29 research outputs found

    A new multiperspective framework for standardization and benchmarking of image dehazing algorithms

    Get PDF
    A standardization and benchmarking framework for image dehazing algorithms based on multiple perspectives is not yet available. Hence, this study proposed a new multi-perspective standardization and benchmarking framework for image dehazing algorithms. Experiments were conducted in three main phases. First, the image dehazing criteria were standardized based on Fuzzy-Delphi Method (FDM). Furthermore, an objective experiment was conducted to test and evaluate the selected criteria from FDM within constraints of Pearson Linear Correlation Coefficient (PLCC) and Spearman Rank Order Correlation Coefficient (SRCC). Second, an evaluation experiment was conducted to obtain a new multi-perspective decision matrix. Third, Best Worst Method (BWM) and Vlse Kriterijumska Optimizacija Kompromisno Resenje (VIKOR) methods were hybridized to determine the weight of the standardized criteria and rank the algorithms. To objectively validate the selection results, mean was applied for this purpose. To evaluate the proposed framework, two main approaches were applied. On the one hand, a standard dataset was tested on the selected criteria and image dehazing algorithms to select the best algorithm. On the other hand, a benchmarking checklist scenario was adopted to measure the feasibility of the proposed work compared to other methods. The results revealed that 11 criteria were selected as the best according to FDM stipulations. Furthermore, seven criteria had been satisfied with the PLCC and SRCC tests. Hybridization of BWM and VIKOR methods can effectively solve the challenges in the selection of the optimal algorithm. The ranking results identified Contrast Limited Adaptive Histogram Equalization (CLAHE) as the best image dehazing algorithm. Apart from that, the benchmarking checklist scenario showed the proposed framework was more effective than the benchmark study

    Mapping and Deep Analysis of Image Dehazing: Coherent Taxonomy, Datasets, Open Challenges, Motivations, and Recommendations

    Get PDF
    Our study aims to review and analyze the most relevant studies in the image dehazing field. Many aspects have been deemed necessary to provide a broad understanding of various studies that have been examined through surveying the existing literature. These aspects are as follows: datasets that have been used in the literature, challenges that other researchers have faced, motivations, and recommendations for diminishing the obstacles in the reported literature. A systematic protocol is employed to search all relevant articles on image dehazing, with variations in keywords, in addition to searching for evaluation and benchmark studies. The search process is established on three online databases, namely, IEEE Xplore, Web of Science (WOS), and ScienceDirect (SD), from 2008 to 2021. These indices are selected because they are sufficient in terms of coverage. Along with definition of the inclusion and exclusion criteria, we include 152 articles to the final set. A total of 55 out of 152 articles focused on various studies that conducted image dehazing, and 13 out 152 studies covered most of the review papers based on scenarios and general overviews. Finally, most of the included articles centered on the development of image dehazing algorithms based on real-time scenario (84/152) articles. Image dehazing removes unwanted visual effects and is often considered an image enhancement technique, which requires a fully automated algorithm to work under real-time outdoor applications, a reliable evaluation method, and datasets based on different weather conditions. Many relevant studies have been conducted to meet these critical requirements. We conducted objective image quality assessment experimental comparison of various image dehazing algorithms. In conclusions unlike other review papers, our study distinctly reflects different observations on image dehazing areas. We believe that the result of this study can serve as a useful guideline for practitioners who are looking for a comprehensive view on image dehazing

    Adaptive Deep Learning Detection Model for Multi-Foggy Images

    Get PDF
    The fog has different features and effects within every single environment. Detection whether there is fog in the image is considered a challenge and giving the type of fog has a substantial enlightening effect on image defogging. Foggy scenes have different types such as scenes based on fog density level and scenes based on fog type. Machine learning techniques have a significant contribution to the detection of foggy scenes. However, most of the existing detection models are based on traditional machine learning models, and only a few studies have adopted deep learning models. Furthermore, most of the existing machines learning detection models are based on fog density-level scenes. However, to the best of our knowledge, there is no such detection model based on multi-fog type scenes have presented yet. Therefore, the main goal of our study is to propose an adaptive deep learning model for the detection of multi-fog types of images. Moreover, due to the lack of a publicly available dataset for inhomogeneous, homogenous, dark, and sky foggy scenes, a dataset for multi-fog scenes is presented in this study (https://github.com/Karrar-H-Abdulkareem/Multi-Fog-Dataset). Experiments were conducted in three stages. First, the data collection phase is based on eight resources to obtain the multi-fog scene dataset. Second, a classification experiment is conducted based on the ResNet-50 deep learning model to obtain detection results. Third, evaluation phase where the performance of the ResNet-50 detection model has been compared against three different models. Experimental results show that the proposed model has presented a stable classification performance for different foggy images with a 96% score for each of Classification Accuracy Rate (CAR), Recall, Precision, F1-Score which has specific theoretical and practical significance. Our proposed model is suitable as a pre-processing step and might be considered in different real-time applications

