Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
Audio compression formats reduce the file size before downloading and uploading on the Cloud and social media platforms. An audio codec performs this operation. The uncompressed or lossless format can become lossless and lossy compressed... more
Audio compression formats reduce the file size before downloading and uploading on the Cloud and social media platforms. An audio codec performs this operation. The uncompressed or lossless format can become lossless and lossy compressed files shrinking file size due to compression. Uncompressed file format change not only decreases the original size but also cuts the audio quality. The bit rate also drops. One assesses the quality of experience (QoE) of compressed audio file formats by comparing them to the original audios. One needs to conduct subjective QoE assessment experiments of both formats. This can be done by uploading a compressed file on the Cloud depending on its quality and sample rate to determine the satisfaction level of the end-user and which audio quality can be uploaded on the cloud, including other social media platforms.
In this paper, the face milling experiments were performed to investigate the cutting process of SiCp/Al (SiCp 65%) volume percentage and their effect on tool life and tool wear mechanism. The study was performed based on different... more
In this paper, the face milling experiments were performed to investigate the cutting process of SiCp/Al (SiCp 65%) volume percentage and their effect on tool life and tool wear mechanism. The study was performed based on different cutting parameters (cutting speed vc, feed per tooth fz, and axial depth of cut ap, 1mm, and width of cut ae 8mm,) and cutting environments adopted as Dry MQL and CO2 Snow to analyze the effect of lubri-cooling machining process using polycrystalline diamond (PCD) cutting tools. A total of 18 experiments were performed during milling of SiCp/Al (65%) with each experimental run involved the 321 mm3 of the volume of material removal. The study found that lubrication and cooling can effectively reduce the tool wear and improve the tool life up to 29% for SiCp65% on moderate cutting parameters. The major wear mechanisms of PCD cutting tools are perceived as abrasive wear and adhesive wear mechanisms, which develop the flank wear and build-up-edge formations. ...
: Digital well-being records are multimodal and high-dimensional (HD). Better theradiagnostics stem from new computationally thorough and edgy technologies, i.e., hyperspectral (HSI) imaging, super-resolution, and nanoimaging, but advance... more
: Digital well-being records are multimodal and high-dimensional (HD). Better theradiagnostics stem from new computationally thorough and edgy technologies, i.e., hyperspectral (HSI) imaging, super-resolution, and nanoimaging, but advance mess data portrayal and retrieval. A patient's state involves multiple signals, medical imaging (MI) modalities, clinical variables, dialogs between clinicians and patients, metadata, genome sequencing, and signals from wearables. Patients' high volume, personalized data amassed over time have advanced artificial intelligence (AI) models for higherprecision inferences, prognosis, and tracking. AI promises are undeniable, but with slow spreading and adoption, given partly unstable AI model performance after real-world use. The HD data is a ratelimiting factor for AI algorithms generalizing real-world scenarios. This paper studies many health data challenges to robust AI models' growth, aka the dimensionality curse (DC). This paper overviews DC in the MIs' context, tackles the negative out-of-sample influence and stresses important worries for algorithm designers. It is tricky to choose an AI platform and analyze hardships. Automating complex tasks requires more examination. Not all MI problems need automation via DL. AI developers spend most time refining algorithms, and quality data are crucial. Noisy and incomplete data limits AI, requiring time to handle control, integration, and analyses. AI demands data mixing skills absent in regular systems, requiring hardware/software speed and flexible storage. A partner or service can fulfill anomaly detection, predictive analysis, and ensemble modeling.
This paper presents a novel web-based crowdsourcing platform for the assessment of the subjective and objective quality of experience (QoE) of the video service in the cloud-server environment. The user has the option to enter subjective... more
This paper presents a novel web-based crowdsourcing platform for the assessment of the subjective and objective quality of experience (QoE) of the video service in the cloud-server environment. The user has the option to enter subjective QoE data for video service by filling out a web questionnaire. The objective QoE data of the cloud-server, network condition, and the user device is automatically captured by the crowdsourcing platform. Our proposed system collects both objective and subjective QoE simultaneously in real-time. The paper presents the key technologies used in the development of the platform and describes the functional requirements and design ideas of the system in detail. The system collects real-time comprehensive data to enhance the quality of the user experience to provide a valuable reference. The system is tested in a real-time environment and the test results are given in terms of the system performance. The crowdsourcing platform has new features of real-time ...
