The development and the implementation of advanced actuation systems has increased in recent years, as many factors are driving the migration from hydraulic actuators to electromechanical actuators (EMAs) in aeronautics. But not only do... more
Lots of research has been carried out globally to design a machine classifier which could predict it from some physical and bio-medical parameters. In this work a hybrid machine learning classifier has been proposed to design an... more
This article describes how as network traffic grows, attacks on traffic become more complicated and harder to detect. Recently, researchers have begun to explore machine learning techniques with cloud computing technologies to classify... more
WSN as a new category of computer-based computing platforms and network structures is showing new applications in different areas such as environmental monitoring, health care and military applications. Although there are a lot of secure... more
According to WHO, there are 60-80 million infertile couples worldwide with the highest incidence in some regions of Sub-Saharan Africa. The social stigma of infertility weighs especially heavily on women, who bear the sole blame for... more
The explosive growth in the amount of data in the field of biology, education, environmental research, sensor network, stock market, weather forecasting and many more due to vast use of internet in distributed environment has generated an... more
While rare clinical events, by definition, occur infrequently in a population, the consequences of these events can be drastic. Unfortunately, developing risk stratification algorithms for these conditions requires large volumes of data... more
Considering both qualitative and quantitative aspects in the same modeling approach enhances coherency when analyzing concurrent system properties. Moreover, the impacts of changes related to functional and temporal features are generally... more
The challenges of the information society require frequent strategic reorientations that, in the context of the relational economy, emphasize the importance of IS/ICT in adapting to change, competitiveness, and economic sustainability.... more
Trust and reputation management represents a significant trend in tackling the emerging security problems in computer networks. The basic idea is to let machines rate each other and then use the aggregated ratings to derive trust scores.... more
In the present context, the term intelligence has marked the economic and social fields. The increase in computational power of the technologies, associated with the activities of the people and organizations, economic know-how... more
Meta-heuristics are of significant interest to decision-makers due to the capability of finding good solutions for complex problems within a reasonable amount of computational time. These methods are further known to perform according to... more
Each hydropower system incorporates with appropriate hydro turbine, and hydro governor unit. In the current work, an Automatic Generation Control (AGC) of two equal hydropower systems with Proportional-Integral-Derivative (PID) controller... more
This chapter deals with the problems occur in the welding under the consideration of many causes of defects such as cracking, distortion, porosity, inclusion and undercutting. Welding is very useful for every industry. It is used as a... more
Due to the rapid development of digital media, the work of researchers in all scientific disciplines has dramatically changed. The objective of this chapter is to give a brief overview of digital tools that can be used for action or... more
<p>An automated mammogram classification system using modified support vector machine</p>
Breast cancer remains a serious public health problem that results in the loss of lives among women. However, early detection of its signs increases treatment options and the likelihood of cure. Although mammography has been established... more
With the ability of MATLAB to run in the cloud environment the authors analyse a retinal image efficiently. A quick and on-the-fly image processing is the cause for leveraging the ability of Cloud with the classic computing power of... more
Trust and reputation management represents a significant trend in tackling the emerging security problems in computer networks. The basic idea is to let machines rate each other and then use the aggregated ratings to derive trust scores.... more
Harmony Search (HS) is a new meta-heuristic algorithm imitating the music improvisation process where musicians search for a better state of harmony. In this paper, a new improvisation scheme is proposed that explicitly uses a... more
The Cluster Head is selected on the basis of maximum number of nodes connected, thus several sensor nodes cannot reach any CH, even though they are in the transmission range. These nodes are called the isolated nodes. To solve this... more
The optimum use of coverage in wireless sensor networks (WSNs) is very important. The hierarchical routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy) is referred to as the basic algorithm of distributed clustering... more
Sensor nodes of Wireless Sensor Network WSN possess very limited power resources normally a battery and a solar cell could exist in some cases, which requires efficient usage of these resources to extend the network's lifetime.... more
Groundwater is the source of drinking water that needs to be maintained from pollution. Groundwater pollution is a major problem caused by human activities that are invaluable to human health. When high levels of organic and inorganic... more
Modeling interactions between agents and the Multi-Agent System (MAS) behavior based on role based collaboration among the participating agents are the key factors to design of effective MAS dynamics. In this paper, a High level Multi... more
