Search results

1 – 10 of 20
Open Access
Article
Publication date: 1 February 2018

Xuhui Ye, Gongping Wu, Fei Fan, XiangYang Peng and Ke Wang

An accurate detection of overhead ground wire under open surroundings with varying illumination is the premise of reliable line grasping with the off-line arm when the inspection…

1243

Abstract

Purpose

An accurate detection of overhead ground wire under open surroundings with varying illumination is the premise of reliable line grasping with the off-line arm when the inspection robot cross obstacle automatically. This paper aims to propose an improved approach which is called adaptive homomorphic filter and supervised learning (AHSL) for overhead ground wire detection.

Design/methodology/approach

First, to decrease the influence of the varying illumination caused by the open work environment of the inspection robot, the adaptive homomorphic filter is introduced to compensation the changing illumination. Second, to represent ground wire more effectively and to extract more powerful and discriminative information for building a binary classifier, the global and local features fusion method followed by supervised learning method support vector machine is proposed.

Findings

Experiment results on two self-built testing data sets A and B which contain relative older ground wires and relative newer ground wire and on the field ground wires show that the use of the adaptive homomorphic filter and global and local feature fusion method can improve the detection accuracy of the ground wire effectively. The result of the proposed method lays a solid foundation for inspection robot grasping the ground wire by visual servo.

Originality/value

This method AHSL has achieved 80.8 per cent detection accuracy on data set A which contains relative older ground wires and 85.3 per cent detection accuracy on data set B which contains relative newer ground wires, and the field experiment shows that the robot can detect the ground wire accurately. The performance achieved by proposed method is the state of the art under open environment with varying illumination.

Article
Publication date: 4 May 2022

Dhanya Pramod

This study explores privacy challenges in recommender systems (RSs) and how they have leveraged privacy-preserving technology for risk mitigation. The study also elucidates the…

Abstract

Purpose

This study explores privacy challenges in recommender systems (RSs) and how they have leveraged privacy-preserving technology for risk mitigation. The study also elucidates the extent of adopting privacy-preserving RSs and postulates the future direction of research in RS security.

Design/methodology/approach

The study gathered articles from well-known databases such as SCOPUS, Web of Science and Google scholar. A systematic literature review using PRISMA was carried out on the 41 papers that are shortlisted for study. Two research questions were framed to carry out the review.

Findings

It is evident from this study that privacy issues in the RS have been addressed with various techniques. However, many more challenges are expected while leveraging technology advancements for fine-tuning recommenders, and a research agenda has been devised by postulating future directions.

Originality/value

The study unveils a new comprehensive perspective regarding privacy preservation in recommenders. There is no promising study found that gathers techniques used for privacy protection. The study summarizes the research agenda, and it will be a good reference article for those who develop privacy-preserving RSs.

Details

Data Technologies and Applications, vol. 57 no. 1
Type: Research Article
ISSN: 2514-9288

Keywords

Article
Publication date: 24 August 2021

K. Sujatha and V. Udayarani

The purpose of this paper is to improve the privacy in healthcare datasets that hold sensitive information. Putting a stop to privacy divulgence and bestowing relevant information…

Abstract

Purpose

The purpose of this paper is to improve the privacy in healthcare datasets that hold sensitive information. Putting a stop to privacy divulgence and bestowing relevant information to legitimate users are at the same time said to be of differing goals. Also, the swift evolution of big data has put forward considerable ease to all chores of life. As far as the big data era is concerned, propagation and information sharing are said to be the two main facets. Despite several research works performed on these aspects, with the incremental nature of data, the likelihood of privacy leakage is also substantially expanded through various benefits availed of big data. Hence, safeguarding data privacy in a complicated environment has become a major setback.

Design/methodology/approach

In this study, a method called deep restricted additive homomorphic ElGamal privacy preservation (DR-AHEPP) to preserve the privacy of data even in case of incremental data is proposed. An entropy-based differential privacy quasi identification and DR-AHEPP algorithms are designed, respectively, for obtaining privacy-preserved minimum falsified quasi-identifier set and computationally efficient privacy-preserved data.

