bbabanner.jpg

Security in Ad hoc networks: From vulnerability to risk management

Mobile Ad hoc Networks (MANETs) have lots of applications. Due to the features of open medium, absence of infrastructure, dynamic changing network topology, cooperative algorithms, lack of centralized monitoring and management point, resource constraints and lack of a clear line of defense, these networks are vulnerable to attacks. A vital problem that must be solved in order to realize these applications is that concerning the security aspects of such networks. Solving these problems combined with the widespread availability of devices such as PDAs, laptops, small fixtures on buildings and

Artificial Intelligence

Fuzzy gaussian process classification model

Soft labels allow a pattern to belong to multiple classes with different degrees. In many real world applications the association of a pattern to multiple classes is more realistic; to describe overlap and uncertainties in class belongingness. The objective of this work is to develop a fuzzy Gaussian process model for classification of soft labeled data. Gaussian process models have gained popularity in the recent years in classification and regression problems and are example of a flexible, probabilistic, non-parametric model with uncertainty predictions. Here we derive a fuzzy Gaussian model

Artificial Intelligence

Modeling intrastromal photorefractive keratectomy procedures

The main idea to correct sight disorders using lasers is to modify corneal curvature by applying laser to specific layers of the cornea. Intrastromal Photorefractive keratectomy is a laser technique used to correct sight disorders by evaporating corneal tissue, which results in small cavities that may coincide to form a larger cavity that will collapse to deform the curvature of the cornea. In this work, a 3D finite element model of the cornea was designed with typical parameters to simulate the procedure. The model outcome was compared with an earlier 2D model used for the same purpose, so as

Artificial Intelligence

Machine learning methodologies in Brain-Computer Interface systems

Brain-Computer Interfaces (BCI) is a one kind of communication system that enables control of devices or communication with others only through brain signal activities without using motor activities. The main application for BCI is to provide an alternative channel for helping disabled persons, hereafter mentioned as subjects, to communicate with the external world. This paper tries to demonstrate the performance of different machine learning algorithms based on classification accuracy. Performance has been evaluated on dataset II from BCI Competition III for the year 2004 for two subjects 'A'

Artificial Intelligence

Computing the burrows-wheeler transform of a string and its reverse

The contribution of this paper is twofold. First, we provide new theoretical insights into the relationship between a string and its reverse: If the Burrows-Wheeler transform (BWT) of a string has been computed by sorting its suffixes, then the BWT and the longest common prefix array of the reverse string can be derived from it without suffix sorting. Furthermore, we show that the longest common prefix arrays of a string and its reverse are permutations of each other. Second, we provide a parallel algorithm that, given the BWT of a string, computes the BWT of its reverse much faster than all

Artificial Intelligence
Healthcare
Software and Communications

Motion history of skeletal volumes and temporal change in bounding volume fusion for human action recognition

Human action recognition is an important area of research in computer vision. Its applications include surveillance systems, patient monitoring, human-computer interaction, just to name a few. Numerous techniques have been developed to solve this problem in 2D and 3D spaces. However 3D imaging gained a lot of interest nowadays. In this paper we propose a novel view-independent action recognition algorithm based on fusion between a global feature and a graph based feature. We used the motion history of skeleton volumes; we compute a skeleton for each volume and a motion history for each action

Artificial Intelligence
Software and Communications

IoT Modes of Operations with Different Security Key Management Techniques: A Survey

The internet of things (IoT) has provided a promising opportunity to build powerful systems and applications. Security is the main concern in IoT applications due to the privacy of exchanged data using limited resources of IoT devices (sensors/actuators). In this paper, we present a classification of IoT modes of operation based on the distribution of IoT devices, connectivity to the internet, and the typical field of application. It has been found that the majority of IoT services can be classified into one of four IoT modes: Gateway, device to device, collaborative, and centralized. The

Artificial Intelligence
Circuit Theory and Applications

Supporting bioinformatics applications with hybrid multi-cloud services

Cloud computing provides a promising solution to the big data problem associated with next generation sequencing applications. The increasing number of cloud service providers, who compete in terms of performance and price, is a clear indication of a growing market with high demand. However, current cloud computing based applications in bioinformatics do not profit from this progress, because they are still limited to just one cloud service provider. In this paper, we present different use case scenarios using hybrid services and resources from multiple cloud providers for bioinformatics

Artificial Intelligence
Software and Communications
Innovation, Entrepreneurship and Competitiveness

Bivariate Double Density Discrete Wavelet for Enhanced Image Denoising

Image denoising is of paramount importance in image processing. In this paper, we propose a new design technique for the design of Double density Discrete Wavelet Transform (DD DWT) AND DD CWT filter bank structure. These filter banks satisfy the perfect reconstruction as well as alias free properties of the DWT. Next, we utilized this filter bank structure in image denoising. Our denoising scheme is based on utilizing the interscale correlation/interscale dependence between wavelet coefficients of a DD DWT of the noisy image. This is known as the Bivariate Shrinkage scheme. More precisely, we

Artificial Intelligence
Software and Communications

Fast fractal modeling of mammograms for microcalcifications detection

Clusters of microcalcifications in mammograms are an important early sign of breast cancer in women. Comparing with microcalcifications, the breast background tissues have high local self-similarity, which is the basic property of fractal objects. A fast fractal modeling method of mammograms for detecting the presence of microcalcifications is proposed in this paper. The conventional fractal modeling method consumes too much computation time. In the proposed method, the image is divided into shade (homogeneous) and non-shade blocks based on the dynamic range and only the non-shade blocks are

Artificial Intelligence
Healthcare