Malmö University Publications
Change search
Refine search result
12 1 - 50 of 61
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Boiko, Olha
    et al.
    Sumy State University,Department of Information Technologies,Sumy,Ukraine.
    Shepeliev, Dmytro
    Sumy State University,Department of Information Technologies,Sumy,Ukraine.
    Shendryk, Vira
    Sumy State University,Department of Information Technologies,Sumy,Ukraine.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    A Comparison of Machine Learning Prediction Models to Estimate the Future Heat Demand2023In: 2023 IEEE 13th International Conference on Consumer Electronics - Berlin (ICCE-Berlin), Institute of Electrical and Electronics Engineers (IEEE), 2023Conference paper (Refereed)
    Abstract [en]

    This paper compares machine learning models for short-term heat demand forecasting in residential and multi-family buildings, evaluating model suitability, data impact on accuracy, computation time, and accuracy improvement methods. The findings are relevant for energy suppliers, researchers, and decision-makers in optimizing energy management and improving heat demand forecasting. The included models in the study are k-NN, Polynomial Regression, and LSTM with weather data, building type, and time index as input variables. Single-dimensional models (Autoregression, SARIMA, and Prophet) based on historical consumption are also studied. LSTM consistently outperforms other models in accuracy across different input variable combinations, measured using mean absolute percentage error (MAPE). The incorporation of historical consumption data improved the performance of k-NN and Polynomial Regression models. The paper also explores dataset volume impact on accuracy and compares training and prediction times. k-NN has the least prediction times, Polynomial Regression takes longer, and LSTM requires more time. All models exhibit acceptable prediction times for heat consumption. LSTM outperforms single-dimensional models in accuracy and has lower prediction times compared to AR, SARIMA, and Prophet models.

  • 2.
    Chang, Jianghao
    et al.
    Hebei GEO Univ, Sch Explorat Technol & Engn, Shijiazhuang 050031, Hebei, Peoples R China..
    Su, Benyu
    China Univ Min & Technol, Sch Resources & Geosci, Xuzhou 221116, Jiangsu, Peoples R China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Xing, Xiuju
    Xian Res Inst Co Ltd, China Coal Technol & Engn Grp Corp, Xian 710077, Shaanxi, Peoples R China..
    Detection of Water-Filled Mining Goaf Using Mining Transient Electromagnetic Method2020In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 16, no 5, p. 2977-2984Article in journal (Refereed)
    Abstract [en]

    Water-filled mining goaves are extremely prone to water inrush accidents in coal mines, and the transient electromagnetic method (TEM) is a good geophysical method for detecting water-rich areas. Considering that conventional TEM was mainly carried out on the ground, to increase the detection resolution, the underground TEM was used to detect the water-filled goaves in this study. Based on the whole-space model, the data-processing method of the underground TEM was studied. The whole-space geoelectric model was established based on actual coal-measure strata data, and the whole-space TEM response of the water-filled goaves was modeled using the finite-difference time-domain method. The results showed that the low-resistance areas of the apparent resistivity contours can accurately reflect the water abundance of the mining goaves. The underground TEM was used to detect the water abundance of the mining goaf in a mine environment and its detection results were consistent with the actual results.

  • 3. Chang, Jianghao
    et al.
    Yu, Jingcun
    Li, Juanjuan
    Xue, Guoqiang
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Su, Benyu
    Diffusion Law of Whole-Space Transient Electromagnetic Field Generated by the Underground Magnetic Source and Its Application2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 63415-63425Article in journal (Refereed)
    Abstract [en]

    Mine water inrush stays as one of the major disasters in coalmine production and construction. As one of the principal methods for detecting hidden water-rich areas in coal mines, underground transient electromagnetic method (TEM) adopts the small loop of a magnetic source which generates a kind of whole-space transient electromagnetic field. To study the diffusion of whole-space transient electromagnetic field, a 3-D finite-difference time-domain (FDTD) is employed in simulating the diffusion pattern of whole-space transient electromagnetic field created by the magnetic source in any direction and the whole-space transient electromagnetic response of the 3-D low-resistance body. The simulation results indicate that the diffusion of whole-space transient electromagnetic field is different from ground half-space and that it does not conform to the "smoke ring effect'' of half-space transient electromagnetic field, for the radius of the electric field's contour ring in whole space keeps expanding without moving upward or downward. The low-resistance body can significantly affect the diffusion of transient electromagnetic field. When the excitation direction is consistent with the bearing of the low-resistance body, the coupling between the transient electromagnetic field and the low-resistance body is optimal, and the abnormal response is most obvious. The bearing of the low-resistance body can be distinguished by comparing the response information of different excitation directions. Based on the results above, multi-directional sector detection technology is adapted to detect the water-rich areas, which can not only detect the target ahead of the roadway but also distinguish the bearing of the target. Both numerical simulation and practical application in underground indicate that the mining TEM can accurately reflect the location of water-rich areas.

    Download full text (pdf)
    FULLTEXT01
  • 4. Cheng, Kang
    et al.
    Ye, Ning
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Wang, Ruchuan
    In-Air Gesture Interaction: Real Time Hand Posture Recognition Using Passive RFID Tags2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 94460-94472Article in journal (Refereed)
    Abstract [en]

    In-air gesture interaction enables a natural communication between a man and a machine with its clear semantics and humane mode of operation. In this paper, we propose a real-time recognition system on multiple gestures in the air. It uses the commodity off-the-shelf (COTS) reader with three antennas to detect the radio frequency (RF) signals of the passive radio frequency identification (RFID) Tags attached to the fingers. The idea derives from the crucial insight that the sequential phase profile of the backscatter RF signals is a reliable and well-regulated indicator insinuating space-time situation of the tagged object, which presents a close interdependency with tag's movements and positions. The KL divergence is utilized to extract the dynamic gesture segment by confirming the endpoints of the data flow. To achieve the template matching and classification, we bring in the dynamic time warping (DTW) and k-nearest neighbors (KNN) for similarity scores calculation and appropriate gesture recognition. The experiment results show that the recognition rates for static and dynamic gestures can reach 85% and 90%, respectively. Moreover, it can maintain satisfying performance under different situations, such as diverse antenna-to-user distances and being hidden from view by nonconducting obstacles.

    Download full text (pdf)
    FULLTEXT01
  • 5. Du, Sunwen
    et al.
    Feng, Guorui
    Wang, Jianmin
    Feng, Shizhe
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Li, Zhixiong
    A New Machine-Learning Prediction Model for Slope Deformation of an Open-Pit Mine: An Evaluation of Field Data2019In: Energies, E-ISSN 1996-1073, Vol. 12, no 7, article id 1288Article in journal (Refereed)
    Abstract [en]

    Effective monitoring of the slope deformation of an open-pit mine is essential for preventing catastrophic collapses. It is a challenging task to accurately predict slope deformation. To this end, this article proposed a new machine-learning method for slope deformation prediction. Ground-based interferometric radar (GB-SAR) was employed to collect the slope deformation data from an open-pit mine. Then, an ensemble learner, which aggregated a set of weaker learners, was proposed to mine the GB-SAR field data, delivering a slope deformation prediction model. The evaluation of the field data acquired from the Anjialing open-pit mine demonstrates that the proposed slope deformation model was able to precisely predict the slope deformation of the monitored mine. The prediction accuracy of the super learner was superior to those of all the independent weaker learners.

    Download full text (pdf)
    FULLTEXT01
  • 6.
    Francis, Antony
    et al.
    Indian Inst Informat Technol Kottayam IIITK, Dept Comp Sci & Engn, Kottayam, India..
    Madhusudhanan, Sheema
    Indian Inst Informat Technol Kottayam IIITK, Dept Comp Sci & Engn, Kottayam, India..
    Jose, Arun Cyril
    Indian Inst Informat Technol Kottayam IIITK, Dept Comp Sci & Engn, Kottayam, India..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Univ Pretoria, Dept Elect Elect & Comp Engn, Pretoria, South Africa..
    An Intelligent IoT-based Home Automation for Optimization of Electricity Use2023In: Przeglad Elektrotechniczny, ISSN 0033-2097, E-ISSN 2449-9544, Vol. 99, no 9, p. 123-127Article in journal (Refereed)
    Abstract [en]

    The world is gearing towards renewable energy sources, due to the numerous negative repercussions of fossil fuels. There is a need to increase the efficiency of power generation, transmission, distribution, and use. The proposed work intends to decrease household electricity use and provide an intelligent home automation solution with ensembled machine learning algorithms. It also delivers organized information about the usage of each item while automating the use of electrical appliances in a home. Experimental results show that with XGBoost and Random Forest classifiers, electricity usage can be fully automated at an accuracy of 79%, thereby improving energy utilization efficiency and improving quality of life of the user.