Findings

Analysis results using Diabetes 130-US hospitals illustrate that the proposed DR-AHEPP method is more significant in preserving privacy on incremental data than existing methods. A comparative analysis of state-of-the-art works with the objective to minimize information loss, false positive rate and execution time with higher accuracy is calibrated.

Originality/value

The paper provides better performance using Diabetes 130-US hospitals for achieving high accuracy, low information loss and false positive rate. The result illustrates that the proposed method increases the accuracy by 4% and reduces the false positive rate and information loss by 25 and 35%, respectively, as compared to state-of-the-art works.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 15 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 1 June 2004

Vladimir Brajović and Takeo Kanade

When a sensor device is packaged together with a CPU, it is called a “smart sensor.” The sensors really become smart when the tight integration of sensing and processing results…

Abstract

When a sensor device is packaged together with a CPU, it is called a “smart sensor.” The sensors really become smart when the tight integration of sensing and processing results in an adaptive sensing system that can react to environmental conditions and consistently deliver useful measurements to a robotic system even under the harshest of the conditions. We illustrate this point with an example from our recent work on illumination‐adaptive algorithm for dynamic range compression that is well suited for an on‐chip implementation resulting in a truly smart image sensor. Our method decides on the tonal mapping for each pixel based on the signal content in pixel's local neighborhood.

Details

Sensor Review, vol. 24 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 11 October 2023

Radha Subramanyam, Y. Adline Jancy and P. Nagabushanam

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…

Abstract

Purpose

Cross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in wireless sensor network (WSN) and Internet of Things (IoT) applications. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes. Game theory optimization for distributed may increase the network performance. The purpose of this study is to survey the various operations that can be carried out using distributive and adaptive MAC protocol. Hill climbing distributed MAC does not need a central coordination system and location-based transmission with neighbor awareness reduces transmission power.

Design/methodology/approach

Distributed MAC in wireless networks is used to address the challenges like network lifetime, reduced energy consumption and for improving delay performance. In this paper, a survey is made on various cooperative communications in MAC protocols, optimization techniques used to improve MAC performance in various applications and mathematical approaches involved in game theory optimization for MAC protocol.

Findings

Spatial reuse of channel improved by 3%–29%, and multichannel improves throughput by 8% using distributed MAC protocol. Nash equilibrium is found to perform well, which focuses on energy utility in the network by individual players. Fuzzy logic improves channel selection by 17% and secondary users’ involvement by 8%. Cross-layer approach in MAC layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data transmissions in WSN and IoT applications. Cross-layer and cooperative communication give energy savings of 27% and reduces hop distance by 4.7%. Choosing the correct objective function in Nash equilibrium for game theory will address fairness index and resource allocation to the nodes.

Research limitations/implications

Other optimization techniques can be applied for WSN to analyze the performance.

Practical implications

Game theory optimization for distributed may increase the network performance. Optimal cuckoo search improves throughput by 90% and reduces delay by 91%. Stochastic approaches detect 80% attacks even in 90% malicious nodes.

Social implications

Channel allocations in centralized or static manner must be based on traffic demands whether dynamic traffic or fluctuated traffic. Usage of multimedia devices also increased which in turn increased the demand for high throughput. Cochannel interference keep on changing or mitigations occur which can be handled by proper resource allocations. Network survival is by efficient usage of valid patis in the network by avoiding transmission failures and time slots’ effective usage.

Originality/value

Literature survey is carried out to find the methods which give better performance.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 November 2019

Diana Andrushia, N. Anand and Prince Arulraj

Health monitoring of concrete is one of the important tasks in the structural health monitoring. The life of any infrastructure relies on the quality of the concrete. The computer…

Abstract

Purpose

Health monitoring of concrete is one of the important tasks in the structural health monitoring. The life of any infrastructure relies on the quality of the concrete. The computer vision-based methods are very useful to identify the structural defects. The identification of minor cracks in the noisy concrete image is complex. The purpose of this paper is to denoise the concrete crack images and also segment the cracks.