Over the last decade, data processing shifted from cloud computing to the local processing environment named Fog computing. Fog computing is an extension of cloud computing, which process data nearby device instead of sending to the cloud... more
Over the last decade, data processing shifted from cloud computing to the local processing environment named Fog computing. Fog computing is an extension of cloud computing, which process data nearby device instead of sending to the cloud this will reduce the burden from the Internet and quick processing. In this paper, we describe fog computing technology, infrastructure, and applications. Specifically, we present the latest development of fog networking, quality of experience, cloud at the edge, platforms, security, and privacy. Finally, we discuss the current research, solutions and present open issues of future research in Fog computing.
Video sharing on social clouds is popular among the users around the world. High-Definition (HD) videos have big file size so the storing in cloud storage and streaming of videos with high quality from cloud to the client are a big... more
Video sharing on social clouds is popular among the users around the world. High-Definition (HD) videos have big file size so the storing in cloud storage and streaming of videos with high quality from cloud to the client are a big problem for service providers. Social clouds compress the videos to save storage and stream over slow networks to provide quality of service (QoS). Compression of video decreases the quality compared to original video and parameters are changed during the online play as well as after download. Degradation of video quality due to compression decreases the quality of experience (QoE) level of end users. To assess the QoE of video compression, we conducted subjective (QoE) experiments by uploading, sharing, and playing videos from social clouds. Three popular social clouds, Facebook, Tumblr, and Twitter, were selected to upload and play videos online for users. The QoE was recorded by using questionnaire given to users to provide their experience about the v...
In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption algorithms have limited ability to deal with... more
In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption algorithms have limited ability to deal with complex data. The chaotic system is characterized by randomness and ergodicity, which has advantages over traditional encryption algorithms in image encryption processing. A novel V-net convolutional neural network (CNN) based on four-dimensional hyperchaotic system for medical image encryption is presented in this study. Firstly, the plaintext medical images are processed into 4D hyperchaotic sequence images, including image segmentation, chaotic system processing, and pseudorandom sequence generation. Then, V-net CNN is used to train chaotic sequences to eliminate the periodicity of chaotic sequences. Finally, the chaotic sequence image is diffused to change the raw image pixel to realize the encryption processing. Simulation test analysis demonstrates ...
Degree attestation verification and traceability are complex one-to-one processes between the Higher Education Commission (HEC) and universities. The procedure shifted to the digitalized manner, but still, on a certain note, manual... more
Degree attestation verification and traceability are complex one-to-one processes between the Higher Education Commission (HEC) and universities. The procedure shifted to the digitalized manner, but still, on a certain note, manual authentication is required. In the initial process, the university verified the degree and stamp seal first. Then, a physical channel of degree submission to the receiving ends is activated. After that, the degree is attested while properly examining and analyzing the tamper records related to degree credentials through e-communication with the university for verification and validation. This issue poses a serious challenge to educational information integrity and privacy. Potentially, blockchain technology could become a standardized platform to perform tasks including issuing, verifying, auditing, and tracing immutable records, which would enable the HEC, universities, and Federal Education Ministry (FEM) to quickly and easily get attested and investiga...
The advent of fog computing as an extension of cloud-enabling technology has moved from the hub of the internet framework to the unmanned aerial vehicle (UAV)-enabled control and management of drone-based data. The key objectives are to... more
The advent of fog computing as an extension of cloud-enabling technology has moved from the hub of the internet framework to the unmanned aerial vehicle (UAV)-enabled control and management of drone-based data. The key objectives are to improve the computation and processing of drone-based resource constraints and deliver the data to the outsourced computational node to schedule, process, manage, optimize, and preserve it since they are located close to each other through a wireless sensor network. This collaborative technological approach to robustness is the standard of drone system design and implementation, reducing the computational power, resource consumption, and latency for the application that needs a fast response. However, recent research into fog-enabled drone-based data management and optimization poses a serious challenge in terms of privacy, security, and preservation. On the other hand, Blockchain Hyperledger Technology, which is mostly used in Bitcoin Cryptocurrencies, has been applied in a large number of distributed applications due to the ledger integrity, transparency, trustworthiness, provenance, reliability, availability, protection, and security-related distributed features that are provided. Therefore, the distributed application of drone control has received more attention because of its ability to handle collaborative procedures to capture, schedule, process, optimize, manage, and preserve drone-based data using fog nodes and blockchain hyperledger technology. In this paper, we proposed a collaborative approach using blockchain hyperledger fabric and a metaheuristic-enabled genetic algorithm for fog node management called B-Drone. This approach handles drone-based data collection, scheduling, optimizing, processing, managing, and preservation in a secure manner in the fog node. The protection of each transaction between drone and fog node before exchange is private with the utilization of the hash-encryption (SHA-256) algorithm. The blockchain smart contracts are implemented and deployed to auto-manage all the connectivity and communication protocols between drones and fog nodes in the designed private permissioned network. The simulations of the proposed collaborative approach reduce
A wireless network is used to connect various wired organizational structures and provide connectivity within the organization for employees to move freely by avoiding the hurdle of a physical network. Maintenance of WLAN security is... more
A wireless network is used to connect various wired organizational structures and provide connectivity within the organization for employees to move freely by avoiding the hurdle of a physical network. Maintenance of WLAN security is crucial to an organization because WLANs are directly linked to the core organization’s network. In this paper, we reviewed the architectures and protocols of wireless communication, security issues, and type of threats used to launch an attack as well as their solutions. Finally, we discuss open research for future development to make a secure wireless network and safe for data transfer.
