Brain tumor is one of the most dreadful worldwide types of cancer and affects people leading to death.Magnetic resonance imaging methods capture skull images that contain healthy and affected tissue.Radiologists check...Brain tumor is one of the most dreadful worldwide types of cancer and affects people leading to death.Magnetic resonance imaging methods capture skull images that contain healthy and affected tissue.Radiologists checked the affected tissue in the slice-by-slice manner,which was timeconsuming and hectic task.Therefore,auto segmentation of the affected part is needed to facilitate radiologists.Therefore,we have considered a hybrid model that inherits the convolutional neural network(CNN)properties to the support vector machine(SVM)for the auto-segmented brain tumor region.The CNN model is initially used to detect brain tumors,while SVM is integrated to segment the tumor region correctly.The proposed method was evaluated on a publicly available BraTS2020 dataset.The statistical parameters used in this work for the mathematical measures are precision,accuracy,specificity,sensitivity,and dice coefficient.Overall,our method achieved an accuracy value of 0.98,which is most prominent than existing techniques.Moreover,the proposed approach is more suitable for medical experts to diagnose the early stages of the brain tumor.展开更多
Green and Sustainable Software has emerged as a new and highly active area in the software community.After several years of research and work,we believe that it is now necessary to obtain a general snapshot of how the...Green and Sustainable Software has emerged as a new and highly active area in the software community.After several years of research and work,we believe that it is now necessary to obtain a general snapshot of how the research in this area is evolving.To do so,we have applied the 5 Ws(why,when,who,where,and what),a formula for getting the complete story on a subject.We have therefore carried out a study,using 542 publications related to Green and Sustainable Software research;these were recovered using SCOPUS.The results obtained allow us to conclude that it is important to identify key elements of the research to allow researchers be fully aware of the state of the research on Green and Sustainable Software(why);the study uses papers published between 2000 and the beginning of November 2018(when);the most prolific authors are mainly from Europe,although the USA is the most active country,Green and Sustainable Software being a very interactive area with a good number of multinational publications(who);the top five keywords related to sustainable aspects are Green Software,Green IT,Software Sustainability,Energy Consumption,and Energy Efficiency(what);finally,as regards the places authors prefer to publish in,there is almost a complete balance between conferences and journals,with a trend towards an increase in the number of publications(where).展开更多
Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of invasion.In recent decade,several t...Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of invasion.In recent decade,several techniques are presented to address these challenges over well-known data-sets.This study provides a comprehensive review on the fingerprint algorithms and techniques which have been published in the last few decades.It divides the research on fingerprint into nine different approaches including feature based,fuzzy logic,holistic,image enhancement,latent,conventional machine learning,deep learning,template matching and miscellaneous tech-niques.Among these,deep learning approach has outperformed other approaches and gained significant attention for future research.By reviewing fingerprint literature,it is historically divided into four eras based on 106 referred papers and their cumulative citations.展开更多
Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its residents.Smart integrated solutions are also a need t...Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its residents.Smart integrated solutions are also a need to deal with the social and environmental challenges,caused by increasing urbanization.Currently,the development of smart services’integrated network,within a city,is facing the bar-riers including;less efficient collection and sharing of data,along with inadequate collaboration of software and hardware.Aiming to resolve these issues,this paper recommended a solution for a synchronous functionality in the smart services’integration process through modeling technique.Using this integration modeling solution,atfirst,the service participants,processes and tasks of smart services are identified and then standard illustrations are developed for the better understand-ing of the integrated service group environment.Business process modeling and notation(BPMN)language based models are developed and discussed for a devised case study,to test and experiment i.e.,for remote healthcare from a smart home.The research is concluded with the integration process model application for the required data sharing among different service groups.The outcomes of the modeling are better understanding and attaining maximum automation that can be referenced and replicated.展开更多
Computer security is a matter of great interest.In the last decade there have been numerous cases of cybercrime based on the exploitation of software vulnerabilities.This fact has generated a great social concern and ...Computer security is a matter of great interest.In the last decade there have been numerous cases of cybercrime based on the exploitation of software vulnerabilities.This fact has generated a great social concern and a greater importance of computer security as a discipline.In this work,the most important vulnerabilities of recent years are identified,classified,and categorized individually.A measure of the impact of each vulnerability is used to carry out this classification,considering the number of products affected by each vulnerability,as well as its severity.In addition,the categories of vulnerabilities that have the greatest presence are identified.Based on the results obtained in this study,we can understand the consequences of the most common vulnerabilities,which software products are affected,how to counteract these vulnerabilities,and what their current trend is.展开更多
