Forthcoming and Online First Articles

International Journal of Computer Applications in Technology

International Journal of Computer Applications in Technology (IJCAT)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Computer Applications in Technology (126 papers in press)

Regular Issues

  • A neural adaptive level set method for wildland forest fire tracking   Order a copy of this article
    by Aymen Mouelhi, Moez Bouchouicha, Mounir Sayadi, Eric Moreau 
    Abstract: Tracking of smoke and fire in videos can provide helpful regional measures to evaluate precisely damages caused by fires. In security applications, real-time video segmentation of both fire and smoke regions represents a crucial operation to avoid disaster. In this paper, we propose a robust tracking method for fire regions in forest wildfire videos using neural pixel classification approach combined with a nonlinear adaptive level set method based on the Bayesian rule. Firstly, an estimation function is built with chromatic and statistical features using linear discriminant analysis and a trained multilayer neural network in order to get a preliminary fire localisation in each frame. This function is used to compute an initial curve and the level set evolution parameters, thus providing fast refined fire segmentation in each processed frame. The experimental results of the proposed method prove its accuracy and robustness when tested on different varieties of wildfire-smoke scenarios.
    Keywords: fire detection; linear discriminant analysis; neural networks; active contour; level set; Bayesian criterion.

  • A less computational complexity clustering algorithm based on dynamic K-means for increasing lifetime of wireless sensor networks   Order a copy of this article
    by Anupam Choudhary, Sapna Jain, Abhishek Badholia, Anurag Sharma, Brijesh Patel 
    Abstract: Clustering in wireless sensor networks is a critical issue based on network lifetime, energy efficiency, connectivity and scalability. Sensor nodes are capable to collect data from any geographical region using routing protocol. This research endeavours to design a less complex computational time clustering algorithm for hierarchical homogeneous wireless sensor networks to extend network lifetime. It forms an optimal number of clusters and reduces the data communication span of sensor nodes using dynamic K-means algorithm. Selection of a suitable cluster head is based on the ratio of the remaining energy of the sensor node to its distance from the centre of the cluster. The simulation results prove that algorithm that has been presented achieves better energy efficiency when compared with other hierarchical homogeneous cluster-based algorithms. It increases the network lifetime, the number of alive nodes per round, the data delivered to the base station, the time of the first node, middle node and last node to die for scalable situations in terms of node density and size of the sensing region.
    Keywords: wireless sensor network; sensor node; hierarchical homogeneous cluster-based protocols; cluster Head; base station; network lifetime.

  • A new multistable jerk system with Hopf bifurcations, its electronic circuit simulation and an application to image encryption   Order a copy of this article
    by Sundarapandian Vaidyanathan, Irene M. Moroz, Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Aceng Sambas 
    Abstract: In this work, we announce a new 3-D jerk system and show that it is chaotic and dissipative with the calculation of the Lyapunov exponents of the system. By performing a detailed bifurcation analysis, we observe that the new jerk system exhibits Hopf bifurcations. It is also shown that the new jerk system exhibits multistability behaviour with two coexisting chaotic attractors. An electronic circuit simulation of the jerk system is built using Multisim. Finally, based on the benefits of our proposed chaotic jerk system, we design a new approach to image encryption as a cryptographic application of our chaotic jerk system. The simulation outcomes prove the efficiency of the proposed encryption scheme with high security.
    Keywords: bifurcations; chaos; chaotic systems; circuit design; jerk systems; image encryption.

  • Compensation of variability using median and i-Vector+PLDA for speaker identification of whispering sound   Order a copy of this article
    by Vijay Sardar 
    Abstract: Speaker identification from the whispered voice is troublesome contrasted with neutral as the voiced phonations are missing in the whisper. The success of the speaker identification system mainly depends on the selection of appropriate audio features. The various available audio features are explored here and it is shown that the timbre features are able to identify the whispering speaker. Only the well-performing, and thus limited timbre, features are sorted by the hybrid selection algorithm. The timbre features named brightness, roughness, roll-off, MFCC and irregularity using CHAIN database offer improvement in the identification outcomes by 5.8% over the baseline system. The framework ought to be robust enough to repay intra-speaker and inter-speaker variability, including channel impacts. The analysis using timbre features based on median value predicted that the intra-speaker variability is being compensated. The use of median timbre features reported further enhancement of 1.12% compared with using timbre features and a further decline in False Negative Rate (FNR). The use of i-Vector + probabilistic discriminant analysis (PLDA) and Support Vector Machine (SVM - cosine kernel) have contributed a relative improvement in accuracy of 8.13%. The reductions in False Positive Rate (FPR) and False Negative Rate (FNR) confirm better variability compensation.
    Keywords: whispered speaker; median timbre feature; i-Vector; cosine kernel; support vector machine.

  • A model predictive control strategy for field-circuit coupled model of PMSM   Order a copy of this article
    by Zhiyan Zhang, Pengyao Guo, Yan Liu, Hang Shi, Yingjie Zhu, Hua Liu 
    Abstract: Based on the analysis of the mathematical equations and drive circuit of permanent magnet synchronous motor (PMSM), a model predictive control strategy for the controller of PMSM is proposed. The stator current discretization model and the cost function of model predictive control are established, and voltage vector selection is derived. Then, the coupling mechanism among motor, driver and controller is analyzed?and the field-circuit coupled model of a 1kW PMSM using model predictive control is set up. Next, the starting performance, load characteristics and electromagnetic field of the motor are obtained. Good speed and electromagnetic characteristics verify the effectiveness of the PMSM control strategy and the correctness of the PMSM field-circuit coupled model. Finally, the back EMF waveforms and its harmonics of the field-circuit coupled model and the finite-element model without drive circuit and controller are compared and analyzed. The simulation results show that the amplitude of back EMF in both models is basically the same while the field-circuit coupled model has high THD value, which can simulate the practical conditions.
    Keywords: PMSM; model predictive control; voltage vector selection; field-circuit coupled model.

  • Mechanics of the tubing string for supercritical CO2 fracturing   Order a copy of this article
    by Wenguang Duan, Baojiang Sun, Deng Pan, Hui Cai 
    Abstract: Supercritical CO2 fracturing is one of the most efficient ways for increasing petroleum productivity. The tubing string for the fracturing is necessary and plays an in important role in the fracturing process. A mechanical model of the tubing string in the well for fracturing is set up. The forces on the tubing string are analysed. The mechanical formulas are derived. The stresses on the tubing string are calculated and the strength of the tubing string is checked. The running accessibility of the tubing string through the well for fracturing is studied. The equations for calculating the critical force on the tubing string for fracturing causing sinusoidal bucking and helical bucking are given. Based on the finite element method, a model is set up. The stress and deformation of the tubing string in the horizontal and deviation well sections are calculated. Results show that under the given conditions, the tubing string is safe and efficient.
    Keywords: supercritical CO2; fracturing; tubing string; running accessibility; mechanics.

  • Ontology-based broker system for interoperability of federated cloud computing platforms   Order a copy of this article
    by Surachai Huapai, Unnadathorn Moonpen, Thepparit Banditwattanawong 
    Abstract: This paper presents an ontology-based broker system for the interoperability of federated clouds. The system can provision cloud infrastructure resources from different platforms to meet the users requirements of Infrastructure as a Service (IaaS). The system engaged an ontology to enable the interoperability of heterogeneous IaaS management platforms, OpenStack, Apache CloudStack, and VMware ESXi. The system provisioned appropriate cloud-infrastructure resources from available platforms based on a vector-space algorithm. Evaluation results relying on the two datasets of non-scheduled and scheduled IaaS-user requests show that our system is practical in that average latencies to generate REST commands for virtual machine provisioning take less than a second per request and are linearly proportional to the number of provisioned servers.
    Keywords: federated-cloud computing; cloud broker; cloud ontology; infrastructure as a service; interoperability.

  • On the estimation of makespan in runtime systems of enterprise application integration platforms: a mathematical modelling approach   Order a copy of this article
    by Fernando Parahyba, Rafael Z. Frantz, Fabricia Roos-Frantz 
    Abstract: Integration platforms are tools developed to support the modelling, implementation and execution of the integration processes, so that data and functionality from applications in software ecosystems can be reused. The runtime system is a key piece of software in an integration platform and it is directly related to its performance; and, makespan is a metric used to measure performance in this systems. In this paper we propose a mathematical model to estimate the makespan for integration processes that run on application integration platforms built based on the theoretical task-based model. Our model has shown to be accurate and viable to assist software engineers in the configuration and deployment process of integration processes on an actual integration platform. The model was validated by means of a set of experiments, which we report in the paper.
    Keywords: enterprise application integration; makespan; runtime system; mathematical modelling; integration platforms.

  • Gradient iterative based kernel method for exponential autoregressive models   Order a copy of this article
    by Jianwei Lu 
    Abstract: Two kernel method based gradient iterative algorithms are proposed for exponential autoregressive (ExpAR) models in this study. A polynomial kernel function is utilized to transform the ExpAR model into a linear-parameter model. Since the order of the linear-parameter model is large, a momentum stochastic gradient algorithm and an adaptive step-length gradient iterative algorithm are developed. Both these two algorithms can estimate the parameters with less computational efforts. Finally, a simulation example shows that the proposed algorithms are effective.
    Keywords: ExpAR model; kernel method; linear-parameter model; momentum stochastic gradient algorithm; adaptive step-length; gradient iterative algorithm.

  • Ontology-based data integration for the internet of things in a scientific software ecosystem   Order a copy of this article
    by Jade Ferreira, José Maria N. David, Regina Braga, Fernanda Campos, Victor Stroele, Leonardo De Aguiar 
    Abstract: The Internet of Things (IoT) enables a smart observation of the environment, producing a large amount of heterogeneous data. On the one hand, it allows the remote collection of data, either providing a ready field dataset compilation or serving as a secondary source of information to better analyse the research context. On the other hand, all the raw data generated by disparate sensors need to be integrated to leverage the power of IoT in scientific experiments. This paper proposes an ontology-based data integration architecture that allows data from different sources, formats, and semantics to be integrated and organized by a mediated ontology that provides knowledge inference. The architecture is thus evaluated as a use case testing in a scientific software ecosystem that supports all stages of the experiment life cycle.
    Keywords: ontology; internet of things; data integration; scientific software ecosystem.
    DOI: 10.1504/IJCAT.2022.10044215
  • New media art design in commercial public space   Order a copy of this article
    by Zhigang Wang, Y.E. Wang, Y.U. Sun 
    Abstract: New media art in commercial public space is very beneficial for art communication and commercial transformation. The mass communication awareness can help to maximize the value of new media art and even strengthen peoples public awareness. The article mainly includes two aspectsexperience design and the impact on the peoples lifestyleto understand the impact of new media art in the commercial public space. The fundamental of experience design is to let the people participate in interactive experience activities. The content includes the combination of art and technology, the combination of the public space environment and the form of new media art, the people\'s experience cognition and emotional cognition. The new media art of commercial space will build a multi-dimensional cultural consumption place from material to symbol to spiritual level. In order to stimulate the inner demand and resonance between people and goods and give deeper cultural significance to consumer activities.
    Keywords: commercial public space; new media art; mass communication.

  • A vision of 6G: technology trends, potential applications, challenges and future roadmap   Order a copy of this article
    by Syed Agha Hassnain Mohsan 
    Abstract: The ongoing research on fifth-generation (5G) has exposed many inherent drawbacks in this technology. These limitations of 5G have spurred global research activities to focus on future sixth-generation (6G) technology. The fundamental architecture and performance requirements of 6G are yet to be explored. In present world, the academic research and industrial synergy is accelerating to conceptualize 6G. The widespread applications of blockchain, internet-of-things (IoT), artificial intelligence (AI), augmented reality (AR), virtual reality (VR) and extended reality (XR) have driven the need of emerging 6G technology. 6G technology will put profound impact on ubiquitous connectivity, deep connectivity and intelligent connectivity. We envisage 6G as an ultradense heterogeneous, highly dynamic and innately intelligent network. Thus, the current upsurge of diversified mobile networks has spurred heated discussion on evolution of 6G. In this study, we have outlined a holistic vision which enables tenets of 6G. We opine it will bring technological trends by exciting services and applications. 6G is envisaged to revolutionize several allied technologies and applications. Furthermore, it will enable Internet of Everything (IoE) which will put profound impact of Quality of Experiences (QoE) and Quality of Services (QoS). Integration of IoE and 6G will provide better performance of flying sites, smart cities, robotic communication, vehicular networks and remote surgical operations. In this review, we have envisioned potential applications and challenges in future 6G technologies. Generally, the intent of this extant study is to lay a foundation for out-of-the-box research around 6G applications. In the roadmap review, 6G applications as well as potential challenges are highlighted. In this regard, we believe this review will be helpful to aggregate the research efforts and eliminate the technical uncertainties towards breakthrough novelties of 6G.
    Keywords: 5G; 6G; Blockchain; IoT; mobile networks; internet of everything; ubiquitous connectivity.

  • Fast position tracking control of PMSM under the high frequency and variable load   Order a copy of this article
    by Jiafeng Zhang, Jinghua Wang, Yang Liu 
    Abstract: According to the force characteristics and deflection characteristics of the rudder surface of a supercavitating vehicle, the problem of PMSM's fast position tracking under high-frequency variable load conditions is proposed. In order to solve the problem of poor tracking effect of the "traditional three closed loop" position tracker under the condition of high-frequency variable load, base on the feedforward control theory and the "traditional three closed loop" position tracker, a position tracking control strategy of "three closed loops + speed loop fuzzy feedforward compensation + current loop feedforward compensation" is proposed. First, feedforward compensation for the speed loop reference input improves the response speed of the system and improves the fast position tracking accuracy. Second the feedforward compensation of the current loop reference input effectively overcomes the influence of high-frequency variable loads on the position tracking effect, and further improves the position tracking accuracy. Then the theoretical analysis shows that the two feed-forward links do not change the stability of the traditional three loop position tracker, and the design method of two feedforward coefficients is given. Finally, three simulation comparison experiments respectively illustrate the effectiveness of speed loop feedforward compensation, current loop feedforward compensation and fuzzy control for improving the accuracy of PMSM fast position tracking under high-frequency variable load conditions. The simulation results also verify that the position tracking control strategy proposed in this paper has better response speed, position tracking accuracy and anti-interference performance than the "traditional three closed loop" and "three closed loop + speed loop feedforward compensation" position trackers.
    Keywords: permanent magnet synchronous motor; high frequency variable load; fast position tracking; three closed-loop control; fuzzy feedforward compensation; load observer.

  • A chaos-enhanced accelerated PSO algorithm in reliable tracking of mobile objects   Order a copy of this article
    by Sahar Teymori, Peyman Babaei 
    Abstract: Object tracking in monitoring applications is one of the topics in The Internet of Things (IoT) issues. Most important key challenges in object tracking have concentrated on energy consumption and service quality and reliability. In the proposed approach the good performance of the PSO algorithm in global optimization, and its weakness in local optimization, the PSO algorithm is combined with the chaos operator to overcome this flaw. The purpose of the present research is to improve energy consumption and service quality and increase system reliability in mobile object tracking in WSNs. The goal is also to improve the algorithm performance. According to the results of the simulations, the energy consumption in the proposed method has been improved due to the optimal selection of the cluster heads. Also, the proposed method is stable while improving the reliability and increasing the quality of sensor network services.
    Keywords: object tracking; wireless sensor network; chaos theory; particle swarm optimisation.

  • Formal specification at model-Level of model-driven engineering using modelling techniques   Order a copy of this article
    by Jnanamurthy HK, Frans Henskens, David Paul, Mark Wallis 
    Abstract: Nowadays, model-driven engineering (MDE) is gaining more popularity owing to high-level development leading to a faster generation of executable code, which reduces manual intervention. Verification is crucial at different levels of model-based development. Model-based development, along with formal verification process, assures the developed model satisfies software requirements described in formal specifications. Owing to inadequate knowledge of formal methods (complex mathematical theory), software developers are not adopting formal methods during software development. There are several approaches in the literature available to transform MDE models into formal models directly for formal verification, and these approaches require an additional input of formal specifications to verification tools for formal verification. But these methods have not addressed the problem of formal specifications at the model level. In this paper, we design a modelling framework using modelling techniques, which allows specifying formal properties at the model level, automatically extracting formal specifications and formal models from developed application models, which are used for formal verification. The proposed method allows full automation and reduces the time for formal verification process during the development life-cycle. Furthermore, the method reduces the complexity of learning formal specification notations (specifications specified at the model level are automatically converted into formal specifications), which are required to input verification tools for formal verification.
    Keywords: model-driven development; formal specification; formal verification; temporal logic; model-driven architecture;.