    Delay optimal schemes for Internet of Things applications in heterogeneous edge cloud computing networks

    Get PDF
    Over the last decade, the usage of Internet of Things (IoT) enabled applications, such as healthcare, intelligent vehicles, and smart homes, has increased progressively. These IoT applications generate delayed- sensitive data and requires quick resources for execution. Recently, software-defined networks (SDN) offer an edge computing paradigm (e.g., fog computing) to run these applications with minimum end-to-end delays. Offloading and scheduling are promising schemes of edge computing to run delay-sensitive IoT applications while satisfying their requirements. However, in the dynamic environment, existing offloading and scheduling techniques are not ideal and decrease the performance of such applications. This article formulates joint and scheduling problems into combinatorial integer linear programming (CILP). We propose a joint task offloading and scheduling (JTOS) framework based on the problem. JTOS consists of task offloading, sequencing, scheduling, searching, and failure components. The study's goal is to minimize the hybrid delay of all applications. The performance evaluation shows that JTOS outperforms all existing baseline methods in hybrid delay for all applications in the dynamic environment. The performance evaluation shows that JTOS reduces the processing delay by 39% and the communication delay by 35% for IoT applications compared to existing schemes.Web of Science2216art. no. 593

    Image‐based malware classification using VGG19 network and spatial convolutional attention

    Get PDF
    In recent years the amount of malware spreading through the internet and infecting computers and other communication devices has tremendously increased. To date, countless techniques and methodologies have been proposed to detect and neutralize these malicious agents. However, as new and automated malware generation techniques emerge, a lot of malware continues to be produced, which can bypass some state‐of‐the‐art malware detection methods. Therefore, there is a need for the classification and detection of these adversarial agents that can compromise the security of people, organizations, and countless other forms of digital assets. In this paper, we propose a spatial attention and convolutional neural network (SACNN) based on deep learning framework for image‐based classification of 25 well‐known malware families with and without class balancing. Performance was evaluated on the Malimg benchmark dataset using precision, recall, specificity, precision, and F1 score on which our proposed model with class balancing reached 97.42%, 97.95%, 97.33%, 97.11%, and 97.32%. We also conducted experiments on SACNN with class balancing on benign class, also produced above 97%. The results indicate that our proposed model can be used for image‐based malware detection with high performance, despite being simpler as compared to other available solutions

    MAFC: Multi-Agent Fog Computing Model for Healthcare Critical Tasks Management

    Get PDF
    Producción CientíficaIn healthcare applications, numerous sensors and devices produce massive amounts of data which are the focus of critical tasks. Their management at the edge of the network can be done by Fog computing implementation. However, Fog Nodes suffer from lake of resources That could limit the time needed for final outcome/analytics. Fog Nodes could perform just a small number of tasks. A difficult decision concerns which tasks will perform locally by Fog Nodes. Each node should select such tasks carefully based on the current contextual information, for example, tasks’ priority, resource load, and resource availability. We suggest in this paper a Multi-Agent Fog Computing model for healthcare critical tasks management. The main role of the multi-agent system is mapping between three decision tables to optimize scheduling the critical tasks by assigning tasks with their priority, load in the network, and network resource availability. The first step is to decide whether a critical task can be processed locally; otherwise, the second step involves the sophisticated selection of the most suitable neighbor Fog Node to allocate it. If no Fog Node is capable of processing the task throughout the network, it is then sent to the Cloud facing the highest latency. We test the proposed scheme thoroughly, demonstrating its applicability and optimality at the edge of the network using iFogSim simulator and UTeM clinic data

    Cyber-Security Incidents: A Review Cases In Cyber-Physical Systems

    Get PDF
    Cyber-Physical Systems refer to systems that have an interaction between computers, communication channels and physical devices to solve a real-world problem. Towards industry 4.0 revolution, Cyber-Physical Systems currently become one of the main targets of hackers and any damage to them lead to high losses to a nation. According to valid resources, several cases reported involved security breaches on Cyber-Physical Systems. Understanding fundamental and theoretical concept of security in the digital world was discussed worldwide. Yet, security cases in regard to the cyber-physical system are still remaining less explored. In addition, limited tools were introduced to overcome security problems in Cyber-Physical System. To improve understanding and introduce a lot more security solutions for the cyber-physical system, the study on this matter is highly on demand. In this paper, we investigate the current threats on Cyber-Physical Systems and propose a classification and matrix for these threats, and conduct a simple statistical analysis of the collected data using a quantitative approach. We confirmed four components i.e., (the type of attack, impact, intention and incident categories) main contributor to threat taxonomy of Cyber-Physical System

