{"title":"Data Wipe-Off Technique for Tracking Weak GPS Signals","authors":"Dah-Jing Jwo, Sheng-Feng Chiu","doi":"10.32604/cmc.2022.020793","DOIUrl":"https://doi.org/10.32604/cmc.2022.020793","url":null,"abstract":": In this paper, the data wipe-off (DWO) algorithm is incorporated into the vector tracking loop of the Global Positioning System (GPS) receiver for improving signal tracking performance. The navigation data, which contains information that is necessary to perform navigation computations, are binary phase-shift keying (BPSK) modulated onto the GPS carrier phase with the bit duration of 20 ms ( i.e ., 50 bits per second). To continuously track the satellite’s signal in weak signal environment, the DWO algorithm on the basis of pre-detection method is adopted to detect data bit sign reversal every 20 ms. Tracking accuracy of a weak GPS signal is decreased by possible data bit sign reversal every 20 ms to the predetection integration time (PIT) or integration interval. To achieve better tracking performance in weak signal environment, the coherent integration interval can be extended. However, increase of the integration interval lead to decrease of the tracking accuracy by possible data bit sign reversal every 20 ms to the integration interval. When the integration interval of the correlator is extended over 20 ms in low C/No levels, the navigation DWO algorithm can be employed to avoid energy loss due to bit transitions. The method presented in this paper has an advantage to continuously estimate the navigation data bit and achieve improved tracking performance. Evaluation of the tracking performance based on the various integration intervals for the vector tracking loop of a GPS receiver will be presented.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"1992 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89020169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Autonomous Defense System Using Machine Learning on Edge Device","authors":"Jaehyuk Cho","doi":"10.32604/cmc.2022.020826","DOIUrl":"https://doi.org/10.32604/cmc.2022.020826","url":null,"abstract":": As a large amount of data needs to be processed and speed needs to be improved, edge computing with ultra-low latency and ultra-connectivity is emerging as a new paradigm. These changes can lead to new cyber risks, and should therefore be considered for a security threat model. To this end, we constructed an edge system to study security in two directions, hardware and software. First, on the hardware side, we want to autonomically defend against hardware attacks such as side channel attacks by configuring field programmable gate array (FPGA) which is suitable for edge computing and identifying communication status to control the communication method according to priority. In addition, on the software side, data collected on the server performs end-to-end encryption via symmetric encryption keys. Also, we modeled autonomous defense systems on the server by using machine learning which targets to incoming and outgoing logs. Server log utilizes existing intrusion detection datasets that should be used in real-world environ-ments. Server log was used to detect intrusion early by modeling an intrusion prevention system to identify behaviors that violate security policy, and to utilize the existing intrusion detection data set that should be used in a real environment. Through this, we designed an efficient autonomous defense system that can provide a stable system by detecting abnormal signals from the device and converting them to an effective method to control edge computing, and to detect and control abnormal intrusions on the server side.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"31 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90146174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sum Rate Maximization-based Fair Power Allocation in Downlink NOMA Networks","authors":"M. Abd-Elnaby","doi":"10.32604/cmc.2022.022020","DOIUrl":"https://doi.org/10.32604/cmc.2022.022020","url":null,"abstract":": Non-orthogonal multiple access (NOMA) has been seen as a promising technology for 5G communication. The performance optimization of NOMA systems depends on both power allocation (PA) and user pairing (UP). Most existing researches provide sub-optimal solutions with high computational complexity for PA problem and mainly focuses on maximizing the sum rate (capacity) without considering the fairness performance. Also, the joint optimization of PA and UP needs an exhaustive search. The main contribution of this paper is the proposing of a novel capacity maximization-based fair power allocation (CMFPA) with low-complexity in downlink NOMA. Extensive investigation and analysis of the joint impact of signal to noise ratio (SNR) per subcarrier and the channel gains of the paired users on the performance of NOMA in terms of the capacity and the user fairness is presented. Next, a closed-form equation for the power allocation coefficient of CMFPA as a function of SNR, and the channel gains of the paired users is provided. In addition, to jointly optimize UP and PA in NOMA systems an efficient low-complexity UP (ELCUP) method is proposed to be incorporated with the proposed CMFPA to compromise the proposed joint resource allocation (JRA). Simulation results demonstrate that the proposed CMFPA can improve the capacity and fairness performance of existing UP methods, such as conventional UP, and random UP methods. Furthermore, the simulation results show that the proposed JRA significantly outperforms the existing schemes and gives a near-optimal performance.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"29 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73481701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Kelechi, M. Alsharif, Chidumebi Agbaetuo, O. Ubadike, A. Aligbe, P. Uthansakul, R. Kannadasan, A. Aly
