ArrayPub Date : 2023-11-02DOI: 10.1016/j.array.2023.100328
Hui Chen , Zhengze Li , Xue Wang
{"title":"On International Chinese Education Index Ranking in a Global Perspective","authors":"Hui Chen , Zhengze Li , Xue Wang","doi":"10.1016/j.array.2023.100328","DOIUrl":"https://doi.org/10.1016/j.array.2023.100328","url":null,"abstract":"<div><p>The prominence of the Chinese language as a United Nations official language has sparked significant interest, leading to this research on international Chinese education (ICE). This study has a triple aim: firstly, to create indicators for monitoring ICE; secondly, to use these indicators to assess ICE development across nations; and thirdly, to highlight disparities and potential influencing factors for informed policy-making.</p><p>To facilitate indicator creation, we introduce an ICE index ranking system, evaluating 24 aspects grouped into three dimensions: Localization, Specialization, and Collaboration. These dimensions further categorize the 24 aspects into seven level-2 indicators, providing insights into global Chinese language education. After a thorough literature review and considering data availability, these indicators rank ICE in 153 countries.</p><p>For evaluation, we objectively assess indicators by assigning weights based on expert opinions. The results demonstrate that the categorized and ranked indicators offer valuable insights into global ICE development. Cluster analysis reveals diverse patterns of ICE development, with distinct areas requiring improvement across nations.</p><p>To illustrate further, we conduct a correlation analysis using an external dataset encompassing five main components: Economic Ties, Geographical Distance, Cultural Ties, Government Policies, and China's Image. The findings indicate that countries with strong economic ties to China tend to excel in all three ICE dimensions. Additionally, nations with higher numbers of tourists visiting China generally achieve higher ICE scores.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100328"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S259000562300053X/pdfft?md5=8abf86d9cf6a88e981240ff29925d406&pid=1-s2.0-S259000562300053X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138086810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-10-31DOI: 10.1016/j.array.2023.100325
Qin Shi , Yan Chen , Haoxiang Liang
{"title":"Real-time risk assessment of road vehicles based on inverse perspective mapping","authors":"Qin Shi , Yan Chen , Haoxiang Liang","doi":"10.1016/j.array.2023.100325","DOIUrl":"https://doi.org/10.1016/j.array.2023.100325","url":null,"abstract":"<div><p>Pan/Tilt/Zoom (PTZ) cameras play an important role in traffic scenes due to their wide monitoring fields and high flexibility. However, since the focal length and angle of PTZ cameras change irregularly with the monitoring needs, it is difficult to obtain accurate physical information about the real world from the image information of PTZ cameras. Aiming to address the need for real-time risk assessment of road vehicles in traffic monitoring scenarios, a vehicle position and velocity measurement scheme based on camera inverse perspective transformation is proposed, along with a method for real-time risk assessment based on the position and velocity. Specifically, Firstly, the vehicle target in the video is detected and tracked by deep learning YOLO detection algorithm and optical flow tracking algorithm. According to the obtained trajectory set, the vanishing points in the road direction are calculated by Cascade Hough Transform and the road marking lines are detected. Then, according to the vanishing point and marking line, the camera calibration task is accomplished via exploratory focal length. After camera calibration, the camera-to-road inverse perspective transformation is applied to project the image plane onto the road surface and obtain, the actual position information of vehicles. Finally, the vehicle speed measurement and real-time road risk assessment are achieved by calculating the average of instantaneous velocities across multiple frames. Simulation experiment results in a traffic monitoring scenario demonstrate that this perspective-based method for real-time road vehicle risk assessment achieves good stability and practicality, which meets the requirements for vehicle speed measurement and real-time road risk assessment.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100325"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000504/pdfft?md5=603e38f95b92deff16c80d0971d0ed44&pid=1-s2.0-S2590005623000504-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138086804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A CNN based multifaceted signal processing framework for heart rate proctoring using Millimeter wave radar ballistocardiography","authors":"Rafid Umayer Murshed , Md. Abrar Istiak , Md. Toufiqur Rahman , Zulqarnain Bin Ashraf , Md. Saheed Ullah , Mohammad Saquib","doi":"10.1016/j.array.2023.100327","DOIUrl":"https://doi.org/10.1016/j.array.2023.100327","url":null,"abstract":"<div><p>The recent pandemic has refocused the medical world’s attention on the diagnostic techniques associated