This paper proposes a novel and secure blockchain hyperledger sawtooth-enabled consortium analytical model for smart educational accreditation credential evaluation. Indeed, candidate academic credentials are generated, verified, and... more
This paper proposes a novel and secure blockchain hyperledger sawtooth-enabled consortium analytical model for smart educational accreditation credential evaluation. Indeed, candidate academic credentials are generated, verified, and validated by the universities and transmitted to the Higher Education Department (HED). The objective is to enable the procedure of credential verification and analyze tamper-proof forged records before validation. For this reason, we designed and created an accreditation analytical model to investigate individual collected credentials from universities and examine candidates’ records of credibility using machine learning techniques and maintain all these aspects of analysis and addresses in the distributed storage with a secure hash-encryption (SHA-256) blockchain consortium network, which runs on a peer-to-peer (P2P) structure. In this proposed analytical model, we deployed a blockchain distributed mechanism to investigate the examiner and analyst pro...
Drone technology is being used for military, agriculture, aerial photography, surveillance, remote sensing and many more purposes. In this paper, drone plane is proposed for monitoring and targeting the street crime criminals based on... more
Drone technology is being used for military, agriculture, aerial photography, surveillance, remote sensing and many more purposes. In this paper, drone plane is proposed for monitoring and targeting the street crime criminals based on real time image processing techniques. Operations of proposed plane controlled with two processing units, 1st processing unit is for implementation of real time image processing techniques and 2nd processing unit will handle the rest of controlling, monitoring and targeting operations. Drone plane will monitor circular area of 5 kilometers and it will automatically perform all operations and can be controlled by operator. Shape detection algorithms have been tested to find accuracy in target detection and analysis the processing time before implementing in such environment and results provide optimal accuracy in matching weapons type with name and shape in predefined database.
Quality-of-service (QoS) is the term used to evaluate the overall performance of a service. In healthcare applications, efficient computation of QoS is one of the mandatory requirements during the processing of medical records through... more
Quality-of-service (QoS) is the term used to evaluate the overall performance of a service. In healthcare applications, efficient computation of QoS is one of the mandatory requirements during the processing of medical records through smart measurement methods. Medical services often involve the transmission of demanding information. Thus, there are stringent requirements for secure, intelligent, public-network quality-of-service. This paper contributes to three different aspects. First, we propose a novel metaheuristic approach for medical cost-efficient task schedules, where an intelligent scheduler manages the tasks, such as the rate of service schedule, and lists items utilized by users during the data processing and computation through the fog node. Second, the QoS efficient-computation algorithm, which effectively monitors performance according to the indicator (parameter) with the analysis mechanism of quality-of-experience (QoE), has been developed. Third, a framework of blo...
Distributed forecasting of agriculture commodity prices has an attractive research perspective that delivers active breakthrough analysis of the rapid fluctuations in pricing forecasts for participating stakeholders without being manually... more
Distributed forecasting of agriculture commodity prices has an attractive research perspective that delivers active breakthrough analysis of the rapid fluctuations in pricing forecasts for participating stakeholders without being manually dispatched lists. The increased use of an efficient forecasting mechanism for the agriculture information management of generated records and processing creates emerging challenges and limitations. These include new government mandates and regulations, the price of land for expansion, forecasting the growing demand for commodities, fluctuations in the global financial market, food security, and bio-based fuels. Building and deploying distributed dynamic scheduling, management, and monitoring systems of agricultural activities for commodity price forecasting and supply chains require a significant secure and efficient approach. Thus, this paper discusses a collaborative approach where two different folds are demonstrated to cover distinct aspects wi...
