A new control chart, namely, modified exponentially weighted moving average (EWMA) control chart, for monitoring the process variance is introduced in this work by following the recommendations of Khan et al.15 The proposed control chart deduces the existing charts to be its special cases. The necessary coefficients, which are required for the construction of modified EWMA chart, are determined for various choices of sample sizes and smoothing constants. The performance of the proposed modified EWMA is evaluated in terms of its run length (RL) characteristics such as average RL and standard deviation of RL. The efficiency of the modified EWMA chart is investigated and compared with some existing control charts. The comparison reveals the superiority of proposal as compared with other control charts in terms of early detection of shift in process variation. The application of the proposal is also demonstrated using a real-life dataset. 相似文献
In recent years, the number of Gun-related incidents has crossed over 250,000 per year and over 85% of the existing 1 billion firearms are in civilian hands, manual monitoring has not proven effective in detecting firearms. which is why an automated weapon detection system is needed. Various automated convolutional neural networks (CNN) weapon detection systems have been proposed in the past to generate good results. However, These techniques have high computation overhead and are slow to provide real-time detection which is essential for the weapon detection system. These models have a high rate of false negatives because they often fail to detect the guns due to the low quality and visibility issues of surveillance videos. This research work aims to minimize the rate of false negatives and false positives in weapon detection while keeping the speed of detection as a key parameter. The proposed framework is based on You Only Look Once (YOLO) and Area of Interest (AOI). Initially, the models take pre-processed frames where the background is removed by the use of the Gaussian blur algorithm. The proposed architecture will be assessed through various performance parameters such as False Negative, False Positive, precision, recall rate, and F1 score. The results of this research work make it clear that due to YOLO-v5s high recall rate and speed of detection are achieved. Speed reached 0.010 s per frame compared to the 0.17 s of the Faster R-CNN. It is promising to be used in the field of security and weapon detection. 相似文献
To determine the individual circumstances that account for a road traffic accident, it is crucial to consider the unplanned connections amongst various factors related to a crash that results in high casualty levels. Analysis of the road accident data concentrated mainly on categorizing accidents into different types using individually built classification methods which limit the prediction accuracy and fitness of the model. In this article, we proposed a multi-model hybrid framework of the weighted majority voting (WMV) scheme with parallel structure, which is designed by integrating individually implemented multinomial logistic regression (MLR) and multilayer perceptron (MLP) classifiers using three different accident datasets i.e., IRTAD, NCDB, and FARS. The proposed WMV hybrid scheme overtook individual classifiers in terms of modern evaluation measures like ROC, RMSE, Kappa rate, classification accuracy, and performs better than state-of-the-art approaches for the prediction of casualty severity level. Moreover, the proposed WMV hybrid scheme adds up to accident severity analysis through knowledge representation by revealing the role of different accident-related factors which expand the risk of casualty in a road crash. Critical aspects related to casualty severity recognized by the proposed WMV hybrid approach can surely support the traffic enforcement agencies to develop better road safety plans and ultimately save lives. 相似文献
The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation (4G) and 5th generation (5G) etc. Researchers have proposed many image encryption algorithms based on the classical random walk and chaos theory for sharing an image in a secure way. Instead of the classical random walk, this paper proposes the quantum walk to achieve high image security. Classical random walk exhibits randomness due to the stochastic transitions between states, on the other hand, the quantum walk is more random and achieve randomness due to the superposition, and the interference of the wave functions. The proposed image encryption scheme is evaluated using extensive security metrics such as correlation coefficient, entropy, histogram, time complexity, number of pixels change rate and unified average intensity etc. All experimental results validate the proposed scheme, and it is concluded that the proposed scheme is highly secured, lightweight and computationally efficient. In the proposed scheme, the values of the correlation coefficient, entropy, mean square error (MSE), number of pixels change rate (NPCR), unified average change intensity (UACI) and contrast are 0.0069, 7.9970, 40.39, 99.60%, 33.47 and 10.4542 respectively. 相似文献
This paper reports an enhancement of the electrical properties of micro-silicon carbide/silicone elastomer (m-SiC/SE) composites by adding nano-aluminum nitride (n-AlN) for the next-generation power module encapsulation applications. The electrical properties, such as nonlinear conductivity, DC breakdown strength, dielectric spectroscopy, and thermally stimulated discharge current, of the pure SE, m-SiC/SE microcomposite, and m-SiC/n-AlN/SE hybrid composites added with 1 wt%, 3 wt%, and 5 wt% n-AlN fillers are investigated. The m-SiC/n-AlN/SE hybrid composites exhibit better nonlinear conductivity characteristics and enhanced DC breakdown strength than the m-SiC/SE microcomposite. Amongst all materials, the 3 wt% n-AlN addition in the hybrid composite has the best enhancement effect on the nonlinear conductivity characteristics and DC breakdown strength. However, it has the lowest low-frequency real and imaginary permittivities among the SE micro and hybrid composites. Furthermore, a m-SiC/n-AlN heterogenous interface model is proposed to explain the mechanism of enhanced electrical properties of the m-SiC/n-AlN/SE composites. It is found that higher m-SiC/n-AlN heterogenous interface barriers are constructed after adding n-AlN fillers, thereby inhibiting the charge carrier transport at low electric fields. In contrast, more conductive paths are activated at high electric fields by the contacted m-SiC fillers via n-AlN fillers, promoting the charge carrier transport at high electric fields.
Journal of Superconductivity and Novel Magnetism - In this work, full potential linearized augmented plane wave (FP-LAPW) method is used to determine the electronic, magnetic, and mechanical... 相似文献
This study aims to solve the nonlinear fractional-order mathematical model (FOMM) by using the normal and dysregulated bone remodeling of the myeloma bone disease (MBD). For the more precise performance of the model, fractional-order derivatives have been used to solve the disease model numerically. The FOMM is preliminarily designed to focus on the critical interactions between bone resorption or osteoclasts (OC) and bone formation or osteoblasts (OB). The connections of OC and OB are represented by a nonlinear differential system based on the cellular components, which depict stable fluctuation in the usual bone case and unstable fluctuation through the MBD. Untreated myeloma causes by increasing the OC and reducing the osteoblasts, resulting in net bone waste the tumor growth. The solutions of the FOMM will be provided by using the stochastic framework based on the Levenberg-Marquardt backpropagation (LVMBP) neural networks (NN), i.e., LVMBPNN. The mathematical performances of three variations of the fractional-order derivative based on the nonlinear disease model using the LVMPNN. The static structural performances are 82% for investigation and 9% for both learning and certification. The performances of the LVMBPNN are authenticated by using the results of the Adams-Bashforth-Moulton mechanism. To accomplish the capability, steadiness, accuracy, and ability of the LVMBPNN, the performances of the error histograms (EHs), mean square error (MSE), recurrence, and state transitions (STs) will be provided. 相似文献
Despite the planned installation and operations of the traditional IEEE 802.11 networks, they still experience degraded performance due to the number of inefficiencies. One of the main reasons is the received signal strength indicator (RSSI) association problem, in which the user remains connected to the access point (AP) unless the RSSI becomes too weak. In this paper, we propose a multi-criterion association (WiMA) scheme based on software defined networking (SDN) in Wi-Fi networks. An association solution based on multi-criterion such as AP load, RSSI, and channel occupancy is proposed to satisfy the quality of service (QoS). SDN having an overall view of the network takes the association and reassociation decisions making the handoffs smooth in throughput performance. To implement WiMA extensive simulations runs are carried out on Mininet-NS3-Wi-Fi network simulator. The performance evaluation shows that the WiMA significantly reduces the average number of retransmissions by 5%–30% and enhances the throughput by 20%–50%, hence maintaining user fairness and accommodating more wireless devices and traffic load in the network, when compared to traditional client-driven (CD) approach and state of the art Wi-Balance approach. 相似文献
One of the most pressing concerns for the consumer market is the detection of adulteration in meat products due to their preciousness. The rapid and accurate identification mechanism for lard adulteration in meat products is highly necessary, for developing a mechanism trusted by consumers and that can be used to make a definitive diagnosis. Fourier Transform Infrared Spectroscopy (FTIR) is used in this work to identify lard adulteration in cow, lamb, and chicken samples. A simplified extraction method was implied to obtain the lipids from pure and adulterated meat. Adulterated samples were obtained by mixing lard with chicken, lamb, and beef with different concentrations (10%–50% v/v). Principal component analysis (PCA) and partial least square (PLS) were used to develop a calibration model at 800–3500 cm−1. Three-dimension PCA was successfully used by dividing the spectrum in three regions to classify lard meat adulteration in chicken, lamb, and beef samples. The corresponding FTIR peaks for the lard have been observed at 1159.6, 1743.4, 2853.1, and 2922.5 cm−1, which differentiate chicken, lamb, and beef samples. The wavenumbers offer the highest determination coefficient R2 value of 0.846 and lowest root mean square error of calibration (RMSEC) and root mean square error prediction (RMSEP) with an accuracy of 84.6%. Even the tiniest fat adulteration up to 10% can be reliably discovered using this methodology. 相似文献
A substitution box (S-Box) is a crucial component of contemporary cryptosystems that provide data protection in block ciphers. At the moment, chaotic maps are being created and extensively used to generate these S-Boxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical attempts. In this paper, the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking approach. The projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their working makes both of these dynamic in nature. The tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic fort. Values of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique S-Box. Comparative analysis and exploration confirmed that the projected chaotic map exhibits a significant amount of chaotic complexity. The security assessment in terms of bijectivity, nonlinearity, bits independence, strict avalanche, linear approximation probability, and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several assaults. The proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security applications. The comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security. 相似文献