ArrayPub Date : 2023-09-01DOI: 10.1016/j.array.2023.100320
Sunil Kumar Prabhakar, Dong-Ok Won
{"title":"Multiple robust approaches for EEG-based driving fatigue detection and classification","authors":"Sunil Kumar Prabhakar, Dong-Ok Won","doi":"10.1016/j.array.2023.100320","DOIUrl":"https://doi.org/10.1016/j.array.2023.100320","url":null,"abstract":"<div><p>Electroencephalography (EEG) signals are used to evaluate the activities of the brain. For the accidents occurring on the road, one of the primary reasons is driver fatigueness and it can be easily identified by the EEG. In this work, five efficient and robust approaches for the EEG-based driving fatigue detection and classification are proposed. In the first proposed strategy, the concept of Multi-Dimensional Scaling (MDS) and Singular Value Decomposition (SVD) are merged and then the Fuzzy C Means based Support Vector Regression (FCM-SVR) classification module is utilized to get the output. In the second proposed strategy, the Marginal Fisher Analysis (MFA) is implemented and the concepts of conditional feature mapping and cross domain transfer learning are implemented and classified with machine learning classifiers. In the third proposed strategy, the concepts of Flexible Analytic Wavelet Transform (FAWT) and Tunable Q Wavelet Transform (TQWT) are implemented and merged and then it is classified with Extreme Learning Machine (ELM), Kernel ELM and Adaptive Neuro Fuzzy Inference System (ANFIS) classifiers. In the fourth proposed strategy, the concepts of Correntropy spectral density and Lyapunov exponent with Rosenstein algorithm is implemented and then the multi distance signal level difference is computed followed by the calculation of the Geodesic minimum distance to the Riemannian means and finally tangent space mapping is implemented to it before feeding it to classification. In the fifth or final proposed strategy, the Hilbert Huang Transform (HHT) is implemented and then the Hilbert marginal spectrum is computed. Then using the Blackhole optimization algorithm, the features are selected and finally it is classified with Cascade Adaboost classifier. The proposed techniques are applied on publicly available EEG datasets and the best result of 99.13% is obtained when the proposed Correntropy spectral density and Lyapunov exponent with Rosenstein algorithm is implemented with the multi distance signal level difference followed by the calculation of the Geodesic minimum distance to the Riemannian means and finally tangent space mapping is implemented with Support Vector Machine (SVM) classifier.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49749362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-09-01DOI: 10.1016/j.array.2023.100311
Adnan
{"title":"Performance evaluation on work-stealing featured parallel programs on asymmetric performance multicore processors","authors":"Adnan","doi":"10.1016/j.array.2023.100311","DOIUrl":"https://doi.org/10.1016/j.array.2023.100311","url":null,"abstract":"<div><p>The speed difference between high-performance CPUs and energy-efficient CPUs, which are found in asymmetric performance multicore processors, affects the current form of Amdahl’s law equation. This paper proposes two updates to that equation based on the performance evaluation results of a simple parallel pi program written with OpenCilk. Performance evaluation was done by measuring execution time and instructions per cycle (IPC). The performance evaluation of the parallel program executed on the Intel Core i5 1240P processor did not indicate decreased performance due to asymmetric performance. Instead, the program with efficient work-stealing advantages from OpenCilk performed well. In the case of using the execution time of the P-CPU as a reference to obtain speedup, the evaluation results in a sublinear speedup. Conversely, in the case of using the execution time of the E-CPU as a reference, the evaluation results in a superlinear speedup. This paper proposes two updates to Amdahl’s law equation based on these two evaluation results.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49759091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A data security and privacy scheme for user quality of experience in a Mobile Edge Computing-based network","authors":"Miguel Landry Foko Sindjoung , Mthulisi Velempini , Clémentin Tayou Djamegni","doi":"10.1016/j.array.2023.100304","DOIUrl":"10.1016/j.array.2023.100304","url":null,"abstract":"<div><p>Cloud computing has widely been used for applications that require huge computational and data storage resources. Unfortunately, with the advent of new technologies such as fifth generation of cellular networks that provide new applications like IoT, cloud computing presents many limits among which the End-To-End (E2E) latency is the main challenge. These applications generally degrade scenarios that require low latency. Mobile Edge Computing (MEC) has been proposed to solve this issue. MEC brings computing and storage resources from cloud data center to edge data center, closer to end-user equipment to reduce the E2E latency for request processing. However, MEC is vulnerable to security, data privacy, and authentication that affect the end-user Quality of Experience (QoE). It is therefore fundamental that these challenges are addressed to avoid poor user experience due to the lack of security or data privacy. In this paper, we propose a hybrid cryptographic system that uses the symmetric and asymmetric cryptographic systems, to improve data security, privacy, and user authentication in a MEC-based network. We show that our proposed scheme is secured by validating it with the Automated Validation of Internet Security Protocol and Application tool. Simulation results show that our solution consumes less computing resources.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46594743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bleeding alert map (BAM): The identification method of the bleeding source in real organs using datasets made on mimicking organs","authors":"Maina Sogabe , Kaoru Ishikawa , Toshihiro Takamatsu , Koh Takeuchi , Takahiro Kanno , Koji Fujimoto , Tetsuro Miyazaki , Toshihiro Kawase , Toshihiko Sato , Kenji Kawashima","doi":"10.1016/j.array.2023.100308","DOIUrl":"10.1016/j.array.2023.100308","url":null,"abstract":"<div><p>In thoraco-laparoscopic surgery, the identification of a bleeding source is recognized as one of the most important issues with hemostasis during operation. However, previously proposed techniques are only capable of detecting an approximate bleeding region, not the precise location itself. To develop a system which can accurately localize a bleeding source, post-bleeding images and their corresponding bleeding source information may be required. However, to pinpoint bleeding sources from actual thoraco-laparoscopic surgery images is no easy task even for an experienced surgeon. In previous studies, a surgeon could only provide rectangular region information around a bleeding source. To address the problem, we have developed a mimicking device that simulates bleeding from a vessel on an artificial organ for obtaining bleeding images and precise bleeding source information at the same time. Using this information, we constructed a Generator that can associate a bleeding image with the corresponding bleeding source by using Pix2Pix and created a “bleeding alert map (BAM)” which concerns the Predicted intensity of bleeding source in the endoscopic view. The Generator successfully created BAMs from ex vivo lung bleeding images as well as actual organ bleeding images captured in thoracoscopic surgeries. The results showed that the BAM Generator constructed only by using the data from the mimicking device was effective in processing bleeding images from actual organs to identify bleeding sources. The proposed system may be utilized during endoscopic surgery to present a BAM which carries important information for hemostasis.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48382187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-09-01DOI: 10.1016/j.array.2023.100318
Wei Chen , Yuxuan Zhu , Zijian Tian CA , Fan Zhang , Minda Yao
{"title":"Occlusion and multi-scale pedestrian detection A review","authors":"Wei Chen , Yuxuan Zhu , Zijian Tian CA , Fan Zhang , Minda Yao","doi":"10.1016/j.array.2023.100318","DOIUrl":"10.1016/j.array.2023.100318","url":null,"abstract":"<div><p>Pedestrian detection has a wide range of application prospects in many fields such as unmanned driving, intelligent monitoring, robot, etc., and has always been a hot issue in the field of computer vision. In recent years, with the development of deep learning and the proposal of many large pedestrian data sets, pedestrian detection technology has also made great progress, and the detection accuracy and detection speed have been significantly improved. However, the performance of the most advanced pedestrian detection methods is still far behind that of human beings, especially when there is occlusion and scale change, the detection accuracy decreases significantly. Occlusion and scale problems are the key problems to be solved in pedestrian detection. The purpose of this paper is to discuss the research progress of pedestrian detection. Firstly, this paper explores the research status of pedestrian detection in the past four years (2019–2022), focuses on analyzing the occlusion and scale problems of pedestrian detection and corresponding solutions, summarizes the data sets and evaluation methods of pedestrian detection, and finally looks forward to the development trend of the occlusion and scale problems of pedestrian detection.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41910862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-09-01DOI: 10.1016/j.array.2023.100311
