Smart Home is indeed a broad concept which includes the techniques and systems applied to living spaces. While its main goal is to reduce the consumption of energy, it provides many benefits including living in comfor...
详细信息
ISBN:
(纸本)9789897581038
Smart Home is indeed a broad concept which includes the techniques and systems applied to living spaces. While its main goal is to reduce the consumption of energy, it provides many benefits including living in comfort, security and increasing flexibility. Smart homes are achieved through networking, control and automation technologies. Since smart homes offer more comfort and security and provide novel innovative services, people with disabilities or the elderly can take the advantages and improve their life quality. However, for such novel services, an analytical infrastructure which can manage overall data flow provided by various sensors, understand anomalous behaviour, and make necessary decisions. In this study, for efficient data handling and visualisation, an integrated smart service approach based on the use of a smart vest is proposed. The smart vest plays a key role in the proposed system since it provides the main health parameters of the monitored person to the smart home service and enables tracking of the monitored person's location. The proposed system offers many benefits to both people with disabilities and the elderly and their families in terms of increased efficiency of health care service and comfort for the monitored person. It can also reduce the cost of health care services by reducing the number of periodical visits.
This model considers the strategy that supplier offers retailer a full trade-credit policy whereas retailer offers their customers a partial trade-credit policy. For such assumption, retailer can earn more profits. In...
详细信息
This paper presents a novel approach of using a Wireless Sensor Network (WSN) as the communication means for Multi-Robot, Cooperative, Simultaneous Localization and Mapping (CSLAM) applications investigating the assoc...
详细信息
Cognitive Radio Technology has brought new insights to the problems of spectrum scarcity and inefficiency, in which spectrum holes are opportunistically accessed when the licensed users (primary users) are not using t...
详细信息
Cognitive Radio Technology has brought new insights to the problems of spectrum scarcity and inefficiency, in which spectrum holes are opportunistically accessed when the licensed users (primary users) are not using the frequencies that are assigned to those users. In this paper, we propose a multi-path route discovery algorithm for cognitive radio ad hoc networks (CRAHN) using algebraic connectivity. The employed routing mechanism takes into account the impact of the primary users on the non-licensed users (secondary users) in a way that the secondary users choose the paths which are less affected by the non-licensed users. With regard to proposed route discovery algorithm, data traffic congestions are tried to be avoided in the secondary network by reducing the number of all possible paths from source to destination. The results show that the devised method overcomes the technique of the route request (RREQ) message flooding between a source and a destination.
Nowadays, the emerging wireless communication technologies cause rapid growth in radio spectrum usage. However, the radio spectrum is a limited resource and has almost been fully assigned by the current network operat...
详细信息
Nowadays, the emerging wireless communication technologies cause rapid growth in radio spectrum usage. However, the radio spectrum is a limited resource and has almost been fully assigned by the current network operators (NOs). Although numerous studies have been accomplished on the spectrum management, there are rare evolutionary techniques dealing with booking spectrum on cognitive radio. Instant Overbooking Framework for Cognitive Radio networks (IOFCR) is used to maximize both spectrum utilization and the revenue of NOs under several over-booking and pricing policies. In such a network, when a primary user (PU) activity is sensed, the control of which requesting secondary users (SUs) can be denied and which Active SUs can be ejected is managed by IOFCR. In this paper, the Particle Swarm Optimization (PSO) algorithm is applied into the IOFCR to find optimal values of the over-booking price and the Compensation Cost (CC) ratio to optimize revenue and achieve high performance.
For every organization having a well secured network is the primary requirement to reach their goals. A network is said to be secure if it can protect itself from sophisticated attacks. Due to the rapid increase in th...
详细信息
For every organization having a well secured network is the primary requirement to reach their goals. A network is said to be secure if it can protect itself from sophisticated attacks. Due to the rapid increase in the number of network users, security becomes the main challenge in the area of network field. Most security related threats target the layers of the OSI reference model. Sophisticated attack types such as Distributed Denial of Service (DDoS), Man-in-the-Middle and IP spoofing attacks are used to attack these layers. In this paper, we analyze most of the attack types that cause serious problems in computer networks and defense techniques to stop or prevent these attacks.
This paper deals with a comparison between inventory followed by shortages model and shortages followed by inventory model with variable demand rate. It is assumed that the stock deteriorates over time which follows a...
详细信息
Background: Embryo selection procedure is one of the critical success factors in in vitro fertilization treatment. Various embryo selection technologies have emerged within the past decade. These technologies are eit...
详细信息
Background: Embryo selection procedure is one of the critical success factors in in vitro fertilization treatment. Various embryo selection technologies have emerged within the past decade. These technologies are either used in combination with morphology or introduced to replace the conventional morphological evaluation. This review aims at investigating the effect of these novel embryo selection technologies on in vitro fertilization success rates. Methods: A systematic review of the literature was performed among full-text English articles in the PubMed database. Study selection was based on the predefined inclusion and exclusion criteria. Clinical effectiveness of the selected studies was measured in terms of implantation, pregnancy, live birth, and multiple pregnancy rates. Results: Five studies were identified that fitted the inclusion criteria. In these studies, researchers used aneuploidy screening, metabolomic profiling, and time-lapse imaging analysis as the new technologies. Among these studies, the one that conducted a randomized controlled trial of a commercial time-lapse imaging system demonstrated significant improvement in implantation rate. Conclusion: Studies using emerging technologies for embryo assessment provide promising results in retrospective analysis. On the other hand, randomized controlled trial studies that test the efficacy of novel embryo selection techniques in clinical practice failed to demonstrate a consistent improvement in the resulting success rates. This review provides a snapshot of the most recent literature on embryo assessment and embryo selection studies. Our findings show that there is a lack of comparative measurements and analyses that are able to assess benefits of the novel technologies in the field of embryo selection.
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sen...
Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.
Emphysema is a chronic lung disease that causes breathlessness. HRCT is the reliable way of visual demonstration of emphysema in patients. The fact that dangerous and widespread nature of the disease require immediate...
详细信息
ISBN:
(纸本)9781467379120
Emphysema is a chronic lung disease that causes breathlessness. HRCT is the reliable way of visual demonstration of emphysema in patients. The fact that dangerous and widespread nature of the disease require immediate attention of a doctor with a good degree of specialized anatomical knowledge. This necessitates the development of computer-based automatic identification system. This study aims to investigate the deep learning solution for discriminating emphysema subtypes by using raw pixels of input HRCT images of lung. Convolutional Neural Network (CNN) is used as the deep learning method for experiments carried out in the Caffe deep learning framework. As a result, promising percentage of accuracy is obtained besides low processing time.
暂无评论