  • 7. Guangming, Shao
    et al.
    Yong, Ma
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Xinping, Yan
    Zhixiong, Li
    A novel cooperative platform design for coupled USV-UAV systems2019In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 15, no 9, p. 4913-4922Article in journal (Refereed)
    Abstract [en]

    This paper presents a novel cooperative USV-UAV platform to form a powerful combination, which offers foundations for collaborative task executed by the coupled USV-UAV systems. Adjustable buoys and unique carrier deck for the USV are designed to guarantee landing safety and transportation of UAV. The deck of USV is equipped with a series of sensors, and a multi-ultrasonic joint dynamic positioning algorithm is introduced for resolving the positioning problem of the coupled USV-UAV systems. To fulfill effective guidance for the landing operation of UAV, we design a hierarchical landing guide point generation algorithm to obtain a sequence of guide points. By employing the above sequential guide points, high quality paths are planned for the UAV. Cooperative dynamic positioning process of the USV-UAV systems is elucidated, and then UAV can achieve landing on the deck of USV steadily. Our cooperative USV-UAV platform is validated by simulation and water experiments.

  • 8. Guo, Tao
    et al.
    He, Wei
    Jiang, Zhonglian
    Chu, Xiumin
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Li, Zhixiong
    An Improved LSSVM Model for Intelligent Prediction of the Daily Water Level2019In: Energies, E-ISSN 1996-1073, Vol. 12, no 1, article id 112Article in journal (Refereed)
    Abstract [en]

    Daily water level forecasting is of significant importance for the comprehensive utilization of water resources. An improved least squares support vector machine (LSSVM) model was introduced by including an extra bias error control term in the objective function. The tuning parameters were determined by the cross-validation scheme. Both conventional and improved LSSVM models were applied in the short term forecasting of the water level in the middle reaches of the Yangtze River, China. Evaluations were made with both models through metrics such as RMSE (Root Mean Squared Error), MAPE (Mean Absolute Percent Error) and index of agreement (d). More accurate forecasts were obtained although the improvement is regarded as moderate. Results indicate the capability and flexibility of LSSVM-type models in resolving time sequence problems. The improved LSSVM model is expected to provide useful water level information for the managements of hydroelectric resources in Rivers.

    Download full text (pdf)
    FULLTEXT01
  • 9. Guo, Xueying
    et al.
    Wang, Wenming
    Huang, Haiping
    Li, Qi
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Location Privacy-Preserving Method Based on Historical Proximity Location2020In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2020, article id 8892079Article in journal (Refereed)
    Abstract [en]

    With the rapid development of Internet services, mobile communications, and IoT applications, Location-Based Service (LBS) has become an indispensable part in our daily life in recent years. However, when users benefit from LBSs, the collection and analysis of users' location data and trajectory information may jeopardize their privacy. To address this problem, a new privacy-preserving method based on historical proximity locations is proposed. The main idea of this approach is to substitute one existing historical adjacent location around the user for his/her current location and then submit the selected location to the LBS server. This method ensures that the user can obtain location-based services without submitting the real location information to the untrusted LBS server, which can improve the privacy-preserving level while reducing the calculation and communication overhead on the server side. Furthermore, our scheme can not only provide privacy preservation in snapshot queries but also protect trajectory privacy in continuous LBSs. Compared with other location privacy-preserving methods such ask-anonymity and dummy location, our scheme improves the quality of LBS and query efficiency while keeping a satisfactory privacy level.

    Download full text (pdf)
    fulltext
  • 10.
    Hamzaoui, Raouf
    et al.
    De Montfort Univ, Leicester LE1 9BH, Leics, England..
    Ning, Huansheng
    Univ Sci & Technol, Beijing 100083, Peoples R China..
    Wang, Chonggang
    InterDigital Commun, Wilmington, DE 19809 USA..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Ding, Wei
    Natl Sci Fdn, Div Informat & Intelligent Syst, Boston, MA 02125 USA.;Univ Massachusetts, Boston, MA 02125 USA..
    Guest Editorial Special Section on Hybrid Human-Artificial Intelligence for Multimedia Computing2021In: IEEE transactions on multimedia, ISSN 1520-9210, E-ISSN 1941-0077, Vol. 23, p. 2185-2187Article in journal (Other academic)
    Abstract [en]

    The papers in this special section focus on hybrid human-artificial intelligene (AI) for multimedia computing. Multimedia computing has experienced a tremendous growth in the last decades, with applications ranging from multimedia information retrieval and analysis to multimedia compression and communication. However, the increasing volume and complexity of multimedia data driven by the large-scale spread of various new devices and sensors is posing a serious challenge to traditional multimedia computing algorithms. Artificial intelligence (AI), in particular deep learning techniques, has improved the performance of multimedia computing algorithms for many tasks, including computer vision and natural language processing. But unlike humans, AI is poor at solving tasks across multiple domains or in dealing with an uncontrolled dynamic environment. Hybrid Human-Artificial Intelligence (HH-AI) is an emerging field that aims at combining the benefits of human intelligence, such as semantic association, inference, and generalization with the computing power of AI.

  • 11.
    Hu, X.
    et al.
    School of Mathematics and Statistics Science, Ludong University, Yantai, Shandong 264025, China..
    Zhu, G.
    Marine College, Zhejiang Ocean University, Zhoushan 316022, China..
    Ma, Y.
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China..
    Li, Z.
    Faculty of Mechanical Engineering, Opole University of Technology, 45-758 Opole, Poland..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sotelo, M.
    School of Mathematics and Statistics Science, Ludong University, Yantai, Shandong 264025, China..
    Event-Triggered Adaptive Fuzzy Setpoint Regulation of Surface Vessels With Unmeasured Velocities Under Thruster Saturation Constraints2022In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 23, no 8, p. 13463-13472Article in journal (Refereed)
    Abstract [en]

    This article investigates the event-triggered adaptive fuzzy output feedback setpoint regulation control for the surface vessels. The vessel velocities are noisy and small in the setpoint regulation operation and the thrusters have saturation constraints. A high-gain filter is constructed to obtain the vessel velocity estimations from noisy position and heading. An auxiliary dynamic filter with control deviation as the input is adopted to reduce thruster saturation effects. The adaptive fuzzy logic systems approximate vessel's uncertain dynamics. The adaptive dynamic surface control is employed to derive the event-triggered adaptive fuzzy setpoint regulation control depending only on noisy position and heading measurements. By the virtue of the event-triggering, the vessel's thruster acting frequencies are reduced such that the thruster excessive wear is avoided. The computational burden is reduced due to the differentiation avoidance for virtual stabilizing functions required in the traditional backstepping. It is analyzed that the event-triggered adaptive fuzzy setpoint regulation control maintains position and heading at desired points and ensures the closed-loop semi-global stability. Both theoretical analyses and simulations with comparisons validate the effectiveness and the superiority of the control scheme. 

  • 12.
    Hu, Xin
    et al.
    School of Mathematics and Statistics Science, Ludong University, Yantai, China.
    Zhu, Guibing
    Marine College, Zhejiang Ocean University, Zhoushan, China.
    Ma, Yong
    School of Navigation, Hubei Key Laboratory of Inland Shipping Technology, Wuhan University of Technology, Wuhan, China.
    Li, Zhixiong
    Faculty of Mechanical Engineering, Opole University of Technology, Opole, Poland.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sotelo, Miguel Angel
    Department of Computer Engineering, University of Alcalá, Alcalá de Henares, Spain.
    Dynamic Event-Triggered Adaptive Formation With Disturbance Rejection for Marine Vehicles Under Unknown Model Dynamics2023In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 72, no 5, p. 5664-5676Article in journal (Refereed)
    Abstract [en]

    This paper investigates the dynamic event-triggered adaptive neural coordinated disturbance rejection for marine vehicles with external disturbances as the sinusoidal superpositions with unknown frequencies, amplitudes and phases. The vehicle movement mathematical models are transformed into parameterized expressions with the neural networks approximating nonlinear dynamics. The parametric exogenous systems are exploited to express external disturbances, which are converted into the linear canonical models with coordinated changes. The adaptive technique together with disturbance filters realize the disturbance estimation and rejection. By using the vectorial backstepping, the dynamic event-triggered adaptive neural coordinated disturbance rejection controller is derived with the dynamic event-triggering conditions being incorporated to reduce execution frequencies of vehicle's propulsion systems. The coordinated formation control can be achieved with the closed-loop semi-global stability. The dynamic event-triggered adaptive disturbance rejection scheme achieves the disturbance estimation and cancellation without requiring the a priori marine vehicle's model dynamics. Illustrative simulations and comparisons validate the proposed scheme.

