57 research outputs found

    Institutional smart buildings energy audit

    Get PDF
    Smart buildings and Fuzzy based control systems used in Buildings Management System (BMS), Building Energy Management Systems (BEMS) and Building Automation Systems (BAS) are a point of interests among researcher and stake holders of buildings’ developing sector due to its ability to save energy and reduce greenhouse gas emissions. Therefore this paper will review, investigates define and evaluates the use of fuzzy logic controllers in smart buildings under subtropical Australia’s subtropical regions. In addition the paper also will define the latest development, design and proposed controlling strategies used in institutional buildings. Furthermore this paper will highlight and discuss the conceptual basis of these technologies including Fuzzy, Neural and Hybrid add-on technologies, its capabilities and its limitation

    Functions of fuzzy logic based controllers used in smart building

    Get PDF
    The main aim of this study is to support design and development processes of advanced fuzzy-logic-based controller for smart buildings e.g., heating, ventilation and air conditioning, heating, ventilation and air conditioning (HVAC) and indoor lighting control systems. Moreover, the proposed methodology can be used to assess systems energy and environmental performances, also compare energy usages of fuzzy control systems with the performances of conventional on/off and proportional integral derivative controller (PID). The main objective and purpose of using fuzzy-logic-based model and control is to precisely control indoor thermal comfort e.g., temperature, humidity, air quality, air velocity, thermal comfort, and energy balance. Moreover, this article present and highlight mathematical models of indoor temperature and humidity transfer matrix, uncertainties of users’ comfort preference set-points and a fuzzy algorithm

    Automatic neonatal sleep stage classification:A comparative study

    Get PDF
    Sleep is an essential feature of living beings. For neonates, it is vital for their mental and physical development. Sleep stage cycling is an important parameter to assess neonatal brain and physical development. Therefore, it is crucial to administer newborn's sleep in the neonatal intensive care unit (NICU). Currently, Polysomnography (PSG) is used as a gold standard method for classifying neonatal sleep patterns, but it is expensive and requires a lot of human involvement. Over the last two decades, multiple researchers are working on automatic sleep stage classification algorithms using electroencephalography (EEG), electrocardiography (ECG), and video. In this study, we present a comprehensive review of existing algorithms for neonatal sleep, their limitations and future recommendations. Additionally, a brief comparison of the extracted features, classification algorithms and evaluation parameters is reported in the proposed study

    Human–Computer Interaction and Participation in Software Crowdsourcing

    Get PDF
    Improvements in communication and networking technologies have transformed people’s lives and organizations’ activities. Web 2.0 innovation has provided a variety of hybridized applications and tools that have changed enterprises’ functional and communication processes. People use numerous platforms to broaden their social contacts, select items, execute duties, and learn new things. Context: Crowdsourcing is an internet-enabled problem-solving strategy that utilizes human–computer interaction to leverage the expertise of people to achieve business goals. In crowdsourcing approaches, three main entities work in collaboration to solve various problems. These entities are requestors (job providers), platforms, and online users. Tasks are announced by requestors on crowdsourcing platforms, and online users, after passing initial screening, are allowed to work on these tasks. Crowds participate to achieve various rewards. Motivation: Crowdsourcing is gaining importance as an alternate outsourcing approach in the software engineering industry. Crowdsourcing application development involves complicated tasks that vary considerably from the micro-tasks available on platforms such as Amazon Mechanical Turk. To obtain the tangible opportunities of crowdsourcing in the realm of software development, corporations should first grasp how this technique works, what problems occur, and what factors might influence community involvement and co-creation. Online communities have become more popular recently with the rise in crowdsourcing platforms. These communities concentrate on specific problems and help people with solving and managing these problems. Objectives: We set three main goals to research crowd interaction: (1) find the appropriate characteristics of social crowd utilized for effective software crowdsourcing, (2) highlight the motivation of a crowd for virtual tasks, and (3) evaluate primary participation reasons by assessing various crowds using Fuzzy AHP and TOPSIS method. Conclusion: We developed a decision support system to examine the appropriate reasons of crowd participation in crowdsourcing. Rewards and employments were evaluated as the primary motives of crowds for accomplishing tasks on crowdsourcing platforms, knowledge sharing was evaluated as the third reason, ranking was the fourth, competency was the fifth, socialization was sixth, and source of inspiration was the seventh.Princess Nourah bint Abdulrahman University Researchers Supporting - Riyadh, Saudi Arabia. Project number (PNURSP2023TR140)

    A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos

    Get PDF
    The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image encryption algorithms based on the classical random walk and chaos theory for sharing an image in a secure way. Instead of the classical random walk, this paper proposes the quantum walk to achieve high image security. Classical random walk exhibits randomness due to the stochastic transitions between states, on the other hand, the quantum walk is more random and achieve randomness due to the superposition, and the interference of the wave functions. The proposed image encryption scheme is evaluated using extensive security metrics such as correlation coefficient, entropy, histogram, time complexity, number of pixels change rate and unified average intensity etc. All experimental results validate the proposed scheme, and it is concluded that the proposed scheme is highly secured, lightweight and computationally efficient. In the proposed scheme, the values of the correlation coefficient, entropy, mean square error (MSE), number of pixels change rate (NPCR), unified average change intensity (UACI) and contrast are 0.0069, 7.9970, 40.39, 99.60%, 33.47 and 10.4542 respectively