In this paper, we study the fractional-order biological population models (FI3PMs) with Malthusian~ Verhulst, and porous media laws. The fractional derivative is defined in Caputo sense. The optimal homotopy asympto...In this paper, we study the fractional-order biological population models (FI3PMs) with Malthusian~ Verhulst, and porous media laws. The fractional derivative is defined in Caputo sense. The optimal homotopy asymptotic method (OHAM) for partial differ- ential equations (PDEs) is extended and successfully implemented to solve FBPMs. Third-order approximate solutions are obtained and compared with the exact solutions. The numerical results unveil that the proposed extension in the OHAM for fractional- order differential problems is very effective and simple in computation. The results reveal the effectiveness with high accuracy and extremely efficient to handle most complicated biological population models.展开更多
The present study deals with the flow of blood through a stenotic artery in the presence of a uniform magnetic field. Different flow situations are taken into account by considering the regular and irregular shapes of...The present study deals with the flow of blood through a stenotic artery in the presence of a uniform magnetic field. Different flow situations are taken into account by considering the regular and irregular shapes of stenosis lying inside the walls of artery. Blood inside the artery is assumed to be Eyring-Powell fluid. A mathematical model is developed and simplified under the physical assumptions of stenosis. The regular perturbation method is adopted to find the solutions for axial velocity and pressure gradient. The variations in pressure drop across the stenosis length, the impedance and the shear stress at the walls of stenotic artery are discussed in detail through graphs. It is observed that the Eyring-Powell fluid is helpful in reducing the resistance to the flow in stenotic artery. Moreover, symmetric form of stenosis is more hazardous as compared to asymmetric stenosis.展开更多
Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data centers.Modern TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not ...Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data centers.Modern TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient to network updates that provoke flow rerouting.In this paper,we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates,because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance deterioration.We look into the causes and propose a network update-friendly TCP(NUFTCP),which is an extension of the DCTCP variant,as a solution.Simulations are used to assess the proposed NUFTCP.Our findings reveal that NUFTCP can more effectively manage the problems of out-of-order packets and packet drops triggered in network updates,and it outperforms DCTCP considerably.展开更多
基金Authors would like to acknowledge the support of the Deputy for Research and Innovation-Ministry of Education,Kingdom of Saudi Arabia for funding this research through a Project(NU/IFC/ENT/01/014)under the institutional funding committee at Najran University,Kingdom of Saudi Arabia.
文摘Brain tumor is one of the most dreadful worldwide types of cancer and affects people leading to death.Magnetic resonance imaging methods capture skull images that contain healthy and affected tissue.Radiologists checked the affected tissue in the slice-by-slice manner,which was timeconsuming and hectic task.Therefore,auto segmentation of the affected part is needed to facilitate radiologists.Therefore,we have considered a hybrid model that inherits the convolutional neural network(CNN)properties to the support vector machine(SVM)for the auto-segmented brain tumor region.The CNN model is initially used to detect brain tumors,while SVM is integrated to segment the tumor region correctly.The proposed method was evaluated on a publicly available BraTS2020 dataset.The statistical parameters used in this work for the mathematical measures are precision,accuracy,specificity,sensitivity,and dice coefficient.Overall,our method achieved an accuracy value of 0.98,which is most prominent than existing techniques.Moreover,the proposed approach is more suitable for medical experts to diagnose the early stages of the brain tumor.
基金the BIZDEVOPS-Global (No. RTI2018-098309-B-C31),supported by the Spanish Ministry of Economy, Industry and Competitiveness and European FEDER fundspart of the SOS project (No. SBPLY/17/180501/000364),funded by the Department of Education, Culture and Sports of the Directorate General of Universities, Research and Innovation of the JCCM(Regional Government of the Autonomous Region of Castilla-La Mancha)
文摘Green and Sustainable Software has emerged as a new and highly active area in the software community.After several years of research and work,we believe that it is now necessary to obtain a general snapshot of how the research in this area is evolving.To do so,we have applied the 5 Ws(why,when,who,where,and what),a formula for getting the complete story on a subject.We have therefore carried out a study,using 542 publications related to Green and Sustainable Software research;these were recovered using SCOPUS.The results obtained allow us to conclude that it is important to identify key elements of the research to allow researchers be fully aware of the state of the research on Green and Sustainable Software(why);the study uses papers published between 2000 and the beginning of November 2018(when);the most prolific authors are mainly from Europe,although the USA is the most active country,Green and Sustainable Software being a very interactive area with a good number of multinational publications(who);the top five keywords related to sustainable aspects are Green Software,Green IT,Software Sustainability,Energy Consumption,and Energy Efficiency(what);finally,as regards the places authors prefer to publish in,there is almost a complete balance between conferences and journals,with a trend towards an increase in the number of publications(where).