  • 13.
    Hua, D.
    et al.
    China University of Mining and Technology, Xuzhou, China.
    Liu, X.
    China University of Mining and Technology, Xuzhou, China.
    Li, W.
    University of Wollongong, Wollongong, NSW, Australia.
    Krolczyk, G.
    Opole University of Technology, Opole, Poland.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Li, Z.
    Yonsei University, Seoul, South Korea.
    A Novel Ferrofluid Rolling Robot: Design, Manufacturing, and Experimental Analysis2021In: IEEE Transactions on Instrumentation and Measurement, ISSN 0018-9456, E-ISSN 1557-9662, Vol. 70, article id 9495803Article in journal (Refereed)
    Abstract [en]

    With the increasing applications of magnetic robots in medical instruments, the research on different structures and locomotion approaches of magnetic robots has become a hotspot in recent years. A ferrofluid rolling robot (FRR) with magnetic actuation is proposed and enabled to realize a novel locomotion approach in this article. The drive performance of ferrofluid is elaborated, which is characterized by the magnetic torque of a rectangle-shaped object filled with ferrofluid under magnetic field. First, the proposed structure and locomotion mechanism of the FRR are detailed. Moreover, based on the established mathematical models of the FRR, the simulations with straight and turning locomotion are carried out, respectively. Finally, the FRR prototype is manufactured by 3-D printing, and experimental results demonstrate that the feasibility of straight and turning locomotion is verified. The locomotion performance of the FRR is in good agreement with the theoretical models where the root mean square (rms) value of displacement for experiments and simulations is 1.2 mm. In this work, the proposed FRR can automatically switch from straight to turning locomotion with a fast response in an external magnetic field, and does not has magnetism when without a magnetic field. 

  • 14.
    Huang, H.
    et al.
    Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing 210013, China.
    Hu, C.
    Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing 210013, China..
    Zhu, J.
    School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210013, China..
    Wu, M.
    Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing 210013, China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Stochastic Task Scheduling in UAV-Based Intelligent On-Demand Meal Delivery System2022In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 23, no 8, p. 13040-13054Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate the dynamic task scheduling problem with stochastic task arrival times and due dates in the UAV-based intelligent on-demand meal delivery system (UIOMDS) to improve the efficiency. The objective is to minimize the total tardiness. The new constraints and characteristics introduced by UAVs in the problem model are fully studied. An iterated heuristic framework SES (Stochastic Event Scheduling) is proposed to periodically schedule tasks, which consists of a task collection and a dynamic task scheduling phases. Two task collection strategies are introduced and three Roulette-based flight dispatching approaches are employed. A simulated annealing based local search method is integrated to optimize the solutions. The experimental results show that the proposed algorithm is robust and more effective compared with other two existing algorithms.

  • 15.
    Huang, Haiping
    et al.
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Wu, Yuhan
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Xiao, Fu
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). University of Pretoria, Pretoria, South Africa.
    An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment2021In: IEEE Transactions on Computational Social Systems, E-ISSN 2329-924X, Vol. 8, no 5, p. 1108-1120Article in journal (Refereed)
    Abstract [en]

    Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a public signature in each data package to verify the authenticity and integrity of the content. However, signature schemes in the NDN-IoT environment are facing several challenges, such as signing security challenge for resource-constrained IoT end devices (EDs) and verification efficiency challenge for NDN routers. This article mainly studies the data package authentication scheme in the package-level security mechanism. Based on mobile edge computing (MEC), an efficient certificateless group signature scheme featured with anonymity, unforgeability, traceability, and key escrow resilience is proposed. The regional and edge architecture is utilized to solve the device management problem of IoT, reducing the risks of content pollution attacks from the data source. By offloading signature pressure to MEC servers, the contradiction between heavy overhead and shortage of ED resources is avoided. Moreover, the verification efficiency in NDN router is much improved via batch verification in the proposed scheme. Both security analysis and experimental simulations show that the proposed MEC-based certificateless group signature scheme is provably secure and practical.

  • 16. Jordaan, Coert
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Design of a monitoring and safety system for underground mines using wireless sensor networks2019In: International Journal of Ad Hoc and Ubiquitous Computing, ISSN 1743-8225, E-ISSN 1743-8233, Vol. 32, no 1, p. 14-28Article in journal (Refereed)
    Abstract [en]

    In this paper, a mine safety system using a wireless sensor network (WSN) is implemented. Investigations are done into design of sensors and wireless communication to profile the underground mining environment. The information is used to design and implement a robust hardware-based sensor node with standalone microcontrollers that sample data from six different sensors, namely temperature, humidity, airflow speed, noise, dust and gas level sensors, and transmit the processed data to a graphical user interface. The system reliability and accuracy is tested in a simulated mine and provided linear and accurate results over nearly a month of daily testing. It is observed that critical success factors for the wireless sensor node is its robust design, which does not easily fail or degrade in performance. The node also has strong, self-adaptive networking functionality, to recover in the case of a node failure.

  • 17.
    Kong, Tianjiao
    et al.
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Shao, Jie
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Hu, Jiuyuan
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Yang, Xin
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Yang, Shiyiling
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    EEG-Based Emotion Recognition Using an Improved Weighted Horizontal Visibility Graph2021In: Sensors, E-ISSN 1424-8220, Vol. 21, no 5, article id 1870Article in journal (Refereed)
    Abstract [en]

    Emotion recognition, as a challenging and active research area, has received considerable awareness in recent years. In this study, an attempt was made to extract complex network features from electroencephalogram (EEG) signals for emotion recognition. We proposed a novel method of constructing forward weighted horizontal visibility graphs (FWHVG) and backward weighted horizontal visibility graphs (BWHVG) based on angle measurement. The two types of complex networks were used to extract network features. Then, the two feature matrices were fused into a single feature matrix to classify EEG signals. The average emotion recognition accuracies based on complex network features of proposed method in the valence and arousal dimension were 97.53% and 97.75%. The proposed method achieved classification accuracies of 98.12% and 98.06% for valence and arousal when combined with time-domain features.

    Download full text (pdf)
    fulltext
  • 18. Krzysztof, Okarma
    et al.
    Darius, Andriukaitis
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sensors in Intelligent Transportation Systems2019In: Journal of Advanced Transportation, ISSN 0197-6729, E-ISSN 2042-3195, Vol. 2019, p. 1-2, article id 7108126Article in journal (Other academic)
    Download full text (pdf)
    FULLTEXT01
  • 19.
    Kurasinski, Lukas
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Tan, Jason
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Using Neural Networks to Detect Fire from Overhead Images2023In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 130, no 2, p. 1085-1105Article in journal (Refereed)
    Abstract [en]

    The use of artificial intelligence (AI) is increasing in our everyday applications. One emerging field within AI is image recognition. Research that has been devoted to predicting fires involves predicting its behaviour. That is, how the fire will spread based on environmental key factors such as moisture, weather condition, and human presence. The result of correctly predicting fire spread can help firefighters to minimise the damage, deciding on possible actions, as well as allocating personnel effectively in potentially fire prone areas to extinguish fires quickly. Using neural networks (NN) for active fire detection has proven to be exceptional in classifying smoke and being able to separate it from similar patterns such as clouds, ground, dust, and ocean. Recent advances in fire detection using NN has proved that aerial imagery including drones as well as satellites has provided great results in detecting and classifying fires. These systems are computationally heavy and require a tremendous amount of data. A NN model is inextricably linked to the dataset on which it is trained. The cornerstone of this study is based on the data dependencieds of these models. The model herein is trained on two separate datasets and tested on three dataset in total in order to investigate the data dependency. When validating the model on their own datasets the model reached an accuracy of 92% respectively 99%. In comparison to previous work where an accuracy of 94% was reached. During evaluation of separate datasets, the model performed around the 60% range in 5 out of 6 cases, with the outlier of 29% in one of the cases. 

    Download full text (pdf)
    fulltext
  • 20. Li, Jie
    et al.
    Wu, Jinsong
    Hu, Bin
    Wang, Chonggang
    Daneshmand, Mahmoud
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Introduction to the Special Section on Big Data and Artificial Intelligence for Network Technologies2020In: IEEE Transactions on Network Science and Engineering, E-ISSN 2327-4697, Vol. 7, no 1, p. 1-2Article in journal (Other academic)
    Abstract [en]

    The papers in this special section examines the deployment of Big Data and artificial intelligence for network technologies. The eneration of huge amounts of data, called big data, is creating the need for efficient tools to manage those data. Artificial intelligence (AI) has become the powerful tool in dealing with big data with recent breakthroughs at multiple fronts in machine learning, including deep learning. Meanwhile, information networks are becoming larger and more complicated, generating a huge amount of runtime statistics data such as traffic load, resource usages. The emerging big data and AI technologies may include a bunch of new requirements, applications and scenarios such as e-health, Intelligent Transportation Systems (ITS), Industrial Internet of Things (IIoT), and smart cities in the term of computing networks. The big data and AI driven network technologies also provide an unprecedented patient to discover new features, to characterize user demands and system capabilities in network resource assignment, security and privacy, system architecture, modeling and applications, which needs more explorations. The focus of this special section is to address the big data and artificial intelligence for network technologies. We appreciate contributions to this special section and the valuable and extensive efforts of the reviewers. The topics of this special section range from big data and AI algorithms, models, architecture for networks and systems to network architecture.