Design/methodology/approach

The novelty of the proposed work lies on the usage of anisotropic diffusion filter in the noisy concrete images. Initially anisotropic diffusion filter is applied to smoothen the concrete images. Adaptive threshold and gray level-based edge stopping constant are used in the diffusion process. The statistical six sigma-based method is utilized to segment the cracks from smoothened concrete images.

Findings

The proposed method is compared with five state-of-the-art-methods with the performance metrics of mean square error, peak signal to noise ratio and mean structural similarity. The experimental results highlight the advantages of the proposed method.

Originality/value

The novelty of the proposed work lies on the usage of anisotropic diffusion filter in the noisy concrete images. This research work gives the scope for structural damage evaluation by the automation techniques.

Details

International Journal of Structural Integrity, vol. 11 no. 3
Type: Research Article
ISSN: 1757-9864

Keywords

Article
Publication date: 5 July 2011

Weishi Chen, Qunyu Xu, Huansheng Ning, Taosheng Wang and Jing Li

Foreign object debris (FOD) poses a significant hazard to aviation safety and brings huge economic losses to the aerospace industry due to aircraft damage and out‐of‐service…

1294

Abstract

Purpose

Foreign object debris (FOD) poses a significant hazard to aviation safety and brings huge economic losses to the aerospace industry due to aircraft damage and out‐of‐service delays. Different schemes and sensors have been utilized for FOD detection. This paper aims to look into a video‐based FOD detection system for airport runway security and propose a scheme for FOD surveillance network establishment.

Design/methodology/approach

The FOD detection algorithm for the system is analyzed in detail, including four steps of pre‐processing, background subtraction, post‐processing and FOD location.

Findings

The overall algorithm is applied to two sets of live video images. The results show that the algorithm is effective for FOD targets of different shades under different lighting conditions. The proposed system is also evaluated by the ground‐truth data collected at Nanyang Airport.

Practical implications

The runway security can be greatly increased by designing an affordable video‐based FOD detection system.

Originality/value

The paper presents critical techniques of video‐based FOD detection system. The scheme for FOD surveillance network, as a significant part of aviation risk management at airports, is applicable and extensible.

Details

Aircraft Engineering and Aerospace Technology, vol. 83 no. 4
Type: Research Article
ISSN: 0002-2667

Keywords

Article
Publication date: 24 March 2022

Elavaar Kuzhali S. and Pushpa M.K.

COVID-19 has occurred in more than 150 countries and causes a huge impact on the health of many people. The main purpose of this work is, COVID-19 has occurred in more than 150…

Abstract

Purpose

COVID-19 has occurred in more than 150 countries and causes a huge impact on the health of many people. The main purpose of this work is, COVID-19 has occurred in more than 150 countries and causes a huge impact on the health of many people. The COVID-19 diagnosis is required to detect at the beginning stage and special attention should be given to them. The fastest way to detect the COVID-19 infected patients is detecting through radiology and radiography images. The few early studies describe the particular abnormalities of the infected patients in the chest radiograms. Even though some of the challenges occur in concluding the viral infection traces in X-ray images, the convolutional neural network (CNN) can determine the patterns of data between the normal and infected X-rays that increase the detection rate. Therefore, the researchers are focusing on developing a deep learning-based detection model.

Design/methodology/approach

The main intention of this proposal is to develop the enhanced lung segmentation and classification of diagnosing the COVID-19. The main processes of the proposed model are image pre-processing, lung segmentation and deep classification. Initially, the image enhancement is performed by contrast enhancement and filtering approaches. Once the image is pre-processed, the optimal lung segmentation is done by the adaptive fuzzy-based region growing (AFRG) technique, in which the constant function for fusion is optimized by the modified deer hunting optimization algorithm (M-DHOA). Further, a well-performing deep learning algorithm termed adaptive CNN (A-CNN) is adopted for performing the classification, in which the hidden neurons are tuned by the proposed DHOA to enhance the detection accuracy. The simulation results illustrate that the proposed model has more possibilities to increase the COVID-19 testing methods on the publicly available data sets.