{"title":"Design of a Low-Cost Air Quality Monitoring System Using Arduino and ThingSpeak","authors":"A. Kelechi, M. Alsharif, Chidumebi Agbaetuo, O. Ubadike, A. Aligbe, P. Uthansakul, R. Kannadasan, A. Aly","doi":"10.32604/cmc.2022.019431","DOIUrl":"https://doi.org/10.32604/cmc.2022.019431","url":null,"abstract":"The impact of daily emissions of gaseous and particulate pollutants of machines and industries on human health and the environment has attracted increasing concerns. This impact has significantly led to a notable increase in mortality in the highly industrialized zones. Therefore, monitoring air quality and creating public awareness are important for a safer future, which led the governments globally to investmulti-billion in policymaking and solution stratification to address the problem. This study aims to design a realtime Internet of Things low-cost air quality monitoring system. The system utilizes air quality and carbon monoxide sensors for monitoring gaseous pollutants. Moreover, the system utilizes an Arduino Nano development board equipped with a WiFi module to effectively send readings to a ThingSpeak online channel platform for instantaneous and real-time display of air quality. The ThingSpeak uses HTTP protocols to send emails in raising awareness of poor air quality. The level of concentration is monitored graphically through channels with the help of ThingSpeak to aid remote communication.A threshold value is set. Thus, when pollutants have become unhealthy and harmful, the system trips off an alarm, and e-mail notifications are sent to the officials. The results have shown that the work was successfully implemented a design of a low-cost air quality monitoring system using Arduino and ThingSpeak, showing that an air quality system can be implemented using a low-cost technology, Arduino and ThingSpeak.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"33 10","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72448031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Continuous Tracking of GPS Signals with Data Wipe-Off Method","authors":"Dah-Jing Jwo, Kun-Chan Lee","doi":"10.32604/cmc.2022.023442","DOIUrl":"https://doi.org/10.32604/cmc.2022.023442","url":null,"abstract":": The decentralized pre-filter based vector tracking loop (VTL) configuration with data wipe-off (DWO) method of the Global Positioning System (GPS) receiver is proposed for performance enhancement. It is a challenging task to continuously track the satellites’ signals in weak signal environment for the GPS receiver. VTL is a very attractive technique as it can provide tracking capability in signal-challenged environments. In the VTL, each channel will not form a loop independently. On the contrary, the signals in the channels of VTL are shared with each other; the navigation processor in turn predicts the code phases. Thus, the receiver can successfully track signals even the signal strength from individual satellite is weak. The tracking loop based on the pre-filter provides more flexible adjustment to specific environments to reduce noise interference. Therefore, even if the signals from some satellites are very weak the receiver can track them from the navigation results based on the other satellites. The navigation data, which contains information necessary to perform navigation computations, are binary phase-shift keying (BPSK) modulated onto the GPS carrier phase with the bit duration of 20 ms (i.e., 50 bits per second) for the GPS L 1 C/A signals. The coherent integration interval can be extended for improved tracking performance in signal-challenged environment. However, tracking accuracy is decreased by possible data bit sign reversal. The DWO algorithm can be employed to remove the data bit in I and Q correlation values so as to avoid energy loss due to bit transitions when the integration interval of the correlator is extended over 20 ms under the low carrier-to-noise ratio (C/No) environments. The proposed method has an advantage to provide continuous tracking of signals and obtain improved navigation performance. Performance evaluation of the tracking capability as well as positioning accuracy will be presented.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"125 3","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72451862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Naveed, D. Baleanu, A. Raza, M. Rafiq, Atif Hassan Soori
