This paper describes the design and implementation of a system for controlling mouse pointer using non-verbal sounds such as whistling and humming. Two control modes have been implemented - an orthogonal mode (where t...
详细信息
Formation energy is one of the most important properties of a compound that is directly related to its stability. More negative the formation energy, the more stable the compound is likely to be. Here we describe the ...
详细信息
ISBN:
(纸本)9781509059119
Formation energy is one of the most important properties of a compound that is directly related to its stability. More negative the formation energy, the more stable the compound is likely to be. Here we describe the development and deployment of predictive models for formation energy, given the chemical composition of the material. The data-driven models described here are built using nearly 100,000 Density Functional Theory (DFT) calculations, which is a quantum mechanical simulation technique based on the electron density within the crystal structure of the material. These models are deployed in an online web-tool that takes a list of material compositions as input, generates over hundred composition-based attributes for each material and feeds them into the predictive models to obtain the predictions of formation energy. The online formation energy predictor is available at http://***/FEpredictor.
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Base...
详细信息
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Based on the relationships between pixels and their neighbors, we propose a reversible data embedding scheme to embed hidden messages into an original image. In our proposed scheme, a two-layer data embedding approach is used for our proposed data embedding phase. Layer-1 embedding is used to hide secret data. Layer-2 embedding, which is an embedding variant of the proposed layer-1 embedding, is used to hide side information, such as the parameters required to restore the marked image. In our layer-1 embedding, the value of an embedded pixel is determined according to a predetermined threshold and the relationship between the pixel and its neighbors. In our layer-2 embedding, the similar data embedding concept is expanded to the block-based. Experimental results provide supportive data to show that the proposed scheme can provide greater hiding capacity while preserving the image quality of a marked image in comparison with previous work.
Sophisticated cyber threats are seen on Online Social Networks (OSNs) social media accounts automated to imitate human behaviours has an impactful effect on distorting public thoughts and opinions. OSNs are weaponized...
Sophisticated cyber threats are seen on Online Social Networks (OSNs) social media accounts automated to imitate human behaviours has an impactful effect on distorting public thoughts and opinions. OSNs are weaponized to diffuse deception, misinformation, and malicious activities, that forms a serious threat to society. The deceptive nature of imitating human behaviour has become a challenging and crucial task to detect automated accounts (socialbots). This research, however, proposes a hybrid metaheuristic optimisation algorithm for socialbot detection. Specifically, a hybrid B-Hill Climbing (B-HC) optimisation algorithm works in tandem with a k-NN nearest neighbour classifier to accurately select a relevant feature subset. It is applied to be tested for fake followers account on Twitter data. Experimental results showed that the proposed method is better than the traditional and the latest feature selection techniques as well as the rule-set methods. The B-HC alongside with k-NN method achieved promising results using only relevant feature subset.
Coronary arterydisease(CAD)has become a significant causeof heart attack,especially amongthose 40yearsoldor *** is a need to develop new technologies andmethods to deal with this *** researchers have proposed image pr...
详细信息
Coronary arterydisease(CAD)has become a significant causeof heart attack,especially amongthose 40yearsoldor *** is a need to develop new technologies andmethods to deal with this *** researchers have proposed image processing-based solutions for CADdiagnosis,but achieving highly accurate results for angiogram segmentation is still a *** different types of angiograms are adopted for CAD *** paper proposes an approach for image segmentation using ConvolutionNeuralNetworks(CNN)for diagnosing coronary artery disease to achieve state-of-the-art *** have collected the 2D X-ray images from the hospital,and the proposed model has been applied to *** augmentation has been performed in this research as it’s the most significant task required to be initiated to increase the dataset’s ***,the images have been enhanced using noise removal techniques before being fed to the CNN model for segmentation to achieve high *** the output,different settings of the network architecture undoubtedly have achieved different accuracy,among which the highest accuracy of the model is 97.61%.Compared with the other models,these results have proven to be superior to this proposed method in achieving state-of-the-art results.
This paper presents a novel mechanism of cryptographic one-to-many reversible mapping between two domains and it's applications. One-to-many reversible mapping is a one-to-many mapping in which the relations can b...
详细信息
This paper presents a novel mechanism of cryptographic one-to-many reversible mapping between two domains and it's applications. One-to-many reversible mapping is a one-to-many mapping in which the relations can be reversible. Cryptographic one-to-many reversible mapping is that the development of one-to-many mapping is performed based on pseudorandom assignment of the subsets of the other set, such that it is difficult to find the many-to-one reversed relation, in which the assignment is done using cryptographic approach. The one-to-many mapping which generates pseudo-randomly has a high avalanche effect in order to cover the identity. The randomness test is measured in terms of uniformity based on mono-bit tests and avalanche effect based on Hamming distance test. The expected uniformity and avalanche effect value is about 50% of the bits changed has been achieved by using Cipher Feedback mode of Advanced Encryption Standard.
Information and Communication Technologies (ICTs) are utilized in an increasing number of museums and collection exhibitions world-wide. In this chapter, we present novel fully-automatic mobile assistant with indoor r...
详细信息
Nowadays, universities and companies have a huge need for simulation and modelling methodologies. In the particular case of traffic and transportation, making physical modifications to the real traffic networks could ...
详细信息
Nowadays, universities and companies have a huge need for simulation and modelling methodologies. In the particular case of traffic and transportation, making physical modifications to the real traffic networks could be highly expensive, dependent on political decisions and could be highly disruptive to the environment. However, while studying a specific domain or problem, analysing a problem through simulation may not be trivial and may need several simulation tools, hence raising interoperability issues. To overcome these problems, we propose an agent-directed transportation simulation platform, through the cloud, by means of services. We intend to use the IEEE standard HLA (High Level Architecture) for simulators interoperability and agents for controlling and coordination. Our motivations are to allow multiresolution analysis of complex domains, to allow experts to collaborate on the analysis of a common problem and to allow co-simulation and synergy of different application domains. This paper will start by presenting some preliminary background concepts to help better understand the scope of this work. After that, the results of a literature review is shown. Finally, the general architecture of a transportation simulation platform is proposed.
暂无评论