Topic Review
Requirements Engineering in OTF-Computing
The idea of On-The-Fly (OTF) Computing is to compose and provide software services ad hoc, based on requirement descriptions in natural language. Since non-technical users write  their software requirements themselves and in unrestricted natural language, deficits occur such as inaccuracy and incompleteness. These deficits are usually tackled by natural language processing methods, which have to face specific challenges in OTF Computing because maximum automation is the goal there. In the following, we present current automatic approaches for solving inaccuracies and incompleteness in natural language requirement descriptions.
  • 2.0K
  • 30 Oct 2020
Topic Review
Takagi–Sugeno Fuzzy-PI Controller Hardware
The intelligent system Field Programmable Gate Array (FPGA) is represented as Takagi--Sugeno Fuzzy-PI controller. The implementation uses a fully parallel strategy associated with a hybrid bit format scheme (fixed-point and floating-point). Two hardware designs are proposed; the first one uses a single clock cycle processing architecture, and the other uses a pipeline scheme. The bit accuracy was tested by simulation with a nonlinear control system of a robotic manipulator. The area, throughput, and dynamic power consumption of the implemented hardware are used to validate and compare the results of this proposal. The results achieved allow the use of the proposed hardware in applications with high-throughput, low-power, and ultra-low-latency requirements such as teleoperation of robot manipulators, tactile internet, or industry 4.0 automation, among others.
  • 937
  • 29 Oct 2020
Topic Review
Lightweight Proof of Game (LPoG)
Interoperability is widely adopted in the case of cross-departmental or specialization cases. As the human body demands multiple specialized and cross-disciplined medical experiments, interoperability of business entities like different departments, different specializations, the involvement of legal and government monitoring issues etc. are not sufficient to reduce the active medical cases. A patient-centric system with high capability to collect, retrieve, store or exchange data is the demand for present and future times. Such data-centric health processes would bring automated patient medication, or patient self-driven trusted and high satisfaction capabilities. However, data-centric processes are having a huge set of challenges such as security, technology, governance, adoption, deployment, integration etc. This work has explored the feasibility to integrate resource-constrained devices-based wearable kidney systems in the Industry 4.0 network and facilitates data collection, liquidity, storage, retrieval and exchange systems. Thereafter, a Healthcare 4.0 processes-based wearable kidney system is proposed that is having the blockchain technology advantages. Further, game theory-based consensus algorithms are proposed for resource-constrained devices in the kidney system. The overall system design would bring an example for the transition from the specialization or departmental-centric approach to data and patient-centric approach that would bring more transparency, trust and healthy practices in the healthcare sector. Results show a variation of 0.10 million GH/s to 0.18 million GH/s hash rate for the proposed approach. The chances of a majority attack in the proposed scheme are statistically proved to be minimum. Further Average Packet Delivery Rate (ADPR) lies between 95% to 97%, approximately, without the presence of outliers. In the presence of outliers, network performance decreases below 80% APDR (to a minimum of 41.3%) and this indicates that there are outliers present in the network. Simulation results show that the Average Throughput (AT) value lies between 120 Kbps to 250 Kbps.
  • 893
  • 29 Oct 2020
Topic Review
Semantic Search and SemSime
This paper presents SemSime, a semantic similarity method for searching over a setof digital resources previously annotated by means of concepts from a weighted reference ontology.It is based on a frequency approach for weighting the ontology, and refines both the user request and the annotations of the digital resources with rating scores. Such scores are High, Medium, and Low and, in the user request, indicate the preferences assigned by the user to each of the concepts representing the searching criteria whereas, in the annotations of the digital resources, they represent the levels of quality associated with each concept in describing the resources. The experiment we have performed shows that SemSime outperforms the previous semantic search method SemSim.
  • 594
  • 29 Oct 2020
Topic Review
Extreme values statistic
One of the pillars of experimental sciences is sampling. Based on analysis conducted on samples the estimations for the populations are made. The distributions are split in two main groups: continuous and discrete and the present study applies for the continuous ones. One of the challenges of the sampling is the accuracy of it, or, in other words how representative is the sample for the population from which was drawn. Another challenge, connected with this one, is the presence of the outliers - observations wrongly collected, not actually belonging to the population subjected to study. The present study proposes a statistic (and a test) intended to be used for any continuous distribution to detect the outliers, by constructing the confidence interval for the extreme value in the sample, at certain (preselected) risk of being in error, and depending on the sample size. The proposed statistic is operational for known distributions (having known their probability density function) and is dependent too on the statistical parameters of the population.