  • Design, optimisation and implementation of a DCT/IDCT based image processing system on FPGA   Order a copy of this article
    by Shensheng Tang, Monali Sinare, Yi Zheng 
    Abstract: In this paper, a discrete cosine transform (DCT) and its inverse transform IDCT are designed and optimised for FPGA using the Xilinx VIVADO High-Level Synthesis (HLS) tool. The DCT and IDCT algorithms, along with a filter logic written by C/C++, are simulated for functional verification and optimised through HLS and packaged as custom IPs. The IPs are incorporated into a VIVADO project to form an image processing system for hardware validation. The VIVADO design, along with a Xilinx SDK application written by C language, is implemented on a Zynq FPGA development board, Zedboard. A C# GUI is developed to transfer image data to/from the FPGA and display the original and processed images. Experimental results are presented with discussion. The FPGA development method, including the DCT/IDCT IP design, optimisation and implementation via HLS as well as the VIVADO project integration, can be extended to a wider range of FPGA applications.
    Keywords: DCT; IDCT; FPGA; VIVADO HLS; IP; Zedboard; GUI; C/C++; Verilog; C#; Optimisation; C/RTL co-simulation; hardware validation.

  • Interactive smart home technologies for users with visual disabilities: a systematic mapping of the literature   Order a copy of this article
    by Otávio Oliveira, André Freire, Raphael De Bettio 
    Abstract: This paper presents a systematic mapping of the literature concerning interactive technologies for smart homes targeting users with visual disabilities. The analysis stemmed from a search resulting in 265 papers, of which 25 were selected. The results show the main types of interaction mode reported, including voice, gesture, touch, keyboard and ambient sensors. Technological approaches included desktop computers, mobile devices, embedded systems, and stand-alone smart devices. The studies showed important features to aggregate different interaction modalities and provide accessible interfaces in mobile and desktop devices to interact with the home. This paper provides valuable insight into the implications for the design of smart home technologies for users with visual disabilities and shows the significant research gaps to be investigated in the future, including overcoming barriers with legacy inaccessible utilities and methodologies to enhance user research in the area.
    Keywords: smart homes; ambient-assisted living; visually impaired user; blind user.

  • Confirmed quality aware recommendations using collaborative filtering and review analysis   Order a copy of this article
    by Seema Nehete, Satish Devane 
    Abstract: Recommendation Systems (RS) save the time of users in their hectic life schedules for purchasing their products. RS faces challenges of data sparsity, cold start, efficiency of prediction of products and hence the proposed system is making use of Multi-kernel Fuzzy C Means (MKFCM) clustering to group together users having similar age, occupation, and gender into clusters. Clusters of similar users are optimised using the Fruit Fly (FF) optimisation algorithm, which gives high cluster accuracy and dynamically created subclusters of similar users and their favorite products, overcoming sparsity issues which make the analysis easy. Collaborative Filtering (CF), one of the filtering method of RS, is used to predict products for target users. This RS gains users faith by additionally performing analysis of textual reviews using optimised Artificial Neuron Network (ANN) to recommend the highest quality products, thus dual tested and quality confirmed products are recommended to the user. Experimentation is done on a standard Movilense dataset used by many researchers to prove the efficiency of this RS, and reviews of all users are extracted from online search engines for product quality analysis before recommendation. Experimentation proves higher recall and accuracy than existing recommendation systems.
    Keywords: clustering; recommendation systems; collaborative filtering; artificial neural network.

  • A combined solution for flexible control of poultry houses   Order a copy of this article
    by Lucas Schmidt, Dalcimar Casanova, Richardson Ribeiro, Marcelo Teixeira 
    Abstract: In poultry houses, thermal comfort is decisive for maximizing the feed conversion rate, a measure for successful production. As there are different automatic control options, that result in variable performance indexes, this paper reproduces, tests, and compares two of them: a reactive, that applies event-driven methods, and a bio-inspired, which is based on artificial intelligence techniques. As each approach adds specific advantages to the process control, we combine them into a single framework that gathers their best features. Simulations using real data show that temperature and humidity have been reproduced with 97% and 80% precision, respectively. In comparison, reactive and bio-inspired approaches show respectively accuracies of 90% and 82% for temperature, and 60% and 66% for humidity. Therefore, we conclude that our approach can improve both reactive and bio-inspired control, standing as a feasible and flexible alternative for the control of poultry houses.
    Keywords: intelligent systems; poultry houses; automatic control; formal modelling.

  • Asynchronous dynamic arbiter for network on chip   Order a copy of this article
    by Abdelkrim Zitouni, Bouraoui Chemli 
    Abstract: In modern Network on Chip (NoC), communicating blocks are synchronised with different clock rates. However, system performances may present a bottleneck that can be remedied only by considering the notion of communication asynchrony. The implementation of a high-performance asynchronous NoC router requires the design of dynamic arbitration structures to lower packet latency, and thus increase throughput. Also, the dissipated power needs to be as small as possible. This paper presents a design approach of asynchronous dynamic arbiters to be implemented in NoC routers. The design steps begin by State Transition Graph (STG) as specification model and generate a Quasi-Delay-Insensitive (QDI) arbiter implemented by C-element gates. The designed arbiter communicates with the shared resources by using a four-phases (Req/Ack) handshaking protocol. Arbiter performances have been evaluated through the implementation of an asynchronous 2D-Mesh NoC router in FPGA (Virtex 5) and ASIC (28 nm) technologies. Experimental results show that the proposed router exhibits better performances compared with its counterparts. In ASIC design, this router achieves low power (3.8 mW), low area (0.009 mm2), low latency (1.53 ns), and high packet throughput (1562 Mflit/s).
    Keywords: asynchronous dynamic arbiter; STG; C-element; NoC router; FPGA/ASIC designs.

  • SCATAA-CT: smart course attendance tracking android application in classroom teaching   Order a copy of this article
    by Saadeh Z. Sweidan, Sondos M. Alshareef, Khalid Darabkh 
    Abstract: Tracking students attendance manually is an exhausting and time-consuming process for both instructors and students in all universities around the world. However, instructors are obligated to report students who exceed the allowed absence limit and take legal measurements against them. On the other hand, the number of smartphone users has rapidly increased in the last decade owing to their attractive features and affordable prices. With the fast spread of smartphones, the importance of their related applications (apps) has increased to become the most reliable way to provide any service. Today, apps are being used in all fields of life, such as social activities, formal government work, and even entertainment, which has motivated us to introduce Smart Course Attendance Tracking Android Application in Classroom Teaching (SCATAA-CT). This app aims to enhance the process of tracking attendance in terms of time and effort in large universities where the number of students in a class is high and attendance is mandatory (based on a universitys rules and regulations). Using SCATAA-CT is simple, a course instructor generates a Quick Response (QR) code during a lecture and views it for a short time to the students who in turn scan the code and send back attendance requests to the instructors device. To add credibility to the scan process, a fingerprint authentication is required in addition to other restrictions that all prevent any possible manipulation. Besides generating QR codes, SCATAA-CT allows instructors to show their courses details, read attendance reports, cancel lectures, and block/unblock students based on their absences. On the other side, students can also use the app to show the details of their attendance reports. Moreover, SCATAA-CT exploits notifications efficiently to send users important pre lecture alerts and post lecture updates. Our app was practically tested in a number of courses during the academic year 2019/2020, where it showed efficiency and credibility in tracking students attendance. Even more, the involved students were asked to answer an evaluation survey and the results were very positive with a number of useful feedbacks to consider.
    Keywords: engineering education; attendance tracking; Android application; classroom teaching; fingerprints; biometric authentication.

  • A novel multichannel UART design with FPGA-based implementation   Order a copy of this article
    by Ngoc Pham Thai, Bao Ho Ngoc, Tan Do Duy, Phuc Truong Quang, Ca Phan Van 
    Abstract: Universal Asynchronous Receiver and Transmitter (UART) is a popular asynchronous serial communication standard. Although the transmission speed is not too high, UART has the advantage of simplicity, ease of implementation and low power consumption. Therefore, UART is still used in various digital modules that do not require high communication speed, such as SIM module, Bluetooth, GPS, etc. However, communication with many low-speed peripherals can reduce the efficiency of data bus usage and the processor's performance. In this paper, we propose a multichannel UART design to efficiently use the Advanced Peripheral Bus (APB) standard data bus in order to support simultaneously multiple transmission data frames with different rates. Then, we evaluate the performance of our multichannel UART design by means of simulations and practical implementation using field-programmable gate array boards. The evaluation results show that our proposed multi-channel UART module ensures stable operation while guaranteeing proper transmission to/from multiple devices following UART standard with different configurations.
    Keywords: UART; multichannel; AMBA 3 APB; testbench; field-programmable gate array.

  • Sensor device scheduling based cuckoo algorithm for enhancing lifetime of cluster-based wireless sensor networks   Order a copy of this article
    by Mazin Kadhum Hameed, Ali Kadhum Idrees 
    Abstract: Among the more complicated aspects of Wireless Sensor Networks (WSNs) is developing an efficient topology control technique for saving energy of the network, as well as increasing its lifespan. This study proposes Sensor Device Scheduling-based Cuckoo Algorithm (SeDeSCA) for Enhancing Lifetime of Cluster-based WSNs. The SeDeSCA technique consists of two phases: clustering and scheduling. The WSN is clustered into clusters using DBSCAN algorithm in the first phase. The scheduling phase is periodic and composed of three steps: cluster head polling, scheduling decision-based optimisation, and covering. The sensor nodes in each cluster choose their cluster head. The elected cluster head executes Cuckoo Algorithm (CA) to select the suitable schedule of sensor nodes that take the mission of sense during the current period. The major aim of scheduling algorithm-based CA is minimising the amount of energy consumption and ensuring sufficient coverage for the monitored area while maximising the network lifespan for WSN. The fourth step is to cover the area of interest by the sensor nodes that are scheduled to be active during this period. The simulation results show that the SeDeSCA technique does indeed improve the network lifespan and global coverage ratio, and improve the lifespan of WSNs.
    Keywords: wireless sensor networks; cuckoo algorithm; DBSCAN; lifetime enhancement; scheduling algorithms.

  • An analysis of real-time traffic congestion optimisation through VTL in VANETs   Order a copy of this article
    by Parul Choudhary, Umang Singh, Rakesh Dweidi 
    Abstract: Traffic congestion is a daunting phenomenon that affects thousands of people worldwide in their everyday lives. Owing to the rapid proliferation of technologies, the demand for VANET technology is increasing expeditiously to create an environment for a virtual traffic light (VTL) to minimise traffic congestion. The replacement of conventional physical traffic light systems with VTL is cost-efficiently achieved across vehicle networks. In this paper, we summarise the recent state-of-the-art methods of VANETs by discussing the importance of VTL in VANET, its architecture, and real-life applications. Further, work is focused on challenges, characteristics, and related domains of allied VANETs applications by filling the gaps of existing surveys along with the latest trends incorporating the concept of VTL. This attempt presents the effectiveness of VTL by including recent work in real scenarios according to research findings. This paper offers a systematic review of current VTL methodologies that promise to show an impactful result in the future. Finally, this attempt comprehensively covers the entire VANET system and highlights certain research gaps of VTL that are still to be explored. This work will support researchers of this domain by analysing the literature on VTL in VANET during the period 2007-2019.
    Keywords: traffic congestion; VANETs; virtual traffic light; real life applications.

  • Capacity configuration optimisation of hybrid renewable energy system using improved grey wolf optimiser   Order a copy of this article
    by Huili Wei Wei, Tianhong Pan, Jun Tao, Mingxing Zhu 
    Abstract: An appropriate capacity configuration of the hybrid renewable energy system (HRES) contributes to reduce the equipment cost of the system configuration, and improve the operational reliability of the system. Aiming at minimising the annualised cost and the loss of power supply probability, a capacity configuration optimisation model of a PVwind HRES is set up in this study. An improved Grey Wolf Optimizer (iGWO) is proposed to optimise the systems configuration. First, the Tent chaotic strategy is used to initialise the population. Then, the convergence factor is modified to balance the local and global search ability of GWO. Finally, the meteorological data of the wind speed and solar radiation in a typical year in Zhenjiang, China, are taken as a case to verify the economy and feasibility of the optimal configuration. The results show that the proposed method not only ensures the operation reliability, but also improves the economic performance of HRES.
    Keywords: hybrid renewable energy system; optimisation; capacity configuration; improved grey wolf Optimiser.

  • Metamodel extension approach applied to the model-driven development of mobile applications   Order a copy of this article
    by Ayoub Sabraoui, Anas Abouzahra, Karim Afdel 
    Abstract: Mobile application development is one of the most promising domains in the software industry. The rapid growth of hardware and emerging technologies has resulted in a large number of mobile platforms, which constitutes a challenge that developers must face when they build applications for different platforms. The model-based artifacts co-evolution is another challenge when metamodels evolve. This paper introduces a model-driven approach for managing the metamodel evolution in the context of cross-platform mobile application development. Firstly, we propose an MDD approach, based on a generic DSL, and a set of code generators to generate platform-specific source code. Secondly, the approach provides a graphical framework: i) to extend the original metamodel through a set of rules, ii) to define the mapping between the newly added meta-elements and their corresponding elements in the target platforms, and iii) to automatically update existing code generators. This paper demonstrates the potentials and limits of our approach through a concrete case study.
    Keywords: cross-platform mobile development; model-driven development; metamodel evolution; model co-evolution; code generation; domain-specific language.

  • Integration of ubiquitous specifications in the conception of objects system   Order a copy of this article
    by Sonia Aimene, Rassoul Idir 
    Abstract: This paper proposes an approach called Ubi-SO (Ubiquitous System Object) based on standard life cycle. This approach aims to identify, to analyse and to design ubiquitous requirements that can be incorporated into a traditional system engineering process. The approach is modelled with the BPMN (Business Process Management Notation) method, which is adapted using the Bizagi Modeler tool. Ubi-SO separates functional, technical and contextual ubiquitous needs in the conceptualisation phase. It is based on an extended sequence diagram in the analysis phase and on an extended class diagram in the design phase using Uml profile for the best adaptation to ubiquitous domain. Compared with a lot of works, this solution offers guidelines for studying and spreading ubiquitous needs. To demonstrate the feasibility of our work, the approach is verified by translating the BPMN into formal LOTOS (Language of Temporal Ordering Specification) and then validated by the CADP tool.
    Keywords: modelling; context-awareness; ubiquitous computing; pervasive applications; mobility; lotos; BPMN; UML profile; life cycle.

  • Numerical simulation of full-scale steel-frame undergoing soil pressure   Order a copy of this article
    by Bayang Zhang, Yaohong Zhu, Fachao Li, Jiawei Wang, Jue Zhu 
    Abstract: During the excavation of a connecting channel between the main tunnels using the mechanical shield method or pipe jacking method, the loading situation on the T-joint is very complicated. A vertical loaded full-scale steel-frame that can imitate the surrounding soil loading is invented to ascertain the action mechanism of each part. It can burden seven-ring segments and concern the soil spring effect. Prior to the field test, the entire installation of the facility is modelled, simulated and analysed to evaluate the safety of the construction. The analysis results show that the steel frame rotates seriously when the steel frame is not welded to the base. After welding the steel frame with the base, the rotation phenomenon of the steel frame can be effectively eliminated, and the stress and displacement of each part are in line with the standard for design of steel structures.
    Keywords: steel frame; vertical loaded; soil spring; earth pressure; seven-ring.

  • SiNoptiC: swarm intelligence optimisation of convolutional neural network architectures for text classification   Order a copy of this article
    by Imen Ferjani, Minyar Sassi Hidri, Ali Frihida 
    Abstract: Although many rules have been suggested by several researchers for designing deep neural architectures, trial-and-error techniques are often exploited in practice to find the optimal model for a given problem. Thus the automation of deep neural architecture search methods is highly recommended. In this work, we address this problem by proposing a hybrid coupling of Convolutional Neural Networks (CNNs) architectures with swarm intelligence, especially the Fish School Search (FSS) algorithm. This coupling is capable of discovering a promising architecture of a CNN on handling text classification tasks. The proposed method allows users to provide training data as input, and receive a CNN model as an output. It is completely automatic and capable of fast convergence. Computational results show the effectiveness of the proposed method in achieving the best classification loss among manually designed CNNs. This is the first work using FSS for automatically designing the architectures of CNNs.
    Keywords: deep learning; convolutional neural network; swarm intelligence; FSS; text classification; NLP.