    Smart healthcare system for severity prediction and critical tasks management of COVID-19 patients in IoT-fog computing environments

    Get PDF
    COVID-19 has depleted healthcare systems around the world. Extreme conditions must be defined as soon as possible so that services and treatment can be deployed and intensified. Many biomarkers are being investigated in order to track the patient's condition. Unfortunately, this may interfere with the symptoms of other diseases, making it more difficult for a specialist to diagnose or predict the severity level of the case. This research develops a Smart Healthcare System for Severity Prediction and Critical Tasks Management (SHSSP-CTM) for COVID-19 patients. On the one hand, a machine learning (ML) model is projected to predict the severity of COVID-19 disease. On the other hand, a multi-agent system is proposed to prioritize patients according to the seriousness of the COVID-19 condition and then provide complete network management from the edge to the cloud. Clinical data, including Internet of Medical Things (IoMT) sensors and Electronic Health Record (EHR) data of 78 patients from one hospital in the Wasit Governorate, Iraq, were used in this study. Different data sources are fused to generate new feature pattern. Also, data mining techniques such as normalization and feature selection are applied. Two models, specifically logistic regression (LR) and random forest (RF), are used as baseline severity predictive models. A multi-agent algorithm (MAA), consisting of a personal agent (PA) and fog node agent (FNA), is used to control the prioritization process of COVID-19 patients. The highest prediction result is achieved based on data fusion and selected features, where all examined classifiers observe a significant increase in accuracy. Furthermore, compared with state-of-the-art methods, the RF model showed a high and balanced prediction performance with 86% accuracy, 85.7% F-score, 87.2% precision, and 86% recall. In addition, as compared to the cloud, the MAA showed very significant performance where the resource usage was 66% in the proposed model and 34% in the traditional cloud, the delay was 19% in the proposed model and 81% in the cloud, and the consumed energy was 31% in proposed model and 69% in the cloud. The findings of this study will allow for the early detection of three severity cases, lowering mortality rates.Web of Science2022art. no. 501296

    Developing variable swimming technique skills among Iraqi schoolchildren during physical education courses

    No full text
    Variable education technology is now more prevalent in Iraq's higher education institutions, notably in physical education courses. The rise in the number of unwell people living in society stands out among the numerous unfavorable phenomena. Another is the decrease in physical activity brought on by technological development, which impacts people's capacity to improve their overall physical functionality and ability to develop their physical qualities. And physical health is the most valuable resource in any state, including Iraq. Thus it is crucial to find answers to the problems with physical education that affect students of all ages, especially young children. The project aims to develop and evaluate a method for teaching swimming to Iraqi kids in physical education classes while they are learning various skills. We selected several strategies to design a methodology for teaching swimming to Iraqi children in physical education classes. The approach used to categorize the study's results on the extent to which, among Iraqi students in the experimental and control groups, the essential physical features necessary for developing a variable capacity in teaching swimming had formed. The results were interpreted differently for each method.&nbsp

    Bio-inspired robotics enabled schemes in blockchain-fog-cloud assisted IoMT environment

    No full text
    Due to emerging developments in sports games, the usage of bio-ankle sensors has been growing progressively. Whereas, Internet of Medical Things (IoMT) is an emerging network that boosts bio-inspired sensors’ performances onto the fog-cloud network. However, a sequence of processes is required to complete the healthcare process for one sportsman. Therefore, workflow-enabled bio-inspired sensors tasks scheduled in IoMT postures different challenges. For instance, cost-efficient scheduling, security, and data validation in distributed hospitals to share their data. In this paper, we devise bio-inspired robotics-enabled schemes in the blockchain-fog-cloud-assisted IoMT environment. The goal is to minimize execution cost and blockchain of applications. Based on the proposed system, the study devises bio-inspired robotics function blockchain task scheduling (BIR-FBTS) schemes, determining the optimal assignment of tasks to the available nodes. The simulation results show that the proposed methods minimized 50% of the service cost and 40% of mined cost in the system compared to all existing bio-inspired healthcare systems
    corecore