In this paper, we introduce the AAPF* algorithm, an innovative approach that synergistically integrates the A-star search algorithm (A*) with the artificial potential field (APF) method. This algorithm is designed to enhance safety and ensure …
Robotics is a vast and growing area in academia and industry, and it is used to solve human problems through artificial intelligent machines. To solve crucial issues or problems such as the survivability of humans in mining, living in Antarctica …
The software requirement selection problem endeavors to ascertain the optimal set of software requirements with the dual objectives of minimizing software cost and maximizing customer satisfaction. The intricate nature of this problem stems from …
verfasst von:
Bo Liu, Guo Zhou, Yongquan Zhou, Qifang Luo, Yuanfei Wei
Schizophrenia is a chronic mental illness that can negatively affect emotions, thoughts, social interaction, motor behavior, attention, and perception. Early diagnosis is still challenging and is based on the disease’s symptoms. However …
verfasst von:
Zeynep Garip, Ekin Ekinci, Kasım Serbest, Süleyman Eken
Malware remains a persistent threat to industrial operations, causing disruptions and financial losses. Traditional malware detection approaches struggle with the increasing complexity of false positives and negatives. However, existing Intrusion …
verfasst von:
P. L. S. Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti
Aiming at binary classification of highly imbalanced data, this paper proposes a novel twin-hypersphere method with conformal transformation. To provide favorable environments that the hyperspheres can search the region containing the majority …
First-Person Shooter (FPS) games are among the most popular latency-sensitive multiplayer online games. A separate game server manages each multiplayer group hosted appropriately to meet the given Quality of Service (QoS) and Quality of Experience …
verfasst von:
Amira-Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta, Atidel B. Hadj-Alouane
Authenticated encryption with associated data (AEAD) has become prominent over time because it offers authenticity and confidentiality simultaneously. In 2018, the National Institute of Standards and Technology (NIST) initiated a competition to …
verfasst von:
Jia-Lin Chan, Wai-Kong Lee, Denis C. -K. Wong, Wun-She Yap, Boon-Yaik Ooi, Bok-Min Goi
In the evolving landscape of Open Radio Access Networks (Open RAN), the dynamic and unpredictable nature of network conditions presents significant challenges for traditional spectrum allocation strategies. This paper introduces an innovative …
The early and accurate diagnosis of brain tumors is critical for effective treatment planning, with Magnetic Resonance Imaging (MRI) serving as a key tool in the non-invasive examination of such conditions. Despite the advancements in …
verfasst von:
Ishak Pacal, Omer Celik, Bilal Bayram, Antonio Cunha
The need for intelligence in today’s era has tremendously increased the demand for Internet of Things (IoT) devices implanted to collect and process diverse data. Cloud computing offers a plethora of services to computationally constrained …
In recent years, the incorporation of sensing technology into residential buildings has given rise to the concept of ”smart buildings”, aimed at enhancing resident comfort. These buildings are typically part of interconnected neighborhoods sharing …
verfasst von:
Hassan Harb, Mohamad Hijazi, Mohamed-El-Amine Brahmia, Ali Kadhum Idrees, Mouhammad AlAkkoumi, Ali Jaber, Abdelhafid Abouaissa
Software defect prediction is a crucial discipline within the software development life cycle. Accurate identification of defective modules in software can result in time and cost savings for developers. The ELM algorithm offers the benefits of …
verfasst von:
Yu Tang, Qi Dai, Mengyuan Yang, Lifang Chen, Ye Du
In recent years, fog computing has become a promising technology that supports computationally intensive and time-sensitive applications, especially when dealing with Internet of Things (IoT) devices with limited processing capability. In this …
Business Intelligence is the key technologies that ensures effective decision making through extracting relevant information and providing adapted systems as the Data Warehouses. To access decisional information, the decision maker should express …
verfasst von:
Rahma Djiroun, Meriem Amel Guessoum, Kamel Boukhalfa, El hadj Benkhelifa
The Internet of Things (IoT), the convergence of blockchain and deep learning (DL) technologies presents exciting opportunities for innovation. The integration of a secured IoT architecture with a blockchain framework and DL technology offers a …
The internet of things (IoT) represents a transformable breakthrough in the domain of intelligent devices, enabling essential functions such as data collection, management, and efficient storage. It has the potential to drive significant progress …
verfasst von:
Abdullah Aljumah, Tariq Ahamed Ahanger, Imdad Ullah
Virtual machine placement (VMP) has a significant importance with respect to resource utilization in cloud data centers. Indeed, the optimized management of machine placement usually results in a significant reduction in energy consumption. VMP is …
Density peaks clustering (DPC) algorithm has attracted the attention of scholars because of its simplicity and efficiency. However, it certainly has some disadvantages. On the one hand, the cut-off distance of DPC is artificially set, which …
Scientific workflows are essential for many applications, enabling the configuration and execution of complex tasks across distributed resources. In this paper, we contribute an Ethereum blockchain-based scientific workflow execution manager …