,Saudi Arabia.
文摘The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive information securely,researchers are combining robust cryptography and steganographic approaches.The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid(DNA)for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility.In the previous approach,DNA was used only for frame selection.If this DNA is compromised,then our frames with the hidden and unencrypted data will be exposed.Moreover the frame selected in this way were random frames,and no consideration was made to the contents of frames.Hiding data in this way introduces visible artifacts in video.In the proposed approach rather than using DNA for frame selection we have created a fakeDNA out of our data and then embedded it in a video file on intelligently selected frames called the complex frames.Using chaotic maps and linear congruential generators,a unique pixel set is selected each time only from the identified complex frames,and encrypted data is embedded in these random locations.Experimental results demonstrate that the proposed technique shows minimum degradation of the stenographic video hence reducing the very first chances of visual surveillance.Further,the selection of complex frames for embedding and creation of a fake DNA as proposed in this research have higher peak signal-to-noise ratio(PSNR)and reduced mean squared error(MSE)values that indicate improved results.The proposed methodology has been implemented in Matlab.
基金supported by National High Technology Research and Development Program of China(863 Program)(No.2011AA040202)National Nature Science Fundation of China(No.51005008)
文摘An assistive robot is a novel service robot, playing an important role in the society. For instance, it can amplify human power not only for the elderly and disabled to recover/rehabilitate their lost/impaired musculoskeletal functions but also for healthy people to perform tasks requiring large forces. Consequently, it is required to consider both accurate position control and human safety, which is the compliance. This paper deals with the robot control compliance problem based on the QNX real-time operating system. Firstly, the mechanical structure of a compliant joint on the assistive robot is designed using Solidworks. Then the parameters of the assistive robot system are identified. The software of robot control includes data acquisition and processing, and control to meet the compliance requirement of the joint control. Finally, a Hogan impedance control experiment is carried out. The experimental results prove the effectiveness of the method proposed.
基金Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(2020-0-01592)Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education under Grant(2019R1F1A1058548)and Grant(2020R1G1A1013221).
文摘Face image analysis is one among several important cues in computer vision.Over the last five decades,methods for face analysis have received immense attention due to large scale applications in various face analysis tasks.Face parsing strongly benefits various human face image analysis tasks inducing face pose estimation.In this paper we propose a 3D head pose estimation framework developed through a prior end to end deep face parsing model.We have developed an end to end face parts segmentation framework through deep convolutional neural networks(DCNNs).For training a deep face parts parsing model,we label face images for seven different classes,including eyes,brows,nose,hair,mouth,skin,and back.We extract features from gray scale images by using DCNNs.We train a classifier using the extracted features.We use the probabilistic classification method to produce gray scale images in the form of probability maps for each dense semantic class.We use a next stage of DCNNs and extract features from grayscale images created as probability maps during the segmentation phase.We assess the performance of our newly proposed model on four standard head pose datasets,including Pointing’04,Annotated Facial Landmarks in the Wild(AFLW),Boston University(BU),and ICT-3DHP,obtaining superior results as compared to previous results.
基金This researchwas supported by aGrant(2021R1F1A1063634)of the Basic Science Research Program through the National Research Foundation(NRF)funded by the Ministry of Education,Republic of Korea。
文摘Virtual reality is an emerging field in the whole world.The problem faced by people today is that they are more indulged in indoor technology rather than outdoor activities.Hence,the proposed system introduces a fitness solution connecting virtual reality with a gaming interface so that an individual can play first-person games.The system proposed in this paper is an efficient and cost-effective solution that can entertain people along with playing outdoor games such as badminton and cricket while sitting in the room.To track the human movement,sensors Micro Processor Unit(MPU6050)are used that are connected with Bluetoothmodules andArduino responsible for sending the sensor data to the game.Further,the sensor data is sent to a machine learning model,which detects the game played by the user.The detected game will be operated on human gestures.A publicly available dataset named IM-Sporting Behaviors is initially used,which utilizes triaxial accelerometers attached to the subject’s wrist,knee,and below neck regions to capture important aspects of human motion.The main objective is that the person is enjoying while playing the game and simultaneously is engaged in some kind of sporting activity.The proposed system uses artificial neural networks classifier giving an accuracy of 88.9%.The proposed system should apply to many systems such as construction,education,offices and the educational sector.Extensive experimentation proved the validity of the proposed system.
基金This research is funded by the Researchers Supporting Project Number(RSPD2024R1027),King Saud University,Riyadh,Saudi Arabia.
文摘Brain tumors pose a significant threat to human lives and have gained increasing attention as the tenth leading cause of global mortality.This study addresses the pressing issue of brain tumor classification using Magnetic resonance imaging(MRI).It focuses on distinguishing between Low-Grade Gliomas(LGG)and High-Grade Gliomas(HGG).LGGs are benign and typically manageable with surgical resection,while HGGs are malignant and more aggressive.The research introduces an innovative custom convolutional neural network(CNN)model,Glioma-CNN.GliomaCNN stands out as a lightweight CNN model compared to its predecessors.The research utilized the BraTS 2020 dataset for its experiments.Integrated with the gradient-boosting algorithm,GliomaCNN has achieved an impressive accuracy of 99.1569%.The model’s interpretability is ensured through SHapley Additive exPlanations(SHAP)and Gradient-weighted Class Activation Mapping(Grad-CAM++).They provide insights into critical decision-making regions for classification outcomes.Despite challenges in identifying tumors in images without visible signs,the model demonstrates remarkable performance in this critical medical application,offering a promising tool for accurate brain tumor diagnosis which paves the way for enhanced early detection and treatment of brain tumors.