    Download full text (pdf)
    fulltext
  • 21.
    Li, Yicheng
    et al.
    Jiangsu Univ, Automot Engn Res Inst, Zhenjiang 212013, Jiangsu, Peoples R China.;Wuhan Univ Technol, Hubei Key Lab Transportat Internet Things, Wuhan 430063, Peoples R China..
    Cai, Yingfeng
    Jiangsu Univ, Automot Engn Res Inst, Zhenjiang 212013, Jiangsu, Peoples R China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Wang, Hai
    Jiangsu Univ, Automot Engn Res Inst, Zhenjiang 212013, Jiangsu, Peoples R China..
    Angel Sotelo, Miguel
    Univ Alcala De Henares, Dept Comp Engn, Alcala De Henares 28801, Madrid, Spain..
    Li, Zhixiong
    Ocean Univ China, Sch Engn, Qingdao 266100, Peoples R China.;Yonsei Univ, Yonsei Frontier Lab, 50 Yonsei Ro, Seoul 03722, South Korea..
    Creating navigation map in semi-open scenarios for intelligent vehicle localization using multi-sensor fusion2021In: Expert systems with applications, ISSN 0957-4174, E-ISSN 1873-6793, Vol. 184, article id 115543Article in journal (Refereed)
    Abstract [en]

    In order to pursue high-accuracy localization for intelligent vehicles (IVs) in semi-open scenarios, this study proposes a new map creation method based on multi-sensor fusion technique. In this new method, the road scenario fingerprint (RSF) was employed to fuse the visual features, three-dimensional (3D) data and trajectories in the multi-view and multi-sensor information fusion process. The visual features were collected in the front and downward views of the IVs; the 3D data were collected by the laser scanner and the downward camera and a homography method was proposed to reconstruct the monocular 3D data; the trajectories were computed from the 3D data in the downward view. Moreover, a new plane-corresponding calibration strategy was developed to ensure the fusion quality of sensory measurements of the camera and laser. In order to evaluate the proposed method, experimental tests were carried out in a 5 km semi-open ring route. A series of nodes were found to construct the RSF map. The experimental results demonstrate that the mean error of the nodes between the created and actual maps was 2.7 cm, the standard deviation of the nodes was 2.1 cm and the max error was 11.8 cm. The localization error of the IV was 10.8 cm. Hence, the proposed RSF map can be applied to semi-open scenarios in practice to provide a reliable basic for IV localization.

  • 22. Liu, Shu
    et al.
    Shao, Jie
    Kong, Tianjiao
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    ECG Arrhythmia Classification using High Order Spectrum and 2D Graph Fourier Transform2020In: Applied Sciences, E-ISSN 2076-3417, Vol. 10, no 14, article id 4741Article in journal (Refereed)
    Abstract [en]

    Heart diseases are in the front rank among several kinds of life threats, due to its high incidence and mortality. Regarded as a powerful tool in the diagnosis of the cardiac disorder and arrhythmia detection, analysis of electrocardiogram (ECG) signals has become the focus of numerous researches. In this study, a feature extraction method based on the bispectrum and 2D graph Fourier transform (GFT) was developed. High-order matrix founded on bispectrum are extended into structured datasets and transformed into the eigenvalue spectrum domain by GFT, so that features can be extracted from statistical quantities of eigenvalues. Spectral features have been computed to construct the feature vector. Support vector machine based on the radial basis function kernel (SVM-RBF) was used to classify different arrhythmia heartbeats downloaded from the Massachusetts Institute of Technology - Beth Israel Hospital (MIT-BIH) Arrhythmia Database, according to the Association for the Advancement of Medical Instrumentation (AAMI) standard. Based on the cross-validation method, the experimental results depicted that our proposed model, the combination of bispectrum and 2D-GFT, achieved a high classification accuracy of 96.2%.

    Download full text (pdf)
    fulltext
  • 23. Liu, Wanli
    et al.
    Li, Zhixiong
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Angel Sotelo, Miguel
    Ma, Zhenjun
    Li, Weihua
    A Novel Multifeature Based On-Site Calibration Method for LiDAR-IMU System2020In: IEEE Transactions on Industrial Electronics, ISSN 0278-0046, E-ISSN 1557-9948, Vol. 67, no 11, p. 9851-9861Article in journal (Refereed)
    Abstract [en]

    Calibration is an essential prerequisite for the combined application of light detection and ranging (LiDAR) and inertial measurement unit (IMU). However, current LiDAR-IMU calibration usually relies on particular artificial targets or facilities and the intensive labor greatly limits the calibration flexibility. For these reasons, this article presents a novel multifeature based on-site calibration method for LiDAR-IMU system without any artificial targets or specific facilities. This new on-site calibration combines the point/sphere, line/cylinder, and plane features from LiDAR scanned data to reduce the labor intensity. The main contribution is that a new method is developed for LiDAR extrinsic parameters on-site calibration and this method could incorporate two or more calibration models to generate more accurate calibration results. First of all, the calibration of LiDAR extrinsic parameters is performed through estimating the geometric features and solving the multifeature geometric constrained optimization problem. Then, the relationships between LiDAR and IMU intrinsic calibration parameters are determined by the coordinate transformation. Lastly, the full information maximum likelihood estimation (FIMLE) method is applied to solve the optimization of the IMU intrinsic parameters calibration. A series of experiments are conducted to evaluate the proposed method. The analysis results demonstrate that the proposed on-site calibration method can improve the performance of the LiDAR-IMU.

  • 24.
    Liu, Wi
    et al.
    Xuzhou, China.
    Li, Zhixiong
    Iowa State University, USA.
    Sun, Shuaishua
    Tohoku University, 13101 Sendai, Miyagi, Japan.
    Gupta, Munish Kumar
    Shandong University, China.
    Du, H.
    University of Wollongong, Australia.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Sotelo, Miguel Angel
    University of Alcal, Spain.
    Li, Weihua
    University of Wollongong, Australia.
    Design a Novel Target to Improve Positioning Accuracy of Autonomous Vehicular Navigation System in GPS Denied Environments2021In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 17, no 11, p. 7575-7588Article in journal (Refereed)
    Abstract [en]

    Accurate positioning is an essential requirement of autonomous vehicular navigation system (AVNS) for safe driving. Although the vehicle position can be obtained in Global Position System (GPS) friendly environments, in GPS denied environments (such as suburb, tunnel, forest or underground scenarios) the positioning accuracy of AVNS is easily reduced by the trajectory error of the vehicle. In order to solve this problem, the plane, sphere, cylinder and cone are often selected as the ground control targets to eliminate the trajectory error for AVNS. However, these targets usually suffer from the limitations of incidence angle, measuring range, scanning resolution, and point cloud density, etc. To bridge this research gap, an adaptive continuum shape constraint analysis (ACSCA) method is presented in this paper to design a new target with optimized identifiable specific shape to eliminate the trajectory error for AVNS. First of all, according to the proposed ACSCA method, we conduct extensive numerical simulations to explore the optimal ranges of the vertexes and the faces for target shape design, and based on these trials, the optimal target shape is found as icosahedron, which composes of 10 vertexes, 20 faces and combines the properties of plane and volume target. Moreover, the algorithm of automatic detection and coordinate calculation is developed to recognize the icosahedron target and calculate its coordinates information for AVNS. Lastly, a series of experimental investigation were performed to evaluate the effectiveness of our designed icosahedron target in GPS denied environments. The experimental results demonstrate that compared with the plane, sphere, cylinder and cone targets, the developed icosahedron target can produce better performances than the above targets in terms of the clustered minimum registration error, ambiguity and range of field-of-view; also can significantly improve the positioning accuracy of AVNS in GPS denied environments.

  • 25. Liu, Wi
    et al.
    Zhixiong, Li
    Shuaishuai, Sun
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Zhenjun, Ma
    Weihua, Li
    Improving positioning accuracy of the mobile laser scanning in GPS-denied environments: An experimental case study2019In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 19, no 22, p. 10753-10763Article in journal (Refereed)
    Abstract [en]

    The positioning accuracy of the mobile laser scanning (MLS) system can reach the level of centimeter under the conditions where GPS works normally. However, in GPS-denied environments this accuracy can be reduced to the decimeter or even the meter level because the observation mode errors and the boresight alignment errors of MLS cannot be calibrated or corrected by the GPS signal. To bridge this research gap, this paper proposes a novel technique that appropriately incorporates the robust weight total least squares (RWTLS) and the full information maximum likelihood optimal estimation (FIMLOE) to improve the positioning accuracy of the MLS system under GPS-denied environment. First of all, the coordinate transformation relationship and the observation parameters vector of MLS system are established. Secondly, the RWTLS algorithm is used to correct the 3D point observation model; then the uncertainty propagation parameter vector and the boresight alignment errors between the laser scanner frame and the IMU frame are calibrated by FIMLOE. Lastly, experimental investigation in indoor scenarios was performed to evaluate the effectiveness of the proposed method. The experimental results demonstrate that the proposed method is able to significantly improve the positioning accuracy of an MLS system in GPS-denied environments.