  • Improved image matching algorithm based on LK optical flow and grid motion statistics   Order a copy of this article
    by Qunpo Liu, Xiulei Xi, Weicun Zhang, Lingxiao Yang, Naohiko Hanajima 
    Abstract: In order to solve the problems of low accuracy and long time-consuming of the AKAZE algorithm in the image matching of glass encapsulated electrical connectors, an improved image matching algorithm based on LK optical flow and grid motion statistics is proposed in this paper. to address the multi-solution problem arising from the construction of the nonlinear scale space in the AKAZE algorithm, this paper proposes an improved AKAZE algorithm fused with LK optical flow method. Matching points are obtained by calculating the matching area which are made up of the feature points for conditional constraints. In the local feature matching algorithm, the large amount of calculation is an urgent problem because the sparse neighborhood consistency feature cannot define adjacent areas well. The false matching points are removed by an improved grid motion statistics algorithm based on integrated FLANN algorithm, and then match computation time is reduced. The performance of the algorithm is verified by experiments based on the Mikolajczyk and actual scene data. Experiment results show that the proposed algorithm can handle the actual scene data, the CMR reaches over 93%, and the time taken is within 0.4s.
    Keywords: positioning; glass-encapsulated electrical connector; AKAZE algorithm; LK optical flow; feature matching; grid motion statistics.

  • Vulnerability assessment of services deployed in internet of things based smart cities   Order a copy of this article
    by Aymen Belghith 
    Abstract: The Internet of Things (IoT) is an innovative and revolutionary technology. It promises to serve humanity and improve our lives by integrating a huge number of heterogeneous end devices and provide diverse interesting services. However, security remains the main key for the success of any technology. In this paper, we aim to provide structural guidelines to secure IoT-based smart cities. We should consider the IoT-based functional requirements in parallel with the security requirements based on the security triad: confidentiality, integrity, and availability. Moreover, we should consider the security challenges of smart cities based on the cube: big data, resource limitation, interoperability, and scalability. We then present solutions to the main threats. Finally, we assess the vulnerabilities of some services offered in an IoT-based smart cities context. We show that current available services still suffer from several vulnerabilities and need associated security countermeasures for the success of the IoT-based smart cities.
    Keywords: IoT; smart cities; security; countermeasures; vulnerabilities; assessment.

  • Research on semantic similarity calculation methods in Chinese financial intelligent customer service   Order a copy of this article
    by Mingyu Ji, Xinhai Zhang 
    Abstract: Semantic similarity computing is an important task in NLP, which aims to calculate the semantic similarity between texts. In order to solve the problem of low accuracy of existing calculation methods in Chinese financial intelligent customer service, we propose a text similarity calculation method combining Capsule-BiLSTM network and Chinese part of speech (POS) correction. In the text preprocessing stage, POS correction is performed on financial professional words and ambiguous words in the dataset to reduce the influence of Chinese word segmentation errors on similarity judgements. Capsule network and BiLSTM were used to obtain local and global information respectively, and the two similarity matrices obtained are fused to determine the similarity. Experimental results show that the proposed method compared with other conventional methods has high precision and F1 value in the ATEC dataset.
    Keywords: semantic similarity; capsule network; BiLSTM; part of speech correction.

  • Hierarchical structure modelling in uncertain emergency location-routing problem using combined genetic algorithm and simulated annealing   Order a copy of this article
    by Bijan Nahavandi, Mahdi Homayounfar, Amir Daneshvar, Mohammad Shokouhifar 
    Abstract: The emergency location routing problem (ELRP) is a strategic issue in different areas especially in healthcare systems. Owing to the importance of the problem, this study aims to develop a multiobjective evolutionary model that determines the location of facilities in a way that facilities in higher levels can serve lower-level facilities efficiently. This study presents a comprehensive literature review to provide the research contribution including: multiple failure; multiple coverage radius; hybrid transportation system; and demand uncertainty in a ELRP. A mathematical model is presented for the ELRP comprising two objective functions. The first objective is to maximize the provided services to demand nodes, assuming proper operation of emergency facilities, and the second objective is to maximise the reliability of the facility system to respond the patients demands even if some facilities fail to operate. To achieve this purpose, a backup system with a hybrid ambulance-helicopter transportation system is developed for the situations where the primary system cannot properly serve the patients. The failure probability of the emergency facilities is analysed via robust optimisation. In terms of data analysis, the NP-hard ELRP problem, a balanced exploration-exploitation metaheuristic algorithm based on genetic algorithm (GA) and simulated annealing (SA), named GASA, is proposed. Research findings by comparison of the GASA simulation results with a commercial solver demonstrates the higher efficiency of the proposed method.
    Keywords: emergency location routing problem; backup facilities; robust optimisation; genetic algorithm; simulated annealing.

  • Optical satellite image MTF compensation for remote-sensing data production   Order a copy of this article
    by Chao Wang, Ruifei Zhu 
    Abstract: Modulation transfer function (MTF) compensation has been widely used in remote-sensing (RS) imagery processing for texture feature enhancement and the restoration ofhigh-frequency details. This paper proposes an optical satellite MTF compensation (MTFC) method for engineering application and RS data production. The framework mainly includes point spread function (PSF) model estimation and non-blind image deconvolution. In PSF estimation, we employ the iterative total variation algorithm and 2D Gaussian model fitting to reduce the dependence on slant-edge quality and improve the efficiency of PSF measurement. The PSF model estimation error is less than 3% using the results from standard commercial software as an evaluation benchmark. In image deconvolution, we adopt a regularisation based a non-blind deconvolution method using hyper-Laplacian prior. Compared with the widely used methods, the MTF result improved more than double in the high-frequency part. Its processing efficiency and image quality can meet the requirements of RS image products.
    Keywords: optical remote-sensing imagery; MTF compensation; PSF estimation; remote-sensing data production.

  • Geometric distortion correction for projections on non-planar and deformable surfaces based on displacement of peripheral image points   Order a copy of this article
    by Onoise Kio, Lik-kwan Shark 
    Abstract: In the delivery of media content involving projections of images on non-planar and deformable surfaces, there is an inevitable problem of geometric distortion that causes visually incorrect images to be produced in the display region. Presented in this paper is a simple and computation efficient method for geometric distortion correction. While the simplicity comes from the use of a single uncalibrated camera to capture the projected image, the computation efficiency comes from the use of a small number of image points along the periphery of the display region to estimate the geometric distortion. In particular, cylindrical surface deformation is used to model the geometric displacements of peripheral image points, and bilinear approximation is used to model the geometric displacements of image points lying between the peripheral image points. Results of tests on static and deformable projection surfaces show this distortion-correction technique improved the normalised geometric similarity measure of distorted displayed images by as much as 31%.
    Keywords: geometric distortion correction; non-planar projection; projector-camera systems; deformable projection surface; RBF warping.

  • Cross event detection and topic evolution analysis in cross events for man-made disasters in social media streams   Order a copy of this article
    by Pramod Bide, Sudhir Dhage 
    Abstract: Terrorist attacks, chemical attacks, rapes and other socially sensitive incidents are shared on social media to gain attention from the world. Microblogging sites like Twitter become flooded with these root events and their sub-events as they evolve over time; such events are referred to as cross events. Cross event detection is critical in determining the nature of events. The event detection is based on tweet segmentation using the Wikipedia title database. Segment clustering is done based on a similarity measure by encoding the tweets in the form of vectors using the BERT model. We proposed the cross event evolution detection framework, which detects cross events that are similar in their temporal nature and result from main events. The experimental results on a real Twitter data collection show the effectiveness of our proposed framework for both cross event detection and topic evolution algorithm during the evolution of topics and cross events.
    Keywords: cross event detection; Twitter; topic evolution; BERT.

  • Convolutional neural network model for an intelligent solution to crack detection in pavement images   Order a copy of this article
    by Aaron Rababaah, James Wolfer 
    Abstract: This paper presents a deep learning solution using convolutional neural networks for pavement crack detection. The advancements in machine learning and machine vision open new opportunities for researchers to explore the power of deep learning instead of classical machine learning to solve old and new problems. We propose a convolutional neural network model to detect cracks in pavement. Our solution is based on a multi-layer model that encompasses a raw image input layer, convolutional layers, activation layers, max-pooling layers, a flattening layer, and a multi-perceptron neural network as classification layers. Matlab was our development platform to create and test the solution. Five hundred sample images were collected from publicly-available sources. Sixteen different experiments were conducted to determine the best configuration for the proposed model in terms of the number of features. The results of the experiments suggest that the proposed model is effective with a detection accuracy of 96.6% when correctly configured.
    Keywords: deep learning; convolutional neural networks; pavement images; crack classification; machine vision.

  • DDoS attack detection and defence mechanism based on second-order exponential smoothing the Holt model   Order a copy of this article
    by Rachana Patil 
    Abstract: Technological progress and digitisation are greatly assisted by the growth of the internet. The web has now become a national asset, and all national security relies on it as well. But these emerging developments have also brought with them unparalleled network threats. Among them, a strong and more powerful attack on the internet is a distributed denial of service attack. This work proposes a novel framework for DDoS detection. To detect anomalous variations in mean distance values, the technique of second order exponential smoothing (Holts method) is used. In the proposed context, the DDoS defence module is based on the principle of the rate limitation of incoming traffic on the basis of bandwidth and demand rates from a device connected. The experimental verification of the proposed method is done using NS2 simulator, and the results are evaluated with detection rate, throughput, and false positive rate.
    Keywords: DDoS attack; rate limiting; network security; Holt model.

  • Cyber attacks visualisation and prediction in complex multi-stage networks   Order a copy of this article
    by Shailendra Mishra, Waleed Bander Alotaibi, Mohammed AlShehri, Sharad Saxena 
    Abstract: In network security, various protocols exist, but these cannot be said to be secure. Many hackers and illegal agents try to take advantage of the vulnerabilities through various incremental penetrations that can compromise critical systems. The conventional tools available for this purpose are not enough to handle things as desired. Risks are always present with dynamically evolving networks and are very likely to lead to serious incidents. This research work proposes a model to visualise and predict cyber attacks in complex, multilayered networks. All the available network security conditions and the possible places where an attacker can exploit the system are summarised. The vulnerability-based multi-graph technique for the attacker is presented. Also, an attack graph algorithm is proposed, leading to identifying all the vulnerable paths that can be used to harden the network by placing sensors at the desired locations and is used for vulnerability assessment of multi-stage cyber attacks.
    Keywords: network vulnerability; attack graph; adjacency matrix; clustering technique; cyber defence.

  • Overheat protection for motor crane hoist using internet of things   Order a copy of this article
    by Paduloh Paduloh, Rifki Muhendra 
    Abstract: Crane hoist is a material-moving tool and work tool for the production process. The hoist often stops suddenly owing to overheating; this condition impacts the production process and safety. This study aims to design a safety device to anticipate the occurrence of overheating in the hoist. The research began with brainstorming, prioritising AHP and designing products using QFD, and designing systems using UML. The product is designed to use a microcontroller, Arduino, fan, and GSM to control the motor temperature and to transmit temperature information to the user. The motor cooler will operate if there is a notification of a motor temperature rise. The novelty of this research lies in the decision-making system, product design, and information system design so that this research can produce a safety device that suits company needs and is easy to operate. This tool is also able to prevent overheating effectively.
    Keywords: hoist crane; QFD; UML; Arduino; IoT.

  • Important extrema points extraction-based data aggregation approach for elongating the WSN lifetime   Order a copy of this article
    by Ali Kadhum M. Al-Qurabat, Hussein M. Salman, Abd Alnasir Riyadh Finjan 
    Abstract: Energy conservation is one of the most basic problems of wireless sensor networks. The energy of sensor nodes is limited, so effective energy usage is important. Data aggregation helps to minimize the volume of data communicated across the network while preserving information quality and decreasing energy waste, thereby enhancing the lifetime of the network. In this paper, we propose a data aggregation approach based on the important extrema points extraction for elongating the WSN lifetime (IEEDA). Rather than transmitting all the set of collected measures at the end of every time period, we propose transmitting the extracted important extrema measures of sensor nodes. Using real-world data sets with radically different properties, we tested our method against two protocols ATP and PFF. The proposed method resulted in a reduction in the amount of the following: data remaining up to 95%, data sent up to 80%, and energy consumed up to 77%.
    Keywords: data aggregation; important extrema points; lifetime; WSN.

  • Digital forensics evidence management based on proxy re-encryption   Order a copy of this article
    by Rachana Patil 
    Abstract: The growing world of digitisation has given rise to cybercrimes. Digital forensics is the process of collecting lawful evidence. Such evidence plays a very crucial role in the court of law to demonstrate the fact explicitly against the crime of the suspect. To ensure the admissibility of evidence in the court of law during trials, it is important to maintain evidence using a proper evidence management system. This paper proposes the use of a unidirectional multi-hop proxy re-encryption scheme for authority delegation. This system will help in securely delegating access to digital evidence. The re-encryption scheme provides a clearer perception of security and validates the usefulness of proxy re-encryption as a method of adding access control to a secure evidence management system. The correctness analysis of the proposed scheme is validated by using BAN logic. The security analysis using the AVISPA tool shows that the proposed scheme is safe against various security attacks.
    Keywords: digital forensics; evidence management; proxy re-encryption; cybercrime; BAN logic; AVISPA.

  • A serious game for the responsible use of fossil fuel-powered vehicles   Order a copy of this article
    by Francisco Javier Moreno Arboleda, Javier Esteban Parra Romero, Agnieszka Szczesna 
    Abstract: Serious gaming has gained increasing prominence in climate change communication, and provides an opportunity to engage people in topics related to environmental protection. This paper presents the design and evaluation of a serious game that concerns pollution generated by fossil fuel-powered vehicles. Serious games might be an effective and motivational tool in that field. The games intention is to motivate the participants to change towards sustainable lifestyles. To achieve this goal, an enhanced game design methodology was proposed and a serious mini-game prototype was developed
    Keywords: serious gaming; game design; sustainable transport; vehicular pollution.

  • Biased compensation adaptive gradient algorithm for rational model with time-delay using self-organising maps   Order a copy of this article
    by Yanxin Zhang, Jing Chen, Yan Pu 
    Abstract: This paper develops a biased compensation adaptive gradient descent algorithm for rational models with unknown time-delay. Owing to the unknown time-delay, traditional identification methods cannot be directly applied for such models. To overcome this difficulty, the self-organised maps are proposed, which can obtain the estimates of the time-delay based on the residual errors. Then, an adaptive gradient descent algorithm is introduced to obtain the parameter estimates. Compared with the traditional gradient descent and redundant rule-based methods, the proposed method has two advantages: (1) each element in the parameter vector has its own step-size, thus it is more effective than the traditional gradient descent method; (2) the number of the unknown parameters is unchanged, therefore, it has needs less computational effort than the redundant rule-based method. Finally, a simulation experiment is given to show the excellent accuracy of the proposed algorithm.
    Keywords: self-organised maps; biased compensation; adaptive gradient descent; parameter estimation; time-delay.

  • FPGA-based DFT system design, optimisation and implementation using high-level synthesis   Order a copy of this article
    by Shensheng Tang, Monali Sinare, Yi Xie 
    Abstract: In this paper, a discrete Fourier transform (DFT) algorithm is designed and optimized for the FPGA implementation using the Xilinx VIVADO High-Level Synthesis (HLS) tool. The DFT algorithm is written by C++ programming and simulated for functional verification in the HLS and MATLAB. For hardware validation, the DFT module is packaged as an IP core and tested in a VIVADO project. A Xilinx SDK application written by C language is developed and used for testing the DFT module on a Zynq FPGA development board, ZedBoard. For visualization of the DFT magnitude spectrum generated in FPGA, a GUI is developed by C# programming and related commands/data can be communicated between the GUI and ZedBoard over the serial port. Experimental results are presented with discussion. The DFT module design, optimization and implementation as well as the VIVADO project development methods can be extended to other FPGA applications.
    Keywords: FPGA; DFT; IP core; VIVADO HLS; C/C++; Verilog; C#; optimisation; hardware validation.

  • QSFN:QoS aware fog node provisioning in fog computing   Order a copy of this article
    by Ashish Chandak, Niranjan Kumar Ray, Deepak Puthal 
    Abstract: The quantity of IoT gadgets is consistently expanding and these gadgets are delay-sensitive and require a speedy reaction. These gadgets are connected with a cloud for the computation of requests yet there may be a delay in computation. To beat the present circumstance, fog nodes are kept at the edge of the IoT gadgets to perform speedy calculation for delay-delicate applications. IoT devices generate tremendous number of tasks and if the task number is increased then the number of fog nodes needs to be increased for immediate processing. Here QoS aware fog node (QSFN) provisioning algorithm has been proposed in which the number of fog nodes is automatically increased based on CPU utilization, queue length, and the number of available resources. We evaluate the performance of QoS-aware fog node provisioning with Bee Swarm and Concurrent algorithm based on makespan, average execution, flowtime, success execution rate, and average response time. Simulation results demonstrate that the proposed QSFN algorithm performs better in comparison with other algorithms.
    Keywords: fog computing; scalability; IoT; fog node.