with cardiovascular disease. Heart rate provides a real-time snapshot of cardiovascular health. A more precise heart rate reading enables a better understanding of cardiac muscle activity. Although many existing diagnostic techniques are approaching the limits of perfection, there remains potential for further development. In this paper, we propose MIBINET, a novel multifaceted approach for real-time proctoring of heart rate from <strong>M</strong>illimeter wave (mm-wave) radar ballistocardiography signals via inter-beat-interval (<strong>IBI</strong>) using a convolutional neural <strong>NET</strong>work (CNN). The central theme of our approach is to synergize the feature extraction capabilities of CNN with novel signal processing techniques, resulting in enhanced estimation accuracy while simultaneously reducing computational complexity. This proposed network can be used in hospitals, homes, and passenger vehicles due to its lightweight and contactless properties. It employs classical signal processing prior to fitting the data into the network. Although MIBINET is primarily designed to work on mm-wave signals, it is found equally effective on signals of various modalities such as PCG, ECG, and PPG. Our approach outperforms state-of-the-art techniques by more than 5% in inter-beat-interval (IBI) estimation accuracy. The architecture achieves a 98.73% correlation coefficient and a 20.69 ms Root-Mean-Square Error (RMSE) over 11 different test subjects. The paper contributes by being the first to apply CNN-based feature extraction in concert with unique signal processing strategies to mm-wave radar data for heart rate monitoring. Our methodology also introduces a synthetic IBI augmentation technique, custom loss function, and novel post-processing methods, all contributing to the robust performance of the model in various settings and modalities.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100327"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000528/pdfft?md5=1ee5b581501a206bfdef0f20bd9711c6&pid=1-s2.0-S2590005623000528-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138087190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient perturbation techniques for preserving privacy of multivariate sensitive data","authors":"Mahbubur Rahman, Mahit Kumar Paul, A.H.M. Sarowar Sattar","doi":"10.1016/j.array.2023.100324","DOIUrl":"https://doi.org/10.1016/j.array.2023.100324","url":null,"abstract":"<div><p>Cloud data is increasing significantly recently because of the advancement of technology which can contain individuals’ sensitive information, such as medical diagnostics reports. While deriving knowledge from such sensitive data, different third party can get their hands on this sensitive information. Therefore, privacy preservation of such sensitive data has become a vital issue. Data perturbation is one of the most often used data mining approaches for safeguarding privacy. A significant challenge in data perturbation is balancing the privacy and utility of data. Securing an individual’s privacy often entails the forfeiture of the data utility, and the contrary is true. Though there exist several approaches to deal with the trade-off between privacy and utility, researchers are always looking for new approaches. In order to address this critical issue, this paper proposes two data perturbation approaches namely NOS2R and NOS2R2. The proposed perturbation techniques are experimented with over ten benchmark UCI data set for analyzing privacy protection, information entropy, attack resistance, data utility, and classification error. The proposed approaches are compared with two existing approaches 3DRT and NRoReM. The thorough experimental analysis exhibits that the best-performing approach NOS2R2 offers 15.48% higher entropy and 15.53% more resistance against ICA attack compared to the best existing approach NRoReM. Furthermore, in terms of utility, the accuracy, f1-score, precision and recall of NOS2R2 perturbed data are 42.32%, 31.22%, 30.77% and 16.15% more close to the original data respectively than the NRoReM perturbed data.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100324"},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49750417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-10-05DOI: 10.1016/j.array.2023.100323
Mahyar Shahsavari , David Thomas , Marcel van Gerven , Andrew Brown , Wayne Luk
{"title":"Advancements in spiking neural network communication and synchronization techniques for event-driven neuromorphic systems","authors":"Mahyar Shahsavari , David Thomas , Marcel van Gerven , Andrew Brown , Wayne Luk","doi":"10.1016/j.array.2023.100323","DOIUrl":"https://doi.org/10.1016/j.array.2023.100323","url":null,"abstract":"<div><p>Neuromorphic event-driven systems emulate the computational mechanisms of the brain through the utilization of spiking neural networks (SNN). Neuromorphic systems serve two primary application domains: simulating neural information processing in neuroscience and acting as accelerators for cognitive computing in engineering applications. A distinguishing characteristic of neuromorphic systems is their asynchronous or event-driven nature, but