Adnan
{"title":"Performance evaluation on work-stealing featured parallel programs on asymmetric performance multicore processors","authors":"Adnan","doi":"10.1016/j.array.2023.100311","DOIUrl":"https://doi.org/10.1016/j.array.2023.100311","url":null,"abstract":"<div><p>The speed difference between high-performance CPUs and energy-efficient CPUs, which are found in asymmetric performance multicore processors, affects the current form of Amdahl’s law equation. This paper proposes two updates to that equation based on the performance evaluation results of a simple parallel pi program written with OpenCilk. Performance evaluation was done by measuring execution time and instructions per cycle (IPC). The performance evaluation of the parallel program executed on the Intel Core i5 1240P processor did not indicate decreased performance due to asymmetric performance. Instead, the program with efficient work-stealing advantages from OpenCilk performed well. In the case of using the execution time of the P-CPU as a reference to obtain speedup, the evaluation results in a sublinear speedup. Conversely, in the case of using the execution time of the E-CPU as a reference, the evaluation results in a superlinear speedup. This paper proposes two updates to Amdahl’s law equation based on these two evaluation results.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49817231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-09-01DOI: 10.1016/j.array.2023.100307
Palanivelu Saranya, Ekambaram Chandrasekaran
{"title":"Optimal inventory system for deteriorated goods with time-varying demand rate function and advertisement cost","authors":"Palanivelu Saranya, Ekambaram Chandrasekaran","doi":"10.1016/j.array.2023.100307","DOIUrl":"10.1016/j.array.2023.100307","url":null,"abstract":"<div><p>This research work presents a depleted demand inventory model with constant deterioration. The rate of change of demand is assumed to be a time-dependent function. Initial non-zero demand occurs due to advertisements. Advertisement cost is assumed to be constant. Two types of models are considered for two replenishment strategies viz., without shortages and with shortages. This study aims to obtain a suitable policy for replenishment for minimizing the total inventory cost. Four examples about the alterations made in the optimal solutions due to different values of independent parameters used in the models are considered and discussed. Sensitivity analysis is done and numerical illustrations are provided for validating the approach presented.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41906706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-09-01DOI: 10.1016/j.array.2023.100302
Theodoros Lampros , Konstantinos Kalafatakis , Nikolaos Giannakeas , Markos G. Tsipouras , Euripidis Glavas , Alexandros T. Tzallas
{"title":"An optimized hybrid methodology for non-invasive fetal electrocardiogram signal extraction and monitoring","authors":"Theodoros Lampros , Konstantinos Kalafatakis , Nikolaos Giannakeas , Markos G. Tsipouras , Euripidis Glavas , Alexandros T. Tzallas","doi":"10.1016/j.array.2023.100302","DOIUrl":"10.1016/j.array.2023.100302","url":null,"abstract":"<div><h3>Background and objective</h3><p>Electronic fetal heart monitoring is currently used during pregnancy throughout most of the developed world to detect risk conditions for both the mother and the fetus. Non-invasive fetal electrocardiogram (NI-fECG), recorded in the maternal abdomen, represents an alternative to cardiotocography, which could provide a more accurate estimate of fetal heart rate. Different methodologies, with varying advantages and disadvantages, have been developed for NI-fECG signal detection and processing.</p></div><div><h3>Methods</h3><p>In this context, we propose a hybrid methodology, combining independent component analysis, signal quality indices, empirical mode decomposition, wavelet thresholding and correlation analysis for NI-fECG optimized signal extraction, denoising, enhancement and addressing the intrinsic mode function selection problem.</p></div><div><h3>Results</h3><p>The methodology has been applied in four different datasets, and the obtained results indicate that our method can produce accurate fetal heart rate (FHR) estimations when tested against different datasets of variable quality and acquisition protocols, on the FECGDARHA dataset our method achieved average values of Sensitivity = 98.55%, Positive Predictive Value = 91.73%, F1 = 94.92%, Accuracy = 90.91%, while on the ARDNIFECG dataset it achieved average values of Sensitivity = 92.96%, Positive Predictive Value = 91.66%, F1 = 93.60%, Accuracy = 90.45%.</p></div><div><h3>Conclusions</h3><p>The proposed methodology is completely unsupervised, has been proven robust in different signal-to-noise ratio scenarios and abdominal signals, and could potentially be applied to the development of real-time fetal monitoring systems.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48525090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-07-01DOI: 10.1016/j.array.2023.100288
