47 research outputs found

    Large neighborhood search for the most strings with few bad columns problem

    Get PDF
    In this work, we consider the following NP-hard combinatorial optimization problem from computational biology. Given a set of input strings of equal length, the goal is to identify a maximum cardinality subset of strings that differ maximally in a pre-defined number of positions. First of all, we introduce an integer linear programming model for this problem. Second, two variants of a rather simple greedy strategy are proposed. Finally, a large neighborhood search algorithm is presented. A comprehensive experimental comparison among the proposed techniques shows, first, that larger neighborhood search generally outperforms both greedy strategies. Second, while large neighborhood search shows to be competitive with the stand-alone application of CPLEX for small- and medium-sized problem instances, it outperforms CPLEX in the context of larger instances.Peer ReviewedPostprint (author's final draft

    Human Activity and Motion Pattern Recognition within Indoor Environment Using Convolutional Neural Networks Clustering and Naive Bayes Classification Algorithms

    Get PDF
    Human Activity Recognition (HAR) systems are designed to read sensor data and analyse it to classify any detected movement and respond accordingly. However, there is a need for more responsive and near real-time systems to distinguish between false and true alarms. To accurately determine alarm triggers, the motion pattern of legitimate users need to be stored over a certain period and used to train the system to recognise features associated with their movements. This training process is followed by a testing cycle that uses actual data of different patterns of activity that are either similar or different to the training data set. This paper evaluates the use of a combined Convolutional Neural Network (CNN) and Naive Bayes for accuracy and robustness to correctly identify true alarm triggers in the form of a buzzer sound for example. It shows that pattern recognition can be achieved using either of the two approaches, even when a partial motion pattern is derived as a subset out of a full-motion path

    Application of Machine Learning Methods for Asset Management on Power Distribution Networks

    Get PDF
    This study aims to study the different kinds of Machine Learning (ML) models and their working principles for asset management in power networks. Also, it investigates the challenges behind asset management and its maintenance activities. In this review article, Machine Learning (ML) models are analyzed to improve the lifespan of the electrical components based on the maintenance management and assessment planning policies. The articles are categorized according to their purpose: 1) classification, 2) machine learning, and 3) artificial intelligence mechanisms. Moreover, the importance of using ML models for proper decision making based on the asset management plan is illustrated in a detailed manner. In addition to this, a comparative analysis between the ML models is performed, identifying the advantages and disadvantages of these techniques. Then, the challenges and managing operations of the asset management strategies are discussed based on the technical and economic factors. The proper functioning, maintenance and controlling operations of the electric components are key challenging and demanding tasks in the power distribution systems. Typically, asset management plays an essential role in determining the quality and profitability of the elements in the power network. Based on this investigation, the most suitable and optimal machine learning technique can be identified and used for future work. Doi: 10.28991/ESJ-2022-06-04-017 Full Text: PD

    Wi-Fi Fingerprinting for Indoor Positioning

    Get PDF
    Wireless Fidelity (Wi-Fi) Fingerprinting is a remarkable approach developed by modern science to detect the user’s location efficiently. Today, the Global Positioning System (GPS) is used to keep track of our current location for outdoor positioning. In GPS technology, satellite signals cannot reach indoor environments as they are shielded from obstructions so that indoor environments with a lack of Line of Sight (LoS) do not provide enough satellite signal accuracy. Since indoor environments are very difficult to track, thus, a wide variety of techniques for dealing with them have been suggested. The best way to offer an indoor positioning service with the current technology is Wi-Fi since the most commercial infrastructure is well equipped with Wi-Fi routers. For indoor positioning systems (IPS), Wi-Fi fingerprinting approaches are being extremely popular. In this paper, all the approaches for Wi-Fi fingerprinting have been reviewed for indoor position localization. Related to Wi-Fi fingerprinting, most of the algorithms have been interpreted and the previous works of other researchers have been critically analyzed in this paper to get a clear view of the Wi-Fi fingerprinting process

    Wi-Fi Fingerprinting for Indoor Positioning

    Get PDF
    Wireless Fidelity (Wi-Fi) Fingerprinting is a remarkable approach developed by modern science to detect the user’s location efficiently. Today, the Global Positioning System (GPS) is used to keep track of our current location for outdoor positioning. In GPS technology, satellite signals cannot reach indoor environments as they are shielded from obstructions so that indoor environments with a lack of Line of Sight (LoS) do not provide enough satellite signal accuracy. Since indoor environments are very difficult to track, thus, a wide variety of techniques for dealing with them have been suggested. The best way to offer an indoor positioning service with the current technology is Wi-Fi since the most commercial infrastructure is well equipped with Wi-Fi routers. For indoor positioning systems (IPS), Wi-Fi fingerprinting approaches are being extremely popular. In this paper, all the approaches for Wi-Fi fingerprinting have been reviewed for indoor position localization. Related to Wi-Fi fingerprinting, most of the algorithms have been interpreted and the previous works of other researchers have been critically analyzed in this paper to get a clear view of the Wi-Fi fingerprinting process

    A Watermark-Based in-Situ Access Control Model for Image Big Data

    Get PDF
    When large images are used for big data analysis, they impose new challenges in protecting image privacy. For example, a geographic image may consist of several sensitive areas or layers. When it is uploaded into servers, the image will be accessed by diverse subjects. Traditional access control methods regulate access privileges to a single image, and their access control strategies are stored in servers, which imposes two shortcomings: (1) fine-grained access control is not guaranteed for areas/layers in a single image that need to maintain secret for different roles; and (2) access control policies that are stored in servers suffers from multiple attacks (e.g., transferring attacks). In this paper, we propose a novel watermark-based access control model in which access control policies are associated with objects being accessed (called an in-situ model). The proposed model integrates access control policies as watermarks within images, without relying on the availability of servers or connecting networks. The access control for images is still maintained even though images are redistributed again to further subjects. Therefore, access control policies can be delivered together with the big data of images. Moreover, we propose a hierarchical key-role-area model for fine-grained encryption, especially for large size images such as geographic maps. The extensive analysis justifies the security and performance of the proposed model
    corecore