even event-driven systems require some synchronous time management of the neuron populations to guarantee sufficient time for the proper delivery of spiking messages. In this study, we assess three distinct algorithms proposed for adding a synchronization capability to asynchronous event-driven compute systems. We run these algorithms on <em>POETS (Partially Ordered Event-Triggered Systems)</em>, a custom-built FPGA-based hardware platform, as a neuromorphic architecture. This study presents the simulation speed of SNNs of various sizes. We explore essential aspects of event-driven neuromorphic system design that contribute to efficient computation and communication. These aspects include varying degrees of connectivity, routing methods, mapping techniques onto hardware components, and firing rates. The hardware mapping and simulation of up to eight million neurons, where each neuron is connected to up to one thousand other neurons, are presented in this work using 3072 reconfigurable processing cores, each of which has 16 hardware threads. Using the best synchronization and communication methods, our architecture design demonstrates 20-fold and 16-fold speedups over the Brian simulator and one 48-chip SpiNNaker node, respectively. We conclude with a brief comparison between our platform and existing large-scale neuromorphic systems in terms of synchronization, routing, and communication methods, to guide the development of future event-driven neuromorphic systems.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100323"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49750415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-10-04DOI: 10.1016/j.array.2023.100322
Junqing Fan , Xiaorong Tian , Chengyao Lv , Simin Zhang , Yuewei Wang , Junfeng Zhang
{"title":"Extractive social media text summarization based on MFMMR-BertSum","authors":"Junqing Fan , Xiaorong Tian , Chengyao Lv , Simin Zhang , Yuewei Wang , Junfeng Zhang","doi":"10.1016/j.array.2023.100322","DOIUrl":"https://doi.org/10.1016/j.array.2023.100322","url":null,"abstract":"<div><p>The advancement of computer technology has led to an overwhelming amount of textual information, hindering the efficiency of knowledge intake. To address this issue, various text summarization techniques have been developed, including statistics, graph sorting, machine learning, and deep learning. However, the rich semantic features of text often interfere with the abstract effects and lack effective processing of redundant information. In this paper, we propose the Multi-Features Maximal Marginal Relevance BERT (MFMMR-BertSum) model for Extractive Summarization, which utilizes the pre-trained model BERT to tackle the text summarization task. The model incorporates a classification layer for extractive summarization. Additionally, the Maximal Marginal Relevance (MMR) component is utilized to remove information redundancy and optimize the summary results. The proposed method outperforms other sentence-level extractive summarization baseline methods on the CNN/DailyMail dataset, thus verifying its effectiveness.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100322"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49750419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-09-29DOI: 10.1016/j.array.2023.100321
Luciano Sánchez , Nahuel Costa , José Otero , David Anseán , Inés Couso
{"title":"Learning remaining useful life with incomplete health information: A case study on battery deterioration assessment","authors":"Luciano Sánchez , Nahuel Costa , José Otero , David Anseán , Inés Couso","doi":"10.1016/j.array.2023.100321","DOIUrl":"https://doi.org/10.1016/j.array.2023.100321","url":null,"abstract":"<div><p>This study proposes a method for developing equipment lifespan estimators that combine physical information and numerical data, both of which may be incomplete. Physical information may not have a uniform fit to all experimental data, and health information may only be available at the initial and final periods. To address these issues, a procedure is defined to adjust the model to different subsets of available data, constrained by feasible trajectories in the health status space. Additionally, a new health model for rechargeable lithium batteries is proposed, and a use case is presented to demonstrate its efficacy. The optimistic (max–max) strategy is found to be the most suitable for diagnosing battery lifetime, based on the results.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100321"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49765441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-09-01DOI: 10.1016/j.array.2023.100310
Abdelhak Imoussaten