基金This work was supported by the National ICT R&D(NICTRDF/NGIRI/2012-13/Corsp/3)University of Management&Technology,Pakistan.
文摘Fingerprint matching,spoof mitigation and liveness detection are the trendiest biometric techniques,mostly because of their stability through life,uniqueness and their least risk of invasion.In recent decade,several techniques are presented to address these challenges over well-known data-sets.This study provides a comprehensive review on the fingerprint algorithms and techniques which have been published in the last few decades.It divides the research on fingerprint into nine different approaches including feature based,fuzzy logic,holistic,image enhancement,latent,conventional machine learning,deep learning,template matching and miscellaneous tech-niques.Among these,deep learning approach has outperformed other approaches and gained significant attention for future research.By reviewing fingerprint literature,it is historically divided into four eras based on 106 referred papers and their cumulative citations.
文摘Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its residents.Smart integrated solutions are also a need to deal with the social and environmental challenges,caused by increasing urbanization.Currently,the development of smart services’integrated network,within a city,is facing the bar-riers including;less efficient collection and sharing of data,along with inadequate collaboration of software and hardware.Aiming to resolve these issues,this paper recommended a solution for a synchronous functionality in the smart services’integration process through modeling technique.Using this integration modeling solution,atfirst,the service participants,processes and tasks of smart services are identified and then standard illustrations are developed for the better understand-ing of the integrated service group environment.Business process modeling and notation(BPMN)language based models are developed and discussed for a devised case study,to test and experiment i.e.,for remote healthcare from a smart home.The research is concluded with the integration process model application for the required data sharing among different service groups.The outcomes of the modeling are better understanding and attaining maximum automation that can be referenced and replicated.
基金part of the BIZDEVOPS-GLOBALUMU project (No.RTI2018-098309-B-C33) supported by the Spanish Ministry of Economy and Competitiveness and the European Fund for Regional Development (ERDF)
文摘Computer security is a matter of great interest.In the last decade there have been numerous cases of cybercrime based on the exploitation of software vulnerabilities.This fact has generated a great social concern and a greater importance of computer security as a discipline.In this work,the most important vulnerabilities of recent years are identified,classified,and categorized individually.A measure of the impact of each vulnerability is used to carry out this classification,considering the number of products affected by each vulnerability,as well as its severity.In addition,the categories of vulnerabilities that have the greatest presence are identified.Based on the results obtained in this study,we can understand the consequences of the most common vulnerabilities,which software products are affected,how to counteract these vulnerabilities,and what their current trend is.
文摘In this paper, we study the fractional-order biological population models (FI3PMs) with Malthusian~ Verhulst, and porous media laws. The fractional derivative is defined in Caputo sense. The optimal homotopy asymptotic method (OHAM) for partial differ- ential equations (PDEs) is extended and successfully implemented to solve FBPMs. Third-order approximate solutions are obtained and compared with the exact solutions. The numerical results unveil that the proposed extension in the OHAM for fractional- order differential problems is very effective and simple in computation. The results reveal the effectiveness with high accuracy and extremely efficient to handle most complicated biological population models.
文摘The present study deals with the flow of blood through a stenotic artery in the presence of a uniform magnetic field. Different flow situations are taken into account by considering the regular and irregular shapes of stenosis lying inside the walls of artery. Blood inside the artery is assumed to be Eyring-Powell fluid. A mathematical model is developed and simplified under the physical assumptions of stenosis. The regular perturbation method is adopted to find the solutions for axial velocity and pressure gradient. The variations in pressure drop across the stenosis length, the impedance and the shear stress at the walls of stenotic artery are discussed in detail through graphs. It is observed that the Eyring-Powell fluid is helpful in reducing the resistance to the flow in stenotic artery. Moreover, symmetric form of stenosis is more hazardous as compared to asymmetric stenosis.
基金supportted by the King Khalid University through the Large Group Project(No.RGP.2/312/44).
文摘Network updates have become increasingly prevalent since the broad adoption of software-defined networks(SDNs)in data centers.Modern TCP designs,including cutting-edge TCP variants DCTCP,CUBIC,and BBR,however,are not resilient to network updates that provoke flow rerouting.In this paper,we first demonstrate that popular TCP implementations perform inadequately in the presence of frequent and inconsistent network updates,because inconsistent and frequent network updates result in out-of-order packets and packet drops induced via transitory congestion and lead to serious performance deterioration.We look into the causes and propose a network update-friendly TCP(NUFTCP),which is an extension of the DCTCP variant,as a solution.Simulations are used to assess the proposed NUFTCP.Our findings reveal that NUFTCP can more effectively manage the problems of out-of-order packets and packet drops triggered in network updates,and it outperforms DCTCP considerably.