    Automatic neonatal sleep stage classification: A comparative study

    Get PDF
    Sleep is an essential feature of living beings. For neonates, it is vital for their mental and physical development. Sleep stage cycling is an important parameter to assess neonatal brain and physical development. Therefore, it is crucial to administer newborn's sleep in the neonatal intensive care unit (NICU). Currently, Polysomnography (PSG) is used as a gold standard method for classifying neonatal sleep patterns, but it is expensive and requires a lot of human involvement. Over the last two decades, multiple researchers are working on automatic sleep stage classification algorithms using electroencephalography (EEG), electrocardiography (ECG), and video. In this study, we present a comprehensive review of existing algorithms for neonatal sleep, their limitations and future recommendations. Additionally, a brief comparison of the extracted features, classification algorithms and evaluation parameters is reported in the proposed study

    A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map

    Get PDF
    With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving cryptosystem is necessary. Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural power, among other characteristics. In this work, a secure image encryption scheme is proposed using linear feedback shift register (LFSR) and chaos-based quantum chaotic map. e focus of the scheme is mainly dependent on the secret keys from the input of the algorithm. e threat landscape, the statistical test analysis, along critical comparisons with other schemes indicate that the presented algorithm is significantly secure and is resistant to a wide range of different attacks such as differential and statistical attacks. e proposed method has sufficiently higher sensitivity and security when compared to existing encryption algorithms. Several security parameters validated the security of proposed work such as correlation coefficient analyses among the neighboring pixels, entropy, the number of pixels change rate (NPCR), unified average change intensity (UACI), mean square error (MSE), brute force, key sensitivity, and peak signal to noise ratio (PSNR) analyses. e randomness of the ciphers produced by the proposed technique is also passed through NIST-800-22. e results of NIST indicate that the ciphers are highly random and do not produce any type of periodicity or pattern

    A Deep Learning-Based Semantic Segmentation Architecture for Autonomous Driving Applications

    Get PDF
    In recent years, the development of smart transportation has accelerated research on semantic segmentation as it is one of the most important problems in this area. A large receptive field has always been the center of focus when designing convolutional neural networks for semantic segmentation. A majority of recent techniques have used maxpooling to increase the receptive field of a network at an expense of decreasing its spatial resolution. Although this idea has shown improved results in object detection applications, however, when it comes to semantic segmentation, a high spatial resolution also needs to be considered. To address this issue, a new deep learning model, the M-Net is proposed in this paper which satisfies both high spatial resolution and a large enough receptive field while keeping the size of the model to a minimum. The proposed network is based on an encoder-decoder architecture. The encoder uses atrous convolution to encode the features at full resolution, and instead of using heavy transposed convolution, the decoder consists of a multipath feature extraction module that can extract multiscale context information from the encoded features. The experimental results reported in the paper demonstrate the viability of the proposed scheme

    Multi-Chaos-Based Lightweight Image Encryption-Compression for Secure Occupancy Monitoring

    Get PDF
    With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose serious privacy concerns and cybersecurity threats. Eavesdroppers can easily access confidential multimedia information and the privacy of individuals can be compromised. As a solution, novel encryption techniques for the multimedia data concealing have been proposed by the cryptographers. Due to the bandwidth limitations and computational complexity, traditional encryption methods are not applicable to multimedia data. In traditional encryption methods such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES), once multimedia data are compressed during encryption, correct decryption is a challenging task. In order to utilize the available bandwidth in an efficient way, a novel secure video occupancy monitoring method in conjunction with encryption-compression has been developed and reported in this paper. The interesting properties of Chebyshev map, intertwining map, logistic map, and orthogonal matrix are exploited during block permutation, substitution, and diffusion processes, respectively. Real-time simulation and performance results of the proposed system show that the proposed scheme is highly sensitive to the initial seed parameters. In comparison to other traditional schemes, the proposed encryption system is secure, efficient, and robust for data encryption. Security parameters such as correlation coefficient, entropy, contrast, energy, and higher key space prove the robustness and efficiency of the proposed solution

    A New Intrusion Detection System for the Internet of Things via Deep Convolutional Neural Network and Feature Engineering

    Get PDF
    The Internet of Things (IoT) is a widely used technology in automated network systems across the world. The impact of the IoT on different industries has occurred in recent years. Many IoT nodes collect, store, and process personal data, which is an ideal target for attackers. Several researchers have worked on this problem and have presented many intrusion detection systems (IDSs). The existing system has difficulties in improving performance and identifying subcategories of cyberattacks. This paper proposes a deep-convolutional-neural-network (DCNN)-based IDS. A DCNN consists of two convolutional layers and three fully connected dense layers. The proposed model aims to improve performance and reduce computational power. Experiments were conducted utilizing the IoTID20 dataset. The performance analysis of the proposed model was carried out with several metrics, such as accuracy, precision, recall, and F1-score. A number of optimization techniques were applied to the proposed model in which Adam, AdaMax, and Nadam performance was optimum. In addition, the proposed model was compared with various advanced deep learning (DL) and traditional machine learning (ML) techniques. All experimental analysis indicates that the accuracy of the proposed approach is high and more robust than existing DL-based algorithms
    • …
    corecore