{"title":"Treatment of Polio Delayed Epidemic Model via Computer Simulations","authors":"Muhammad Naveed, D. Baleanu, A. Raza, M. Rafiq, Atif Hassan Soori","doi":"10.32604/cmc.2022.020112","DOIUrl":"https://doi.org/10.32604/cmc.2022.020112","url":null,"abstract":": Through the study, the nonlinear delayed modelling has vital sig-nificance in the different field of allied sciences like computational biology, computational chemistry, computational physics, computational economics and many more. Polio is a contagious viral illness that in its most severe form causes nerve injury leading to paralysis, difficulty breathing and sometimes death. In recent years, developing regions like Asia, Africa and sub-continents facing a dreadful situation of poliovirus. That is the reason we focus on the treatment of the polio epidemic model with different delay strategies in this article. Polio delayed epidemic model is categorized into four compartments like susceptible, exposed, infective and vaccinated classes. The equilibria, positivity, boundedness, and reproduction number are investigated. Also, the sensitivity of the parameters is analyzed. Well, known results like the Routh Hurwitz criterion and Lyapunov function stabilities are investigated for polio delayed epidemic model in the sense of local and global respectively. Further-more, the computer simulations are presented with different traditions in the support of the analytical analysis of the polio delayed epidemic model.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"59 10","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72483678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nouh Sabri Elmitwally, Asma Kanwal, Sagheer Abbas, M. A. Khan, Muhammad Adnan Khan, Munir Ahmad, S. Alanazi
{"title":"Personality Detection Using Context Based Emotions in Cognitive Agents","authors":"Nouh Sabri Elmitwally, Asma Kanwal, Sagheer Abbas, M. A. Khan, Muhammad Adnan Khan, Munir Ahmad, S. Alanazi","doi":"10.32604/cmc.2022.021104","DOIUrl":"https://doi.org/10.32604/cmc.2022.021104","url":null,"abstract":": Detection of personality using emotions is a research domain in artificial intelligence. At present, some agents can keep the human’s profile for interaction and adapts themselves according to their preferences. However, the effective method for interaction is to detect the person’s personality by understanding the emotions and context of the subject. The idea behind adding personality in cognitive agents begins an attempt to maximize adaptability on the basis of behavior. In our daily life, humans socially interact with each other by analyzing the emotions and context of interaction from audio or visual input. This paper presents a conceptual personality model in cognitive agents that can determine personality and behavior based on some text input, using the context subjectivity of the given data and emotions obtained from a particular situation/context. The proposed work consists of Jumbo Chatbot, which can chat with humans. In this social interaction, the chatbot predicts human personality by understanding the emotions and context of interactive humans. Currently, the Jumbo chatbot is using the BFI technique to interact with a human. The accuracy of proposed work varies and improve through getting more experiences of interaction.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"112 ","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72495165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybridization of CNN with LBP for Classification of Melanoma Images","authors":"Saeed Iqbal, Adnan N. Qureshi, Ghulam Mustafa","doi":"10.32604/cmc.2022.023178","DOIUrl":"https://doi.org/10.32604/cmc.2022.023178","url":null,"abstract":"Skin cancer (melanoma) is one of the most aggressive of the cancers and the prevalence has significantly increased due to increased exposure to ultraviolet radiation. Therefore, timely detection and management of the lesion is a critical consideration in order to improve lifestyle and reduce mortality. To this end, we have designed, implemented and analyzed a hybrid approach entailing convolutional neural networks (CNN) and local binary patterns (LBP). The experiments have been performed on publicly accessible datasets ISIC 2017, 2018 and 2019 (HAM10000) with data augmentation for in-distribution generalization. As a novel contribution, the CNN architecture is enhanced with an intelligible layer, LBP, that extracts the pertinent visual patterns. Classification of Basal Cell Carcinoma, Actinic Keratosis, Melanoma and Squamous Cell Carcinoma has been evaluated on 8035 and 3494 cases for training and testing, respectively. Experimental outcomes with cross-validation depict a plausible performance with an average accuracy of 97.29%, sensitivity of 95.63% and specificity of 97.90%. Hence, the proposed approach can be used in research and clinical settings to provide second opinions, closely approximating experts’ intuition.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"47 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77937829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taher M. Ghazal, Sagheer Abbas, Sundus Munir, M. A. Khan, Munir Ahmad, Ghassan F. Issa, Syeda Binish Zahra, Muhammad Adnan Khan, Mohammad Kamrul Hasan
{"title":"Alzheimer Disease Detection Empowered with Transfer Learning","authors":"Taher M. Ghazal, Sagheer Abbas, Sundus Munir, M. A. Khan, Munir Ahmad, Ghassan F. Issa, Syeda Binish Zahra, Muhammad Adnan Khan, Mohammad Kamrul Hasan","doi":"10.32604/cmc.2022.020866","DOIUrl":"https://doi.org/10.32604/cmc.2022.020866","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"21 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80377244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}