  • 1.2K
  • 29 Oct 2020
Topic Review
Digital Image Watermarking Techniques
Image authentication is an extremely significant concern for the digital revolution, as it is easy to alter any image. In the last few decades, it has been an urgent concern for researchers to ensure the authenticity of digital images. Based on the desired applications, several suitable watermarking techniques have been developed to mitigate this concern. However, it is tough to achieve a watermarking system that is simultaneously robust and secure. This paper gives details of standard watermarking system frameworks and lists some standard requirements that are used in designing watermarking techniques for several distinct applications. The current trends of digital image watermarking techniques are also reviewed to find state-of-the-art methods and their limitations. Some conventional attacks are discussed, and future research directions are given.
  • 3.9K
  • 29 Oct 2020
Topic Review
Facial Information for Healthcare Applications
The document is not limited to global face analysis but it also concentrates on methods related to local cues (e.g. the eyes). A research taxonomy is introduced by dividing the face in its main features: eyes, mouth, muscles, skin, and shape. For each facial feature, the computer vision-based tasks aiming at analyzing it and the related healthcare goals that could be pursued are detailed.
  • 799
  • 28 Oct 2020
Topic Review
Current Threat Landscape of Botnets
Botnets have been around for about three decades, and their sophistication and capabilities have evolved rapidly over the period. Originally simple codes that were used for the administration of IRC channels, botnets today pose very formidable threats to systems and network infrastructure. They have become one of the more-preferred options in the toolkit of hackers and cybercriminals; particularly due to their ability to subvert and overrun secure infrastructures within a relatively short time. Research has greatly advanced in trying to keep up with the rapid evolution of the botnet threat. At this time, it is important to review the status of the threat, vis-á-vis the extent of research that has emerged in relation to the threat. This is crucial for understanding the future prospects of the threat, in terms of where it is headed next; as well as what research areas require more work. This exploratory research serves this purpose. It introduces the botnet threat from its early origins; then it traverses the current status of botnets, and summarizes research efforts so far (highlighting some limitations of modern countermeasures). It further goes on to discuss the future trends of botnets and botnet research, before bringing it together to present the current threat landscape.
  • 922
  • 28 Oct 2020
Topic Review
Control-Based 4D Printing
Building on the recent progress of four-dimensional (4D) printing to produce dynamic structures, this study aimed to bring this technology to the next level by introducing control-based 4D printing to develop adaptive 4D-printed systems with highly versatile multi-disciplinary applications, including medicine, in the form of assisted soft robots, smart textiles as wearable electronics and other industries such as agriculture and microfluidics. This study introduced and analyzed adaptive 4D-printed systems with an advanced manufacturing approach for developing stimuli-responsive constructs that organically adapted to environmental dynamic situations and uncertainties as nature does. The adaptive 4D-printed systems incorporated synergic integration of three-dimensional (3D)-printed sensors into 4D-printing and control units, which could be assembled and programmed to transform their shapes based on the assigned tasks and environmental stimuli. This paper demonstrates the adaptivity of these systems via a combination of proprioceptive sensory feedback, modeling and controllers, as well as the challenges and future opportunities they present.
  • 1.0K
  • 28 Oct 2020
Topic Review
Authority-Based Conversation Tracking in Twitter
Twitter is undoubtedly one of the most widely used data sources to analyze human communication. The literature is full of examples where Twitter is accessed, and data are downloaded as the previous step to a more in-depth analysis in a wide variety of knowledge areas. Unfortunately, the extraction of relevant information from the opinions that users freely express in Twitter is complicated, both because of the volume generated—more than 6000 tweets per second—and the difficulties related to filtering out only what is pertinent to our research. Inspired by the fact that a large part of users use Twitter to communicate or receive political information, we created a method that allows for the monitoring of a set of users (which we will call authorities) and the tracking of the information published by them about an event. Our approach consists of dynamically and automatically monitoring the hottest topics among all the conversations where the authorities are involved, and retrieving the tweets in connection with those topics, filtering other conversations out. Although our case study involves the method being applied to the political discussions held during the Spanish general, local, and European elections of April/May 2019, the method is equally applicable to many other contexts, such as sporting events, marketing campaigns, or health crises.
  • 807
  • 28 Oct 2020
  • Page
  • of
  • 371
ScholarVision Creations