  • Design of a FPGA accelerator for the FIVE fuzzy interpolation method   Order a copy of this article
    by Roland Bartók, József Vásárhelyi 
    Abstract: Complex control systems are difficult to describe with mathematical models owing to the complexity of the system. The control of these systems can be solved with a solution that does not require accurate knowledge of the system model. The most common solution in such cases is the use of neural networks. With complex description of rule-based behaviour, complex control system can also be implemented. Using fuzzy logic is an effective way to describe the behaviour of a system. The problems encountered when using classical fuzzy logic are avoided by using a fuzzy interpolation method such as the Fuzzy Interpolation in Vague Environment (FIVE) method. Compared with classic fuzzy logic, FIVE has the advantage of computing acceleration, through algorithm parallelisation, which is important in the case of real-time calculations and in tuning procedures. The paper presents a flexible parameterisable hardware-accelerator implementation of the FIVE method using field programmable gate array.
    Keywords: fuzzy; FPGA; hardware accelerator; etorobotics; robotics; behaviour-based control.

  • Two-Degree-of-Freedom Tilt Integral Derivative Controller based Firefly Optimization for Automatic Generation Control of Restructured Power System   Order a copy of this article
    by G. Tulasichandra Sekhar, Ramana Pilla, Ahmad Taher Azar, Mudadla Dhananjaya 
    Abstract: The present work proposes a two degree of freedom tilt integral derivative (2- DOFTID) controller tuned with a firefly algorithm (FA) for a two-area automatic generation control (AGC) power system. Initially, a standard two-area power system is tested to show the superior output of the proposed controller relative to other control strategies. After that, the 2-DOFTID controller is continued for the next test system i.e. restructured power system as a secondary controller. Further, the operation of the Unified Power Flow Controller (UPFC) is analyzed by assimilation in the tie-line. In addition, the redox flow battery (RFB) is used in area-1 to track the frequency variation and thus increases the system's transient responses. Finally, a robustness study was carried out to analyze the capacity of the proposed controller in a poolco-based transaction with the UPFC and RFB system integration by different system parameters and to consider unpredicted load disturbances.
    Keywords: Automatic Generation Control (AGC); Firefly Algorithm (FA); Random Load Disturbance; Redox Flow Battery (RFB); Two Degree of Freedom Tilt Integral Derivative (2-DOFTID) controller; Unified Power Flow Controller (UPFC).

  • Multi-label legal text classification with BiLSTM and Attention layer   Order a copy of this article
    by Liriam Enamoto, Andre Santos, Ricardo Maia, Li Weigang, Geraldo Pereira Rocha Filho 
    Abstract: Like many other knowledge fields, the legal area has experienced an information-overloaded scenario. However, to extract data from legal documents is a challenge owing to the complexity of legal concepts and terms. This work aims to address Bidirectional Long Short-Term Memory (BiLSTM) to perform Portuguese legal text classification to solve such challenges. The proposed model is a shallow network with one BiLSTM layer and one Attention layer trained over two small datasets extracted from two Brazilian courts: the Superior Labour Court (TST) and 1st Region Labour Court. The experimental results show that combining the BiLSTM layer and the Attention layer for long judicial texts helps to capture the past and future contexts and extract multiple tags. As the main contribution of this research, the proposed model can quickly process multi-label and multi-class datasets and adapt to new contexts in different languages.
    Keywords: legal text; multi-label; text classification; BiLSTM; Attention layer.

  • Network intrusion detection using fusion features and convolutional bidirectional recurrent neural network   Order a copy of this article
    by Jagruthi H, Kavitha C, Manjunath Mulimani 
    Abstract: In this paper, novel fusion features to train Convolutional Bidirectional Recurrent Neural Network (CBRNN) are proposed for network intrusion detection. UNSW-NB15 dataset's attack behaviors (input features) are fused with their first and second-order derivatives at different stages to get fusion features. In this work, we have taken architectural advantage and combine both Convolutional Neural Network (CNN) and bidirectional Long Sort-Term Memory (LSTM) as Recurrent Neural Network (RNN) to get CBRNN. The input features and their first and second-order derivatives are fused and considered as input to CNN and this fusion is known as early fusion. Outputs of the CNN layers are fused and used as input to the bidirectional LSTM, this fusion is known as late fusion. The performance of the early and late fusion features is evaluated on the publicly available UNSW-NB15 dataset. Results show that late fusion features are more suitable for intrusion detection and outperform the state-of-the-art approaches with average recognition accuracies of 98.00% and 91.50% for binary and multiclass classification configurations, respectively.
    Keywords: intrusion detection; fusion features; convolutional neural network; bidirectional long short-term memory; convolutional bidirectional recurrent neural network; UNSW-NB15 dataset.

  • A brief survey for person re-identification based on deep learning   Order a copy of this article
    by Li Liu, Xi Li, Xuemei Lei 
    Abstract: Person re-identification (Re-ID) has been paid more attention due to its wide application in intelligent surveillance systems. Finding the same person from other non-overlapping cameras when a specific image of the pedestrian is given, which is a challenging problem for the reason of viewpoint variation, clothes changing, low resolution, etc. In this paper, we motivate reviewing for deep learning-based methods of Person Re-ID. We present a detailed survey of the state of the art in terms of the description and analysis of supervised-based and unsupervised-based network and their performance evaluation in the commonly used datasets. Finally, we analyze the challenging problems and discuss future works in this area.
    Keywords: person re-identification; deep learning; literature survey; evaluation metric.

  • Parameter identification of fractional order CARMA model based on least squares principle   Order a copy of this article
    by Jiali Rui, Junhong Li 
    Abstract: The fractional order model is more accurate than the integer order model when describing the actual system. This paper studies the fractional order CARMA model identification, and derives the identification expression of the fractional order CARMA model through the definition of Gr
    Keywords: fractional order model; parameter estimation; system identification; least squares; colored noise.

  • On the use of emerging decentralised technologies for supporting software factories coopetition   Order a copy of this article
    by Fábio Paulo Basso, Diego Kreutz, Carlos Molina-Jiménez, Rafael Z. Frantz 
    Abstract: Besides the recent adoption of outsourcing and open source business models, software factory is still a centralised process. In spite of the advantages of centralisation, it is widely accepted that decentralised systems are better alternatives; for instance, they are more scalable and reliable, and more suitable for market sharing. The implementation of decentralised software factories demands solution to several technical challenges that conventional technology cannot solve. Emerging decentralised technologies (e.g., blockchain and smart contracts) can help to solve these challenges. Decentralised technologies are only emerging, consequently, its potential use to support software factories is a new research avenue. To cast some light on this emerging topic, in this article we provide an analysis of some centralized and decentralized architectures and raise research questions that need attention from the perspective of architecture selection. To frame the discussion, we focus our attention on software architectures for Model Driven Engineering, Asset Specifications and Integration Tools, resulting in a characterization and analysis of possibilities for implementation of heterogeneous blockchain-oriented repositories.
    Keywords: MDE; software ecosystems; smart contracts; systems of systems; blockchain; MDE as a service; pivot language.

  • A novel approach for decision support system in cricket using machine learning   Order a copy of this article
    by Sudan Jha, Sidheswar Routray, Hikmat A. M. Abdeljaber, Sultan Ahmad 
    Abstract: In shorter format of cricket, the choice of a bowler has three main parameters namely: economy, strike rate and dot balls delivered. In most of the cases, the most hitting parameters are economy rate and number of wickets taken, which again are inter related with the dot balls delivered. This paper presents a survey operational linear approach which comparative analyse the above-cited three parameters and suggests a solution-based approach to choose a best bowler in Playing Eleven with highest preference to the dot balls delivered. The bowler with highest dot ball delivered is considered as highest preference bowler. The inter-relationship among these parameters are established based on collected data. The proposed indicator is proved useful while making decisions. A software-based architecture is also proposed relating to decision support system for selecting a bowler in playing eleven using past data.
    Keywords: Twenty20 match; cricket; bowler selection; indicator; parameter; decision tree.

  • Apple image fusion algorithm based on binocular acquisition system   Order a copy of this article
    by Liqun Liu, Yubo Zhou, Renyuan Gu 
    Abstract: To solve the problem that single natural scene image acquisition information in orchard cannot meet the requirements of accurate fruit recognition and target positioning, a new apple image fusion algorithm based on the binocular acquisition system named New Non-subsampled Contourlet Transform algorithm is proposed to obtain a high-quality fusion image. The binocular acquisition system is constructed with the Time of Flight industrial camera and the color camera. In order to achieve a better fusion effect, a parameter optimization algorithm based on an Artificial Bee Colony algorithm with discard strategy for brightness saliency function is proposed to optimize the low-frequency component parameters of the new fusion coefficient rule. The experiments were taken on series of apple images under three sunlight conditions in the orchard. The experimental results show that the six evaluation indicators obtained by the new algorithm achieve the expected fusion image effect under three different types of sunlight conditions.
    Keywords: binocular acquisition system; time of flight; camera calibration; image fusion.

  • A flexible mobile application for image classification using deep learning: a case study on COVID-19 and X-ray images   Order a copy of this article
    by Omar Andres Carmona Cortes 
    Abstract: This paper proposes a flexible mobile application for embedding any CNN-image-based classification model, providing a computer application to assist health professionals. Two approaches are suggested: an embedded offline and a running online model via web API. To preset the applicability of the mobile software, we used a CNN COVID-19 classification based on X-ray images as a case study. Still, any other image-based classification application could have been used. We used a popular Kaggle database consisting of 7178 X-ray images divided into three classes: normal, COVID-19, and viral pneumonia. We tested 14 state-of-art CNNs to decided which one to embed. The VGG16 achieved the best performance metrics; therefore, the VGG16 was embedded. The software production methodology was applied based on the built model, class diagram, use cases, and execution flow, besides designing a web API to execute the back-end classification model.
    Keywords: mobile application; Medicine 4.0; CNN; COVID-19; X-ray.

  • Stacking-based modelling for improved over-indebtedness predictions   Order a copy of this article
    by Suleiman Ali Alsaif, Adel Hidri, Minyar Sassi Hidri 
    Abstract: In a world now starkly divided into pre- and post-COVID times, it's imperative to examine the impact of this public health crisis on the banking functions - particularly over-indebtedness risks. In this work, a flexible analytics-based model is proposed to improve the banking process of detecting customers who are likely to have difficulty in managing their debt. The proposed model assists the banks in improving their predictions. The proposed meta-model extracts information from existing data to determine patterns and predict future outcomes and trends. We test and evaluate a large variety of Machine Learning Algorithms (MLAs) by using new techniques like feature selection. Moreover, models of previous months are combined in order to build a meta-model representing several months using the stacked generalization technique. The new model will identify 91% of the customers potentially unable to repay their debt six months ahead and enable the bank to implement targeted collections strategies.
    Keywords: over-indebtedness; predictive analytics; machine Learning; features selection; stacked generalisation.

    by Vijayalakshmi S, MohanaPriya D, Poonguzhali Narasingam 
    Abstract: Breast cancer is common disease in the todays world and many techniques are used to extract the cancer cell from the breast image. Most of the systems use features extracted from the images and these images are selected using feature selection techniques. The feature selection techniques helps to a greater level in removal of irrelevant data from huge amount of data and fine tune the identification process and accuracy of relevant data. But still the prediction accuracy and number of the features selection factors are not yielding 100% prediction result. This work, Nearest Density Fire Ant (NDFA) is proposed for breast cancer prediction and used for feature selection techniques. This technique is used for diagnosing and producing results compared to the previous methods such as Random Forest, Ant Colony and Genetic Algorithm. The proposed techniques are inspected on Wisconsin Breast Cancer Database (WBCD) and Breast Cancer Wisconsin WDBC datasets. The experimental result shows that proposed NDFA using Fire Ant optimization technique produces better results in prediction and diagnosing of Breast Cancer.
    Keywords: breast cancer; feature selection classification; nearest neighbour search; fire ant; optimisation.

  • Multi-scale super-pixels-based passive forensics for copy-move forgery using local characteristics   Order a copy of this article
    by Wensheng Yan, Hong Bing Lv 
    Abstract: Copy-move forgery is the most common kind of tampering technique for digital images. This paper presents a novel hybrid approach, which uses the speeded-up robust features (SURF) point and characteristics of local feature regions (LFR) matching. First, the multi-scale super-pixels algorithm adaptively divides the suspected image into irregular blocks according to the texture level of host images. Then, the improved SURF detector is adopted in extracting feature points from each super-pixel and the feature point threshold is related to the entropy of each super-pixel block. Next, LFRs are defined, and a robust feature descriptor is extracted from each LFR as a vector field. Last, the matching LFRs are found by using Euclidean locality sensitive hashing; the removal of falsely matched pairs is realised by using the random sample consensus (RANSAC) algorithm. Comparing with the leading-edge block-matching methods and point-based methods, our method can produce far better detection results.
    Keywords: digital image forensics; multi-scale super-pixels; local feature region; polar harmonic transform; duplicated region detection.

  • Prediction of the right crop for the right soil and recommendation of fertiliser use by machine learning algorithm   Order a copy of this article
    by Rubini PE, Kavitha P 
    Abstract: Crop production is a crucial aspect of farming and it depends on many factors like soil nutrients, fertiliser usage, water resources, etc. The critical factor for effective agriculture is soil. The composition of soil varies from one land to another which muddles the farmers to choose the appropriate crop for their farmland. The proposed study focuses on recommending the right crop for the right soil and also signifies the required composition of fertiliser. Nonetheless, the work requires analysis of a huge volume of data which can be accomplished by applying five machine learning techniques and to enhance the accuracy and precision in the prediction of the crop, the solution of all these algorithms is integrated into a proposed model through ensemble learning which provides the aggregated output i.e., the recommended crop and fertiliser dosage. The intention of the proposed model is to improvise farmer's growth by increasing their productivity and profit.
    Keywords: agriculture; machine learning; fertiliser use; ensemble learning; prediction; crop productivity.

  • A multivocal literature mapping on mobile compatibility testing   Order a copy of this article
    by Isabel K. Villanes, Andre T. Endo, Arilo C. Dias-Neto 
    Abstract: Today's mobile market is composed of multiple brands and device models with different characteristics. In addition, mobile apps can present particular behaviors when running on these diverse devices. Mobile compatibility testing is a quality assurance task aimed at ensuring that apps run correctly on all devices. However, it is infeasible to test all devices on the market. This paper aims to identify and categorise the research evidence that has been published in mobile compatibility testing. We conducted a Multivocal Literature Mapping (MLM) divided into two phases: a systematic mapping study guided by the snowballing approach and a grey literature review. Results have evinced a need for continuous monitoring of API evolution and operating systems' updates. Those changes have an immediate impact on mobile app compatibility and device selection for testing. There is still room for new studies to understand the mobile app characteristics to improve methods for selection devices.
    Keywords: compatibility testing; mobile testing; Android fragmentation; mobile device selection.

  • Wind turbine signal fault diagnosis using deep neural networks-inspired model   Order a copy of this article
    by Aaron Rababaah 
    Abstract: This work presents a deep neural network-inspired solution to intelligent signal fault diagnosis for wind turbine gearbox systems. A 1D convolution deep neural network architecture is proposed, constructed and validated. The proposed model was constructed of 1D signal for the input layer, 10 different learned kernels as signal features, convolution layer, activation layer using rectified linear unit function, max-pooling layer, flatten layer and traditional multi-perceptron neural network for classification with soft-max class assignment. The data was acquired from real-world experiments conducted on real wind turbine gearboxes and archived by the National Renewable Energy Labs of the USA Department of Energy. Ten independent experiments were conducted on 2,400,000 data points, and the proposed model produced a mean classification accuracy of 96.14% for normal signals with a standard deviation of 0.0027 and a mean classification accuracy of 99.87% for faulty signals with a standard deviation of 0.0016.
    Keywords: deep neural networks; fault signal diagnosis; wind turbine; gearbox; signal processing; deep learning; convolutional neural networks; signal features.