Findings

From the experimental analysis, the accuracy of the proposed M-DHOA–CNN was 5.84%, 5.23%, 6.25% and 8.33% superior to recurrent neural network, neural networks, support vector machine and K-nearest neighbor, respectively. Thus, the segmentation and classification performance of the developed COVID-19 diagnosis by AFRG and A-CNN has outperformed the existing techniques.

Originality/value

This paper adopts the latest optimization algorithm called M-DHOA to improve the performance of lung segmentation and classification in COVID-19 diagnosis using adaptive K-means with region growing fusion and A-CNN. To the best of the authors’ knowledge, this is the first work that uses M-DHOA for improved segmentation and classification steps for increasing the convergence rate of diagnosis.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 3
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 4 July 2016

Tomasz Chady, Ryszard Sikora, Mariusz Szwagiel, Bogdan Grzywacz, Leszek Misztal, Pawel Waszczuk, Michal Szydlowski and Barbara Szymanik

The purpose of this paper is to describe a multisource system for nondestructive inspection of welded elements exploited in aircraft industry developed in West Pomeranian…

Abstract

Purpose

The purpose of this paper is to describe a multisource system for nondestructive inspection of welded elements exploited in aircraft industry developed in West Pomeranian University of Technology, Szczecin in the frame of CASELOT project. The system task is to support the operator in flaws identification of welded aircraft elements using data obtained from X-ray inspection and 3D triangulation laser scanners.

Design/methodology/approach

For proper defects detection a set of special processing algorithms were developed. For easier system exploitation and integration of all components a user friendly interface in LabVIEW environment was designed.

Findings

It is possible to create the fully independent, intelligent system for welds’ flaws detection. This kind of technology might be crucial in further development of aircraft industry.

Originality/value

In this paper a number of innovative solutions (new algorithms, algorithms’ combinations) for defects’ detection in welds are presented. All of these solutions are the basis of presented complete system. One of the main original solution is a combination of the systems based on 3D triangulation laser scanner and X-ray testing.

Details

COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering, vol. 35 no. 4
Type: Research Article
ISSN: 0332-1649

Keywords

Article
Publication date: 19 June 2019

Shujing Zhang, Manyu Zhang, Yujie Cui, Xingyue Liu, Bo He and Jiaxing Chen

This paper aims to propose a fast machine compression scheme, which can solve the problem of low-bandwidth transmission for underwater images.

Abstract

Purpose

This paper aims to propose a fast machine compression scheme, which can solve the problem of low-bandwidth transmission for underwater images.

Design/methodology/approach

This fast machine compression scheme mainly consists of three stages. Firstly, raw images are fed into the image pre-processing module, which is specially designed for underwater color images. Secondly, a divide-and-conquer (D&C) image compression framework is developed to divide the problem of image compression into a manageable size. And extreme learning machine (ELM) is introduced to substitute for principal component analysis (PCA), which is a traditional transform-based lossy compression algorithm. The execution time of ELM is very short, thus the authors can compress the images at a much faster speed. Finally, underwater color images can be recovered from the compressed images.

Findings

Experiment results show that the proposed scheme can not only compress the images at a much faster speed but also maintain the acceptable perceptual quality of reconstructed images.

Originality/value

This paper proposes a fast machine compression scheme, which combines the traditional PCA compression algorithm with the ELM algorithm. Moreover, a pre-processing module and a D&C image compression framework are specially designed for underwater images.

Details

Sensor Review, vol. 39 no. 4
Type: Research Article
ISSN: 0260-2288

Keywords

1 – 10 of 20