{"title":"The study of the hyper-parameter modelling the decision rule of the cautious classifiers based on the Fβ measure","authors":"Abdelhak Imoussaten","doi":"10.1016/j.array.2023.100310","DOIUrl":"https://doi.org/10.1016/j.array.2023.100310","url":null,"abstract":"<div><p>In some sensitive domains where data imperfections are present, standard classification techniques reach their limits. To avoid misclassifications that have serious consequences, recent works propose cautious classification algorithms to handle this problem. Despite of the presence of uncertainty and/or imprecision, a point prediction classifier is forced to bet on a single class. While a cautious classifier proposes the appropriate subset of candidate classes that can be assigned to the sample in the presence of imperfect information. On the other hand, cautiousness should not be at the expense of precision and a trade-off has to be made between these two criteria. Among the existing cautious classifiers, two classifiers propose to manage this trade-off in the decision step by the mean of a parametrized objective function. The first one is the non-deterministic classifier (ndc) proposed within the framework of probability theory and the second one is “evidential classifier based on imprecise relabelling” (eclair) proposed within the framework of belief functions. The theoretical aim of the mentioned hyper-parameters is to control the size of predictions for both classifiers. This paper proposes to study this hyper-parameter in order to select the “best” value in a classification task. First the utility for each candidate subset is studied related to the values of the hyper-parameter and some thresholds are proposed to control the size of the predictions. Then two illustrations are proposed where a method to choose this hyper-parameters based on the calibration data is proposed. The first illustration concerns randomly generated data and the second one concerns the images data of fashion mnist. These illustrations show how to control the size of the predictions and give a comparison between the performances of the two classifiers for a tuning based on our proposition and the one based on grid search method.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"19 ","pages":"Article 100310"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49749466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-09-01DOI: 10.1016/j.array.2023.100319
Siwar Jendoubi, Aurélien Baelde, Thong Tran
{"title":"SSFuzzyART: A Semi-Supervised Fuzzy ART through seeding initialization and a clustered data generation algorithm to deeply study clustering solutions","authors":"Siwar Jendoubi, Aurélien Baelde, Thong Tran","doi":"10.1016/j.array.2023.100319","DOIUrl":"https://doi.org/10.1016/j.array.2023.100319","url":null,"abstract":"<div><p>Semi-supervised clustering is a machine learning technique that was introduced to boost clustering performance when labeled data is available. Indeed, some labeled data are usually available in real use cases, and can be used to initialize the clustering process to guide it and to make it more efficient. Fuzzy ART is a clustering technique that is proved to be efficient in several real cases, but as an unsupervised algorithm, it cannot use available labeled data. This paper introduces a semi-supervised variant of the FuzzyART clustering algorithm (SSFuzzyART). The proposed solution uses the available labeled data to initialize clusters centers. In another hand, to deeply evaluate the characteristics of the proposed algorithm, a clustered binary data generation algorithm with controlled partitioning is also introduced in this paper. Indeed, the controlled generated clusters allows studying the characteristics of the proposed SSFuzzyART. Furthermore, a set of experiments is carried out on some available benchmarks. SSFuzzyART demonstrated better clustering prediction results than its classic counterpart.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"19 ","pages":"Article 100319"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49749623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-09-01DOI: 10.1016/j.array.2023.100311
Adnan
{"title":"Performance evaluation on work-stealing featured parallel programs on asymmetric performance multicore processors","authors":"Adnan","doi":"10.1016/j.array.2023.100311","DOIUrl":"https://doi.org/10.1016/j.array.2023.100311","url":null,"abstract":"<div><p>The speed difference between high-performance CPUs and energy-efficient CPUs, which are found in asymmetric performance multicore processors, affects the current form of Amdahl’s law equation. This paper proposes two updates to that equation based on the performance evaluation results of a simple parallel pi program written with OpenCilk. Performance evaluation was done by measuring execution time and instructions per cycle (IPC). The performance evaluation of the parallel program executed on the Intel Core i5 1240P processor did not indicate decreased performance due to asymmetric performance. Instead, the program with efficient work-stealing advantages from OpenCilk performed well. In the case of using the execution time of the P-CPU as a reference to obtain speedup, the evaluation results in a sublinear speedup. Conversely, in the case of using the execution time of the E-CPU as a reference, the evaluation results in a superlinear speedup. This paper proposes two updates to Amdahl’s law equation based on these two evaluation results.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"19 ","pages":"Article 100311"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49759091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}