  • Research on the evolution of public opinion and topic recognition based on multi-source data mining   Order a copy of this article
    by Zeguo Qiu, Baiyan He 
    Abstract: In the era of rapid network development, the Internet has become the main medium for the spread of online public opinion. Users can express their views on hot issues through text, pictures, and videos anytime and anywhere, analyze the evolving trend of netizens emotions in emergencies to discover the law of public opinion evolution and potential risks, and provide decision support for public opinion guidance and control. In this paper, python is used to preprocess the collected text data, and proposes a method based on spectral clustering algorithm, using the Latent Dirichlet Allocation to extract text topics. From the perspective of multi-language and multi-source data, it mines high-value public opinion topics in online public opinion, and uses data visualization methods to study the emotional tendencies of netizens. The research results can clearly reveal the content of discussion and the emotional attitude of netizens in the period of public opinion transmission.
    Keywords: internet public opinion; sentiment analysis; multi-source data; visualisation; natural language processing.

  • A novel mixed resilience engineering and macro ergonomics framework for performance evaluation of an insurance company   Order a copy of this article
    by Mehrdad Sarani, Mojtaba Hamid, Mahdi Bastan, Mina Samieinasab 
    Abstract: Insurance industry has always attracted the attention of researchers because the improved performance of this industry can have a tremendous impact on other manufacturing and service sectors. Therefore, the evaluation and efficiency of active departments in this service area are of great significance. This study evaluated the performance of an insurance company based on resilience engineering (RE) and macro ergonomics (ME) and indicators using quantitative and qualitative approaches. For this purpose, after designing a questionnaire and having it completed by 65 experts, the company's performance was analysed using Data Envelopment Analysis (DEA), statistical methods, and sensitivity analysis methods. Results showed that considering resilience engineering and macro ergonomics can improve the company's performance. Also, it was found that preparedness and information flow indicators were the most important and least important factors influencing the company's performance, respectively. The proposed framework can be used as an effective tool by managers to boost efficiency.
    Keywords: performance evaluation; resilience engineering; macro ergonomic; data envelopment analysis; insurance company.

  • Hyper-chaos based image encryption and cryptanalysis on a non-RGB channel   Order a copy of this article
    by Jayashree Karmakar, Subhashish Pal, Mrinal Mandal 
    Abstract: Till date, a lot of research works have been published proposing an image encryption mechanism. However, the cryptanalysis of several research works shows their limitations besides fulfilling security-test by the NPCR, UACI, entropy, etc. This work proposes a novel hyper-chaos-based encryption technique that uses multiple layers of diffusion and scrambling based on a highly sensitive hyper-chaotic sequence. The multiple layers of scrambling (pixel-scrambling, local-global bit-scrambling (LGBS)) are performed with a different chaotic sequence that gives extra security against the intruder. Besides using the widely used RGB channel, we chose the YCbCr-channel. The higher informative Y channel (luminance channel) has gone through more layers of diffusion and scrambling . In contrast, the other channel (lesser informative chroma channels i.e, Cb, Cr) go through comparatively lesser steps. It reduces the computational complexity compared to other state-of-the-art works without compromising security. Various widely used security-testing parameters examine the encryption strength. Furthermore, the resistivity of the proposed mechanism against the intruder is examined by the cryptanalysis. We use the hyper-chaotic key-dependent pixel diffusion and different scramblings. The scrambling methods include local bit scrambling (LBS), Global Bit Scrambling (GBS), and pixel scrambling using Arnold Cat Map (ACM). It makes the algorithm highly resistive against attacks, and the experimental results fulfill the authors' claim. A comparative study with some recent and related works shows the superiority of the proposed algorithm in terms of security and computational load.
    Keywords: Hyper-chaos; encryption; non-RGB channel; cryptanalysis; decryption.

  • A mathematical model to compute makespan for application integration processes using graph theory approach   Order a copy of this article
    by Sandra Neuckamp, Rafael Z. Frantz, Fabricia Roos-Frantz, Sandro Sawicki 
    Abstract: The performance of integration platforms depends on the performance of execution models implemented for execution engines. Integration processes can be divided into two levels: process execution and resource management. In the first level, we considered the processing time of tasks; as for the second level, we only analyzed elements of management and allocation of computational resources. Our proposal aims to identify the elements present at these levels that impact the process execution time, so we develop a mathematical model which determines makespan analytically in integration processes using a Directed Acyclic Graph (DAG). The proposed mathematical model can be used not only to compute makespan, but also to identify the optimal number of computational threads to execute an integration process with the lowest possible makespan. This mathematical model is validated by a Coffee Shop integration process, which is a well-known benchmark to evaluate and compare integration platforms.
    Keywords: enterprise application integration; runtime system; mathematical modelling; integration platforms; graph theory.

  • Canny optimisation of the dynamic image colour automatic segmentation algorithm   Order a copy of this article
    by Song Li 
    Abstract: Aiming at the current dynamic image colour automatic segmentation algorithm in image segmentation, there are problems of missing image edge information, poor clarity, large impact noise, and low image segmentation accuracy. A Canny-optimized automatic colour segmentation algorithm for dynamic image was proposed. By the Laplace operator test, a switch-type median filter was used to filter out the impact noise in the dynamic image. The Canny operator was optimized by concavity method, and the gradient amplitude histogram of dynamic image was analysed. Adaptive double threshold was selected according to image features. After weighted fusion of edge image by using primary colour feature, and dynamic image colour edge image segmentation was completed. The results show that the proposed algorithm has complete image edge information and good segmentation effect, and can effectively filter out impact noise and improve the accuracy of image segmentation.
    Keywords: Canny optimisation; dynamic image; automatic segmentation; weighted fusion; the edge.

  • A CNN approach for online metal can end rivet inspection   Order a copy of this article
    by Maurício Stivanello, Juliano Masson, Marcelo Stemmer 
    Abstract: Can end rivet fracture is an important defect type that may arise during the manufacturing of metal cans used in the food industry. Thus, an inspection procedure must be performed to remove the defective can ends from the production line. Previous approaches have demonstrated the possibility of performing an automated inspection. However, these approaches faced limitations associated with description and classification as they employed classical techniques. In this paper, a new machine vision-based method for online can end rivet inspection is described. In the proposed method the rivets are localized by using blob analysis, while the description and classification are entrusted to a convolutional neural network. The experiments carried out using images acquired under real conditions of use demonstrate that the proposed approach outperforms the results obtained in previous works.
    Keywords: automated inspection; convolutional neural network; fracture detection; machine vision; pull tab rivet.

  • Integrated encoding and scheduling protocol for improving the lifetime in wireless sensor networks   Order a copy of this article
    by Lina Waleed Jawad, Ali Kadhum Idrees 
    Abstract: In this paper, we propose an Integrated Encoding and Scheduling (InES) protocol for extending the lifetime in wireless sensor nodes in IoT networks. InES protocol works on two levels: sensor nodes and the gateway. The sensor nodes capture the data and compress them using either Modified Run Length Encoding (MRLE) or Huffman Encoding (HE). In the gateway level, InES applies the agglomeration clustering approach to produce the best schedule of sensor nodes that stay active in the next period. The sensor nodes are clustered based on the received vectors of data into groups, and one sensor will be elected in each group to stay active in next period. The simulation results were conducted to prove the effectiveness of the proposed InES protocol, where it reduced the transmitted data from 94.3 up to 98.8, decreased the consumed energy from 99.5 up to 99.8, and decreased the percentage of lost data from 5.3% up to 21.1% compared with the PFF.
    Keywords: sensor networks; IoT; scheduling; clustering; data compression; network lifetime.

  • Research on image to illustration translation method based on CycleGAN   Order a copy of this article
    by Yuhan Wei, Mingyu Ji, Jian Lv, Xinhai Zhang 
    Abstract: Aiming at the problem that balance between abstract style and original painting content is not enough in traditional image style migration, this paper puts forword an improved method that based on traditional CyclicConsistent Generation Adversarial Networks (CycleGAN), which enables generator to subsample feature map of each residual layer, and uses skip link and upsampling to merge low level feature and advanced feature. Then image averaging operation is used to enhance contrast of generated images, and weighted mean filter is used to filter out redundant details. Finally, gray level of the image is reduced in order to improve its abstraction. The experimental results show that with CycleGAN, DualGAN, CartoonGAN compared three methods of migration image style, this model not only improves the image style of abstract degree, also better retain original image content, significantly improve the processing and transfer the balance between the content of original painting abstract style.
    Keywords: GAN; image to image translation; illustrations to generate; deep learning.

  • Study on the law of the structure parameters' influence on thermal deformation of magnetic poles of magnetic-liquid double suspension bearing   Order a copy of this article
    by Liwen Chen, Dianrong Gao, Jianhua Zhao, Jisheng Zhao 
    Abstract: Magnetic-LiquidDouble Suspension Bearing (MLDSB) is suitable for seawater desalination high-pressure pump, aerospace and other fields. Magnetic poles are the source of electromagnetic levitation force, which directly determine bearing capacity and control accuracy. The temperature rise and thermal deformation of magnetic poles are influenced by structural factors. The influence of structural parameters on temperature rise and thermal deformation of magnetic poles is studied. The results indicate that with the number of magnetic poles increase, the fluid cooling efficiency is improved, the thermal deformation of magnetic poles basically unchanged. As the number of turns in the coil increases, the temperature and thermal deformation of magnetic poles show a linear increasing trend. Through orthogonal test range and variance analysis, the effects of structural parameters on the degree of temperature rise and thermal deformation are detected.
    Keywords: magnetic-liquid double suspension bearing; electromagnetic suspension; hydrostatic bearing; liquid-solid-thermal coupling; structure parameters; orthogonal experiment.

  • A novel spread spectrum underwater acoustic communication system for the reduction of inter-symbol interference   Order a copy of this article
    by Yan Li, Ning Jia, Jianchun Huang, Biao Liu, Shengming Guo 
    Abstract: A novel spread spectrum underwater acoustic (UWA) communication system is proposed to suppress the inter-symbol interference (ISI) caused by the long time-delay spread underwater acoustic multipath channels in this paper. The interleaved hybrid spread spectrum (IHSS) communication method is combined with M-ary code shift spread spectrum and interleaving method, which has an excellent communication performance when the time-delay spread of the UWA channels is larger than the period of pseudo-noise sequences in the spread spectrum system. The BER performance of the proposed system and the conventional M-ary code shift spread spectrum underwater communication system (CMCSSS) is evaluated through computer simulations and the sea trial. The results demonstrate the proposed system can effectively suppress ISI and has a better communication quality.
    Keywords: underwater acoustic communication; long time-delay spread; interleaved hybrid spread spectrum.

  • The optimisation of the travelling salesman problem based on parallel ant colony algorithm   Order a copy of this article
    by Amin Jarrah, Ali Al Bataineh, Abedalmuhdi Almomany 
    Abstract: General search algorithms offer some solutions to solve and avoid the constraints of the finding shortest path problem. Ant colony optimisation (ACO) is a metaheuristic search-based and probabilistic searching technique for an optimal path. However, ACO is computationally intensive and may not achieve the desired performance. Thus, a parallel implementation of the ACO for the travelling salesman problem is proposed and implemented on FPGA platform. Different optimisation techniques are adopted and applied to enhance the performance of the algorithm. The overall results have shown a 28-fold improvement in performance due to the applied optimisation techniques with different numbers of ants and iterations. The speedup is improved by increasing the number of iterations/ants, which further validated the proposed method. The network on chip methodology was also adopted to connect the ants where a comprehensive analysis of FPGA chip traffic is modelled and emulated to get the best architecture.
    Keywords: ant colony optimisation; FPGA; TSP problem; high level synthesis; parallel architecture; optimisation techniques.

  • Transformer for long-term effect estimation   Order a copy of this article
    by Shengjia Cui, Xianglong Qi, Xiao Wang, Chen Zeng 
    Abstract: Determining the long-term causal effects as well as making decisions in a timely fashion are the most challenging and significant tasks in A/B tests. The key challenge is that long-term and short-term effects may be different, especially in an online controlled experiment that a low-qualified ads strategy with high short-term revenue may hurt users' service experience in the future. We propose a Transformer on Long-Term Effect (TLTE) method to encode the short-term latent features and predict the outcome of the long-term to estimate the long-term effects. TLTE uses the transformer structure to capture the reasoning feature, considering the global information by the self-attention mechanism. Extensive experiments are conducted on public day-level datasets and our collected large-scale hourly dataset, providing flexible and sensitive analysis.
    Keywords: long term; transformer; causal effect.

  • PUID: Persona User Intention Detection
    by Shengjia Cui, Xianglong Qi, Xiao Wang, Chen Zeng 
    Abstract: Although user intention detection has been widely studied, existing researches suffer inferior performance when only utilizing the semantic features of query and neglecting the personalized user attributes. A key challenge is that the same or similar queries among users who possess different social positions can be inferred from different intentions. Therefore, we propose a novel task that user attributes are introduced as additional personalized features in user intention detection besides the semantic information of queries, named ``Persona User Intention Detection (PUID)''. We collected the query log with corresponding user attributes on the professional search engine to construct a large-scale user intention dataset. Then, we propose a Persona-Augmented Hypergraph Neural Network (PAHG) for PUID consequently. Extensive experiments are conducted on several state-of-the-art methods and our method.
    Keywords: Intent Detection; Hypergraph Learning; Large-Scale Modeling

  • Multi-objective enhanced imperialistic competitive method for multi-criteria engineering issues   Order a copy of this article
    by Nejlaoui Mohamed 
    Abstract: Optimising multi-criteria engineering issues using a multi-objective evolutionary algorithm has received a lot of attention in recent years. In this work, a multi-objective enhanced version of the imperialist competitive algorithm (ICA), named (MOEICA), was developed and investigated to handle multi-criteria constrained engineering problems. A new strategy for colonies progress towards their imperialists, which is called enhanced assimilation, is implemented to ameliorate the efficiency of the algorithm to achieve the global optima. Moreover, in contrast to ICA, the proposed algorithm integrates the Pareto dominance strategy to store the Pareto optimal solutions of multiple conflicting functions. Two performance metrics are used to evaluate the performance of the proposed algorithm; a) convergence to the to the true Pareto-optimal set and b) diversities of optimal solutions. The obtained results show that for both benchmark functions and multi-objective engineering issues, the MOEICA outperforms other common techniques in terms of convergence characteristics and global search capability.
    Keywords: MOEICA; multi-criteria problems; con?icting objectives; engineering optimisation; high dimensions.

  • A contemporary review on soft computing techniques for thyroid disorder identification and detection   Order a copy of this article
    by Rajshree Srivastava, Pardeep Kumar 
    Abstract: This paper reviews various soft computing techniques for the identification and detection of thyroid disorder. The papers are extracted from databases such as Science Direct, ACM etc. More than 400 papers published in the last decade were downloaded. The inclusion criteria include papers from SCI/Scopus databases. Soft computing techniques are divided into three categories, namely simple, improved and hybrid techniques. Out of 113 papers, 51%, 37% and 12% papers are based on simple, improved and hybrid soft computing techniques. This review will answer the following research questions for thyroid disorder: (1) various soft computing techniques; (2) reasons to adopt soft computing techniques; (3) existing research gaps; (4) feature selection techniques; (5) different performance metrics. It sheds light on less attention of researchers on hybrid soft computing techniques for thyroid nodule disorder. It also provides future research directions to develop novel techniques for thyroid disorder.
    Keywords: simple techniques; improved techniques; hybrid techniques; thyroid disorder; identification; detection; feature selection; soft computing.