Alexandros Filotheou, Andreas L. Symeonidis, Georgios D. Sergiadis, Antonis G. Dimitriou
{"title":"Correspondenceless scan-to-map-scan matching of 2D panoramic range scans","authors":"Alexandros Filotheou, Andreas L. Symeonidis, Georgios D. Sergiadis, Antonis G. Dimitriou","doi":"10.1016/j.array.2023.100288","DOIUrl":"10.1016/j.array.2023.100288","url":null,"abstract":"<div><p>In this article a real-time method is proposed that reduces the pose estimate error for robots capable of motion on the 2D plane. The solution that the method provides addresses the recent introduction of low-cost panoramic range scanners (2D LIDAR range sensors whose field of view is 360<span><math><msup><mrow></mrow><mrow><mo>∘</mo></mrow></msup></math></span>), whose use in robot localisation induces elevated pose uncertainty due to their significantly increased measurement noise compared to prior, costlier sensors. The solution employs scan-to-map-scan matching and, in contrast to prior art, its novelty lies in that matching is performed without establishing correspondences between the two input scans; rather, the matching problem is solved in closed form by virtue of exploiting the periodicity of the input signals. The correspondence-free nature of the solution allows for dispensing with the calculation of correspondences between the input range scans, which (a) becomes non-trivial and more error-prone with increasing input noise, and (b) involves the setting of parameters whose output effects are sensitive to the parameters’ correct configuration, and which does not hold universal or predictive validity. The efficacy of the proposed method is illustrated through extensive experiments on public domain data and over various measurement noise levels exhibited by the aforementioned class of sensors. Through these experiments we show that the proposed method exhibits (a) lower pose errors compared to state of the art methods, and (b) more robust pose error reduction rates compared to those which are capable of real-time execution. The source code of its implementation is available for download.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45249262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ArrayPub Date : 2023-07-01DOI: 10.1016/j.array.2023.100290
Abdul Ahad , Zahra Ali , Abdul Mateen , Mohammad Tahir , Abdul Hannan , Nuno M. Garcia , Ivan Miguel Pires
{"title":"A Comprehensive review on 5G-based Smart Healthcare Network Security: Taxonomy, Issues, Solutions and Future research directions","authors":"Abdul Ahad , Zahra Ali , Abdul Mateen , Mohammad Tahir , Abdul Hannan , Nuno M. Garcia , Ivan Miguel Pires","doi":"10.1016/j.array.2023.100290","DOIUrl":"10.1016/j.array.2023.100290","url":null,"abstract":"<div><p>Healthcare is experiencing a fast change from a hospital-centric and specialist-focused model to one that is dispersed and patient-centric. Numerous technological advancements are driving this fast evolution of the healthcare sector. Communication technologies, among others, have permitted the delivery of customized and distant healthcare services. The present 4G networks and other wireless communication technologies are being utilized by the healthcare industry to create smart healthcare applications. These technologies are continuously evolving to meet the expectations and requirements of future smart healthcare applications. At the moment, current communication technologies are incapable of meeting the dynamic and complex demands of smart healthcare applications. Thus, the future 5G and beyond 5G networks are expected to support smart healthcare applications such as remote surgery, tactile internet and Brain-computer Interfaces. Future smart healthcare networks will combine IoT and advanced wireless communication technologies that will address current limitations related to coverage, network performance and security issues. This paper presents 5G-based smart healthcare architecture, key enabling technologies and a deep examination of the threats and solutions for maintaining the security and privacy of 5G-based smart healthcare networks.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42634701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}