The objective of this research paper is, to present the reliability measures of a model by representing an industrial system having three subsystems. Two of the subsystems have standby unit while the third one has n units in parallel... more
Cloud Learning Environments (CLEs) have recently emerged as a novel approach to learning, putting learners in the spotlight and providing them with the cloud-based tools for building their own learning environments according to their... more
Smishing attack is generally performed by sending a fake short message service (SMS) that contains a link of the malicious webpage or application. Smishing messages are the subclass of spam SMS and these are more harmful compared to spam... more
The evolution of Cellular automaton has proved to be very efficient in carrying out arbitrary information processing. A significant application lies in the theory and practice of finding a technique for unifying the information... more
Accounting research, like many other social science disciplines, has gradually moved from qualitative to quantitative research with an emphasis on the use of multiple evidence or methods in the conduct of research. This chapter explores... more
Abnormality detection plays an important role in many real-life applications. Retinal vessel segmentation algorithms are the critical components of circulatory blood vessel Analysis systems for detecting the various abnormalities in... more
Investigators search usually for any kind of events related directly to an investigation case to both limit the search space and propose new hypotheses about the suspect. Intrusion detection system (IDS) provide relevant information to... more
This chapter serves as a guideline for outlining the core characteristics of mixed methods research (MMR) and the various steps researchers undertake in order to conduct a research study. The purpose is to create a worksheet assisting the... more
This chapter focuses on key applications of metaheuristic techniques in the field of gene selection and classification of microarray data. The metaheuristic techniques are efficient in handling combinatorial optimization problems. In this... more
Due to limited energy resources, different design strategies have been proposed in order to achieve better energy efficiency in wireless sensor networks, and organizing sensor nodes into clusters and data aggregation are among such... more
Trust and reputation management represents a significant trend in tackling the emerging security problems in computer networks. The basic idea is to let machines rate each other and then use the aggregated ratings to derive trust scores.... more
The student project allocation problem is a well-known constraint satisfaction problem that involves assigning students to projects or supervisors based on a number of criteria. This study investigates the use of population-based... more
The development and the implementation of advanced actuation systems has increased in recent years, as many factors are driving the migration from hydraulic actuators to electromechanical actuators (EMAs) in aeronautics. But not only do... more
The explosive growth in the amount of data in the field of biology, education, environmental research, sensor network, stock market, weather forecasting and many more due to vast use of internet in distributed environment has generated an... more
Many real-word classification scenarios suffer a common drawback: missing, or incomplete, data. The ability of missing data handling has become a fundamental requirement for pattern classification because the absence of certain values for... more
Diabetes has affected over 246 million people worldwide and by 2025 it is expected to rise to over 380 million. With the rise of information technology and its continued advent into the medical and healthcare sector, different symptoms of... more
The findings of image segmentation reflects its expansive applications and existence in the field of digital image processing, so it has been addressed by many researchers in numerous disciplines. It has a crucial impact on the overall... more
Retinal image analysis plays an important part in identifying various eye related diseases such as diabetic retinopathy (DR), glaucoma and many others. Accurate segmentation of blood vessels plays an important part in identifying the... more
Optimization is an important fields of study in science where researchers seek to make the best and most practical decisions. Solving real optimization problems is an intractable issue which calls for generating an approximate using... more
Trust and reputation management represents a significant trend in tackling the emerging security problems in computer networks. The basic idea is to let machines rate each other and then use the aggregated ratings to derive trust scores.... more
The minimum interference frequency assignment problem (MI-FAP) plays an important role in cellular networks. MI-FAP is the problem of finding an assignment of a small number of frequencies to a large number of transceivers (TRXs) that... more
Reliability is a major concern in qualitative research. Most of the current research deals with finding the reliability of the data, but not much work is reported on how to improve the reliability of the unreliable data. This paper... more
While existing localization approaches mainly focus on enhancing the accuracy, particular attention has recently been given to reducing the localization algorithm implementation costs. To obtain a tradeoff between location accuracy and... more
In recent years, various heuristic algorithms based on natural phenomena and swarm behaviors were introduced to solve innumerable optimization problems. These optimization algorithms show better performance than conventional algorithms.... more