Special Issue on: The Significance of Machine Learning for COVID-19

  • Analysis of some topological nodes using the adaptive control based on 9-D, hypothesis theoretical to COVID-19   Order a copy of this article
    by Abdulsattar Abdullah Hamad, M. Lellis Thivagar, K. Martin Sagayam 
    Abstract: This work is an extension and based on a new model previously proposed where the Hamiltonian, synchronisation, Lyapunov expansion, equilibrium, and stability of the proposed model from the same authors were analysed. In this paper, we will present a broader analysis to develop receiving network nodes faster. The analysis and study have demonstrated how to determine the basic structure and content of the Sym in theory, an attempt to identify objects that have a fundamental engineering role for the model, and after confirming the performance and results, we can suggest it to determine the spread of Coronavirus.
    Keywords: synchronisation; Lyapunov expansion; equilibrium; topological nodes.
    DOI: 10.1504/IJCAT.2021.10044334
  • The impact of oil exports on consumer imports in the Iraqi economy and COVID-19 period, a theoretical study   Order a copy of this article
    by Mustafa Kamil Rasheed, Ali Mahdi Abbas Al-Bairmani, Abir Mohammed Jasim Al-Hussaini 
    Abstract: The COVID-19 pandemic has caused the closure of economic activity in most countries in general, and developing countries in particular, which caused additional economic losses in developing countries that suffer from weak productive links and sectoral interdependence limited. The Iraqi economy suffers from the dominance of the oil sector, which has led to the sustainability of the structural imbalance in the output, the weakness of economic linkages, economic activities decline, weakness of the aggregate productivity of the economy. ARDL model proved the effect of oil exports in consumption imports by 0.05 in the current year and 0.038 in the second lag year. The research recommended diversifying the Iraqi economy, and utilising the financial returns from the sale of crude oil in building the Iraqi economy.
    Keywords: oil exports; consumer imports; total exports; production activities; COVID-19; Iraqi economy.
    DOI: 10.1504/IJCAT.2021.10044337
  • Simple program for computing objective optical properties of magnetic lenses   Order a copy of this article
    by R.Y.J. Al-Salih, Abdullah I.M. Al-Abdulla, Ezaldeen Mahmood Abdalla Alkattan 
    Abstract: The paper describes the basic features of a new program denoted Magnetic Electron Lens Optical Properties (MELOP), primarily intended for providing free and simple way to calculate the objective focal properties of rotationally-symmetric electron magnetic lenses with the presence of its axial magnetic field distribution. The calculation is done by solving the paraxial ray equation using the fourth-order Runge-Kutta formula. For specific beam voltage, the program computes the excitation parameter, the object or image plane, the objective principal plane, the objective focal length, the objective magnification, the spherical aberration coefficient, the chromatic aberration coefficient and the magnetic flux density at the object or image plane. These parameters are solved for zero, low, high or infinite magnification condition. The program can handle instantaneously plotting the variations of the calculated parameters relatively. In addition to that, the data can be transferred to xlsx or txt file format.
    Keywords: electron lenses design; electron objective focal properties; fourth-order Runge-Kutta formula.
    DOI: 10.1504/IJCAT.2021.10044336
  • Impact parameter evaluation of nano Al2O3 dielectric in wire cut-electrical release machining in a COVID-19 environment   Order a copy of this article
    by Farook Nehad Abed, Azwan Bin Sapit, Saad Kariem Shather 
    Abstract: The present paper focuses on wire electric discharge machine in a COVID-19 environment. It can be considered as an attempt to develop models of response variables, using different liquids, one of which is nanoparticle (Al2O3), in the use of a ratio of (2 mg) and the function of comparison. In both cases they are the rate of material removing, in the wire electric discharge machine process using the response surface methodology. The pilot plan is based on the concept of the Box-Behnken, and the study conveys the six main parameters. To evaluate the value of the advanced model, ANOVA was applied; the test results support the validity and suitability of the advanced RSM model. Optimum settings for the parameters are improved work safety in COVID-19 environments.
    Keywords: wire electric discharge machine; titanium; MRR; RSM; COVID-19.
    DOI: 10.1504/IJCAT.2021.10044338
  • An empirical validation of learn from home a case of COVID-19 catalysed online distance learning in India and Morocco   Order a copy of this article
    by Gabriel A. Ogunmola, Wagayehu Enbeyle, Wissale Mahdaoui 
    Abstract: The world has changed over a short period of time, with the rise and spread of the deadly novel Corona virus known as COVID-19, and the world will never be the same again. This study explores the devastating effects of the novel virus pandemic and the transformation of offline classroom into an online classroom. It explores the numerous online teaching platforms, study materials, techniques and technologies being used to ensure that educating the students does not stop. Furthermore, it identifies the platforms and technologies which can be used to conduct online examination in an environment devoid of cheating. The identified variables were empirically tested with the aid of a structured questionnaire; there were 340 numbers of respondents who were purposefully sampled. The result indicates that students prefer online teaching when such sessions are enhanced with multimedia presentations. The study recommends that instructors need to train in the use of Technology Enhanced Learning (TEL).
    Keywords: COVID-19; online classroom; Zoom; lock-down; MOOC; iCloud; POM; proportional odds model.
    DOI: 10.1504/IJCAT.2021.10044340
  • A statistical analysis for COVID-19 as a contract tracing approach and social network communication management   Order a copy of this article
    by Anasuya Swain, Suneeta Satpathy, Saibal Dutta, Sipra Sahoo, Abdulsattar Abdullah Hamad 
    Abstract: The COVID-19 caused by severe acute respiratory syndrome coronavirus2 (SARS-CoV-2) was first detected in Wuhan city of China and later declared as global pandemic by World Health Organization (WHO). The disease is spread through droplets hung in the air produced from nose and mouth by coughing, sneezing and talking. The preventive measures for this infectious disease can be taken by creating awareness and implementation of the contact tracing process. Contact tracing aims to find infected persons as well as persons who came in contact with infected ones. Social media networking can be adopted as a contact tracing and awareness tool and then data collected from this can be analysed with different classifiers and statistical learning methods of AI. This paper has adopted Natural Language Processing (NLP) method to process social network data followed by validation of the relationship between social networking as contact tracing tool and AI techniques with regression, coefficient correlation and Anova.
    Keywords: COVID-19; infectious; preventive controls; awareness; social media; contact tracing; artificial intelligence.
    DOI: 10.1504/IJCAT.2021.10044342
  • The degree of applying electronic learning in the Gifted School/Nineveh in Iraq and what management provided to the students and its relationship to qualitative education under coronavirus (COVID-19) pandemic   Order a copy of this article
    by Ahmed S. Al-Obeidi, Nawar A. Sultan, Anas Romaih Obaid, Abdulsattar Abdullah Hamad 
    Abstract: This paper discusses the most critical pillars on which e-learning supports the success of the distance learning process in a Gifted School in Nineveh. Through this study, we were able to identify the methods of conducting distance education under the information technology system and on the work and learning environment used in electronic learning. They were increasing the efficiency of the educational institution through distance electronic learning just as the basics of building an e-learning system in various educational institutions the types of programs, the most famous of which are in the application of e-learning in educational institutions in general and in the Gifted School, in particular, were also discussed. A comparison was made between the two in terms of method and accuracy of using these programs.
    Keywords: electronic learning; gifted school; Coronavirus-19; distance education; hypothetical education.
    DOI: 10.1504/IJCAT.2021.10044343
  • Multivariate economic analysis of the government policies and COVID-19 on financial sector   Order a copy of this article
    by Monika Mangla, Nonita Sharma, Sourabh Yadav, Vaishali Mehta, Deepti Kakkar, Prabhakar Kandukuri 
    Abstract: The sudden pandemic outbreak of COVID-19 has led to disruption in trade, travel and commerce by halting manufacturing, industries, and all other sundry activities. Global markets plummeted, leading to erosion of around US $6 trillion within just one week during February 2020. During the same week, the S&P 500 index alone experienced a loss of more than US $5 trillion in the USA, while other top 10 companies in the S&P 500 suffered a loss of more than US $1.4 trillion. This manuscript performs multivariate analysis of the financial markets during the COVID-19 period and thus correlates its impact on the worldwide economy. An empirical evaluation of the effect of containment policies on financial activity, stock market indices, purchasing manager index and commodity prices are also carried out. The obtained results reveal that the number of lockdown days, fiscal stimulus and overseas travel bans significantly influences the level of economic activity.
    Keywords: coronavirus; COVID-19; financial sector; forecasting; multivariate analysis; nifty-indices; pandemic; regression model; stringency index.
    DOI: 10.1504/IJCAT.2021.10044345
  • An empirical study on COVID-19 for social contact tracing on classification perspective   Order a copy of this article
    by Mohammad Gouse Galety, Elham Tahsin Yasin, Abdellah Behri Awol, Lubab Talib 
    Abstract: The COVID-19 is a pandemic and irresistible one without the antibody and cure. This issue needs preventive controls through the creation of awareness and implementation of the contact tracing process. This device has its usage to lessen the infections with the information described at the infectious disease and reduce the spreadsheet of infections and inflamed human beings. In contrast, social media networking is a superb knowledge set of nowadays market coverage of maximum sociology of the planet to see, analyse and interpret. AI has been used to determine the infected COVID-19 and infers the good action and preventive measures to reduce the expansion of COVID-19. The authors have derived the available data with its analysis and contract tracing through the usage of social media datasets.
    Keywords: COVID-19; infectious; preventive controls; awareness; social media; contact tracing; artificial intelligence.
    DOI: 10.1504/IJCAT.2021.10041926
  • Analysis of COVID-19 pandemic and forecasting using machine learning models   Order a copy of this article
    by Ekansh Chauhan, Manpreet Sirswal, Deepak Gupta, Ashish Khanna, Aditya Khamparia 
    Abstract: The coronavirus is menacing thousands of lives and economy. Machine learning is being used in every sphere to fight the coronavirus. It is also critical to predict the pandemic lifetime so to decide on opportune and remedial activities. In this paper, based on public data available of the world and India, the estimation of pandemic parameters and the ten days ahead forecast of the coronavirus cases is proposed using Prophet, Polynomial Regression, Auto Arima and Support Vector Machine (SVM). The performance of all the models was motivating. The four parameters for coronavirus growth in the USA and India, including growth factor, growth ratio, growth rate, and second derivative, are also calculated and compared. This paper also discusses and submits a number of theories about the origins of coronavirus.
    Keywords: COVID-19; machine learning; novel coronavirus; classification; technology.
    DOI: 10.1504/IJCAT.2021.10044341
  • Design and analysis on molecular level biomedical event trigger extraction using recurrent neural network-based particle swarm optimisation for COVID-19 research   Order a copy of this article
    by R.N. Devendra Kumar, Arvind Chakrapani, Srihari Kannan 
    Abstract: In this paper, the rich extracted feature sets are fed to the deep learning classifier that estimates the optimal extraction of lung molecule triggered events for COVID-19 infections. The feature extraction is carried out using Recurrent Neural Network (RNN) that effectively extracts the features from the rich data sets. Secondly, a Particle Swarm Optimisation (PSO) algorithm is utilised to classify the extracted features of COVID-19 infections. The rule set for feature extractor is supplied by the fuzzy logic rule set. The simulation shows that the RNN-PSO, which is the combination of two different algorithms, offers better performance than other machine learning classifiers.
    Keywords: event triggers; COVID-19; lung molecules; feature extraction; classification; PSO; RNN.
    DOI: 10.1504/IJCAT.2021.10044344
  • COVID-19 suspected person detection and identification using thermal imaging-based closed circuit television camera and tracking using drone in Internet of Things   Order a copy of this article
    by Pawan Singh Mehra, Yogita Bisht Mehra, Arvind Dagur, Anshu Kumar Dwivedi, M.N. Doja, Aatif Jamshed 
    Abstract: COVID-19 has emerged as a worldwide health concern. It is very hard to check or scan every individual. In this paper, we have propounded a system where the suspected person can be easily detected and identified for COVID-19 by using thermal imaging-based closed-circuit television. The thermal imaging-based closed-circuit television will automatically scan the person in vicinity and capture the video/image of the suspected person. The system will raise an alarm in the vicinity so that people in vicinity keep clear of each other. The recorded video/image will be forwarded to the base station and information about the suspected person will be fetched from the server. Meanwhile, the drones will be used for tracking the suspected person until the nodal medical team diagnoses the suspected person for confirmation. The proposed system can contribute significantly to curbing the rate of infected COVID-19 persons and prevent further spread of this pandemic disease.
    Keywords: coronavirus; COVID-19; face recognition; drone; Internet of Things; automation; deep learning.
    DOI: 10.1504/IJCAT.2021.10044332
  • Machine learning-based classification: an analysis based on COVID-19 transmission electron microscopy images   Order a copy of this article
    by Kalyan Kumar Jena, Sourav Kumar Bhoi, Soumya Ranjan Nayak, Chinmaya Ranjan Pattanaik 
    Abstract: Virus is a type of microorganism which provides adverse effect on the human society. Viruses replicate within the human cells quickly. Currently, the effects of very dangerous infectious viruses are a major issue throughout the globe. Coronavirus (CV) is a very dangerous infectious virus which has adverse effects for the entire world. The Coronavirus Disease 2019 (COVID-19) infected cases are increasing day by day in a rapid manner. So, it is very important to detect and classify this type of virus at the initial stage so that preventive measures can be taken as early as possible. In this work, a Machine Learning (ML) based approach is focused for the type classification of Transmission Electron Microscopy (TEM) CV images (CVIs) such as alpha CV (ACV), beta CV (BCV) and gamma CV (GCV). The ML-based approach mainly focuses on several classification techniques such as Support Vector Machine (SVM), Random Forest (RF), AdaBoost (AB) and Decision Tree (DT) techniques for the processing of TEM CVIs. The performance of these techniques is analysed using the performance metrics such as Classification Accuracy (CA), Area Under receiver operating characteristic Curve (AUC), F1, Precision and Recall. The simulation of this work is carried out using Orange-3.26.0.
    Keywords: COVID-19; machine learning; TEM CVIs; support vector machine; random forest; AdaBoost; decision tree; classification accuracy; AUC; microscopy images.
    DOI: 10.1504/IJCAT.2021.10044346
  • Gradient and statistical features-based prediction system for COVID-19 using chest X-ray images   Order a copy of this article
    by Anurag Jain, Shamik Tiwari, Tanupriya Choudhury, Bhupesh Kumar Dewangan 
    Abstract: As per data available on WHO website, COVID-19 patients on 20 June 2020 have surpassed the figure of 8.7 million globally and around 4.6 lakhs have lost their life. The most common diagnostic test for COVID-19 detection is a Polymerase Chain Reaction (PCR) test. In highly populated developing countries like Brazil, India etc., there has been a severe shortage of PCR test-kits. Furthermore, the PCR-test is very specific and has lower sensitivity. In this research work, authors have designed a decision support system based on statistical features and edge maps of X-ray images to detect COVID-19 virus in a patient. Online available data sets of chest X-ray images have been used to train and test decision tree, K-nearest neighbour's, random forest, and multilayer perceptron machine learning classifiers. From the experimental results, it has found that the multilayer perceptron achieved 94% accuracy which is higher than the other classifiers.
    Keywords: COVID-19; chest X-ray; statistical features; image gradient; random forest; KNN; multilayer perceptron; decision tree.
    DOI: 10.1504/IJCAT.2021.10044347
  • Indian COVID-19 time series prediction using Facebook's Prophet model   Order a copy of this article
    by Mamata Garanayak, Goutam Sahu, Gouse Baig Mohammad, Sujata Chakravarty 
    Abstract: The entire world has been facing an unprecedented public health crisis due to Covid-19 pandemic for the last one year. Meanwhile, more than one million people across the world have already died; many more millions are under treatment. Some countries in Europe have begun to experience the second wave of the pandemic too. This has put the entire health infrastructure of countries under severe strain and has led to downward spiral in the economy. The most worrisome part is the uncertainty as to the spread or arrest of the pandemic. In such a scenario, robust forecasting methods are needed to enable health professionals and governments to make necessary preparation in accordance with the situation. Artificial Intelligence and Machine Learning techniques are useful tools not only for collection of accurate data but also for prediction. Studies show that Time Series Forecasting Techniques like Facebook's Prophet have shown promising results. In this paper, Time Series Techniques have been used to forecast the numbers of death, recovery and positive cases 60 days ahead. The experimental results obtained demonstrate that machine learning techniques can be beneficial in forecasting the behaviour of the pandemic.
    Keywords: machine learning; prophet; COVID-19; time series; coronavirus; prediction.
    DOI: 10.1504/IJCAT.2021.10044348
  • Transmission dynamics of COVID-19 outbreak in India and effectiveness of self-quarantine: a phase-wise data driven analysis   Order a copy of this article
    by Sahil Khan, Md. Wasim Khan, Narender Kumar, Ravins Dohare, Shweta Sankhwar 
    Abstract: The novel coronavirus disease referred to as COVID-19 was declared as pandemic by World Health Organisation (WHO). During this pandemic more than 988,172 lives were lost and 7,506,090 approximately active cases were found across the world by 25 September 2020. To predict the novel coronavirus transmission dynamics, the SQEIHDR mathematical model is proposed to predict the COVID-19 transmission dynamics in India. The model is an extension of basic SEIR mathematical model with additional compartments. These additional compartments include self-quarantine (Q), isolation (H) and deceased (D) which helps to understand COVID-19 outbreak in India in more realistic way and supposed to suppress the rise of transmission. The SQEIHDR model's simulation covers ten phases (Phases 0 to 9) with different COVID-19 preparedness and response plans. The simulation results show significant changes in curve of infected population based on variation in compartment Q, which reveals efficacy of imposed as well as proposed preparedness and response plan. Aftermath with different conditions of preparedness and response plan highlight the keys for outbreak downfall i.e., rate of self-quarantine (Q) which includes general awareness, social distancing and food availability.
    Keywords: COVID-19; mathematical modelling; self-quarantine; transmission dynamics; preparedness; response plan.
    DOI: 10.1504/IJCAT.2021.10044349
  • COVID-19 outbreak in Orissa: MLR and H-SVR-based modelling and forecasting   Order a copy of this article
    by Satyabrata Dash, Hemraj Saini, Sujata Chakravarty 
    Abstract: WHO has declared COVID-19 as the pandemic in early March and now in June it became a severe threat to the human community in almost all the countries. The present situation throughout the world is too tensed and puts everyone at a high risk of novel corona virus and this further leads to the high mortality rate due to mass reaction to it. Everyone of the related research community is using technology and trying to identify the time at which it stops and make the world healthy again. Therefore, in this study, an attempt has been made to analyse and predict COVID-19 outbreak using Multiple Linear Regression and Support Vector Regression. In this comparative analysis, Multiple Linear Regression outperforms Support Vector Regression. Hence, MLR can be used to predict COVID-19 outbreak in the real-life application.
    Keywords: novel coronavirus; COVID-19; linear multiple regression; support vector regression.
    DOI: 10.1504/IJCAT.2021.10044350
  • An ensemble approach to forecast COVID-19 incidences using linear and non-linear statistical models   Order a copy of this article
    by Asmita Mahajan, Nonita Sharma, Firas Husham Almukhtar, Monika Mangla, Krishna Pal Sharma, Rajneesh Rani 
    Abstract: Coronavirus has infected many countries across the globe and is still spreading. As health sectors are experiencing an unexpected rise in cases each day, researchers are perpetually trying to discover a permanent antidote for the virus. Considering the spread, it becomes imperative to predict the spread of disease to mitigate the spread. This paper proposes a stacked ensemble model to predict occurrences of COVID-19 using Exponential Smoothing (ETS), Auto Regressive Integrated Moving Average (ARIMA), and Neural Network Auto-regression (NNAR) as the base models. Each base model is trained individually on the disease data set, whose regress values are then used to train the Multi-Layer Perceptron (MLP) model. The stacked ensemble model outperforms the base models in terms of Root Mean Square Error (RMSE) and Mean Absolute Error (MAE). The results conclude that the ensemble model is competent to forecast future COVID incidences in comparison to other statistical time series models.
    Keywords: coronavirus; COVID-19; pandemic; forecasting; ensemble; stacking; auto regressive integrated moving average; exponential smoothing; neural network; multi-layer perceptron.
    DOI: 10.1504/IJCAT.2021.10044335
  • Analysis of convolutional recurrent neural network classifier for COVID-19 symptoms over computerised tomography images   Order a copy of this article
    by Srihari Kannan, N. Yuvaraj, Barzan Abdulazeez Idrees, P. Arulprakash, Vijayakumar Ranganathan, E. Udayakumar, P. Dhinakar 
    Abstract: In this paper, a Convolutional Recurrent Neural Network (CRNN) model is designed to classify the patients with COVID-19 infections. The CRNN model is designed to identify the Computerised Tomography (CT) images. The processing of CRNN is modelled with input image processing and feature extraction using CNN and prediction by RNN model that quickens the entire process. The simulation is carried with a set of 226 CT images by varying the training-testing accuracy on a tenfold cross-validation. The accuracy in estimating the image samples is increased with increased training data. The results of the simulation show that the proposed method has higher accuracy and reduced MSE with higher training data than other methods.
    Keywords: image classification; convolutional recurrent neural network; tenfold cross validation.
    DOI: 10.1504/IJCAT.2021.10044339
  • Prediction of COVID-19 epidemic curve of India using supervised learning approach   Order a copy of this article
    by Shweta Mongia, Sugandha Sharma, Jaisankar Natarajan, Manoj Kumar, Vasudha Arora, Thompson Stephan, Achyut Shankar, Pragya Gupta, Raghav Kachhawaha 
    Abstract: The recent outbreak of the COVID-19 pandemic, a neo zoonotic infectious disease, has caused high mortality worldwide. The need of the hour is to equip the governments with early detection, prevention, and mitigation of such contagious diseases. In this paper, a supervised learning approach of the polynomial regression model is used for the prediction of COVID-19 cases in terms of the number of confirmed cases (CC), death cases (DC), and recovered cases (RC) in India. Authors have also predicted death rates and recovery rates. The recovery rate on 25th April 2020 is 21.97% and by 1st June 2020 this rate will increase to 79%. In addition to this, authors have projected a monthly percentage increase in the number of CC from 1st May 2020 to 1st December 2020. This analysis would help and enable the concerned authorities in bringing effective preventive measures into action in the process of decision making.
    Keywords: supervised learning; polynomial regression model; COVID-19; prediction; epidemic curve.
    DOI: 10.1504/IJCAT.2021.10043901

Special Issue on: Signal and Information Processing in Sensor and Transducer Systems

  • Identification of Hammerstein-Wiener nonlinear dynamic models using conjugate gradient based iterative algorithm   Order a copy of this article
    by Xiangli Li, Lincheng Zhou 
    Abstract: This paper mainly studies the identification of a class of nonlinear dynamic models with Hammerstein-Wiener nonlinearity.Firstly, a special form of Hammerstein-Wiener polynomial model is constructed by using the key term decomposition technique to separate the model parameters to be estimated.On this basis, an iterative algorithm based on conjugate gradient (CGI) is proposed, which computes a new conjugate vector along the conjugate direction in each iteration step.Because the search direction of the CGI algorithm is conjugate with respect to the Hessian matrix of the cost function, the CGI algorithm can generally obtain the faster convergence rates than the gradient based iterative algorithm.By conjugating the search direction of the CGI algorithm with the Hessian matrix of the loss function, CGI algorithm has more advantages in convergence rates than the gradient based iterative algorithm. Finally, numerical examples are given to demonstrate the effectiveness of the proposed algorithm.
    Keywords: Hammerstein-Wiener model; conjugate gradient; key term decomposition; Hessian matrix; parameter estimation.

  • Multi-sensor temperature and humidity control system of wine cellar based on cooperative control of intelligent vehicle and UAV   Order a copy of this article
    by Yufan Wang 
    Abstract: Red wine has extremely strict requirements on its fermentation and long-term storage environment. The rapid change of cellar temperature will cause great damage to the taste of red wine. At present, wine cellars at home and abroad usually adopt pure manual management or lay a large number of sensors for monitoring to solve such problems. However, in the face of fire risks caused by specialized laboratories or excessive costs and a large number of aging production lines, it is obvious that the needs of wine cellar managers cannot be met. This paper designs and completes the multi-point data acquisition temperature and humidity adjustment sensor system of the wine cellar under the collaborative control of smart car and UAV. The system consists of four independent parts: the intelligent patrol car terminal, the four-rotor UAV auxiliary terminal, the handheld terminal and the intelligent temperature control device terminal, which cooperate with each other to realize the monitoring and control of the environment under closed conditions. Compared with the traditional temperature and humidity collection method, this system uses the method of UAV and smart car to collect and collect data, which greatly improves the efficiency and accuracy of data collection. The system is equipped with low-power autonomous charging to realize unmanned management. At the same time, the administrator can view and intervene in the real-time changes of the indoor environment through the handheld segment to achieve human-computer interaction. Experimental tests show that this system has strong robustness and adaptability, is accurate, intelligent, efficient, and saves a lot of manpower and material resources.
    Keywords: temperature and humidity acquisition sensor system; DHT11; cooperation; human-computer interaction.

  • Simulation study on identification technology of transmission line potential hazards based on corona discharge characteristics   Order a copy of this article
    by Wei Liu 
    Abstract: The prevention and control of transmission line potential hazards is the guarantee of safe and reliable operation of power grids. At present, the prevention and control of line potential hazards is still based on manual inspection, which has problems of low efficiency and poor reliability. Based on corona discharge theory and experimental simulation, this paper studies the fingerprint characteristics of line discharge signal caused by tree barrier, bird damage and insulator pollution, and puts forward a method of line potential hazard detection and fault identification based on discharge characteristics. The results show that the development of line potential hazard will lead to the discharge process, and the discharge characteristics of different types of potential hazard have obvious differences. The differences are mainly reflected in the main wave width and discharge repetition rate, which can be used to identify the types of potential hazard.
    Keywords: overhead line; potential hazard; corona discharge; simulation analysis; identification.

  • Development and application of PD spatial location system in distributing substation   Order a copy of this article
    by Fang Peng, Hong-yu Zhou, Xiao-ming Zhao 
    Abstract: Partial discharge is an important cause of insulation deterioration of distribution network equipment. Due to the variety of distribution network equipment, the location of discharge source is always a technical difficulty in engineering. In this paper, through the research of UHF PD spatial location technology, a system for spatial location of discharge source in distribution room is developed. The UHF sensor, acquisition and processing module and analysis and diagnosis module for the location of discharge source in distribution room are designed. The results of laboratory test and actual operation show that the system has the advantages of high detection sensitivity, high location accuracy and high operation reliability. It can be used for effective monitoring and timely warning of PD defects in distribution room, which helps to improve the power supply reliability of distribution network system.
    Keywords: distributing substation; partial discharge; spatial location; sensor; online monitoring.

  • Feature matching for multi-beam sonar image sequence using KD-Tree and KNN search   Order a copy of this article
    by Jue Gao 
    Abstract: Feature matching for image sequence generated by multi-beam sonar is a critical step in widespread applications like image mosaic, image registration, motion estimation and object tracking. In many cases, feature matching is accomplished by nearest neighbour arithmetic on extracted features, but the global search adopted brings heavy computational burden. Furthermore, sonar imaging characteristics such as low resolution, low SNR, inhomogeneity, point of view changes and other artifacts sometimes lead to poor sonar image quality. This paper presents an approach to the feature extraction, K-Dimension Tree (KD-Tree) construction, and subsequent matching of the features in multi-beam sonar images. Initially, Scale Invariant Feature Transform (SIFT) method are used to extract features. A KD-Tree based on feature location is then constructed. By K Nearest Neighbour (KNN) search, every SIFT feature is matched with K candidates between a pair of consecutive frames. Finally, the Random Sample Consensus (RANSAC) arithmetic is used to eliminate wrong matches. The performances of the proposed approach are assessed with measured data that exhibited reliable results with limited computational burden for the feature-matching task.
    Keywords: feature extraction; feature matching; multi-beam sonar; KD-Tree; KNN.

  • A study on ultrasonic process tomography for dispersed small particle system visualization   Order a copy of this article
    by Zhiheng Meng, Jianfei Gu, Yongxin Chou 
    Abstract: The present challenge in the ultrasonic process tomography on dispersed small particle system is that it is hard to obtain the accurate algorithm to reconstruction. For more accurate reconstruction, this work proposes an improved GMRES(Generalized Minimal Residual)algorithm based on generalized minimal residual iteration and mean filtering method. To verify the feasibility of the algorithm for dispersed small particle system visualization, a linear acoustic attenuation model is developed to obtain the projection data of ultrasonic array. Then, we compared it with the current mainstream reconstruction algorithms under the conditions of the less effective information by solving the underdetermined equations. It is showed that this method can present a high reconstruction precision in the cases of numerical simulations, and reasonably reflect the cross section of dispersed small particle distribution. In the numerical simulations, the imaging accuracy of improved GMRES algorithm can reach about 90%.
    Keywords: ultrasonic method; dispersed particle; particulate two-phase flow; back projection; iterative algorithm.

  • Distributed fusion algorithm based on maximum internal ellipsoid mechanism   Order a copy of this article
    by Jinliang Cong 
    Abstract: In this paper, a Bar-Shalom Campo based algorithm is presented to solve the approximate maximum ellipsoid in the cross region of covariance ellipsoid. An objective function that can be solved by linear matrix inequality is designed based on the rotation transformation of matrix. Compared with the classical covariance intersection fusion algorithm, it is less conservative. Moreover, the unknown cross-covariance is approximated as a linear matrix inequality constraint with Pearson correlation coefficient which is bounded. With the inequality constraint, the accuracy of fusion results can be improved. Finally, two simulation examples are given to verify the effectiveness of the proposed algorithm.
    Keywords: distributed sensor network; information fusion; maximum ellipsoid; cross-covariance constraint.

  • Local track to detect for video object detection   Order a copy of this article
    by Biao Zeng, Shan Zhong, Lifan Zhou, Zhaohui Wang, Shengrong Gong 
    Abstract: The existing methods for video object detection are generally achieved from searching the objects through the entire image. However, they always suffer from large computation consumption as a result of dozens of similar images are required to be operated. To relieve this problem, we propose a Local Track to Detect (LTD) framework to detect video objects by predicting the movements of objects in local areas. LTD can automatically determine key frames and non-key frames, the objects in key frames can be detected by the single frame detector, and the objects in non-key frames can be efficiently detected by the movement prediction module. LTD also has a siamese module to predict whether objects between the key frame and the non-key frame are the same object to ensure the accuracy of the movement prediction module. Compared with other previous work, our method is more efficient and achieves state-of-the-art performance.
    Keywords: video object detection; local detection; detect and track; movement prediction; efficient detection; CNN.

  • Simple interpolation algorithm and its application in power parameter estimation   Order a copy of this article
    by Zhongyou Luo, Shuping Song, Ling Zhang, Puzhi Zhao, Haijiang Zhang 
    Abstract: The computational complexity of interpolation algorithms is a major concern for real-world power harmonic parameter estimation based on the windowed-interpolation fast Fourier transform (FFT) algorithm. A new interpolation algorithm is proposed in this study to estimate the harmonic parameters of power system. This technique is based on the frequency-domain characteristics of the mainlobe of the weighting cosine window, and its calculation formulas are obtained by employing Newtons divided-difference interpolation polynomial. The validity of the proposed algorithm is confirmed through computer simulations via MATLAB and field tests in a photovoltaic system. The results show that the proposed algorithm has the advantage of low computational effort and can be employed for any cosine window.
    Keywords: FFT; harmonic parameter estimation; cosine window; interpolation; Newton’s divided-difference interpolation.

  • Finger knuckle print verification by fusing invariant texture and structure scores   Order a copy of this article
    by Chaa Mourad, Zahid Akhtar, Sehar Uroosa 
    Abstract: Finger Knuckle Print (FKP) biometric traits for person recognition have recently gained much attention from both the research community and industry, owing to their distinctive features and higher usability or user friendliness. In this paper, a reliable and robust personal identification approach using FKP is presented. The proposed framework merges two types of matching scores extracted from structure and texture images. The region covariances algorithm (RCA) has been employed in the presented method to extract the structure and the texture images from each FKP captured image. Gabor filter bank and Kernel Fisher Discriminant (KFD) methods have been used to obtain distinctive feature vectors. Finally, the Cosine Mahalanobis distance similarity metric is used for classification. Experimental analyses were performed on the Hong Kong Polytechnic University (PolyU) FKP database. Experimental results show that our proposed system achieves better results than prior state-of-the-art systems. In addition, fused scores using the weighted sum rule in the proposed framework renders very good performance compared with min, max, and simple sum rules.
    Keywords: biometric system; FKP-based person recognition; Gabor filter; region covariances algorithm; kernel Fisher discriminant.

  • A novel chaotic grey wolf optimisation for high-dimensional and numerical optimisation   Order a copy of this article
    by Mengjian Zhang, Daoyin Long, Dandan Li, Xiao Wang, Tao Qin, Jing Yang 
    Abstract: Aiming at the weakness of the current evolutionary algorithms for high-dimensional and numerical optimization problems of global convergence, a novel chaotic grey wolf optimization (NCGWO) is proposed for solving the high-dimensional optimization problems. Firstly, the six chaotic one-dimensional maps are introduced and their mathematical models are improved with their mapping ranges being in the interval (0, 1). Secondly, the diversity experiments are conducted to test the results of the chaotic maps. The experiments show that the initial population by chaotic maps is superior to the GWO algorithm and the Sine map is best. Finally, the CSGWO algorithm is also proposed based on the NCGWO algorithm with the parameter C by Sine map. The simulations demonstrate that the performance of the GWO algorithm can be improved by the chaotic maps for high-dimensional and numerical optimization problems, and the effectiveness of the CSGWO algorithm is superior to other evolutionary algorithms and achieves better accuracy and convergence speed.
    Keywords: chaotic system; grey wolf optimisation; chaos initialisation; optimisation; high-dimension.

  • Recursive identification of state space systems with colored process noise and measurement noise   Order a copy of this article
    by Fang Zhu, Xuehai Wang 
    Abstract: This paper concerns the modeling and identification of the state space system, in which both colored process noise and measurement noise are encountered. By using the state filtering, the state space system with colored process noise is transformed into a model without correlated noise, and a state filtering based parameter estimation algorithm is derived on the base of designing a state filter observer using the multi-innovation identification. The validity of the proposed algorithm is verified by given simulation examples
    Keywords: parameter estimation; recursive identification; filtering technique; state estimation.

  • Research on cable partial discharge detection and location system based on optical fibre timing   Order a copy of this article
    by Jian-jun Zhang, Fang Peng, An-ming Xie, Yang Fei 
    Abstract: Partial discharge (PD) is an important index to reflect the running state of cable. According to the characteristics and propagation mechanism of cable partial discharge signal, a cable partial discharge detection and location system based on optical fibre time synchronization technology and travelling wave double terminal location principle is developed. The system has high detection sensitivity, high reliability, real-time detection, diagnosis and positioning of cable discharge power supply. The experimental results show that the positioning accuracy of the cable partial discharge source can be effectively improved based on the fibre timing and double terminal positioning technology, and the positioning accuracy can reach 1%; the method studied in this paper can meet the requirements of the accurate location of the partial discharge source of the cable, Gil and other equipment.
    Keywords: cable; partial discharge; optical fibre timing; double terminal positioning; online monitoring.

  • Life-threatening arrhythmias recognition by pulse-to-pulse intervals analysis   Order a copy of this article
    by Lijuan Chou, Yongxin Chou, Jicheng Liu, Shengrong Gong, Kejia Zhang 
    Abstract: Tachycardia, bradycardia, ventricular flutter and ventricular tachycardia are the four life-threatening arrhythmias, which are seriously harmful to the cardiovascular system. Therefore, a method for identifying these arrhythmias by pulse-to-pulse intervals analysis is proposed in this study. First, the noise and interference are wiped out from the raw pulse signal, and the clear pulse signal is spitted into pulse waves by pulse troughs whose first-order difference are the pulse-to-pulse intervals. Then, fifteen features are extracted from the pulse-to-pulse intervals, and the two-samples Kolmogorov-Smirnov test is utilized to select the markedly changed features. Finally, we design the classifiers for arrhythmias recognition by the probabilistic neural network (PNN), feedback neural network (BPNN) and random forest (RF). The pulse signal from the international physiological database (PhysioNET) is utilized as the experimental data. The experimental results show that RF classifier has the best average classification performance with the kappa coefficient (KC) of 98.86
    Keywords: pulse signal; pulse-to-pulse intervals; life-threatening arrhythmias; intelligent recognition.

  • Instantaneous frequency enhanced peak detection for sugarcane seed cutting   Order a copy of this article
    by Junfeng Wei, Weidong Tang, Chunming Wen, Longdian Huang 
    Abstract: Peak detection methods are widely used in various of areas. This study introduced a peak detection method used for seed cutting. The envelope of signal in discrete time domain was calculated by Hilbert transform. In order to increase the reliability in noise condition, the envelope was enhanced by utilizing instantaneous frequency of signal, and then a multi-rule joint search algorithm marks the peaks, which stands for the location of a node. The proposed method worked in worse SNR condition in the simulation, and was verified in the experiment of detecting sugarcane nodes. Local maximums of accelerometer data are marked, showing the position of node rings on the sugarcane surface. The position data will be used for an action signal in cutting machines, or be used for the analysis of crop growth.
    Keywords: discrete Hilbert transform; instantaneous frequency; peak detection; sugarcane seed cutting.

Special Issue on: Computer Applications in Technology and their Role in Education with Respect to Economic Impact

  • Efficient residential load forecasting using a deep learning approach   Order a copy of this article
    by Rida Mubashar, Mazhar Javed Awan, Muhammad Ahsan, Awais Yasin, Vishwa Pratap Singh 
    Abstract: A reliable and efficient smart grid depends on smart meters that are used for tracking electricity usage and provides accurate, granular information that can be used for forecasting power loads. Residential load forecasting is indispensable, since smart meters can now be deployed at the residential level for collecting historical data consumption of residents. The proposed method is tested and validated through available real world data sets. A comparison of LSTM is then made with two traditionally available techniques, ARIMA and exponential smoothing. Real data from 12 houses over a period of 3 months is used to inspect and validate the accuracy of load forecasts performed using three mentioned techniques. LSTM models, owing to their higher capability of memorising large datasets, establish their usefulness in time series based predictions.
    Keywords: short term load forecast; residential load; power system planning; LSTM; exponential smoothing; ARIMA; deep learning.

  • Fake profile recognition using big data analytics in social media platforms   Order a copy of this article
    by Mazhar Javed 
    Abstract: Online social media platforms today have many more users. This has led to increased fake profile trends, which is harming both social and business entities as fraudsters use images of people for creating new fake profiles. However, most of those proposed methods are outdated and arent accurate enough with an average accuracy of 83%. Our proposed solution for this problem is a Spark ML based project that can predict fake profiles with higher accuracy than other present methods of profile recognition. Our project consists of Spark ML libraries including Random Forest Classifier and other plotting tools. We have described our proposed model diagram and tried to depict our results in graphical representations like confusion matrix, learning curve and ROC plot for better understanding. Research findings through this project illustrate that this proposed system has accuracy of 93% in finding fake profiles over social media platforms. There is 7% false positive rate in which our system fails to correctly identify a fake profile.
    Keywords: fake profile; social media; big data; machine learning; Spark.

  • Towards an enhanced user experience with critical system interfaces in Middle-Eastern countries: a case study of usability evaluation of Saudi Arabias weather interface system (Arsad)   Order a copy of this article
    by Abdulrahman Khamaj 
    Abstract: Access to weather forecasts is well adopted by the public in Western countries. However, in Saudi Arabia (KSA), the use of weather forecasts for administering safety precautions and planning daily activities is still not at an acceptable level owing to the lack of easily accessible weather platforms. Recently, the Saudi Presidency of Meteorology and Environment has launched the first governmental smartphone weather application, Arsad. However, the usability of the Arsad systems interface design is still unknown. Through user testing and a questionnaire, this study examined all Arsads embedded features and design aspects. The analyses highlighted several usability issues and recommendations to be considered in the redesign phases. This research will contribute to the usability body of knowledge of weather interface systems, as well as offer opportunities for users and providers to work together to enhance the accessibility and usability of weather system interfaces in KSA and other Middle-Eastern countries.
    Keywords: smartphone applications; usability; weather forecasts; user experience.

  • Comparative study of satellite multispectral image data processing with Map Reduce and classification algorithm   Order a copy of this article
    by Ch Rajya Lakshmi, Katta Subba Rao, R. Rajeswara Rao 
    Abstract: Now that big data has amassed a significant amount of data, it is available in both structured and unstructured formats. Unstructured data processing is difficult to generate by individuals (e.g. Twitter data) or even sensors (e.g. satellites, videos) with data sizes ranging from gigabytes to terabytes and petabytes. The term 'big data' is being used to describe a growing number of items. We can easily analyse and classify different trends in unstructured datasets if the right analytical approach is used, while keeping data quality and size in mind. Early warning forecasts, which are based on satellite imagery and radar sensor data, are a major problem in the real world. The number of space objects derived from such data querying is a complex task. To obtain a better understanding of big data, a proper architecture for the analysis of various classifications of satellite imagery patterns using Hadoop technology should be proposed. Different classification methods for different satellite imagery pattern classification methods are segregated in the proposed architecture, and Google's Map Reduce C4.5 algorithm for successful classification is proposed for both time efficiency and scalability results to increase the performance of classification patterns and an increasing amount of datasets. The focus of this study is on NASA satellite data, Twitter data, and weather forecasting.
    Keywords: C4.5 algorithm; satellite image; Hadoop; Google’s Map Reduce; big data.

  • Management techniques and methods of total quality management implementation in management institutions.   Order a copy of this article
    by Pritidhara Hota, Bhagirathi Nayak, Sunil Mishra, Pratima Sarangi 
    Abstract: This study explored the implementation and barriers of the internal stakeholder Total Quality Management (TQM) activities and of various performance measures. In this analysis, we used a methodology-based approach to the stakeholders who were the unit of the survey. The sample has been chosen from Top Management, Students, Faculty, Non-teaching Staffs, Alumni and Principal of Management Institutes in Odisha. We developed a questionaire with 64 accessible questions, and 10 major factors were collected, with an acceptable answering rate of 49.4%. The primary research elements Principal Components Analysis (PCA) and ANOVA test have been performed. This study showed that different TQM activities influence different performance results significantly. Results showed that lack of employee engagement, knowledge of employees and dedication, inadequate structure, and lack of resources, were the key challenges that management organisations face with internal stakeholders. Management institutes with all their variables to enhance efficiency should continue implementation of TQM.
    Keywords: TQM; stakeholders; ANOVA; PCA.

  • Improving software performance by automatic test cases through genetic algorithm   Order a copy of this article
    by Sudeshna Chakraborty, Vijay Bhanudas Gujar, Tanupriya Choudhury, Bhupesh Dewangan 
    Abstract: Software testing is a vital part of software development. One would like to decrease work and get the most out of the number of faults detected. For optimization problems, test case production is used. Program checking for major problems in regular production trials has a known sufficiency importance factor. Generating test cases automatically will decrease the price and working time considerably. Experiment case information produced without any human interface by using genetic algorithm and random testing is compared with genetic algorithms. Observation is random testing limitations are solved by genetic algorithms. We have implemented these test cases and tested them in real time environments, and the outcomes show good performance.
    Keywords: routine test case generation; correspondence class partitioning; arbitrary testing.

  • Application of hazard identification and risk assessment for reducing occupational accidents in firework industries with specific reference to Sivakasi   Order a copy of this article
    by Indumathi N, Ramalakshmi R 
    Abstract: Occupational accidents should be avoided because they have very negative consequences on both industries and employees. In India, Sivakasi is the second largest fireworks manufacturing sector. Every workplace task that involves a chemical process has the potential to cause an accident. Identifying the hazards is essential to reduce accidents and explosions. Hazard Identification and Risk Assessment (HIRA) can be used as a risk assessment method to help users identify hazards and estimate the risk associated with each one. This study aims to look into the possible hazards and incidents that may occur in the fireworks industry, and to improve occupational safety and wellness by the techniques of HIRA and F-test. HIRA identified the industrial risk zones based on the task as high (43%), medium (36%), and low (21%). Through the failure detection analysis, it achieved 84% reduction of risk priority number through the prevention and mitigation program.
    Keywords: occupational accidents; hazard identification; risk assessment; fireworks industry; safety; chemical hazards.

  • Flight web searches analytics through big data   Order a copy of this article
    by Amna Khalil, Mazhar Javed Awan, Awais Yasin, Vishwa Pratap Singh, Hafiz Muhammad Faisal Shehzad 
    Abstract: The flight search is considered one of the biggest searches on the World Wide Web. This study aims to establish an effective prediction model from a huge dataset. This article offers a linear regression model to forecast flight searches using the big data framework SparkML library and statistics. Experiments on realistic datasets of domestic airports reveal that the suggested model's accuracy is close to 90% using the big data framework. Our research provides an efficient flight web search engine, which can manage through big data.
    Keywords: flights databases; search query; World Wide Web search engines; content-based retrieval.

  • Application of information technology to e-commerce   Order a copy of this article
    by Nasser Binsaif 
    Abstract: Nations are accelerating the application of technology to e-commerce because of its impact at all times, just as the use of computer applications in electronic shopping is one of the most important pillars of trade. E-commerce is the process of buying and selling services and goods over the internet. Generally, data or money is also transferred over the internet, which is an electronic network. In an online business environment, all information is displayed and payment is also made online. The current situation and the digital world have embraced the e-commerce facility. This article discusses the potential behaviours of e-commerce in the Kingdom of Saudi Arabia. The article analyses perspective and e-commerce in the Kingdom of Saudi Arabia. Fraudulent activities are encountered during transactions and purchases. The difficulties are addressed through security policies and the technology is promoted through social activities.
    Keywords: e-commerce; business; consumer; security policy; threat; social media.

  • The electrical circuit of a new seven-dimensional system with twenty-one boundaries and the phenomenon of complete synchronisation   Order a copy of this article
    by Khaled Mohammed Al-Hamad, Anas Romaih Obaid, Ahmed S. Al-Obeidi 
    Abstract: One the most important properties of dynamic systems is the synchronisation phenomenon. In this document, we obtain nonlinear control unit results in which to synchronise two equivalent 7D structures. We used linearisation and Lyapunov as analytical ways and linearisation way doesnt require Lyapunov function updating, thus it is effective to achieve synchronisation phenomena with better results than Lyapunov way. The two ways were used, and eventually we obtained such similarity to the error of the dynamic system. Digital emulation was applied to the mathematical system with control and error of the dynamic system. The digital excellent results were close to those of the two ways mentioned before. We studied three synchronisation phenomena (complete, incomplete, and hybrid) according to Lyapunov and linearisation ways, and compared their results. Finally, we applied the current system and present it in new attractor and compared these results with other similar ones.
    Keywords: chaos; Lyapunov; linearisation; projective synchronization; nonlinear dynamic system.

  • An expert system based IoT system for minimisation of air pollution in developing countries   Order a copy of this article
    by Sudan Jha, Sidheswar Routray, Sultan Ahmad 
    Abstract: Carbon dioxide (CO2), nitrogen dioxide (NO2), suphur dioxide (SO2) are the major contributing sources to environmental pollution in developing countries. Therefore, measuring and controlling them are significant to human health. This paper proposes a new approach using Internet-of-Things (IoT) to measure and control air pollution in developing countries. Various sensors related to temperature, humidity, and smoke have been used to collect data. These data are sent to the central server through an access point. Numerous techniques have been used on these stored data to investigate the increase in the levels of pollution, temperature, and other parameters that cause air pollution. If they are above danger levels, then an alert signal will be sent to the whole city, and the precautionary measures that need to be taken by the citizens are broadcast. The proposed IoT model has shown superior performance compared with related works concerning factors such as CO2 and NO2.
    Keywords: pollution; pollutants; sensors; internet of things; temperature; controller.

  • An empirical study for customer relationship management in the banking sector using machine learning techniques   Order a copy of this article
    by Guru Prasad Dash, Bhagirathi Nayak 
    Abstract: Customer creation is necessary for a new bank and as well as retention is an existing bank that is more productive and cost-effective. Indian bankers' CRM aims to develop and retain their customers and to view a whole organizational structure as a fully integrated attempt to seek, build, and meet the needs of customers. The deposit and innovation capacity is extremely low in rural areas, but immense in urban regions because the majority of the potential product scheme is well known. It was assumed that analysis and CRM in the banking sector were appropriate in these circumstances. The study is an analytical survey using machine learning techniques aimed at investigating the technological progress faced by commercial banks, and how far banks have gained to create a better performance of the financial sector of public and private sector banks.
    Keywords: CRM; financial sector; machine learning.

  • Data visualization using augmented reality for an education system   Order a copy of this article
    by Sumit Hirve, Pradeep Reddy CH 
    Abstract: Data is present in abundance in the present world whether it is education, e-commerce, defence or many other sectors of the nation, but the actual benefit arises when information is extracted from such huge data which can be used in educational, scientific, or commercial fields. Data visualisation plays an important role in understanding what exactly the data is while processing it and inferring results out of it. Students, being the building and budding blocks of the nation, at a very ripe age are exposed to abundant data so this paper is focused on improving the educational system so that students can get a proper understanding of concepts by visualising the matter at hand. The main objective of the paper lies in innovating educational technology by introducing augmented reality into the data visualisation process.
    Keywords: augmented reality; 3-D visualisation; Hololens; education system; Unity; Visual Studio.

  • Design of QoS on data collection in wireless sensor network for automation process   Order a copy of this article
    by Ghaida Muttashar Abdulsaheb, Hassan Jaleel Hassan, Osamah Ibrahim Khalaf 
    Abstract: Wireless sensor networks (WSN) facilitate the analysis of the universe with an unprecedented resolution. WSN is a network that connects many low-cost, low-powered sensor nodes that are capable of sensing/actuating and can interact with one another over short distances through a low-power radio. This article aims to provide strategies for enhancing and maintaining Quality of Service (QoS) in WSN communication. As a result, we implemented a classification-based multi-layer WSN stack prototype that takes CDC applications into account. This method decreases the increasing point load by control messages, resulting in higher application throughput. In the presence of reasonably large unicast data traffic, the CDC multi-layer stack achieves 85.16% throughput while running at less than 12.14% delay. While WSN is the transmission technique and automation is the implementation scenario, the existing methods can be extended to certain other WSN and scenarios with related communication patterns and QoS issues.
    Keywords: WSN; QoS; throughput; end-to-end delay; network traffic.