scispace - formally typeset
Search or ask a question

Showing papers in "Computers & Electrical Engineering in 2022"


Journal ArticleDOI
TL;DR: Zhang et al. as discussed by the authors proposed a tracking framework combining correlation filter tracking and Siamese-based object tracking, which achieved state-of-the-art performance in the TC128 dataset.

73 citations


Journal ArticleDOI
TL;DR: In this paper , the authors proposed novel techniques in AI technique based soft sensor integrated with remote sensing model using deep learning architectures, the input has been pre-processed to recognize the missing value, data cleaning and noise removal from the image which is collected from the agricultural land.

70 citations


Journal ArticleDOI
TL;DR: In this article , the authors presented a CNN-based approach for anomaly-based intrusion detection systems (IDS) that takes advantage of IoT's power, providing qualities to efficiently examine whole traffic across the IoT.

61 citations


Journal ArticleDOI
TL;DR: In this article , a new architecture composed of two components: DoS/DDoS detection and DDoS mitigation is proposed, which provides fine-granularity detection, as it identifies the specific type of attack, and the packet type used in the attack.

56 citations


Journal ArticleDOI
TL;DR: In this article , data augmentation and transfer learning were used to improve the classification accuracy of ore deposit datasets, and the classification performance was further improved by training a Squeeze-and-Excitation Networks (SENet) classifier using features calculated with MobileNet.

49 citations


Journal ArticleDOI
TL;DR: In this article , the authors proposed a hybrid machine learning classification technique based on ensemble technique with enhanced-grey wolf optimization (E-GWO) feature selection algorithm to analyze these complex biomedical data.

44 citations


Journal ArticleDOI
TL;DR: Zhang et al. as discussed by the authors proposed a context hierarchical integrated network (CHI-Net) for medical image segmentation, which can accurately segment salient regions from medical images in a purely task-driven manner.

39 citations


Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a multi-scale context integration network (MCI-Net) for liver image segmentation, which combines four cascaded branches of hybrid dilated convolutions to capture broader and deeper features.

39 citations


Journal ArticleDOI
TL;DR: In this article , the authors proposed an automated technique for detecting brain tumors using magnetic resonance imaging (MRI) images and applied two different pre-trained deep learning models to extract powerful features from images and combined them to form a hybrid feature vector using the partial least squares (PLS) method.

38 citations


Journal ArticleDOI
TL;DR: In this article , the authors proposed a novel application of Convolutional Neural Networks on accelerometer data for pothole detection using an iOS smartphone installed on the dashboard of a car, running a dedicated application.

35 citations


Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed a new detection method, which applies the 3D-BoNet instance-segmentation model with a multi-scale grouping structure and transfer learning to a 3D point-cloud tunnel dataset.

Journal ArticleDOI
TL;DR: In this paper , a collaborative approach using blockchain hyperledger fabric and a metaheuristic-enabled genetic algorithm for fog node management called B-Drone is proposed, which handles drone-based data collection, scheduling, optimizing, processing, managing, and preservation in a secure manner in the fog node.

Journal ArticleDOI
TL;DR: The adaptive Joint Photographic Experts Group 2000 (JPEG2000) image compression approach employing the wavelet image transform had proposed with the rise of the optimized Video Internet of Things (VIoT) using image transmission security using Elliptic Curve Cryptography (ECC) techniques as discussed by the authors .

Journal ArticleDOI
TL;DR: In this article , a platform for managing agricultural crop information collected through multi-rotor UAVs is presented, where the Django framework is utilized to design the information service system to collect the crop information and position information from UAV in real-time.

Journal ArticleDOI
TL;DR: In this paper , a blockchain-based spectrum trading and sharing system that addresses security concerns and maintains user privacy is proposed, where mobile network operators can exchange spectrum without relying on a third party using a Distributed Blockchain Consortium System (DBCS).

Journal ArticleDOI
TL;DR: Wang et al. as mentioned in this paper proposed an end-to-end model for network attack detection and network attack classification using deep learning-based recurrent models, which extracts the features of hidden layers of recurrent models and further employs a kernel-based principal component analysis (KPCA) feature selection approach to identify optimal features.

Journal ArticleDOI
TL;DR: In this article , a metaheuristic algorithm, namely Harris Hawks Optimization (HHO), was used to tune the hyper-parameter tuning of CNN for hand gesture recognition.

Journal ArticleDOI
TL;DR: In this article , a convolutional neural network (CNN) and ConvLSTM deep learning models (DLMs) are presented for automatic detection of arrhythmia for IoT applications, where the input ECG signals are represented in 2D format and then the obtained images are fed into the proposed DLMs for classification.

Journal ArticleDOI
TL;DR: In this article , the authors presented a trust-driven privacy method using encryption and steganography for real-time Internet of Vehicles (IoV) communication. But the proposed method is not suitable for the use of autonomous vehicles.

Journal ArticleDOI
TL;DR: In this paper , 39 features were created from multimedia texts and used to detect fake news regarding COVID-19 using state-of-the-art deep learning models, and the model's fake news feature extraction improved accuracy from 59.20% to 86.12%.

Journal ArticleDOI
TL;DR: In this article , a mathematical description of the modular encryption standard (MES) and the augmentation of condition-centric risk monitoring of confidential information to provide a layered model for securing healthcare data confidentiality is presented.

Journal ArticleDOI
TL;DR: In this paper , a fuzzy logic-based energy management and TFP model (FLEM-TFP) for CPS in intelligent transportation systems (ITS) has been proposed.

Journal ArticleDOI
TL;DR: In this paper , a Gaussian based network traffic similarity function for similarity computation between network traffic instances and a machine learning model SWASTHIKA which uses feature transformation traffic for detection of low rate and high-rate network attacks.

Journal ArticleDOI
TL;DR: In this article , the authors classified the research efforts into two groups: solutions to cope with DoS attacks on SDN and SDN-based solutions to tackle DoS attack on networks.

Journal ArticleDOI
TL;DR: In this paper , the authors proposed an intelligent intrusion detection system (IDS) for UAVs that uses principal component analysis (PCA) and one-class classifiers to detect attacks.

Journal ArticleDOI
TL;DR: In this article , a deep learning model is proposed to address the intrusion classification problem effectively using LSTM (Long Short-Term Memory) and FCN (Fully Connected Network) deep learning approaches.

Journal ArticleDOI
TL;DR: Agarwal et al. as mentioned in this paper perform an analysis of previously published reviews, surveys, and related studies to distill a list of questions and present answers to their research questions.

Journal ArticleDOI
TL;DR: In this article , a deep feature transfer learning model, called IRv2-CXL, is proposed to improve prediction accuracy and lower variance of breast cancer histopathology images.

Journal ArticleDOI
TL;DR: Zhang et al. as discussed by the authors proposed a novel underwater image restoration method based on information distribution and light scattering prior, which can effectively remove the color cast and increase contrast in underwater images.

Journal ArticleDOI
TL;DR: In this article , a new model for allocating pumped-storage hydropower units in the unit commitment program's next day's market is presented, where a triple scenario tree is also used to cover electricity market uncertainties.