Robot is machine like human beings working in hazardous situations, replace domain experts and provide accurate results. We proposed automated medication system that work like human physician experts in remote locations, where flood and... more
Robot is machine like human beings working in hazardous situations, replace domain experts and provide accurate results. We proposed automated medication system that work like human physician experts in remote locations, where flood and thunderstorm occurs. It measure patient’s temperature and blood pressure using sensors and get input from user via keyboard and voice system. After finding diseases, it retrieves symptoms for diseases from stored databases. The proposed automated medication system provides facility to people which are unable to reach big cities where medical facilities are available.
Lately, there has been growing interest of users in Roman-Urdu text processing by using English language keyboard over the various social network platforms in Pakistan as well as in some other states of Indo-European. Nonetheless, one... more
Lately, there has been growing interest of users in Roman-Urdu text processing by using English language keyboard over the various social network platforms in Pakistan as well as in some other states of Indo-European. Nonetheless, one major issue in Roman-Urdu text processing is that it has no standardized lexicon, resulting one word in Urdu have different spelling variations. Due to this fact, least work is reported in Urdu language by the NLP researcher’s community. The objective of this study is to provide comprehensive review on Roman-Urdu and Urdu language, which covers previous works done by authors in this area. Further, we discuss grammatical structure of Urdu languages, pre-processing techniques, software tools and database used in Roman-Urdu and Urdu language. Furthermore, performance metrics, algorithms techniques have also been illustrated. Finally, in conclusion, research findings and future directions are highlighted as to give novel ideas in this area.
The Internet of Things (IoT) is basically like a system for connecting computer devices, mechanical and digital machines, objects, or individuals provided with the unique system (UIDs) and without transfer to transmit data over an ability... more
The Internet of Things (IoT) is basically like a system for connecting computer devices, mechanical and digital machines, objects, or individuals provided with the unique system (UIDs) and without transfer to transmit data over an ability human-to-human or computer-to-human relation. Another thing on the internet is that the items in the IoT are like a connected manner with humans and computers to which internet protocol addresses can be assigned and which can transfer data over the network or another man-made object. In this paper, we describe the utilization of IoT in the cloud, fog, IoT technologies with applications and security. Specifically, we provide IoT architecture for design and development with sensors in 6G. Finally, we discuss the current research, solutions, and present open issues of future research in IoT.
Volume 1 concentrates on UAS control and performance methodologies including Computer Vision and Data Storage, Integrated Optical Flow for Detection and Avoidance Systems, Navigation and Intelligence, Modeling and Simulation, Multisensor... more
Volume 1 concentrates on UAS control and performance methodologies including Computer Vision and Data Storage, Integrated Optical Flow for Detection and Avoidance Systems, Navigation and Intelligence, Modeling and Simulation, Multisensor Data Fusion, Vision in Micro-Aerial Vehicles (MAVs), Computer Vision in UAV using ROS, Security Aspects of UAV and Robot Operating System, Vision in Indoor and Outdoor Drones, Sensors and Computer Vision, and Small UAVP for Persistent Surveillance.
In this paper, we proposed quality of experience/service (QoE/S) framework for valuation of gaming services on the fog network. Fog computing has been conceptualized to encourage the sending of new services that cloud computing cannot... more
In this paper, we proposed quality of experience/service (QoE/S) framework for valuation of gaming services on the fog network. Fog computing has been conceptualized to encourage the sending of new services that cloud computing cannot provide, especially those requesting QoE guarantees. The proposed model is useful in Fog computing that offers cloud like services at the edge network to support users with low latency response requirements. Our proposed model for QoE/QoS of multimedia and gaming services of fog computing based on the objective and subjective QoE which will captured automatically by using agent technology and user feedback form. This framework monitors, analyses, generate reports and changes policy without intervention of administrators.

And 79 more

Volume 1 concentrates on UAS control and performance methodologies including Computer Vision and Data Storage, Integrated Optical Flow for Detection and Avoidance Systems, Navigation and Intelligence, Modeling and Simulation, Multisensor... more
Volume 1 concentrates on UAS control and performance methodologies including Computer Vision and Data Storage, Integrated Optical Flow for Detection and Avoidance Systems, Navigation and Intelligence, Modeling and Simulation, Multisensor Data Fusion, Vision in Micro-Aerial Vehicles (MAVs), Computer Vision in UAV using ROS, Security Aspects of UAV and Robot Operating System, Vision in Indoor and Outdoor Drones, Sensors and Computer Vision, and Small UAVP for Persistent Surveillance.