  • 26.
    Liu, Xingchen
    et al.
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China.;Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor N, Nanjing 210023, Peoples R China..
    Zhang, Shaohui
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China.;Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor N, Nanjing 210023, Peoples R China..
    Huang, Haiping
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China.;Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor N, Nanjing 210023, Peoples R China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage2024In: Peer-to-Peer Networking and Applications, ISSN 1936-6442, E-ISSN 1936-6450, Vol. 17, no 2, p. 985-1000Article in journal (Refereed)
    Abstract [en]

    Edge computing has low transmission delay and unites more agile interconnected devices spread across geographies, which enables cloud-edge storage more suitable for distributed data sharing. This paper proposes a trustworthy and reliable multi-keyword search (TRMS) in blockchain-assisted cloud-edge storage, where data users can choose a faster search based on edge servers or a wider search based on cloud servers. To acquire trustworthy search results and find reliable servers, the blockchain-based smart contract is introduced in our scheme, which will execute the search algorithm and update the score-based trust management model. In this way, search results and trust scores will be published and recorded on the blockchain. By checking search results, data users can judge whether the returned documents are top-k documents. Based on the trust management model, we can punish the malicious behavior of search servers, while data users can choose more reliable servers based on trust scores. To improve efficiency, we design a threshold-based depth-first search algorithm. Extensive experiments are simulated on Hyperledger Fabric v2.4.1, which demonstrate our scheme (with 16 threads) can reduce the time cost of index construction by 92% and the time cost of search by 82%, approximately. Security analysis and extensive experiments can prove the security and efficiency of the proposed scheme.

  • 27.
    Liu, Xingchen
    et al.
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China.;Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor N, Nanjing 210023, Peoples R China..
    Zhang, Shaohui
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China.;Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor N, Nanjing 210023, Peoples R China..
    Huang, Haiping
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China.;Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor N, Nanjing 210023, Peoples R China..
    Wang, Wenming
    Anqing Normal Univ, Sch Comp & Informat, Anqing 246133, Peoples R China.;Nanjing Univ, State Key Lab oratory Novel Software Technol, Nanjing 210023, Peoples R China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    A Verifiable and Efficient Secure Sharing Scheme in Multiowner Multiuser Settings2023In: IEEE Systems Journal, ISSN 1932-8184, E-ISSN 1937-9234, Vol. 17, no 4, p. 5798-5809Article in journal (Refereed)
    Abstract [en]

    Data security has remained a challenging problem in cloud storage, especially in multiowner data sharing scenarios. As one of the most effective solutions for secure data sharing, multikeyword ranked searchable encryption (MRSE) has been widely used. However, most of the existing MRSE schemes have some shortcomings in multiowner data sharing, such as index trees generated by data owners, relevance scores in plaintext form, and lack of verification function. In this article, we propose a verifiable and efficient secure sharing scheme in multiowner multiuser settings, where the index tree is generated by the trusted authority. To achieve verifiable functionality, the blockchain-based smart contract is adopted to execute the search algorithm. Based on a distributed two-trapdoor public-key cryptosystem, the data uploaded and used are in ciphertext form, and the proposed algorithms are secure in our scheme. For improving efficiency, the encrypted data are aggregated according to the category and the Category ID-based index tree is generated. Extensive experiments are conducted to demonstrate that it can reduce the time cost of index construction by 75% and the time cost of search by 53%, approximately. Moreover, multithreaded optimization is introduced in our scheme, which can reduce the time cost of index construction by 76% and the time cost of search by 67%, approximately (with 16 threads).

  • 28. Liu, Yongshuang
    et al.
    Huang, Haiping
    Xiao, Fu
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Wang, Wenming
    Classification and recognition of encrypted EEG data based on neural network2020In: Journal of Information Security and Applications, ISSN 2214-2134, E-ISSN 2214-2126, Vol. 54, article id 102567Article in journal (Refereed)
    Abstract [en]

    With the rapid development of Machine Learning technology applied in electroencephalography (EEG) signals, Brain-Computer Interface (BCI) has emerged as a novel and convenient human-computer interaction for smart home, intelligent medical and other Internet of Things (IoT) scenarios. However, security issues such as sensitive information disclosure and unauthorized operations have not received sufficient concerns. There are still some defects with the existing solutions to encrypted EEG data such as low accuracy, high time complexity or slow processing speed. For this reason, a classification and recognition method of encrypted EEG data based on neural network is proposed, which adopts Paillier encryption algorithm to encrypt EEG data and meanwhile resolves the problem of floating point operations. In addition, it improves traditional feed-forward neural network (FNN) by using the approximate function instead of activation function and realizes multi-classification of encrypted EEG data. Extensive experiments are conducted to explore the effect of several metrics (such as the hidden neuron size and the learning rate updated by improved simulated annealing algorithm) on the recognition results. Followed by security and time cost analysis, the proposed model and approach are validated and evaluated on public EEG datasets provided by PhysioNet, BCI Competition IV and EPILEPSIAE. The experimental results show that our proposal has the satisfactory accuracy, efficiency and feasibility compared with other solutions. (C) 2020 Elsevier Ltd. All rights reserved.

  • 29.
    Ma, Yong
    et al.
    Hubei Key Laboratory of Inland Shipping Technology, Wuhan, China; School of Navigation, Wuhan University of Technology, Wuhan, China.
    Nie, Zongqiang
    Hubei Key Laboratory of Inland Shipping Technology, Wuhan, China; School of Navigation, Wuhan University of Technology, Wuhan, China.
    Hu, Songlin
    Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China.
    Li, Zhixiong
    Department of Marine Engineering, Ocean University of China, Tsingdao, China; School of Mechanical, Materials, Mechatronic and Biomedical Engineering, University of Wollongong, Wollongong, NSW, Australia.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Sotelo, M.
    Department of Computer Engineering, University of Alcalá, Alcalá de Henares, Spain.
    Fault Detection Filter and Controller Co-Design for Unmanned Surface Vehicles Under DoS Attacks2021In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 22, no 3, p. 1422-1434Article in journal (Refereed)
    Abstract [en]

    This paper addresses the co-design problem of a fault detection filter and controller for a networked-based unmanned surface vehicle (USV) system subject to communication delays, external disturbance, faults, and aperiodic denial-of-service (DoS) jamming attacks. First, an event-triggering communication scheme is proposed to enhance the efficiency of network resource utilization while counteracting the impact of aperiodic DoS attacks on the USV control system performance. Second, an event-based switched USV control system is presented to account for the simultaneous presence of communication delays, disturbance, faults, and DoS jamming attacks. Third, by using the piecewise Lyapunov functional (PLF) approach, criteria for exponential stability analysis and co-design of a desired observer-based fault detection filter and an event-triggered controller are derived and expressed in terms of linear matrix inequalities (LMIs). Finally, the simulation results verify the effectiveness of the proposed co-design method. The results show that this method not only ensures the safe and stable operation of the USV but also reduces the amount of data transmissions.

  • 30.
    Ma, Yong
    et al.
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China, also with the Sanya Science and Education Innovation Park, Wuhan University of Technology, Sanya 572000, China, and also with the Chongqing Research Institute, Wuhan University of Technology, Chongqing 401120, China..
    Zhao, Yujiao
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China, also with the Sanya Science and Education Innovation Park, Wuhan University of Technology, Sanya 572000, China, and also with the Chongqing Research Institute, Wuhan University of Technology, Chongqing 401120, China..
    Li, Zhixiong
    Faculty of Mechanical Engineering, Opole University of Technology, 45758 Opole, Poland, and also with the Yonsei Frontier Laboratory, Yonsei University, Seodaemun-gu, Seoul 03722, Republic of Korea.
    Bi, Huaxiong
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China, also with the Sanya Science and Education Innovation Park, Wuhan University of Technology, Sanya 572000, China, and also with the Chongqing Research Institute, Wuhan University of Technology, Chongqing 401120, China..
    Wang, Jing
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China, also with the Sanya Science and Education Innovation Park, Wuhan University of Technology, Sanya 572000, China, and also with the Chongqing Research Institute, Wuhan University of Technology, Chongqing 401120, China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sotelo, Miguel Angel
    Department of Computer Engineering, University of Alcalá, 28801 Alcalá de Henares, Spain..
    CCIBA*: An Improved BA* Based Collaborative Coverage Path Planning Method for Multiple Unmanned Surface Mapping Vehicles2022In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 23, no 10, p. 19578-19588Article in journal (Refereed)
    Abstract [en]

    The main emphasis of this work is placed on the problem of collaborative coverage path planning for unmanned surface mapping vehicles (USMVs). As a result, the collaborative coverage improved BA* algorithm (CCIBA*) is proposed. In the algorithm, coverage path planning for a single vehicle is achieved by task decomposition and level map updating. Then a multiple USMV collaborative behavior strategy is designed, which is composed of area division, recall and transfer, area exchange and recognizing obstacles. Moverover, multiple USMV collaborative coverage path planning can be achieved. Consequently, a high-efficiency and high-quality coverage path for USMVs can be implemented. Water area simulation results indicate that our CCIBA* brings about a substantial increase in the performances of path length, number of turning, number of units and coverage rate.

  • 31.
    Ma, Yulin
    et al.
    Tsinghua University, Suzhou, China.
    Li, Zhixiong
    Ocean University of China, Tsingtao, China; Yonsei University, Seoul, South Korea.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Zheng, Sifa
    Tsinghua University, Suzhou, China.
    Angel Sotelo, Miguel
    University of Alcalá, Alcalá de Henares, Spain.
    A novel multi-mode hybrid control method for cooperative driving of an automated vehicle platoon2021In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 8, no 7, p. 5822-5838Article in journal (Refereed)
    Abstract [en]

    A multi-mode hybrid automaton is proposed for setting vehicle platoon modes with velocity, distance, length, lane position and other state information. Based on a vehicle platoon shift movement under different modes, decisions are made based on key conditional actions such as sudden acceleration changes because of vehicle distance changes, emergency braking to avoid collisions and free-lane changing choices adapted to various traffic conditions, so as to ensure effortless movement and safety in multi-mode shift. With a 3-degree (longitudinal, lateral, and yaw directions) of freedom coupled model, a hybrid vehicle platoon controller is proposed using non-singular terminal sliding mode control to ensure fast and steady tracking on the hybrid automaton outputs during the multi-mode shift process. Convergence of the hybrid controller in finite time is also analyzed with the Lyapunov exponential stability. The analysis result proves that the proposed controller not only ensures the stability of the individual vehicle and the vehicle platoon, but also ensures stability of the multi-mode shift movement system. The proposed cooperative driving strategy for vehicle platoon is evaluated using simulations, where varying traffic conditions and the influence of cutting off are considered in conjunction with demonstration simulations of a vehicle platoon’s cruising, following, lane changing, overtaking and moving in/out of garage functions.

  • 32.
    Madhusudhanan, Sheema
    et al.
    Department of Computer Science, Indian Institute of Information Technology Kottayam (IIITK), Kottayam, Kerala, India.
    Jose, Arun Cyril
    Department of Computer Science, Indian Institute of Information Technology Kottayam (IIITK), Kottayam, Kerala, India.
    Sahoo, Jayakrushna
    Department of Computer Science, Indian Institute of Information Technology Kottayam (IIITK), Kottayam, Kerala, India.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    PRIMϵ: Novel Privacy-preservation Model with Pattern Mining and Genetic Algorithm2024In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 19, p. 571-585Article in journal (Refereed)
    Abstract [en]

    This paper proposes a novel agglomerated privacy-preservation model integrated with data mining and evolutionary Genetic Algorithm (GA). Privacy-pReservIng with Minimum Epsilon (PRIMϵ) delivers minimum privacy budget (ϵ) value to protect personal or sensitive data during data mining and publication. In this work, the proposed Pattern identification in the Locale of Users with Mining (PLUM) algorithm, identifies frequent patterns from dataset containing users’ sensitive data. ϵ-allocation by Differential Privacy (DP) is achieved in PRIMϵ with GA PRIMϵ , yielding a quantitative measure of privacy loss (ϵ) ranging from 0.0001 to 0.045. The proposed model maintains the trade-off between privacy and data utility with an average relative error of 0.109 on numerical data and an Earth Mover’s Distance (EMD) metric in the range between [0.2,1.3] on textual data. PRIMϵ model is verified with Probabilistic Computational Tree Logic (PCTL) and proved to accept DP data only when ϵ ≤ 0.5. The work demonstrated resilience of model against background knowledge, membership inference, reconstruction, and privacy budget attack. PRIMϵ is compared with existing techniques on DP and is found to be linearly scalable with worst time complexity of O(n log n) .

  • 33.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Department of Electrical, Electronic and Computer Engineering, University of Pretoria, Pretoria, 0083, South Africa.
    Effective Supervision for Enhancing Quality of Doctoral Research in Computer Science and Engineering2023In: SN Computer Science, E-ISSN 2661-8907, Vol. 4, no 5, article id 678Article in journal (Refereed)
    Abstract [en]

    This article reflects on effective supervision and possible guidance for enhancing quality of doctoral research in the computer science and engineering field. The aims of this study are (1) to understand supervision and the role of supervisors in the quality of doctoral research, (2) to elaborate on effective supervision in the computer science and engineering field and challenges in effective supervision, and (3) to identify key indicators for evaluating effective supervision with a view to improving the quality of doctoral research. After studying various pieces of literature and conducting interviews with experienced supervisors and doctoral students, the article concludes by describing important characteristics in effective supervision. Some of the features for effective supervision are common to other areas of research; however, in computer science and engineering and similar fields, it is important that a supervisor takes the role of a team member by giving proper advice on the reports, algorithm and mathematical modeling developed in the research, and demonstrating the ability to provide advice on complex problems with practical approaches.

    Download full text (pdf)
    fulltext
  • 34.
    Malekian, Reza
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Thakur, Arnav
    Nair, Lakshmi
    Fischer Pedersen, Christian
    A Sensor Based Peer to Peer Vehicle Data Sharing System, An Internet of Vehicles Approach2018In: Journal of Internet Technology, ISSN 1607-9264, E-ISSN 2079-4029, Vol. 19, no 7, p. 2155-2162Article in journal (Refereed)
    Abstract [en]

    This paper describes the work that has been done in the design and development of a vehicular peer-to-peer data sharing system, with the objectives of increasing the situational awareness of the motorist and to reduce or eliminate accidents. Sensors are used to detect objects along the road that a vehicle is travelling on. This information is then displayed to the motorist and warning messages are relayed to peer vehicles through vehicle to vehicle communication. To improve the situational awareness of the motorist, each vehicle can receive and send information to a road side unit, through vehicle to infrastructure communication. A central server remotely manages and monitors the overall peer-to-peer system. Qualification tests are conducted to validate various aspects of the system. The results indicate that the system is capable of vehicle to vehicle communication and vehicle to infrastructure communication communication for sharing information to prevent accidents and promote safe driving.

  • 35. Molapo, Nthetsoa Alinah
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Nair, Lakshmi
    Real-Time Livestock Tracking System with Integration of Sensors and Beacon Navigation2018In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 104, no 2, p. 853-879Article in journal (Refereed)
    Abstract [en]

    This paper presents the design and development of a livestock tracking system, with the objective of transmitting the location and activity status of the animals, in real-time, to an end-user. The system comprises of tag, beacon and base station nodes, communicating wirelessly with each other. Tag nodes receive location information from neighbouring beacon nodes and through the process of trilateration, the location of a specific animal is determined. Motion sensors within the tags, are used to determine activity status of the animal. The base station node receives the identity, location and activity information, from the tag nodes and transfers the data to a web server, where a database stores the tag information in real-time. An Android application, serves as an interface between the end user and the web server, enabling the remote monitoring and tracking of the livestock. The performance of the system is evaluated in terms of its range, accuracy and the ability to detect and store information. The nodes in the system are able to communicate within the expected ranges. The tag data can be inserted into the database and be retrieved for end user needs. The results demonstrate that the system can successfully read, process, transmit and display the location and activity information.

  • 36.
    Omar, Azhar-Husain
    et al.
    University of Pretoria,Department of Electrical, Electronic and Computer Engineering,Pretoria,South Africa,0082.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). University of Pretoria,Department of Electrical, Electronic and Computer Engineering,Pretoria,South Africa,0082.
    Bogatinoska, Dijana Capeska
    Machine Intelligence and Robotics University of Information Science and Technology "St. Paul the Apostle",Faculty of Applied IT,Ohrid,North Macedonia.
    Energy management system based on wireless sensor networks and power line communications2022In: 2022 International Conference Automatics and Informatics (ICAI), Institute of Electrical and Electronics Engineers (IEEE), 2022Conference paper (Refereed)
    Abstract [en]

    In this paper, we developed a power line communication (PLC) system design, power measurement sensor design, light sensor design, temperature sensor design, and the integration of these components into an advanced sensor network to allow for energy metering and environment monitoring. A power measurement sensor was implemented through a current and voltage sensing circuitry was interfaced multi-plug power adapter to allow for non-invasive measurement of power usage of appliances. The sensors produce signals corresponding to the drawn voltage and current, which are then sampled and processed to estimate power usage. The PLC communications operated at an average accuracy of 95%. The power measurement sensor had an accuracy of 92%, which made it appropriate for home user estimations. The light sensor had an accuracy of between 91-97%, which was suitable for home lighting measurement.

  • 37. Pienaar, Schalk Wilhelm
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Human Activity Recognition Using Visual Object Detection2019In: 2019 IEEE 2nd Wireless Africa Conference (WAC), IEEE, 2019, p. 85-89Conference paper (Refereed)
    Abstract [en]

    Visual Human Activity Recognition (HAR), by means of an object detection algorithm, can be used to localize and monitor the states of people with little to no obstruction. The purpose of this paper is to discuss a way to train a model that has the ability to localize and capture the states of underground miners using a Single Shot Detector (SSD) model, trained specifically to make a distinction between an injured and a non injured miner (lying down vs standing up). Tensorflow is used for the abstraction layer of implementing the machine learning algorithm, and although it uses Python to deal with nodes and tensors, the actual algorithms run on C++ libraries, providing a good balance between performance and speed of development. The paper further discusses evaluation methods for determining the accuracy of the machine-learning progress. For future work, data fusion is introduced in order to improve the accuracy of the detected activity/state of people in a mining environment.

  • 38.
    Qi, Lingtao
    et al.
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Huang, Haiping
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Li, Feng
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Wang, Ruchuan
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    A Novel Shilling Attack Detection Model Based on Particle Filter and Gravitation2019In: China Communications, ISSN 1673-5447, Vol. 16, no 10, p. 112-132Article in journal (Refereed)
    Abstract [en]

    With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profiles into recommender systems to manipulate recommendation results. As one of the most important attack methods in recommender systems, the shilling attack has been paid considerable attention, especially to its model and the way to detect it. Among them, the loose version of Group Shilling Attack Generation Algorithm (GSAGen(l)) has outstanding performance. It can be immune to some PCC (Pearson Correlation Coefficient)-based detectors due to the nature of anti-Pearson correlation. In order to overcome the vulnerabilities caused by GSAGen(l), a gravitation-based detection model (GBDM) is presented, integrated with a sophisticated gravitational detector and a decider. And meanwhile two new basic attributes and a particle filter algorithm are used for tracking prediction. And then, whether an attack occurs can be judged according to the law of universal gravitation in decision-making. The detection performances of GBDM, HHT-SVM, UnRAP, AP-UnRAP Semi-SAD, SVM-TIA and PCA-P are compared and evaluated. And simulation results show the effectiveness and availability of GBDM.

  • 39.
    Saleem, Hajira
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Munir, Hussan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Neural Network-Based Recent Research Developments in SLAM for Autonomous Ground Vehicles: A Review2023In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 23, no 13, p. 13829-13858Article, review/survey (Refereed)
    Abstract [en]

    The development of autonomous vehicles has prompted an interest in exploring various techniques in navigation. One such technique is simultaneous localization and mapping (SLAM), which enables a vehicle to comprehend its surroundings, build a map of the environment in real time, and locate itself within that map. Although traditional techniques have been used to perform SLAM for a long time, recent advancements have seen the incorporation of neural network techniques into various stages of the SLAM pipeline. This review article provides a focused analysis of the recent developments in neural network techniques for SLAM-based localization of autonomous ground vehicles. In contrast to the previous review studies that covered general navigation and SLAM techniques, this paper specifically addresses the unique challenges and opportunities presented by the integration of neural networks in this context. Existing review studies have highlighted the limitations of conventional visual SLAM, and this article aims to explore the potential of deep learning methods. This article discusses the functions required for localization, and several neural network-based techniques proposed by researchers to carry out such functions. First, it presents a general background of the issue, the relevant review studies that have already been done, and the adopted methodology in this review. Then, it provides a thorough review of the findings regarding localization and odometry. Finally, it presents our analysis of the findings, open research questions in the field, and a conclusion. A semisystematic approach is used to carry out the review.

  • 40. Schalk Wilhelm, Pienaar
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Survey on a smart health monitoring system based on context awareness sensing2019In: Communications of the CCISA, ISSN 1729-6056, Vol. 25, no 1, p. 1-13Article in journal (Refereed)
    Abstract [en]

    Wearable health monitoring systems, with a context-awareness sensing ability, can greatly improve the way such devices work, both in terms of its accuracy and efficiency. This paper summarises related work previously performed, their advantages and disadvantages, and how they can be incorporated in future work. The related work covers approaches using devices such as smartphones used in isolation, smartphones combined with wristbands and ARM based microcontrollers interfaced with different sensors. Different approaches for optimizing power usage in wireless systems are also investigated. For context awareness, various papers are analyzed to determine existing activity recognition patterns, and approaches to solve common problems experienced in this field. Furthermore, this paper proposes a system that can be considered for future work, combining methods that are found to be meet a certain set of criteria, to develop a device that would be applicable for use by underground mine workers.

    Download full text (pdf)
    FULLTEXT01
  • 41. Sha, Chao
    et al.
    Ren, Chunhui
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Wu, Min
    Huang, Haiping
    Ye, Ning
    A Type of Virtual Force based Energy-hole Mitigation Strategy for Sensor Networks2020In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 20, no 2, p. 1105-1119Article in journal (Refereed)
    Abstract [en]

    In the era of Big Data and Mobile Internet, how to ensure the terminal devices (e.g., sensor nodes) work steadily for a long time is one of the key issues to improve the efficiency of the whole network. However, a lot of facts have shown that the unattended equipments are prone to failure due to energy exhaustion, physical damage and other reasons. This may result in the emergence of energy-hole, seriously affecting network performance and shortening its lifetime. To reduce data redundancy and avoid the generation of sensing blind areas, a type of Virtual Force based Energy-hole Mitigation strategy (VFEM) is proposed in this paper. Firstly, the virtual force (gravitation and repulsion) between nodes is introduced that makes nodes distribute as uniformly as possible. Secondly, in order to alleviate the "energy-hole problem", the network is divided into several annuluses with the same width. Then, another type of virtual force, named "virtual gravity generated by annulus", is proposed to further optimize the positions of nodes in each annulus. Finally, with the help of the "data forwarding area", the optimal paths for data uploading can be selected out, which effectively balances energy consumption of nodes. Experiment results show that, VFEM has a relatively good performance on postponing the generation time of energy-holes as well as prolonging the network lifetime compared with other typical energy-hole mitigation methods.

    Download full text (pdf)
    fulltext
  • 42.
    Sha, Chao
    et al.
    chool of Computer Science Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China.
    Song, Dandan
    chool of Computer Science Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    A Periodic and Distributed Energy Supplement Method based on Maximum Recharging Benefit in Sensor Networks2021In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 8, no 4, p. 2649-2669Article in journal (Refereed)
    Abstract [en]

    The issue of using vehicles to wirelessly recharge nodes for energy supplement in Wireless Sensor Networks has become a research hotspot in recent works. Unfortunately, most of the researches did not consider the rationality of the recharging request threshold and also overlooked the difference of node’s power consumption, which may lead to premature death of nodes as well as low efficiency of Wireless Charging Vehicles(WCVs). In order to solve the above problems, a Periodic and Distributed Energy Supplement Method based on maximum recharging benefit (PDESM) is proposed in this paper. Firstly, to avoid frequent recharging requests from nodes, we put forward an annuluses based cost-balanced data uploading strategy under deterministic deployment. Then, one WCV in each annulus periodically selects and recharges nodes located in this region which send the energy supplement requests. In addition, the predicted value of power consumption of nodes are calculated out according to the real-time energy consumption rate, and thus the most appropriate recharging request threshold is obtained. Finally, a moving path optimization scheme based on Minimum Spanning Tree is constructed for distributed recharging. Simulation results show that, PDESM performs well on enhancing the proportion of the alive nodes as well as the wireless recharging efficiency compared with NFAOC and FCFS. Moreover, it also has advantage in balancing the energy consumption of WCVs.

  • 43.
    Sha, Chao
    et al.
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, China.
    Sun, Yang
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Research on Cost-Balanced Mobile Energy Replenishment Strategy for Wireless Rechargeable Sensor Networks2020In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, ISSN 0018-9545, Vol. 69, no 3, p. 3135-3150Article in journal (Refereed)
    Abstract [en]

    In order to maximize the utilization rate of the Mobile Wireless Chargers (MWCs) and reduce the recharging delay in large-scale Rechargeable Wireless Sensor Networks (WRSNs), a type of C ost- B alanced M obile E nergy R eplenishment S trategy (CBMERS) is proposed in this paper. Firstly, nodes are assigned into groups according to their remaining lifetime, which ensures that only the ones with lower residual energy are recharged in each time slot. Then, to balance energy consumption among multiple MWCs, the moving distance as well as the power cost of the MWC are taken as constraints to get the optimal trajectory allocation scheme. Moreover, by further adjusting the amount of energy being replenished to some sensor nodes, it ensures that the MWC have enough energy to fulfill the recharging task and return back to the base station. Experiment results show that, compared with the Periodic recharging strategy and the C luster based M ultiple C harges C oordination algorithm (C-MCC), the proposed method can improve the recharging efficiency of MWCs by about 48.22% and 43.35%, and the average waiting time of nodes is also reduced by about 55.72% and 30.7%, respectively.

    Download full text (pdf)
    fulltext
  • 44.
    Shendryk, Vira
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Department of Information Technologies, Sumy State University, Sumy, 40007, Ukraine.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Davidsson, Paul
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Interoperability, Scalability, and Availability of Energy Types in Hybrid Heating Systems2023In: New Technologies, Development and Application VI: Volume 2, Springer, 2023, p. 3-13Conference paper (Refereed)
    Abstract [en]

    A promising approach to improve sustainability within the energy sector is to incorporate renewable energy sources into existing energy systems. However, such hybrid energy systems have several characteristics that make developing and coordinating the challenging, e.g. due to the need to manage large amounts of heterogeneous data in a distributed and dynamic manner. This paper analyses important characteristics of hybrid heating systems, such as interoperability, scalability, and availability of energy sources. The purpose is to determine how the availability of different energy sources within a hybrid heating system affects sustainability and environmental impact, as well as how interoperability and scalability can affect the overall performance of the hybrid heating system. All these quality characteristic parameters were considered in the aspect of heterogeneous data management.

  • 45.
    Shokrollahi, Azad
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Persson, Jan A.
    Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sarkheyli-Hägele, Arezoo
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Karlsson, Fredrik
    Sony Network Commun, S-22362 Lund, Sweden..
    Passive Infrared Sensor-Based Occupancy Monitoring in Smart Buildings: A Review of Methodologies and Machine Learning Approaches2024In: Sensors, E-ISSN 1424-8220, Vol. 24, no 5, article id 1533Article, review/survey (Refereed)
    Abstract [en]

    Buildings are rapidly becoming more digitized, largely due to developments in the internet of things (IoT). This provides both opportunities and challenges. One of the central challenges in the process of digitizing buildings is the ability to monitor these buildings' status effectively. This monitoring is essential for services that rely on information about the presence and activities of individuals within different areas of these buildings. Occupancy information (including people counting, occupancy detection, location tracking, and activity detection) plays a vital role in the management of smart buildings. In this article, we primarily focus on the use of passive infrared (PIR) sensors for gathering occupancy information. PIR sensors are among the most widely used sensors for this purpose due to their consideration of privacy concerns, cost-effectiveness, and low processing complexity compared to other sensors. Despite numerous literature reviews in the field of occupancy information, there is currently no literature review dedicated to occupancy information derived specifically from PIR sensors. Therefore, this review analyzes articles that specifically explore the application of PIR sensors for obtaining occupancy information. It provides a comprehensive literature review of PIR sensor technology from 2015 to 2023, focusing on applications in people counting, activity detection, and localization (tracking and location). It consolidates findings from articles that have explored and enhanced the capabilities of PIR sensors in these interconnected domains. This review thoroughly examines the application of various techniques, machine learning algorithms, and configurations for PIR sensors in indoor building environments, emphasizing not only the data processing aspects but also their advantages, limitations, and efficacy in producing accurate occupancy information. These developments are crucial for improving building management systems in terms of energy efficiency, security, and user comfort, among other operational aspects. The article seeks to offer a thorough analysis of the present state and potential future advancements of PIR sensor technology in efficiently monitoring and understanding occupancy information by classifying and analyzing improvements in these domains.

    Download full text (pdf)
    fulltext
  • 46.
    Simonoska, Elena
    et al.
    University of Information Science and Technology "St. Paul the Apostle",Ohrid,N. Macedonia.
    Bogatinoska, Dijana Capeska
    University of Information Science and Technology "St. Paul the Apostle",Ohrid,N. Macedonia.
    Dimitrievski, Ile
    University of Information Science and Technology "St. Paul the Apostle",Ohrid,N. Macedonia.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Department of Electrical Electronic and Computer Engineering University of Pretoria, Pretoria, South Africa.
    Sensor System for Real-time Water Quality Monitoring2023In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO), Institute of Electrical and Electronics Engineers (IEEE), 2023Conference paper (Refereed)
    Abstract [en]

    Water pollution is a global issue that has an impact on the entire ecosystems’ life cycles. Traditional sampling and laboratory testing techniques are labor-intensive and error-prone, making them ineffective for quickly detecting changes in water quality. This paper presents the development of a low-cost, portable and efficient prototype sensor-based system for monitoring water quality in real-time. The system consists of a microcontroller, temperature, turbidity, pH, and distance sensors, and an application for a visual representation of the data. Extensive testing was carried out to ensure uninterrupted operation. The prototype is a user-friendly sensor system that can be positioned close to the target area in order to assist in preventing environmental and biological harm. This can ensure safe, healthy, and sustainable water supplies for the communities, environment, and the economy. Continuous monitoring of water parameters can also help avoid critical situations. The experimental results demonstrate a successful development of a smart water quality monitoring system with potential applications in various scenarios.

  • 47. Soni, Nikheel
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Andriukaitis, Darius
    Navikas, Dangirutis
    Internet of Vehicles Based Approach for Road Safety Applications Using Sensor Technologies2019In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 105, no 4, p. 1257-1284Article in journal (Refereed)
    Abstract [en]

    In this paper, the Internet of Vehicles approach is used to develop a novel low cost sensor based system for road safety applications in intelligent transportation systems. It was found that major hazards that compromise road safety include weather related factors, poor road surfaces and presence of sharp turns. A wireless sensor network based solution consisting of embedded systems for the vehicular clients and infrastructure waypoints is developed for detecting road safety hazards and warning users about potentially hazardous events from causes that include presence of speed bumps, sharp turns and weather related factors of rain and fog. Hazards detected by the embedded systems are conveyed to the user by using the Vehicle-to-Vehicle communication and Vehicle-to-infrastructure communication interfaces developed in this study for inter-vehicle communication and obtaining sensory information from infrastructure waypoints respectively. Accuracy achieved was 88% for speed bump detection, 73.86% for detecting sharp turns and 100% for detection of rain and fog. Communication systems in the designed solution are optimized by reducing the size of packet being exchanged which improves transmission speed, packet losses and congestion on the network. Thus, the designed solution is capable of improving road safety by using an Internet of Vehicles approach.

  • 48.
    Soni, Nikheel
    et al.
    Amazon Web Services, Cape Town, South Africa; University of Pretoria, Pretoria, South Africa.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). University of Pretoria, Pretoria, South Africa.
    Bogatinoska, Dijana Capeska
    Malmö University, Internet of Things and People (IOTAP).
    Algorithms for Computing in Fog Systems: Principles, Algorithms, and Challenges2020In: 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO), 2020, p. 473-478Conference paper (Refereed)
    Abstract [en]

    Fog computing is an architecture that is used to distribute resources such as computing, storage, and memory closer to end-user to improve applications and service deployment. The idea behind fog computing is to improve cloud computing and IoT infrastructures by reducing compute power, network bandwidth, and latency as well as storage requirements. This paper presents an overview of what fog computing is, related concepts, algorithms that are present to improve fog computing infrastructure as well as challenges that exist. This paper shows that there is a great advantage of using fog computing to support cloud and IoT systems.

  • 49. Thakur, Arnav
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Internet of Vehicles Communication Technologies for Traffic Management and Road Safety Applications2019In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 109, no 1, p. 31-49Article in journal (Refereed)
    Abstract [en]

    The primary objective of intelligent transport systems (ITS) is to improve road safety and efficiency in the transport sector and are addressed in Internet of vehicles (IoV) based solutions, peer to peer vehicle data sharing, inter vehicle and vehicle to infrastructure communication channels. Effectiveness of an IoV solution is dependent on the robustness of the wireless communication technology. Performance of ZigBee, Wi-Fi and DSRC communication technologies for deployment in an IoV system is investigated by performing simulations in an identified platform. It was found that ZigBee, Wi-Fi and DSRC can offer successful exchange of data with failure rate of less than 1% for low frequency of communication events while Wi-Fi and DSRC can offer this performance at even higher frequencies of exchange events. Findings of the research will be used to design and test road safety and traffic management mechanisms for an IoV system.

  • 50.
    Tseng, Fan-Hsun
    et al.
    Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan..
    Chen, Chi-Yuan
    Natl Ilan Univ, Dept Comp Sci & Informat Engn, Yilan, Taiwan..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Nakano, Tadashi
    Osaka City Univ, Grad Sch Engn, Osaka, Japan..
    Zhang, Zhenjiang
    Beijing Jiaotong Univ, Sch Software Engn, Beijing, Peoples R China..
    Guest Editorial: AI-enabled intelligent network for 5G and beyond2022In: IET Communications, ISSN 1751-8628, E-ISSN 1751-8636, Vol. 16, no 11, p. 1265-1267Article in journal (Other academic)
12 1 - 50 of 61
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf