Malmö University Publications
Change search
Refine search result
12 1 - 50 of 56
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Liu, Xingchen
    et al.
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China.;Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor N, Nanjing 210023, Peoples R China..
    Zhang, Shaohui
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China.;Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor N, Nanjing 210023, Peoples R China..
    Huang, Haiping
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210023, Peoples R China.;Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab Wireless Sensor N, Nanjing 210023, Peoples R China..
    Wang, Wenming
    Anqing Normal Univ, Sch Comp & Informat, Anqing 246133, Peoples R China.;Nanjing Univ, State Key Lab oratory Novel Software Technol, Nanjing 210023, Peoples R China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    A Verifiable and Efficient Secure Sharing Scheme in Multiowner Multiuser Settings2023In: IEEE Systems Journal, ISSN 1932-8184, E-ISSN 1937-9234Article in journal (Refereed)
    Abstract [en]

    Data security has remained a challenging problem in cloud storage, especially in multiowner data sharing scenarios. As one of the most effective solutions for secure data sharing, multikeyword ranked searchable encryption (MRSE) has been widely used. However, most of the existing MRSE schemes have some shortcomings in multiowner data sharing, such as index trees generated by data owners, relevance scores in plaintext form, and lack of verification function. In this article, we propose a verifiable and efficient secure sharing scheme in multiowner multiuser settings, where the index tree is generated by the trusted authority. To achieve verifiable functionality, the blockchain-based smart contract is adopted to execute the search algorithm. Based on a distributed two-trapdoor public-key cryptosystem, the data uploaded and used are in ciphertext form, and the proposed algorithms are secure in our scheme. For improving efficiency, the encrypted data are aggregated according to the category and the Category ID-based index tree is generated. Extensive experiments are conducted to demonstrate that it can reduce the time cost of index construction by 75% and the time cost of search by 53%, approximately. Moreover, multithreaded optimization is introduced in our scheme, which can reduce the time cost of index construction by 76% and the time cost of search by 67%, approximately (with 16 threads).

  • 2.
    Francis, Antony
    et al.
    Indian Inst Informat Technol Kottayam IIITK, Dept Comp Sci & Engn, Kottayam, India..
    Madhusudhanan, Sheema
    Indian Inst Informat Technol Kottayam IIITK, Dept Comp Sci & Engn, Kottayam, India..
    Jose, Arun Cyril
    Indian Inst Informat Technol Kottayam IIITK, Dept Comp Sci & Engn, Kottayam, India..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Univ Pretoria, Dept Elect Elect & Comp Engn, Pretoria, South Africa..
    An Intelligent IoT-based Home Automation for Optimization of Electricity Use2023In: Przeglad Elektrotechniczny, ISSN 0033-2097, E-ISSN 2449-9544, Vol. 99, no 9, p. 123-127Article in journal (Refereed)
    Abstract [en]

    The world is gearing towards renewable energy sources, due to the numerous negative repercussions of fossil fuels. There is a need to increase the efficiency of power generation, transmission, distribution, and use. The proposed work intends to decrease household electricity use and provide an intelligent home automation solution with ensembled machine learning algorithms. It also delivers organized information about the usage of each item while automating the use of electrical appliances in a home. Experimental results show that with XGBoost and Random Forest classifiers, electricity usage can be fully automated at an accuracy of 79%, thereby improving energy utilization efficiency and improving quality of life of the user.

  • 3.
    Hu, Xin
    et al.
    School of Mathematics and Statistics Science, Ludong University, Yantai, China.
    Zhu, Guibing
    Marine College, Zhejiang Ocean University, Zhoushan, China.
    Ma, Yong
    School of Navigation, Hubei Key Laboratory of Inland Shipping Technology, Wuhan University of Technology, Wuhan, China.
    Li, Zhixiong
    Faculty of Mechanical Engineering, Opole University of Technology, Opole, Poland.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sotelo, Miguel Angel
    Department of Computer Engineering, University of Alcalá, Alcalá de Henares, Spain.
    Dynamic Event-Triggered Adaptive Formation With Disturbance Rejection for Marine Vehicles Under Unknown Model Dynamics2023In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 72, no 5, p. 5664-5676Article in journal (Refereed)
    Abstract [en]

    This paper investigates the dynamic event-triggered adaptive neural coordinated disturbance rejection for marine vehicles with external disturbances as the sinusoidal superpositions with unknown frequencies, amplitudes and phases. The vehicle movement mathematical models are transformed into parameterized expressions with the neural networks approximating nonlinear dynamics. The parametric exogenous systems are exploited to express external disturbances, which are converted into the linear canonical models with coordinated changes. The adaptive technique together with disturbance filters realize the disturbance estimation and rejection. By using the vectorial backstepping, the dynamic event-triggered adaptive neural coordinated disturbance rejection controller is derived with the dynamic event-triggering conditions being incorporated to reduce execution frequencies of vehicle's propulsion systems. The coordinated formation control can be achieved with the closed-loop semi-global stability. The dynamic event-triggered adaptive disturbance rejection scheme achieves the disturbance estimation and cancellation without requiring the a priori marine vehicle's model dynamics. Illustrative simulations and comparisons validate the proposed scheme.

  • 4.
    Zhu, Guibing
    et al.
    School of Maritime, Zhejiang Ocean University, Zhoushan, China.
    Ma, Yong
    School of Navigation, Hubei Key Laboratory of Inland Shipping Technology, Wuhan University of Technology, Wuhan, China.
    Li, Zhixiong
    Faculty of Mechanical Engineering, Opole University of Technology, Opole, Poland.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sotelo, M.
    Department of Computer Engineering, University of Alcal, Alcala de Henares (Madrid), Spain.
    Dynamic Event-Triggered Adaptive Neural Output Feedback Control for MSVs Using Composite Learning2023In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 24, no 1, p. 787-800Article in journal (Refereed)
    Abstract [en]

    This paper investigates the control issue of marine surface vehicles (MSVs) subject to internal and external uncertainties without velocity information. Utilizing the specific advantages of adaptive neural network and disturbance observer, a classification reconstruction idea is developed. Based on this idea, a novel adaptive neural-based state observer with disturbance observer is proposed to recover the unmeasurable velocity. Under the vector-backstepping design framework, the classification reconstruction idea and adaptive neural-based state observer are used to resolve the control design issue for MSVs. To improve the control performance, the serial-parallel estimation model is introduced to obtain a prediction error, and then a composite learning law is designed by embedding the prediction error and estimate of lumped disturbance. To reduce the mechanical wear of actuator, a dynamic event triggering protocol is established between the control law and actuator. Finally, a new dynamic event-triggered composite learning adaptive neural output feedback control solution is developed. Employing the Lyapunov stability theory, it is strictly proved that all signals in the closed-loop control system of MSVs are bounded. Simulation and comparison results validate the effectiveness of control solution.

  • 5.
    Saleem, Hajira
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Munir, Hussan
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Neural Network-Based Recent Research Developments in SLAM for Autonomous Ground Vehicles: A Review2023In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 23, no 13, p. 13829-13858Article, review/survey (Refereed)
    Abstract [en]

    The development of autonomous vehicles has prompted an interest in exploring various techniques in navigation. One such technique is simultaneous localization and mapping (SLAM), which enables a vehicle to comprehend its surroundings, build a map of the environment in real time, and locate itself within that map. Although traditional techniques have been used to perform SLAM for a long time, recent advancements have seen the incorporation of neural network techniques into various stages of the SLAM pipeline. This review article provides a focused analysis of the recent developments in neural network techniques for SLAM-based localization of autonomous ground vehicles. In contrast to the previous review studies that covered general navigation and SLAM techniques, this paper specifically addresses the unique challenges and opportunities presented by the integration of neural networks in this context. Existing review studies have highlighted the limitations of conventional visual SLAM, and this article aims to explore the potential of deep learning methods. This article discusses the functions required for localization, and several neural network-based techniques proposed by researchers to carry out such functions. First, it presents a general background of the issue, the relevant review studies that have already been done, and the adopted methodology in this review. Then, it provides a thorough review of the findings regarding localization and odometry. Finally, it presents our analysis of the findings, open research questions in the field, and a conclusion. A semisystematic approach is used to carry out the review.

  • 6.
    Madhusudhanan, Sheema
    et al.
    Department of Computer Science, Indian Institute of Information Technology Kottayam (IIITK), Kottayam, Kerala, India.
    Jose, Arun Cyril
    Department of Computer Science, Indian Institute of Information Technology Kottayam (IIITK), Kottayam, Kerala, India.
    Sahoo, Jayakrushna
    Department of Computer Science, Indian Institute of Information Technology Kottayam (IIITK), Kottayam, Kerala, India.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Department of Computer Science and Media Technology, Internet of Things and People Research Centre, Malmö University, Malmö, Sweden.
    PRIMϵ: Novel Privacy-preservation Model with Pattern Mining and Genetic Algorithm2023In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021Article in journal (Refereed)
    Abstract [en]

    This paper proposes a novel agglomerated privacy-preservation model integrated with data mining and evolutionary Genetic Algorithm (GA). Privacy-pReservIng with Minimum Epsilon (PRIMϵ) delivers minimum privacy budget (ϵ) value to protect personal or sensitive data during data mining and publication. In this work, the proposed Pattern identification in the Locale of Users with Mining (PLUM) algorithm, identifies frequent patterns from dataset containing users’ sensitive data. ϵ-allocation by Differential Privacy (DP) is achieved in PRIMϵ with GA PRIMϵ , yielding a quantitative measure of privacy loss (ϵ) ranging from 0.0001 to 0.045. The proposed model maintains the trade-off between privacy and data utility with an average relative error of 0.109 on numerical data and an Earth Mover’s Distance (EMD) metric in the range between [0.2,1.3] on textual data. PRIMϵ model is verified with Probabilistic Computational Tree Logic (PCTL) and proved to accept DP data only when ϵ ≤ 0.5. The work demonstrated resilience of model against background knowledge, membership inference, reconstruction, and privacy budget attack. PRIMϵ is compared with existing techniques on DP and is found to be linearly scalable with worst time complexity of O(n log n) .

  • 7.
    Simonoska, Elena
    et al.
    University of Information Science and Technology "St. Paul the Apostle",Ohrid,N. Macedonia.
    Bogatinoska, Dijana Capeska
    University of Information Science and Technology "St. Paul the Apostle",Ohrid,N. Macedonia.
    Dimitrievski, Ile
    University of Information Science and Technology "St. Paul the Apostle",Ohrid,N. Macedonia.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Department of Electrical Electronic and Computer Engineering University of Pretoria, Pretoria, South Africa.
    Sensor System for Real-time Water Quality Monitoring2023In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO), Institute of Electrical and Electronics Engineers (IEEE), 2023Conference paper (Refereed)
    Abstract [en]

    Water pollution is a global issue that has an impact on the entire ecosystems’ life cycles. Traditional sampling and laboratory testing techniques are labor-intensive and error-prone, making them ineffective for quickly detecting changes in water quality. This paper presents the development of a low-cost, portable and efficient prototype sensor-based system for monitoring water quality in real-time. The system consists of a microcontroller, temperature, turbidity, pH, and distance sensors, and an application for a visual representation of the data. Extensive testing was carried out to ensure uninterrupted operation. The prototype is a user-friendly sensor system that can be positioned close to the target area in order to assist in preventing environmental and biological harm. This can ensure safe, healthy, and sustainable water supplies for the communities, environment, and the economy. Continuous monitoring of water parameters can also help avoid critical situations. The experimental results demonstrate a successful development of a smart water quality monitoring system with potential applications in various scenarios.

  • 8.
    Zhao, Mingbo
    et al.
    Donghua Univ, Shanghai, Peoples R China..
    Wu, Zhou
    Chongqing Univ, Chongqing, Peoples R China..
    Zhang, Zhao
    Hefei Univ Technol, Hefei, Anhui, Peoples R China..
    Hao, Tianyong
    South China Normal Univ, Guangzhou, Peoples R China..
    Meng, Zhiwei
    Tech Univ Denmark, Copenhagen, Denmark..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Special issue on neural computing and applications 20202023In: Neural Computing & Applications, ISSN 0941-0643, E-ISSN 1433-3058, Vol. 35, no 17, p. 12243-12245Article in journal (Other academic)
  • 9.
    Kurasinski, Lukas
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Tan, Jason
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Using Neural Networks to Detect Fire from Overhead Images2023In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 130, no 2, p. 1085-1105Article in journal (Refereed)
    Abstract [en]

    The use of artificial intelligence (AI) is increasing in our everyday applications. One emerging field within AI is image recognition. Research that has been devoted to predicting fires involves predicting its behaviour. That is, how the fire will spread based on environmental key factors such as moisture, weather condition, and human presence. The result of correctly predicting fire spread can help firefighters to minimise the damage, deciding on possible actions, as well as allocating personnel effectively in potentially fire prone areas to extinguish fires quickly. Using neural networks (NN) for active fire detection has proven to be exceptional in classifying smoke and being able to separate it from similar patterns such as clouds, ground, dust, and ocean. Recent advances in fire detection using NN has proved that aerial imagery including drones as well as satellites has provided great results in detecting and classifying fires. These systems are computationally heavy and require a tremendous amount of data. A NN model is inextricably linked to the dataset on which it is trained. The cornerstone of this study is based on the data dependencieds of these models. The model herein is trained on two separate datasets and tested on three dataset in total in order to investigate the data dependency. When validating the model on their own datasets the model reached an accuracy of 92% respectively 99%. In comparison to previous work where an accuracy of 94% was reached. During evaluation of separate datasets, the model performed around the 60% range in 5 out of 6 cases, with the outlier of 29% in one of the cases. 

    Download full text (pdf)
    fulltext
  • 10.
    Ma, Yong
    et al.
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China, also with the Sanya Science and Education Innovation Park, Wuhan University of Technology, Sanya 572000, China, and also with the Chongqing Research Institute, Wuhan University of Technology, Chongqing 401120, China..
    Zhao, Yujiao
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China, also with the Sanya Science and Education Innovation Park, Wuhan University of Technology, Sanya 572000, China, and also with the Chongqing Research Institute, Wuhan University of Technology, Chongqing 401120, China..
    Li, Zhixiong
    Faculty of Mechanical Engineering, Opole University of Technology, 45758 Opole, Poland, and also with the Yonsei Frontier Laboratory, Yonsei University, Seodaemun-gu, Seoul 03722, Republic of Korea.
    Bi, Huaxiong
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China, also with the Sanya Science and Education Innovation Park, Wuhan University of Technology, Sanya 572000, China, and also with the Chongqing Research Institute, Wuhan University of Technology, Chongqing 401120, China..
    Wang, Jing
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China, also with the Sanya Science and Education Innovation Park, Wuhan University of Technology, Sanya 572000, China, and also with the Chongqing Research Institute, Wuhan University of Technology, Chongqing 401120, China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sotelo, Miguel Angel
    Department of Computer Engineering, University of Alcalá, 28801 Alcalá de Henares, Spain..
    CCIBA*: An Improved BA* Based Collaborative Coverage Path Planning Method for Multiple Unmanned Surface Mapping Vehicles2022In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 23, no 10, p. 19578-19588Article in journal (Refereed)
    Abstract [en]

    The main emphasis of this work is placed on the problem of collaborative coverage path planning for unmanned surface mapping vehicles (USMVs). As a result, the collaborative coverage improved BA* algorithm (CCIBA*) is proposed. In the algorithm, coverage path planning for a single vehicle is achieved by task decomposition and level map updating. Then a multiple USMV collaborative behavior strategy is designed, which is composed of area division, recall and transfer, area exchange and recognizing obstacles. Moverover, multiple USMV collaborative coverage path planning can be achieved. Consequently, a high-efficiency and high-quality coverage path for USMVs can be implemented. Water area simulation results indicate that our CCIBA* brings about a substantial increase in the performances of path length, number of turning, number of units and coverage rate.

  • 11.
    Omar, Azhar-Husain
    et al.
    University of Pretoria,Department of Electrical, Electronic and Computer Engineering,Pretoria,South Africa,0082.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). University of Pretoria,Department of Electrical, Electronic and Computer Engineering,Pretoria,South Africa,0082.
    Bogatinoska, Dijana Capeska
    Machine Intelligence and Robotics University of Information Science and Technology "St. Paul the Apostle",Faculty of Applied IT,Ohrid,North Macedonia.
    Energy management system based on wireless sensor networks and power line communications2022In: 2022 International Conference Automatics and Informatics (ICAI), Institute of Electrical and Electronics Engineers (IEEE), 2022Conference paper (Refereed)
    Abstract [en]

    In this paper, we developed a power line communication (PLC) system design, power measurement sensor design, light sensor design, temperature sensor design, and the integration of these components into an advanced sensor network to allow for energy metering and environment monitoring. A power measurement sensor was implemented through a current and voltage sensing circuitry was interfaced multi-plug power adapter to allow for non-invasive measurement of power usage of appliances. The sensors produce signals corresponding to the drawn voltage and current, which are then sampled and processed to estimate power usage. The PLC communications operated at an average accuracy of 95%. The power measurement sensor had an accuracy of 92%, which made it appropriate for home user estimations. The light sensor had an accuracy of between 91-97%, which was suitable for home lighting measurement.

  • 12.
    Hu, X.
    et al.
    School of Mathematics and Statistics Science, Ludong University, Yantai, Shandong 264025, China..
    Zhu, G.
    Marine College, Zhejiang Ocean University, Zhoushan 316022, China..
    Ma, Y.
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China..
    Li, Z.
    Faculty of Mechanical Engineering, Opole University of Technology, 45-758 Opole, Poland..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sotelo, M.
    School of Mathematics and Statistics Science, Ludong University, Yantai, Shandong 264025, China..
    Event-Triggered Adaptive Fuzzy Setpoint Regulation of Surface Vessels With Unmeasured Velocities Under Thruster Saturation Constraints2022In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 23, no 8, p. 13463-13472Article in journal (Refereed)
    Abstract [en]

    This article investigates the event-triggered adaptive fuzzy output feedback setpoint regulation control for the surface vessels. The vessel velocities are noisy and small in the setpoint regulation operation and the thrusters have saturation constraints. A high-gain filter is constructed to obtain the vessel velocity estimations from noisy position and heading. An auxiliary dynamic filter with control deviation as the input is adopted to reduce thruster saturation effects. The adaptive fuzzy logic systems approximate vessel's uncertain dynamics. The adaptive dynamic surface control is employed to derive the event-triggered adaptive fuzzy setpoint regulation control depending only on noisy position and heading measurements. By the virtue of the event-triggering, the vessel's thruster acting frequencies are reduced such that the thruster excessive wear is avoided. The computational burden is reduced due to the differentiation avoidance for virtual stabilizing functions required in the traditional backstepping. It is analyzed that the event-triggered adaptive fuzzy setpoint regulation control maintains position and heading at desired points and ensures the closed-loop semi-global stability. Both theoretical analyses and simulations with comparisons validate the effectiveness and the superiority of the control scheme. 

  • 13.
    Zhu, G.
    et al.
    Maritime College, Zhejiang Ocean University, Zhoushan 316022, China..
    Ma, Y.
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan 430063, China.
    Li, Z.
    School of Engineering, Ocean University of China, Qingdao 266110, China, and also with the Yonsei Frontier Lab, Yonsei University, Seoul 03722, Republic of Korea.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Sotelo, M.
    Department of Computer Engineering. University of Alcalá, 28806 Alcalá de Henares, Spain.
    Event-Triggered Adaptive Neural Fault-Tolerant Control of Underactuated MSVs With Input Saturation2022In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 23, no 7, p. 7045-7057Article in journal (Refereed)
    Abstract [en]

    This paper investigates the tracking control problem of marine surface vessels (MSVs) in the presence of uncertain dynamics and external disturbances. The facts that actuators are subject to undesirable faults and input saturation are taken into account. Benefiting from the smoothness of the Gaussian error function, a novel saturation function is introduced to replace each nonsmooth actuator saturation nonlinearity. Applying the hand position approach, the original motion dynamics of underactuated MSVs are transformed into a standard integral cascade form so that the vector design method can be used to solve the control problem for underactuated MSVs. By combining the neural network technique and virtual parameter learning algorithm with the vector design method, and introducing an event triggering mechanism, a novel event-triggered indirect neuroadaptive fault-tolerant control scheme is proposed, which has several notable characteristics compared with most existing strategies: 1) it is not only robust and adaptive to uncertain dynamics and external disturbances but is also tolerant to undesirable actuator faults and saturation; 2) it reduces the acting frequency of actuators, thereby decreasing the mechanical wear of the MSV actuators, via the event-triggered control (ETC) technique; 3) it guarantees stable tracking without the a priori knowledge of the dynamics of the MSVs, external disturbances or actuator faults; and 4) it only involves two parameter adaptations--a virtual parameter and a lower bound on the uncertain gains of the actuators--and is thus more affordable to implement. On the basis of the Lyapunov theorem, it is verified that all signals in the tracking control system of the underactuated MSVs are bounded. Finally, the effectiveness of the proposed control scheme is demonstrated by simulations and comparative results. 

  • 14.
    Tseng, Fan-Hsun
    et al.
    Natl Cheng Kung Univ, Dept Comp Sci & Informat Engn, Tainan, Taiwan..
    Chen, Chi-Yuan
    Natl Ilan Univ, Dept Comp Sci & Informat Engn, Yilan, Taiwan..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Nakano, Tadashi
    Osaka City Univ, Grad Sch Engn, Osaka, Japan..
    Zhang, Zhenjiang
    Beijing Jiaotong Univ, Sch Software Engn, Beijing, Peoples R China..
    Guest Editorial: AI-enabled intelligent network for 5G and beyond2022In: IET Communications, ISSN 1751-8628, E-ISSN 1751-8636, Vol. 16, no 11, p. 1265-1267Article in journal (Other academic)
  • 15.
    Zietsman, Grant
    et al.
    Department of Electrical, Electronic and Computer Engineering, University of Pretoria, South Africa.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). Department of Electrical, Electronic and Computer Engineering, University of Pretoria, South Africa.
    Modelling of a Speech-to-Text Recognition System for Air Traffic Control and NATO Air Command2022In: Journal of Internet Technology, ISSN 1607-9264, E-ISSN 2079-4029, Vol. 23, no 7, p. 1527-1539Article in journal (Refereed)
    Abstract [en]

    Accent invariance in speech recognition is a chal- lenging problem especially in the are of aviation. In this paper a speech recognition system is developed to transcribe accented speech between pilots and air traffic controllers. The system allows handling of accents in continuous speech by modelling phonemes using Hidden Markov Models (HMMs) with Gaussian mixture model (GMM) probability density functions for each state. These phonemes are used to build word models of the NATO phonetic alphabet as well as the numerals 0 to 9 with transcriptions obtained from the Carnegie Mellon University (CMU) pronouncing dictionary. Mel-Frequency Cepstral Co-efficients (MFCC) with delta and delta-delta coefficients are used for the feature extraction process. Amplitude normalisation and covariance scaling is implemented to improve recognition accuracy. A word error rate (WER) of 2% for seen speakers and 22% for unseen speakers is obtained.

  • 16.
    Huang, H.
    et al.
    Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing 210013, China.
    Hu, C.
    Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing 210013, China..
    Zhu, J.
    School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210013, China..
    Wu, M.
    Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing University of Posts and Telecommunications, Nanjing 210013, China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Stochastic Task Scheduling in UAV-Based Intelligent On-Demand Meal Delivery System2022In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 23, no 8, p. 13040-13054Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate the dynamic task scheduling problem with stochastic task arrival times and due dates in the UAV-based intelligent on-demand meal delivery system (UIOMDS) to improve the efficiency. The objective is to minimize the total tardiness. The new constraints and characteristics introduced by UAVs in the problem model are fully studied. An iterated heuristic framework SES (Stochastic Event Scheduling) is proposed to periodically schedule tasks, which consists of a task collection and a dynamic task scheduling phases. Two task collection strategies are introduced and three Roulette-based flight dispatching approaches are employed. A simulated annealing based local search method is integrated to optimize the solutions. The experimental results show that the proposed algorithm is robust and more effective compared with other two existing algorithms.

  • 17.
    Hua, D.
    et al.
    China University of Mining and Technology, Xuzhou, China.
    Liu, X.
    China University of Mining and Technology, Xuzhou, China.
    Li, W.
    University of Wollongong, Wollongong, NSW, Australia.
    Krolczyk, G.
    Opole University of Technology, Opole, Poland.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Li, Z.
    Yonsei University, Seoul, South Korea.
    A Novel Ferrofluid Rolling Robot: Design, Manufacturing, and Experimental Analysis2021In: IEEE Transactions on Instrumentation and Measurement, ISSN 0018-9456, E-ISSN 1557-9662, Vol. 70, article id 9495803Article in journal (Refereed)
    Abstract [en]

    With the increasing applications of magnetic robots in medical instruments, the research on different structures and locomotion approaches of magnetic robots has become a hotspot in recent years. A ferrofluid rolling robot (FRR) with magnetic actuation is proposed and enabled to realize a novel locomotion approach in this article. The drive performance of ferrofluid is elaborated, which is characterized by the magnetic torque of a rectangle-shaped object filled with ferrofluid under magnetic field. First, the proposed structure and locomotion mechanism of the FRR are detailed. Moreover, based on the established mathematical models of the FRR, the simulations with straight and turning locomotion are carried out, respectively. Finally, the FRR prototype is manufactured by 3-D printing, and experimental results demonstrate that the feasibility of straight and turning locomotion is verified. The locomotion performance of the FRR is in good agreement with the theoretical models where the root mean square (rms) value of displacement for experiments and simulations is 1.2 mm. In this work, the proposed FRR can automatically switch from straight to turning locomotion with a fast response in an external magnetic field, and does not has magnetism when without a magnetic field. 

  • 18.
    Ma, Yulin
    et al.
    Tsinghua University, Suzhou, China.
    Li, Zhixiong
    Ocean University of China, Tsingtao, China; Yonsei University, Seoul, South Korea.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Zheng, Sifa
    Tsinghua University, Suzhou, China.
    Angel Sotelo, Miguel
    University of Alcalá, Alcalá de Henares, Spain.
    A novel multi-mode hybrid control method for cooperative driving of an automated vehicle platoon2021In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 8, no 7, p. 5822-5838Article in journal (Refereed)
    Abstract [en]

    A multi-mode hybrid automaton is proposed for setting vehicle platoon modes with velocity, distance, length, lane position and other state information. Based on a vehicle platoon shift movement under different modes, decisions are made based on key conditional actions such as sudden acceleration changes because of vehicle distance changes, emergency braking to avoid collisions and free-lane changing choices adapted to various traffic conditions, so as to ensure effortless movement and safety in multi-mode shift. With a 3-degree (longitudinal, lateral, and yaw directions) of freedom coupled model, a hybrid vehicle platoon controller is proposed using non-singular terminal sliding mode control to ensure fast and steady tracking on the hybrid automaton outputs during the multi-mode shift process. Convergence of the hybrid controller in finite time is also analyzed with the Lyapunov exponential stability. The analysis result proves that the proposed controller not only ensures the stability of the individual vehicle and the vehicle platoon, but also ensures stability of the multi-mode shift movement system. The proposed cooperative driving strategy for vehicle platoon is evaluated using simulations, where varying traffic conditions and the influence of cutting off are considered in conjunction with demonstration simulations of a vehicle platoon’s cruising, following, lane changing, overtaking and moving in/out of garage functions.

  • 19.
    Sha, Chao
    et al.
    chool of Computer Science Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China.
    Song, Dandan
    chool of Computer Science Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, 210003, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    A Periodic and Distributed Energy Supplement Method based on Maximum Recharging Benefit in Sensor Networks2021In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 8, no 4, p. 2649-2669Article in journal (Refereed)
    Abstract [en]

    The issue of using vehicles to wirelessly recharge nodes for energy supplement in Wireless Sensor Networks has become a research hotspot in recent works. Unfortunately, most of the researches did not consider the rationality of the recharging request threshold and also overlooked the difference of node’s power consumption, which may lead to premature death of nodes as well as low efficiency of Wireless Charging Vehicles(WCVs). In order to solve the above problems, a Periodic and Distributed Energy Supplement Method based on maximum recharging benefit (PDESM) is proposed in this paper. Firstly, to avoid frequent recharging requests from nodes, we put forward an annuluses based cost-balanced data uploading strategy under deterministic deployment. Then, one WCV in each annulus periodically selects and recharges nodes located in this region which send the energy supplement requests. In addition, the predicted value of power consumption of nodes are calculated out according to the real-time energy consumption rate, and thus the most appropriate recharging request threshold is obtained. Finally, a moving path optimization scheme based on Minimum Spanning Tree is constructed for distributed recharging. Simulation results show that, PDESM performs well on enhancing the proportion of the alive nodes as well as the wireless recharging efficiency compared with NFAOC and FCFS. Moreover, it also has advantage in balancing the energy consumption of WCVs.

  • 20.
    Zhu, Guibing
    et al.
    Zhejiang Ocean Univ, Marine Coll, Zhoushan 316022, Peoples R China..
    Ma, Yong
    Wuhan Univ Technol, Sch Nav, Hubei Key Lab Inland Shipping Technol, Wuhan 430063, Peoples R China..
    Li, Zhixiong
    Ocean Univ China, Sch Engn, Qingdao 266110, Peoples R China.;Yonsei Univ, Yonsei Frontier Lab, Seoul 03722, South Korea..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Sotelo, M.
    Univ Alcala De Henares, Dept Comp Engn, Madrid 28806, Spain..
    Adaptive Neural Output Feedback Control for MSVs With Predefined Performance2021In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 70, no 4, p. 2994-3006Article in journal (Refereed)
    Abstract [en]

    In this paper, we investigate the problem of trajectory tracking control for marine surface vehicles (MSVs), which are subject to dynamic uncertainties, external disturbances and unmeasurable velocities. To recover the unmeasurable velocities, a novel adaptive neural network-based (NN-based) state observer is constructed. To guarantee the transient and steady-state tracking performance of the system, a novel nonlinear transformation method is proposed by employing a tracking error transformation together with a newly constructed performance function, which is characterized by a user-defined settling time and tracking control accuracy. With the aid of the state observer and the nonlinear transformation method in combination with the adaptive NN technique and vector-backstepping design tool, an adaptive neural output-feedback trajectory tracking control scheme with predefined performance is developed. With regard to the developed control scheme, uncertainties can be reconstructed only by utilizing the position and heading of the MSVs. Independent designs of the state observer and the controller can be achieved, and the position tracking error can be guaranteed to fall into a predefined residual set in the user-defined time frame and remain in the above set. A rigorous stability analysis validates that all signals in the closed-loop trajectory tracking control system for MSVs are uniformly ultimately bounded. Simulation results verify the effectiveness of the developed adaptive neural output-feedback trajectory tracking control scheme.

  • 21.
    Huang, Haiping
    et al.
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Wu, Yuhan
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Xiao, Fu
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). University of Pretoria, Pretoria, South Africa.
    An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment2021In: IEEE Transactions on Computational Social Systems, E-ISSN 2329-924X, Vol. 8, no 5, p. 1108-1120Article in journal (Refereed)
    Abstract [en]

    Named data networking (NDN) is an emerging information-centric networking paradigm, in which the Internet of Things (IoT) achieves excellent scalability. Recent literature proposes the concept of NDN-IoT, which maximizes the expansion of IoT applications by deploying NDN in the IoT. In the NDN, the security is built into the network by embedding a public signature in each data package to verify the authenticity and integrity of the content. However, signature schemes in the NDN-IoT environment are facing several challenges, such as signing security challenge for resource-constrained IoT end devices (EDs) and verification efficiency challenge for NDN routers. This article mainly studies the data package authentication scheme in the package-level security mechanism. Based on mobile edge computing (MEC), an efficient certificateless group signature scheme featured with anonymity, unforgeability, traceability, and key escrow resilience is proposed. The regional and edge architecture is utilized to solve the device management problem of IoT, reducing the risks of content pollution attacks from the data source. By offloading signature pressure to MEC servers, the contradiction between heavy overhead and shortage of ED resources is avoided. Moreover, the verification efficiency in NDN router is much improved via batch verification in the proposed scheme. Both security analysis and experimental simulations show that the proposed MEC-based certificateless group signature scheme is provably secure and practical.

  • 22.
    Wang, Wenming
    et al.
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Jiangsu, Peoples R China.;Anqing Normal Univ, Sch Comp & Informat, Anqing 246011, Anhui, Peoples R China..
    Huang, Haiping
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Jiangsu, Peoples R China.;Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China..
    Xue, Lingyan
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Jiangsu, Peoples R China.;Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China..
    Li, Qi
    Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Jiangsu, Peoples R China.;Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Zhang, Youzhi
    Anqing Normal Univ, Sch Comp & Informat, Anqing 246011, Anhui, Peoples R China..
    Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment2021In: Journal of systems architecture, ISSN 1383-7621, E-ISSN 1873-6165, Vol. 115, article id 102024Article in journal (Refereed)
    Abstract [en]

    Intelligent telehealth system (ITS) provides patients and medical institutions with a lot of convenience, medical institutions can achieve medical services for patients in time through monitored health data. However, as the scope of people?s daily activities extends, the traditional single-server architecture is no longer applicable. To deal with this problem, a multi-server architecture has been proposed recently while there remains security and privacy challenges, including handover authentication. In this paper, we investigate a blockchain-assisted handover authentication and key agreement scheme for ITS in a multi-server edge computing environment. Specifically, we first propose a novel handover authentication model of ITS with multi-server edge computing architecture. Second, the proposed handover authentication scheme allows the authenticated server to assist users subsequently authenticate with other server, thereby achieving interactions with the server anytime and anywhere with low overhead. Finally, blockchain technology and strong anonymity mechanism are introduced to protect users? privacy strictly. To our best knowledge, the proposed scheme is the first in the literature to provide efficient authentication, strict anonymity and computational load transfer simultaneously. The security analysis and performance evaluation show that our scheme can not only satisfy the security requirements but also achieve higher efficiency in computation and communication cost.

  • 23.
    Li, Yicheng
    et al.
    Jiangsu Univ, Automot Engn Res Inst, Zhenjiang 212013, Jiangsu, Peoples R China.;Wuhan Univ Technol, Hubei Key Lab Transportat Internet Things, Wuhan 430063, Peoples R China..
    Cai, Yingfeng
    Jiangsu Univ, Automot Engn Res Inst, Zhenjiang 212013, Jiangsu, Peoples R China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Wang, Hai
    Jiangsu Univ, Automot Engn Res Inst, Zhenjiang 212013, Jiangsu, Peoples R China..
    Angel Sotelo, Miguel
    Univ Alcala De Henares, Dept Comp Engn, Alcala De Henares 28801, Madrid, Spain..
    Li, Zhixiong
    Ocean Univ China, Sch Engn, Qingdao 266100, Peoples R China.;Yonsei Univ, Yonsei Frontier Lab, 50 Yonsei Ro, Seoul 03722, South Korea..
    Creating navigation map in semi-open scenarios for intelligent vehicle localization using multi-sensor fusion2021In: Expert systems with applications, ISSN 0957-4174, E-ISSN 1873-6793, Vol. 184, article id 115543Article in journal (Refereed)
    Abstract [en]

    In order to pursue high-accuracy localization for intelligent vehicles (IVs) in semi-open scenarios, this study proposes a new map creation method based on multi-sensor fusion technique. In this new method, the road scenario fingerprint (RSF) was employed to fuse the visual features, three-dimensional (3D) data and trajectories in the multi-view and multi-sensor information fusion process. The visual features were collected in the front and downward views of the IVs; the 3D data were collected by the laser scanner and the downward camera and a homography method was proposed to reconstruct the monocular 3D data; the trajectories were computed from the 3D data in the downward view. Moreover, a new plane-corresponding calibration strategy was developed to ensure the fusion quality of sensory measurements of the camera and laser. In order to evaluate the proposed method, experimental tests were carried out in a 5 km semi-open ring route. A series of nodes were found to construct the RSF map. The experimental results demonstrate that the mean error of the nodes between the created and actual maps was 2.7 cm, the standard deviation of the nodes was 2.1 cm and the max error was 11.8 cm. The localization error of the IV was 10.8 cm. Hence, the proposed RSF map can be applied to semi-open scenarios in practice to provide a reliable basic for IV localization.

  • 24.
    Liu, Wi
    et al.
    Xuzhou, China.
    Li, Zhixiong
    Iowa State University, USA.
    Sun, Shuaishua
    Tohoku University, 13101 Sendai, Miyagi, Japan.
    Gupta, Munish Kumar
    Shandong University, China.
    Du, H.
    University of Wollongong, Australia.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Sotelo, Miguel Angel
    University of Alcal, Spain.
    Li, Weihua
    University of Wollongong, Australia.
    Design a Novel Target to Improve Positioning Accuracy of Autonomous Vehicular Navigation System in GPS Denied Environments2021In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 17, no 11, p. 7575-7588Article in journal (Refereed)
    Abstract [en]

    Accurate positioning is an essential requirement of autonomous vehicular navigation system (AVNS) for safe driving. Although the vehicle position can be obtained in Global Position System (GPS) friendly environments, in GPS denied environments (such as suburb, tunnel, forest or underground scenarios) the positioning accuracy of AVNS is easily reduced by the trajectory error of the vehicle. In order to solve this problem, the plane, sphere, cylinder and cone are often selected as the ground control targets to eliminate the trajectory error for AVNS. However, these targets usually suffer from the limitations of incidence angle, measuring range, scanning resolution, and point cloud density, etc. To bridge this research gap, an adaptive continuum shape constraint analysis (ACSCA) method is presented in this paper to design a new target with optimized identifiable specific shape to eliminate the trajectory error for AVNS. First of all, according to the proposed ACSCA method, we conduct extensive numerical simulations to explore the optimal ranges of the vertexes and the faces for target shape design, and based on these trials, the optimal target shape is found as icosahedron, which composes of 10 vertexes, 20 faces and combines the properties of plane and volume target. Moreover, the algorithm of automatic detection and coordinate calculation is developed to recognize the icosahedron target and calculate its coordinates information for AVNS. Lastly, a series of experimental investigation were performed to evaluate the effectiveness of our designed icosahedron target in GPS denied environments. The experimental results demonstrate that compared with the plane, sphere, cylinder and cone targets, the developed icosahedron target can produce better performances than the above targets in terms of the clustered minimum registration error, ambiguity and range of field-of-view; also can significantly improve the positioning accuracy of AVNS in GPS denied environments.

  • 25.
    Kong, Tianjiao
    et al.
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Shao, Jie
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Hu, Jiuyuan
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Yang, Xin
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Yang, Shiyiling
    College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China; Key Laboratory of Underwater Acoustic Signal Processing, Ministry of Education, Southeast University, Nanjing 210096, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    EEG-Based Emotion Recognition Using an Improved Weighted Horizontal Visibility Graph2021In: Sensors, E-ISSN 1424-8220, Vol. 21, no 5, article id 1870Article in journal (Refereed)
    Abstract [en]

    Emotion recognition, as a challenging and active research area, has received considerable awareness in recent years. In this study, an attempt was made to extract complex network features from electroencephalogram (EEG) signals for emotion recognition. We proposed a novel method of constructing forward weighted horizontal visibility graphs (FWHVG) and backward weighted horizontal visibility graphs (BWHVG) based on angle measurement. The two types of complex networks were used to extract network features. Then, the two feature matrices were fused into a single feature matrix to classify EEG signals. The average emotion recognition accuracies based on complex network features of proposed method in the valence and arousal dimension were 97.53% and 97.75%. The proposed method achieved classification accuracies of 98.12% and 98.06% for valence and arousal when combined with time-domain features.

    Download full text (pdf)
    fulltext
  • 26.
    Ma, Yong
    et al.
    Hubei Key Laboratory of Inland Shipping Technology, Wuhan, China; School of Navigation, Wuhan University of Technology, Wuhan, China.
    Nie, Zongqiang
    Hubei Key Laboratory of Inland Shipping Technology, Wuhan, China; School of Navigation, Wuhan University of Technology, Wuhan, China.
    Hu, Songlin
    Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing, China.
    Li, Zhixiong
    Department of Marine Engineering, Ocean University of China, Tsingdao, China; School of Mechanical, Materials, Mechatronic and Biomedical Engineering, University of Wollongong, Wollongong, NSW, Australia.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Sotelo, M.
    Department of Computer Engineering, University of Alcalá, Alcalá de Henares, Spain.
    Fault Detection Filter and Controller Co-Design for Unmanned Surface Vehicles Under DoS Attacks2021In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 22, no 3, p. 1422-1434Article in journal (Refereed)
    Abstract [en]

    This paper addresses the co-design problem of a fault detection filter and controller for a networked-based unmanned surface vehicle (USV) system subject to communication delays, external disturbance, faults, and aperiodic denial-of-service (DoS) jamming attacks. First, an event-triggering communication scheme is proposed to enhance the efficiency of network resource utilization while counteracting the impact of aperiodic DoS attacks on the USV control system performance. Second, an event-based switched USV control system is presented to account for the simultaneous presence of communication delays, disturbance, faults, and DoS jamming attacks. Third, by using the piecewise Lyapunov functional (PLF) approach, criteria for exponential stability analysis and co-design of a desired observer-based fault detection filter and an event-triggered controller are derived and expressed in terms of linear matrix inequalities (LMIs). Finally, the simulation results verify the effectiveness of the proposed co-design method. The results show that this method not only ensures the safe and stable operation of the USV but also reduces the amount of data transmissions.

  • 27.
    Hamzaoui, Raouf
    et al.
    De Montfort Univ, Leicester LE1 9BH, Leics, England..
    Ning, Huansheng
    Univ Sci & Technol, Beijing 100083, Peoples R China..
    Wang, Chonggang
    InterDigital Commun, Wilmington, DE 19809 USA..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Ding, Wei
    Natl Sci Fdn, Div Informat & Intelligent Syst, Boston, MA 02125 USA.;Univ Massachusetts, Boston, MA 02125 USA..
    Guest Editorial Special Section on Hybrid Human-Artificial Intelligence for Multimedia Computing2021In: IEEE transactions on multimedia, ISSN 1520-9210, E-ISSN 1941-0077, Vol. 23, p. 2185-2187Article in journal (Other academic)
    Abstract [en]

    The papers in this special section focus on hybrid human-artificial intelligene (AI) for multimedia computing. Multimedia computing has experienced a tremendous growth in the last decades, with applications ranging from multimedia information retrieval and analysis to multimedia compression and communication. However, the increasing volume and complexity of multimedia data driven by the large-scale spread of various new devices and sensors is posing a serious challenge to traditional multimedia computing algorithms. Artificial intelligence (AI), in particular deep learning techniques, has improved the performance of multimedia computing algorithms for many tasks, including computer vision and natural language processing. But unlike humans, AI is poor at solving tasks across multiple domains or in dealing with an uncontrolled dynamic environment. Hybrid Human-Artificial Intelligence (HH-AI) is an emerging field that aims at combining the benefits of human intelligence, such as semantic association, inference, and generalization with the computing power of AI.

  • 28.
    Zhao, Yujiao
    et al.
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan, China.
    Qi, Xin
    School of Computer Science and Technology, Wuhan University of Technology, Wuhan, China.
    Ma, Yong
    Hubei Key Laboratory of Inland Shipping Technology, School of Navigation, Wuhan University of Technology, Wuhan, China.
    Li, Zhixiong
    School of Engineering, Ocean University of China, Tsingtao, China; School of Mechanical, Materials, Mechatronics, and Biomedical Engineering, University of Wollongong, Wollongong, NSW, Australia.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Angel Sotelo, Miguel
    University of Alcalá, Alcalá de Henares, Spain.
    Path Following Optimization for an Underactuated USV Using Smoothly-Convergent Deep Reinforcement Learning2021In: IEEE transactions on intelligent transportation systems (Print), ISSN 1524-9050, E-ISSN 1558-0016, Vol. 22, no 10, p. 6208-6220Article in journal (Refereed)
    Abstract [en]

    This paper aims to solve the path following problem for an underactuated unmanned-surface-vessel (USV) based on deep reinforcement learning (DRL). A smoothly-convergent DRL (SCDRL) method is proposed based on the deep Q network (DQN) and reinforcement learning. In this new method, an improved DQN structure was developed as a decision-making network to reduce the complexity of the control law for the path following of a three-degree of freedom USV model. An exploring function was proposed based on the adaptive gradient descent to extract the training knowledge for the DQN from the empirical data. In addition, a new reward function was designed to evaluate the output decisions of the DQN, and hence, to reinforce the decision-making network in controlling the USV path following. Numerical simulations were conducted to evaluate the performance of the proposed method. The analysis results demonstrate that the proposed SCDRL converges more smoothly than the traditional deep Q learning while the path following error of the SCDRL is comparable to existing methods. Thanks to good usability and generality of the proposed method for USV path following, it can be applied to practical applications.

  • 29. Liu, Wanli
    et al.
    Li, Zhixiong
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Angel Sotelo, Miguel
    Ma, Zhenjun
    Li, Weihua
    A Novel Multifeature Based On-Site Calibration Method for LiDAR-IMU System2020In: IEEE Transactions on Industrial Electronics, ISSN 0278-0046, E-ISSN 1557-9948, Vol. 67, no 11, p. 9851-9861Article in journal (Refereed)
    Abstract [en]

    Calibration is an essential prerequisite for the combined application of light detection and ranging (LiDAR) and inertial measurement unit (IMU). However, current LiDAR-IMU calibration usually relies on particular artificial targets or facilities and the intensive labor greatly limits the calibration flexibility. For these reasons, this article presents a novel multifeature based on-site calibration method for LiDAR-IMU system without any artificial targets or specific facilities. This new on-site calibration combines the point/sphere, line/cylinder, and plane features from LiDAR scanned data to reduce the labor intensity. The main contribution is that a new method is developed for LiDAR extrinsic parameters on-site calibration and this method could incorporate two or more calibration models to generate more accurate calibration results. First of all, the calibration of LiDAR extrinsic parameters is performed through estimating the geometric features and solving the multifeature geometric constrained optimization problem. Then, the relationships between LiDAR and IMU intrinsic calibration parameters are determined by the coordinate transformation. Lastly, the full information maximum likelihood estimation (FIMLE) method is applied to solve the optimization of the IMU intrinsic parameters calibration. A series of experiments are conducted to evaluate the proposed method. The analysis results demonstrate that the proposed on-site calibration method can improve the performance of the LiDAR-IMU.

  • 30. Sha, Chao
    et al.
    Ren, Chunhui
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Wu, Min
    Huang, Haiping
    Ye, Ning
    A Type of Virtual Force based Energy-hole Mitigation Strategy for Sensor Networks2020In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 20, no 2, p. 1105-1119Article in journal (Refereed)
    Abstract [en]

    In the era of Big Data and Mobile Internet, how to ensure the terminal devices (e.g., sensor nodes) work steadily for a long time is one of the key issues to improve the efficiency of the whole network. However, a lot of facts have shown that the unattended equipments are prone to failure due to energy exhaustion, physical damage and other reasons. This may result in the emergence of energy-hole, seriously affecting network performance and shortening its lifetime. To reduce data redundancy and avoid the generation of sensing blind areas, a type of Virtual Force based Energy-hole Mitigation strategy (VFEM) is proposed in this paper. Firstly, the virtual force (gravitation and repulsion) between nodes is introduced that makes nodes distribute as uniformly as possible. Secondly, in order to alleviate the "energy-hole problem", the network is divided into several annuluses with the same width. Then, another type of virtual force, named "virtual gravity generated by annulus", is proposed to further optimize the positions of nodes in each annulus. Finally, with the help of the "data forwarding area", the optimal paths for data uploading can be selected out, which effectively balances energy consumption of nodes. Experiment results show that, VFEM has a relatively good performance on postponing the generation time of energy-holes as well as prolonging the network lifetime compared with other typical energy-hole mitigation methods.

    Download full text (pdf)
    fulltext
  • 31.
    Soni, Nikheel
    et al.
    Amazon Web Services, Cape Town, South Africa; University of Pretoria, Pretoria, South Africa.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). University of Pretoria, Pretoria, South Africa.
    Bogatinoska, Dijana Capeska
    Malmö University, Internet of Things and People (IOTAP).
    Algorithms for Computing in Fog Systems: Principles, Algorithms, and Challenges2020In: 2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO), 2020, p. 473-478Conference paper (Refereed)
    Abstract [en]

    Fog computing is an architecture that is used to distribute resources such as computing, storage, and memory closer to end-user to improve applications and service deployment. The idea behind fog computing is to improve cloud computing and IoT infrastructures by reducing compute power, network bandwidth, and latency as well as storage requirements. This paper presents an overview of what fog computing is, related concepts, algorithms that are present to improve fog computing infrastructure as well as challenges that exist. This paper shows that there is a great advantage of using fog computing to support cloud and IoT systems.

  • 32. Liu, Yongshuang
    et al.
    Huang, Haiping
    Xiao, Fu
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Wang, Wenming
    Classification and recognition of encrypted EEG data based on neural network2020In: Journal of Information Security and Applications, ISSN 2214-2134, E-ISSN 2214-2126, Vol. 54, article id 102567Article in journal (Refereed)
    Abstract [en]

    With the rapid development of Machine Learning technology applied in electroencephalography (EEG) signals, Brain-Computer Interface (BCI) has emerged as a novel and convenient human-computer interaction for smart home, intelligent medical and other Internet of Things (IoT) scenarios. However, security issues such as sensitive information disclosure and unauthorized operations have not received sufficient concerns. There are still some defects with the existing solutions to encrypted EEG data such as low accuracy, high time complexity or slow processing speed. For this reason, a classification and recognition method of encrypted EEG data based on neural network is proposed, which adopts Paillier encryption algorithm to encrypt EEG data and meanwhile resolves the problem of floating point operations. In addition, it improves traditional feed-forward neural network (FNN) by using the approximate function instead of activation function and realizes multi-classification of encrypted EEG data. Extensive experiments are conducted to explore the effect of several metrics (such as the hidden neuron size and the learning rate updated by improved simulated annealing algorithm) on the recognition results. Followed by security and time cost analysis, the proposed model and approach are validated and evaluated on public EEG datasets provided by PhysioNet, BCI Competition IV and EPILEPSIAE. The experimental results show that our proposal has the satisfactory accuracy, efficiency and feasibility compared with other solutions. (C) 2020 Elsevier Ltd. All rights reserved.

  • 33.
    Chang, Jianghao
    et al.
    Hebei GEO Univ, Sch Explorat Technol & Engn, Shijiazhuang 050031, Hebei, Peoples R China..
    Su, Benyu
    China Univ Min & Technol, Sch Resources & Geosci, Xuzhou 221116, Jiangsu, Peoples R China..
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Xing, Xiuju
    Xian Res Inst Co Ltd, China Coal Technol & Engn Grp Corp, Xian 710077, Shaanxi, Peoples R China..
    Detection of Water-Filled Mining Goaf Using Mining Transient Electromagnetic Method2020In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 16, no 5, p. 2977-2984Article in journal (Refereed)
    Abstract [en]

    Water-filled mining goaves are extremely prone to water inrush accidents in coal mines, and the transient electromagnetic method (TEM) is a good geophysical method for detecting water-rich areas. Considering that conventional TEM was mainly carried out on the ground, to increase the detection resolution, the underground TEM was used to detect the water-filled goaves in this study. Based on the whole-space model, the data-processing method of the underground TEM was studied. The whole-space geoelectric model was established based on actual coal-measure strata data, and the whole-space TEM response of the water-filled goaves was modeled using the finite-difference time-domain method. The results showed that the low-resistance areas of the apparent resistivity contours can accurately reflect the water abundance of the mining goaves. The underground TEM was used to detect the water abundance of the mining goaf in a mine environment and its detection results were consistent with the actual results.

  • 34. Liu, Shu
    et al.
    Shao, Jie
    Kong, Tianjiao
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    ECG Arrhythmia Classification using High Order Spectrum and 2D Graph Fourier Transform2020In: Applied Sciences, E-ISSN 2076-3417, Vol. 10, no 14, article id 4741Article in journal (Refereed)
    Abstract [en]

    Heart diseases are in the front rank among several kinds of life threats, due to its high incidence and mortality. Regarded as a powerful tool in the diagnosis of the cardiac disorder and arrhythmia detection, analysis of electrocardiogram (ECG) signals has become the focus of numerous researches. In this study, a feature extraction method based on the bispectrum and 2D graph Fourier transform (GFT) was developed. High-order matrix founded on bispectrum are extended into structured datasets and transformed into the eigenvalue spectrum domain by GFT, so that features can be extracted from statistical quantities of eigenvalues. Spectral features have been computed to construct the feature vector. Support vector machine based on the radial basis function kernel (SVM-RBF) was used to classify different arrhythmia heartbeats downloaded from the Massachusetts Institute of Technology - Beth Israel Hospital (MIT-BIH) Arrhythmia Database, according to the Association for the Advancement of Medical Instrumentation (AAMI) standard. Based on the cross-validation method, the experimental results depicted that our proposed model, the combination of bispectrum and 2D-GFT, achieved a high classification accuracy of 96.2%.

    Download full text (pdf)
    fulltext
  • 35. Yang, Qing
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Wang, Chonggang
    Rawat, Danda
    Editorial: Industrial Internet: Security, Architectures, and Technologies2020In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 16, no 6, p. 4219-4220Article in journal (Other academic)
    Abstract [en]

    Industrial Internet is applicable across a broad industrial spectrum including manufacturing, aviation, road and rail transport, power, oil and gas, healthcare, smart cities and buildings. Some of the major impacts of the Industrial Internet include the development of new and innovative services and products, which in turn also has economic benefits. The purpose of this special issue is to bring together research studies proposing novel techniques, algorithms, models, and solutions to address challenges such as interoperability, security, and privacy associated with Industrial Internet, blockchain and Cyber-physical systems.

    Download full text (pdf)
    fulltext
  • 36. Li, Jie
    et al.
    Wu, Jinsong
    Hu, Bin
    Wang, Chonggang
    Daneshmand, Mahmoud
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Introduction to the Special Section on Big Data and Artificial Intelligence for Network Technologies2020In: IEEE Transactions on Network Science and Engineering, ISSN 2327-4697, Vol. 7, no 1, p. 1-2Article in journal (Other academic)
    Abstract [en]

    The papers in this special section examines the deployment of Big Data and artificial intelligence for network technologies. The eneration of huge amounts of data, called big data, is creating the need for efficient tools to manage those data. Artificial intelligence (AI) has become the powerful tool in dealing with big data with recent breakthroughs at multiple fronts in machine learning, including deep learning. Meanwhile, information networks are becoming larger and more complicated, generating a huge amount of runtime statistics data such as traffic load, resource usages. The emerging big data and AI technologies may include a bunch of new requirements, applications and scenarios such as e-health, Intelligent Transportation Systems (ITS), Industrial Internet of Things (IIoT), and smart cities in the term of computing networks. The big data and AI driven network technologies also provide an unprecedented patient to discover new features, to characterize user demands and system capabilities in network resource assignment, security and privacy, system architecture, modeling and applications, which needs more explorations. The focus of this special section is to address the big data and artificial intelligence for network technologies. We appreciate contributions to this special section and the valuable and extensive efforts of the reviewers. The topics of this special section range from big data and AI algorithms, models, architecture for networks and systems to network architecture.

    Download full text (pdf)
    fulltext
  • 37. Guo, Xueying
    et al.
    Wang, Wenming
    Huang, Haiping
    Li, Qi
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Location Privacy-Preserving Method Based on Historical Proximity Location2020In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2020, article id 8892079Article in journal (Refereed)
    Abstract [en]

    With the rapid development of Internet services, mobile communications, and IoT applications, Location-Based Service (LBS) has become an indispensable part in our daily life in recent years. However, when users benefit from LBSs, the collection and analysis of users' location data and trajectory information may jeopardize their privacy. To address this problem, a new privacy-preserving method based on historical proximity locations is proposed. The main idea of this approach is to substitute one existing historical adjacent location around the user for his/her current location and then submit the selected location to the LBS server. This method ensures that the user can obtain location-based services without submitting the real location information to the untrusted LBS server, which can improve the privacy-preserving level while reducing the calculation and communication overhead on the server side. Furthermore, our scheme can not only provide privacy preservation in snapshot queries but also protect trajectory privacy in continuous LBSs. Compared with other location privacy-preserving methods such ask-anonymity and dummy location, our scheme improves the quality of LBS and query efficiency while keeping a satisfactory privacy level.

    Download full text (pdf)
    fulltext
  • 38.
    Sha, Chao
    et al.
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, China.
    Sun, Yang
    School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Research on Cost-Balanced Mobile Energy Replenishment Strategy for Wireless Rechargeable Sensor Networks2020In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, ISSN 0018-9545, Vol. 69, no 3, p. 3135-3150Article in journal (Refereed)
    Abstract [en]

    In order to maximize the utilization rate of the Mobile Wireless Chargers (MWCs) and reduce the recharging delay in large-scale Rechargeable Wireless Sensor Networks (WRSNs), a type of C ost- B alanced M obile E nergy R eplenishment S trategy (CBMERS) is proposed in this paper. Firstly, nodes are assigned into groups according to their remaining lifetime, which ensures that only the ones with lower residual energy are recharged in each time slot. Then, to balance energy consumption among multiple MWCs, the moving distance as well as the power cost of the MWC are taken as constraints to get the optimal trajectory allocation scheme. Moreover, by further adjusting the amount of energy being replenished to some sensor nodes, it ensures that the MWC have enough energy to fulfill the recharging task and return back to the base station. Experiment results show that, compared with the Periodic recharging strategy and the C luster based M ultiple C harges C oordination algorithm (C-MCC), the proposed method can improve the recharging efficiency of MWCs by about 48.22% and 43.35%, and the average waiting time of nodes is also reduced by about 55.72% and 30.7%, respectively.

    Download full text (pdf)
    fulltext
  • 39. Du, Sunwen
    et al.
    Feng, Guorui
    Wang, Jianmin
    Feng, Shizhe
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Li, Zhixiong
    A New Machine-Learning Prediction Model for Slope Deformation of an Open-Pit Mine: An Evaluation of Field Data2019In: Energies, E-ISSN 1996-1073, Vol. 12, no 7, article id 1288Article in journal (Refereed)
    Abstract [en]

    Effective monitoring of the slope deformation of an open-pit mine is essential for preventing catastrophic collapses. It is a challenging task to accurately predict slope deformation. To this end, this article proposed a new machine-learning method for slope deformation prediction. Ground-based interferometric radar (GB-SAR) was employed to collect the slope deformation data from an open-pit mine. Then, an ensemble learner, which aggregated a set of weaker learners, was proposed to mine the GB-SAR field data, delivering a slope deformation prediction model. The evaluation of the field data acquired from the Anjialing open-pit mine demonstrates that the proposed slope deformation model was able to precisely predict the slope deformation of the monitored mine. The prediction accuracy of the super learner was superior to those of all the independent weaker learners.

    Download full text (pdf)
    FULLTEXT01
  • 40. Guangming, Shao
    et al.
    Yong, Ma
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Xinping, Yan
    Zhixiong, Li
    A novel cooperative platform design for coupled USV-UAV systems2019In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 15, no 9, p. 4913-4922Article in journal (Refereed)
    Abstract [en]

    This paper presents a novel cooperative USV-UAV platform to form a powerful combination, which offers foundations for collaborative task executed by the coupled USV-UAV systems. Adjustable buoys and unique carrier deck for the USV are designed to guarantee landing safety and transportation of UAV. The deck of USV is equipped with a series of sensors, and a multi-ultrasonic joint dynamic positioning algorithm is introduced for resolving the positioning problem of the coupled USV-UAV systems. To fulfill effective guidance for the landing operation of UAV, we design a hierarchical landing guide point generation algorithm to obtain a sequence of guide points. By employing the above sequential guide points, high quality paths are planned for the UAV. Cooperative dynamic positioning process of the USV-UAV systems is elucidated, and then UAV can achieve landing on the deck of USV steadily. Our cooperative USV-UAV platform is validated by simulation and water experiments.

  • 41.
    Qi, Lingtao
    et al.
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Huang, Haiping
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Li, Feng
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Wang, Ruchuan
    Nanjing University of Posts and Telecommunications, Nanjing, China.
    A Novel Shilling Attack Detection Model Based on Particle Filter and Gravitation2019In: China Communications, ISSN 1673-5447, Vol. 16, no 10, p. 112-132Article in journal (Refereed)
    Abstract [en]

    With the rapid development of e-commerce, the security issues of collaborative filtering recommender systems have been widely investigated. Malicious users can benefit from injecting a great quantities of fake profiles into recommender systems to manipulate recommendation results. As one of the most important attack methods in recommender systems, the shilling attack has been paid considerable attention, especially to its model and the way to detect it. Among them, the loose version of Group Shilling Attack Generation Algorithm (GSAGen(l)) has outstanding performance. It can be immune to some PCC (Pearson Correlation Coefficient)-based detectors due to the nature of anti-Pearson correlation. In order to overcome the vulnerabilities caused by GSAGen(l), a gravitation-based detection model (GBDM) is presented, integrated with a sophisticated gravitational detector and a decider. And meanwhile two new basic attributes and a particle filter algorithm are used for tracking prediction. And then, whether an attack occurs can be judged according to the law of universal gravitation in decision-making. The detection performances of GBDM, HHT-SVM, UnRAP, AP-UnRAP Semi-SAD, SVM-TIA and PCA-P are compared and evaluated. And simulation results show the effectiveness and availability of GBDM.

  • 42. Guo, Tao
    et al.
    He, Wei
    Jiang, Zhonglian
    Chu, Xiumin
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Li, Zhixiong
    An Improved LSSVM Model for Intelligent Prediction of the Daily Water Level2019In: Energies, E-ISSN 1996-1073, Vol. 12, no 1, article id 112Article in journal (Refereed)
    Abstract [en]

    Daily water level forecasting is of significant importance for the comprehensive utilization of water resources. An improved least squares support vector machine (LSSVM) model was introduced by including an extra bias error control term in the objective function. The tuning parameters were determined by the cross-validation scheme. Both conventional and improved LSSVM models were applied in the short term forecasting of the water level in the middle reaches of the Yangtze River, China. Evaluations were made with both models through metrics such as RMSE (Root Mean Squared Error), MAPE (Mean Absolute Percent Error) and index of agreement (d). More accurate forecasts were obtained although the improvement is regarded as moderate. Results indicate the capability and flexibility of LSSVM-type models in resolving time sequence problems. The improved LSSVM model is expected to provide useful water level information for the managements of hydroelectric resources in Rivers.

    Download full text (pdf)
    FULLTEXT01
  • 43. Yongliang, Cheng
    et al.
    Shao, Jie
    Yihe, Zhao
    Shu, Liu
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    An Improved Separation Method of Multi-Components Signal for Sensing Based on Time-Frequency Representation2019In: Review of Scientific Instruments, ISSN 0034-6748, E-ISSN 1089-7623, Vol. 6, no 90, article id 064901Article in journal (Refereed)
    Abstract [en]

    In many situations, it is essential to analyze a nonstationary signal for sensing whose components not only overlapped in time-frequency domain (TFD) but also have different durations. In order to address this issue, an improved separation method based on the time-frequency distribution is proposed in this paper. This method computes the time-frequency representation (TFR) of the signal and extracts the instantaneous frequency (IF) of components by a two-dimensional peak search in a limited area in which normalized energy is greater than the set threshold value. If there is more than one peak from a TFR, IFs of components can be determined and linked by a method of minimum slope difference. After the IFs are obtained, the improved time-frequency filtering algorithm is used to reconstruct the component of the signal. We continue this until the residual energy in the TFD is smaller than a fraction of the initial TFD energy. Different from previous methods, the improved method can separate the signal whose components overlapped in TFR and have different time durations. Simulation results have shown the effectiveness of the proposed method.

    Download full text (pdf)
    fulltext
  • 44. Jordaan, Coert
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Design of a monitoring and safety system for underground mines using wireless sensor networks2019In: International Journal of Ad Hoc and Ubiquitous Computing, ISSN 1743-8225, E-ISSN 1743-8233, Vol. 32, no 1, p. 14-28Article in journal (Refereed)
    Abstract [en]

    In this paper, a mine safety system using a wireless sensor network (WSN) is implemented. Investigations are done into design of sensors and wireless communication to profile the underground mining environment. The information is used to design and implement a robust hardware-based sensor node with standalone microcontrollers that sample data from six different sensors, namely temperature, humidity, airflow speed, noise, dust and gas level sensors, and transmit the processed data to a graphical user interface. The system reliability and accuracy is tested in a simulated mine and provided linear and accurate results over nearly a month of daily testing. It is observed that critical success factors for the wireless sensor node is its robust design, which does not easily fail or degrade in performance. The node also has strong, self-adaptive networking functionality, to recover in the case of a node failure.

  • 45. Chang, Jianghao
    et al.
    Yu, Jingcun
    Li, Juanjuan
    Xue, Guoqiang
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Su, Benyu
    Diffusion Law of Whole-Space Transient Electromagnetic Field Generated by the Underground Magnetic Source and Its Application2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 63415-63425Article in journal (Refereed)
    Abstract [en]

    Mine water inrush stays as one of the major disasters in coalmine production and construction. As one of the principal methods for detecting hidden water-rich areas in coal mines, underground transient electromagnetic method (TEM) adopts the small loop of a magnetic source which generates a kind of whole-space transient electromagnetic field. To study the diffusion of whole-space transient electromagnetic field, a 3-D finite-difference time-domain (FDTD) is employed in simulating the diffusion pattern of whole-space transient electromagnetic field created by the magnetic source in any direction and the whole-space transient electromagnetic response of the 3-D low-resistance body. The simulation results indicate that the diffusion of whole-space transient electromagnetic field is different from ground half-space and that it does not conform to the "smoke ring effect'' of half-space transient electromagnetic field, for the radius of the electric field's contour ring in whole space keeps expanding without moving upward or downward. The low-resistance body can significantly affect the diffusion of transient electromagnetic field. When the excitation direction is consistent with the bearing of the low-resistance body, the coupling between the transient electromagnetic field and the low-resistance body is optimal, and the abnormal response is most obvious. The bearing of the low-resistance body can be distinguished by comparing the response information of different excitation directions. Based on the results above, multi-directional sector detection technology is adapted to detect the water-rich areas, which can not only detect the target ahead of the roadway but also distinguish the bearing of the target. Both numerical simulation and practical application in underground indicate that the mining TEM can accurately reflect the location of water-rich areas.

    Download full text (pdf)
    FULLTEXT01
  • 46. Pienaar, Schalk Wilhelm
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Human Activity Recognition Using Visual Object Detection2019In: 2019 IEEE 2nd Wireless Africa Conference (WAC), IEEE, 2019, p. 85-89Conference paper (Refereed)
    Abstract [en]

    Visual Human Activity Recognition (HAR), by means of an object detection algorithm, can be used to localize and monitor the states of people with little to no obstruction. The purpose of this paper is to discuss a way to train a model that has the ability to localize and capture the states of underground miners using a Single Shot Detector (SSD) model, trained specifically to make a distinction between an injured and a non injured miner (lying down vs standing up). Tensorflow is used for the abstraction layer of implementing the machine learning algorithm, and although it uses Python to deal with nodes and tensors, the actual algorithms run on C++ libraries, providing a good balance between performance and speed of development. The paper further discusses evaluation methods for determining the accuracy of the machine-learning progress. For future work, data fusion is introduced in order to improve the accuracy of the detected activity/state of people in a mining environment.

  • 47. Xinhua, Liu
    et al.
    Xiaohui, Zhang
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Th., Sarkodie-Gyan
    Zhixiong, Li
    Improved Neural Network Control Approach for a Humanoid Arm2019In: Journal of Dynamic Systems Measurement, and Control, ISSN 0022-0434, E-ISSN 1528-9028, Vol. 141, no 10, p. 1-13, article id 101009Article in journal (Refereed)
    Abstract [en]

    This study extended the knowledge over the improvement of the control performance for a seven degrees-of-freedom (7DOF) humanoid arm. An improved adaptive Gaussian radius basic function neural network (RBFNN) approach was proposed to ensure the reliability and stability of the humanoid arm control. Considering model uncertainties, the established dynamic model for the humanoid arm was divided into a nominal model and an error model. The error model was approximated by the RBFNN learning to compensate the uncertainties. The contribution of this study mainly concentrates on employing fruit fly optimization algorithm (FOA) to optimize the basic width parameter of the RBFNN, which can enhance the capability of the error approximation speed. Additionally, the output weights of the neural network were adjusted using the Lyapunov stability theory to improve the robustness of the RBFN-based error model. The simulation and experiment results demonstrate that the proposed approach is able to optimize the system state with less tracking errors, regulate the uncertain nonlinear dynamic characteristics, and effectively reduce unexpected interferences.

  • 48. Liu, Wi
    et al.
    Zhixiong, Li
    Shuaishuai, Sun
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Zhenjun, Ma
    Weihua, Li
    Improving positioning accuracy of the mobile laser scanning in GPS-denied environments: An experimental case study2019In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 19, no 22, p. 10753-10763Article in journal (Refereed)
    Abstract [en]

    The positioning accuracy of the mobile laser scanning (MLS) system can reach the level of centimeter under the conditions where GPS works normally. However, in GPS-denied environments this accuracy can be reduced to the decimeter or even the meter level because the observation mode errors and the boresight alignment errors of MLS cannot be calibrated or corrected by the GPS signal. To bridge this research gap, this paper proposes a novel technique that appropriately incorporates the robust weight total least squares (RWTLS) and the full information maximum likelihood optimal estimation (FIMLOE) to improve the positioning accuracy of the MLS system under GPS-denied environment. First of all, the coordinate transformation relationship and the observation parameters vector of MLS system are established. Secondly, the RWTLS algorithm is used to correct the 3D point observation model; then the uncertainty propagation parameter vector and the boresight alignment errors between the laser scanner frame and the IMU frame are calibrated by FIMLOE. Lastly, experimental investigation in indoor scenarios was performed to evaluate the effectiveness of the proposed method. The experimental results demonstrate that the proposed method is able to significantly improve the positioning accuracy of an MLS system in GPS-denied environments.

  • 49. Cheng, Kang
    et al.
    Ye, Ning
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP).
    Wang, Ruchuan
    In-Air Gesture Interaction: Real Time Hand Posture Recognition Using Passive RFID Tags2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 94460-94472Article in journal (Refereed)
    Abstract [en]

    In-air gesture interaction enables a natural communication between a man and a machine with its clear semantics and humane mode of operation. In this paper, we propose a real-time recognition system on multiple gestures in the air. It uses the commodity off-the-shelf (COTS) reader with three antennas to detect the radio frequency (RF) signals of the passive radio frequency identification (RFID) Tags attached to the fingers. The idea derives from the crucial insight that the sequential phase profile of the backscatter RF signals is a reliable and well-regulated indicator insinuating space-time situation of the tagged object, which presents a close interdependency with tag's movements and positions. The KL divergence is utilized to extract the dynamic gesture segment by confirming the endpoints of the data flow. To achieve the template matching and classification, we bring in the dynamic time warping (DTW) and k-nearest neighbors (KNN) for similarity scores calculation and appropriate gesture recognition. The experiment results show that the recognition rates for static and dynamic gestures can reach 85% and 90%, respectively. Moreover, it can maintain satisfying performance under different situations, such as diverse antenna-to-user distances and being hidden from view by nonconducting obstacles.

    Download full text (pdf)
    FULLTEXT01
  • 50. Soni, Nikheel
    et al.
    Malekian, Reza
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Andriukaitis, Darius
    Navikas, Dangirutis
    Internet of Vehicles Based Approach for Road Safety Applications Using Sensor Technologies2019In: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 105, no 4, p. 1257-1284Article in journal (Refereed)
    Abstract [en]

    In this paper, the Internet of Vehicles approach is used to develop a novel low cost sensor based system for road safety applications in intelligent transportation systems. It was found that major hazards that compromise road safety include weather related factors, poor road surfaces and presence of sharp turns. A wireless sensor network based solution consisting of embedded systems for the vehicular clients and infrastructure waypoints is developed for detecting road safety hazards and warning users about potentially hazardous events from causes that include presence of speed bumps, sharp turns and weather related factors of rain and fog. Hazards detected by the embedded systems are conveyed to the user by using the Vehicle-to-Vehicle communication and Vehicle-to-infrastructure communication interfaces developed in this study for inter-vehicle communication and obtaining sensory information from infrastructure waypoints respectively. Accuracy achieved was 88% for speed bump detection, 73.86% for detecting sharp turns and 100% for detection of rain and fog. Communication systems in the designed solution are optimized by reducing the size of packet being exchanged which improves transmission speed, packet losses and congestion on the network. Thus, the designed solution is capable of improving road safety by using an Internet of Vehicles approach.

12 1 - 50 of 56
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf