Journal of Electrical and Computer Engineering The latest articles from Hindawi © 2017 , Hindawi Limited . All rights reserved. Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology Mon, 24 Apr 2017 00:00:00 +0000 With the Internet of Everything (IoE) paradigm that gathers almost every object online, huge traffic workload, bandwidth, security, and latency issues remain a concern for IoT users in today’s world. Besides, the scalability requirements found in the current IoT data processing (in the cloud) can hardly be used for applications such as assisted living systems, Big Data analytic solutions, and smart embedded applications. This paper proposes an extended cloud IoT model that optimizes bandwidth while allowing edge devices (Internet-connected objects/devices) to smartly process data without relying on a cloud network. Its integration with a massively scaled spine-leaf (SL) network topology is highlighted. This is contrasted with a legacy multitier layered architecture housing network services and routing policies. The perspective offered in this paper explains how low-latency and bandwidth intensive applications can transfer data to the cloud (and then back to the edge application) without impacting QoS performance. Consequently, a spine-leaf Fog computing network (SL-FCN) is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment. This approach is cost-effective as it maximizes bandwidth while maintaining redundancy and resiliency against failures in mission critical applications. K. C. Okafor, Ifeyinwa E. Achumba, Gloria A. Chukwudebe, and Gordon C. Ononiwu Copyright © 2017 K. C. Okafor et al. All rights reserved. The Channel Compressive Sensing Estimation for Power Line Based on OMP Algorithm Sun, 23 Apr 2017 00:00:00 +0000 Power line communication (PLC) can collect information by power line which increases the coverage and connectivity of the smart grid. In this paper, we analyze the transmission characteristics of the power line channel and model it with mathematics channel. The multipath effect of the power line channel is studied with a novel technology named compressive sensing herein. We also proposed a new method to the power line channel estimation based on compressive sensing. We can collect and extract the effective parameters of the power line channel to storage, which only take very little storage space. The simulation results show that the proposed approach can reduce the amount of processing data in the digital signal processing module and decrease the requirement for the hardware. Yiying Zhang, Kun Liang, Yeshen He, Yannian Wu, Xin Hu, and Lili Sun Copyright © 2017 Yiying Zhang et al. All rights reserved. Study of SAW Based on a Micro Force Sensor in Wireless Sensor Network Wed, 19 Apr 2017 00:00:00 +0000 Wireless sensor network (WSN) technology has increasingly assumed an active role in detection, identification, location, and tracking applications after more than ten years of development. However, its application still suffers from technology bottlenecks, which must be solved and perfected to eliminate the key problems of the technology. This article investigates WSN acquisition nodes and analyzes the relationship between the frequency and actual pressure values of sensor nodes. The sensitive mechanism of the surface acoustic wave (SAW) based on a micro force sensor is researched, and the principle of least squares method is used to establish a transformation model of frequency and pressure for the SAW sensor. According to the model, polyfit function and matrix calculation are selected to solve and calculate the estimate of the polynomial coefficients, which simulate the data acquisition of WSN nodes and draw a polynomial curve fitting. The actual SAW sensor is tested to demonstrate the reasonableness of the device stability in WSNs. Jun Wang, Yuanyuan Li, Ke Chen, Wenke Lu, Qinghong Liu, Haoxin Zhang, and Huashan Yan Copyright © 2017 Jun Wang et al. All rights reserved. Development of an Integrated Cooling System Controller for Hybrid Electric Vehicles Mon, 10 Apr 2017 00:00:00 +0000 A hybrid electrical bus employs both a turbo diesel engine and an electric motor to drive the vehicle in different speed-torque scenarios. The cooling system for such a vehicle is particularly power costing because it needs to dissipate heat from not only the engine, but also the intercooler and the motor. An electronic control unit (ECU) has been designed with a single chip computer, temperature sensors, DC motor drive circuit, and optimized control algorithm to manage the speeds of several fans for efficient cooling using a nonlinear fan speed adjustment strategy. Experiments suggested that the continuous operating performance of the ECU is robust and capable of saving 15% of the total electricity comparing with ordinary fan speed control method. Chong Wang, Qun Sun, and Limin Xu Copyright © 2017 Chong Wang et al. All rights reserved. Abnormal Event Detection in Wireless Sensor Networks Based on Multiattribute Correlation Thu, 06 Apr 2017 00:00:00 +0000 Abnormal event detection is one of the vital tasks in wireless sensor networks. However, the faults of nodes and the poor deployment environment have brought great challenges to abnormal event detection. In a typical event detection technique, spatiotemporal correlations are collected to detect an event, which is susceptible to noises and errors. To improve the quality of detection results, we propose a novel approach for abnormal event detection in wireless sensor networks. This approach considers not only spatiotemporal correlations but also the correlations among observed attributes. A dependency model of observed attributes is constructed based on Bayesian network. In this model, the dependency structure of observed attributes is obtained by structure learning, and the conditional probability table of each node is calculated by parameter learning. We propose a new concept named attribute correlation confidence to evaluate the fitting degree between the sensor reading and the abnormal event pattern. On the basis of time correlation detection and space correlation detection, the abnormal events are identified. Experimental results show that the proposed algorithm can reduce the impact of interference factors and the rate of the false alarm effectively; it can also improve the accuracy of event detection. Mengdi Wang, Anrong Xue, and Huanhuan Xia Copyright © 2017 Mengdi Wang et al. All rights reserved. Energy Efficient Partial Permutation Encryption on Network Coded MANETs Thu, 06 Apr 2017 00:00:00 +0000 Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing capabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption and decryption operations should be optimized to consume less energy. In this regard, we have focused on network coding which is a lightweight mechanism that can also be used for data confidentiality. In this paper, we have further reduced the cost of network coding mechanism by reducing the size of data used for permutation. The basic idea is that source permutes only global encoding vectors (GEVs) without permuting the whole message symbols which significantly reduces the complexity and transmission cost over the network. We have also proposed an algorithm for key generation and random permutation confusion key calculation. The proposed scheme achieves better performance in throughput, encryption time, and energy consumption as compared to previous schemes. Ali Khan, Qifu Tyler Sun, Zahid Mahmood, and Ata Ullah Ghafoor Copyright © 2017 Ali Khan et al. All rights reserved. On Improving the Performance of Dynamic DCVSL Circuits Tue, 04 Apr 2017 00:00:00 +0000 This contribution aims at improving the performance of Dynamic Differential Cascode Voltage Switch Logic (Dy-DCVSL) and Enhanced Dynamic Differential Cascode Voltage Switch Logic (EDCVSL) and suggests three architectures for the same. The first architecture uses transmission gates (TG) to reduce the logic tree depth and width, which results in speed improvement. As leakage is a dominant issue in lower technology nodes, the second architecture is proposed by adapting the leakage control technique (LECTOR) in Dy-DCVSL and EDCVSL. The third proposed architecture combines features of both the first and the second architectures. The operation of the proposed architectures has been verified through extensive simulations with different CMOS submicron technology nodes (90 nm, 65 nm, and 45 nm). The delay of the gates based on the first architecture remains almost the same for different functionalities. It is also observed that Dy-DCVSL gates are 1.6 to 1.4 times faster than their conventional counterpart. The gates based on the second architecture show a maximum of 74.3% leakage power reduction. Also, it is observed that the percentage of reduction in leakage power increases with technology scaling. Lastly, the gates based on the third architecture achieve similar leakage power reduction values to the second one but are not able to exhibit the same speed advantage as achieved with the first architecture. Pratibha Bajpai, Neeta Pandey, Kirti Gupta, Shrey Bagga, and Jeebananda Panda Copyright © 2017 Pratibha Bajpai et al. All rights reserved. Estimation of Sideslip Angle Based on Extended Kalman Filter Tue, 28 Mar 2017 00:00:00 +0000 The sideslip angle plays an extremely important role in vehicle stability control, but the sideslip angle in production car cannot be obtained from sensor directly in consideration of the cost of the sensor; it is essential to estimate the sideslip angle indirectly by means of other vehicle motion parameters; therefore, an estimation algorithm with real-time performance and accuracy is critical. Traditional estimation method based on Kalman filter algorithm is correct in vehicle linear control area; however, on low adhesion road, vehicles have obvious nonlinear characteristics. In this paper, extended Kalman filtering algorithm had been put forward in consideration of the nonlinear characteristic of the tire and was verified by the Carsim and Simulink joint simulation, such as the simulation on the wet cement road and the ice and snow road with double lane change. To test and verify the effect of extended Kalman filtering estimation algorithm, the real vehicle test was carried out on the limit test field. The experimental results show that the accuracy of vehicle sideslip angle acquired by extended Kalman filtering algorithm is obviously higher than that acquired by Kalman filtering in the area of the nonlinearity. Yupeng Huang, Chunjiang Bao, Jian Wu, and Yan Ma Copyright © 2017 Yupeng Huang et al. All rights reserved. Dynamic Search Mechanism with Threat Prediction in a GNSS Receiver Thu, 23 Mar 2017 09:50:53 +0000 With the development of GNSS and the application of multimode signals, efficient GNSS receiver research has become very important. However, threat signals in the received signal are inevitable, which will represent important threats to navigation applications and will lead to leakage and fault detection for the receiver. Therefore, the searches with threat prediction in GNSS signals have been regarded as the important problem for GNSS receivers. In view of the limitations and nonadaptability of the current search technologies as well as on the basis of the proportionality peak judgment mechanism, a dynamic search mechanism with threat prediction (DSM-TP) is proposed in this paper, in which we define a series of preset coefficients and a threat index to optimize the decision mechanism. The simulation results demonstrate that the DSM-TP method can predict the threat situation and can adapt to lower SNR environments compared to the traditional method. In addition, the DSM-TP method can avoid the impact of threats, and the detection capability of the new method is better than the detection capability of the traditional method. Fang Liu and Meng Liu Copyright © 2017 Fang Liu and Meng Liu. All rights reserved. Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map Wed, 22 Mar 2017 08:26:42 +0000 This paper presents a three-dimensional autonomous chaotic system with high fraction dimension. It is noted that the nonlinear characteristic of the improper fractional-order chaos is interesting. Based on the continuous chaos and the discrete wavelet function map, an image encryption algorithm is put forward. The key space is formed by the initial state variables, parameters, and orders of the system. Every pixel value is included in secret key, so as to improve antiattack capability of the algorithm. The obtained simulation results and extensive security analyses demonstrate the high level of security of the algorithm and show its robustness against various types of attacks. Jian-feng Zhao, Shu-ying Wang, Li-tao Zhang, and Xiao-yan Wang Copyright © 2017 Jian-feng Zhao et al. All rights reserved. Ferrography Wear Particles Image Recognition Based on Extreme Learning Machine Tue, 21 Mar 2017 07:27:09 +0000 The morphology of wear particles reflects the complex properties of wear processes involved in particle formation. Typically, the morphology of wear particles is evaluated qualitatively based on microscopy observations. This procedure relies upon the experts’ knowledge and, thus, is not always objective and cheap. With the rapid development of computer image processing technology, neural network based on traditional gradient training algorithm can be used to recognize them. However, the feedforward neural network based on traditional gradient training algorithms for image segmentation creates many issues, such as needing multiple iterations to converge and easy fall into local minimum, which restrict its development heavily. Recently, extreme learning machine (ELM) for single-hidden-layer feedforward neural networks (SLFN) has been attracting attentions for its faster learning speed and better generalization performance than those of traditional gradient-based learning algorithms. In this paper, we propose to employ ELM for ferrography wear particles image recognition. We extract the shape features, color features, and texture features of five typical kinds of wear particles as the input of the ELM classifier and set five types of wear particles as the output of the ELM classifier. Therefore, the novel ferrography wear particle classifier is founded based on ELM. Qiong Li, Tingting Zhao, Lingchao Zhang, Wenhui Sun, and Xi Zhao Copyright © 2017 Qiong Li et al. All rights reserved. Anomaly Detection for Aviation Safety Based on an Improved KPCA Algorithm Thu, 16 Mar 2017 00:00:00 +0000 Thousands of flights datasets should be analyzed per day for a moderate sized fleet; therefore, flight datasets are very large. In this paper, an improved kernel principal component analysis (KPCA) method is proposed to search for signatures of anomalies in flight datasets through the squared prediction error statistics, in which the number of principal components and the confidence for the confidence limit are automatically determined by OpenMP-based -fold cross-validation algorithm and the parameter in the radial basis function (RBF) is optimized by GPU-based kernel learning method. Performed on Nvidia GeForce GTX 660, the computation of the proposed GPU-based RBF parameter is 112.9 times (average 82.6 times) faster than that of sequential CPU task execution. The OpenMP-based -fold cross-validation process for training KPCA anomaly detection model becomes 2.4 times (average 1.5 times) faster than that of sequential CPU task execution. Experiments show that the proposed approach can effectively detect the anomalies with the accuracy of 93.57% and false positive alarm rate of 1.11%. Xiaoyu Zhang, Jiusheng Chen, and Quan Gan Copyright © 2017 Xiaoyu Zhang et al. All rights reserved. Enhancing the Cloud Computing Performance by Labeling the Free Node Services as Ready-To-Execute Tasks Thu, 16 Mar 2017 00:00:00 +0000 The huge bandwidth and hardware capacity form a high combination together which leads to a vigorous development in the Internet. On the other hand, different problems will come up during the use of the networks such as delay and node tasks load. These problems lead to degrade the network performance and then affect network service for users. In cloud computing, users are looking to be provided with a high level of services from the service provider. In addition, cloud computing service facilitates the execution of complicated tasks that needed high-storage scale for the computation. In this paper, we have implemented a new technique to retain the service and assign tasks to the best and free available node already labeled by the manager node. The Cloud Computing Alarm (CCA) technique is working to provide all information about the services node and which one is ready to receive the task from users. According to the simulation results, the CCA technique is making good enhancements on the QoS which will increase the number of users to use the service. Additionally, the results showed that the CCA technique improved the services without any degrading of network performance by completing each task in less time. Radwan S. Abujassar and Moneef Jazzar Copyright © 2017 Radwan S. Abujassar and Moneef Jazzar. All rights reserved. A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning Wed, 15 Mar 2017 00:00:00 +0000 The explosive growth of network traffic and its multitype on Internet have brought new and severe challenges to DDoS attack detection. To get the higher True Negative Rate (TNR), accuracy, and precision and to guarantee the robustness, stability, and universality of detection system, in this paper, we propose a DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning and design a heuristic detection algorithm based on Singular Value Decomposition (SVD) to construct our detection system. Experimental results show that our detection method is excellent in TNR, accuracy, and precision. Therefore, our algorithm has good detective performance for DDoS attack. Through the comparisons with Random Forest, -Nearest Neighbor (-NN), and Bagging comprising the component classifiers when the three algorithms are used alone by SVD and by un-SVD, it is shown that our model is superior to the state-of-the-art attack detection techniques in system generalization ability, detection stability, and overall detection performance. Bin Jia, Xiaohong Huang, Rujun Liu, and Yan Ma Copyright © 2017 Bin Jia et al. All rights reserved. Online Behavior Analysis-Based Student Profile for Intelligent E-Learning Mon, 13 Mar 2017 00:00:00 +0000 With the development of mobile platform, such as smart cellphone and pad, the E-Learning model has been rapidly developed. However, due to the low completion rate for E-Learning platform, it is very necessary to analyze the behavior characteristics of online learners to intelligently adjust online education strategy and enhance the quality of learning. In this paper, we analyzed the relation indicators of E-Learning to build the student profile and gave countermeasures. Adopting the similarity computation and Jaccard coefficient algorithm, we designed a system model to clean and dig into the educational data and also the students’ learning attitude and the duration of learning behavior to establish student profile. According to the E-Learning resources and learner behaviors, we also present the intelligent guide model to guide both E-Learning platform and learners to improve learning things. The study on student profile can help the E-Learning platform to meet and guide the students’ learning behavior deeply and also to provide personalized learning situation and promote the optimization of the E-Learning. Kun Liang, Yiying Zhang, Yeshen He, Yilin Zhou, Wei Tan, and Xiaoxia Li Copyright © 2017 Kun Liang et al. All rights reserved. Security Enrichment in Intrusion Detection System Using Classifier Ensemble Sun, 12 Mar 2017 08:06:32 +0000 In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique. Uma R. Salunkhe and Suresh N. Mali Copyright © 2017 Uma R. Salunkhe and Suresh N. Mali. All rights reserved. A Fast and Robust Key Frame Extraction Method for Video Copyright Protection Wed, 08 Mar 2017 08:36:59 +0000 The paper proposes a key frame extraction method for video copyright protection. The fast and robust method is based on frame difference with low level features, including color feature and structure feature. A two-stage method is used to extract accurate key frames to cover the content for the whole video sequence. Firstly, an alternative sequence is got based on color characteristic difference between adjacent frames from original sequence. Secondly, by analyzing structural characteristic difference between adjacent frames from the alternative sequence, the final key frame sequence is obtained. And then, an optimization step is added based on the number of final key frames in order to ensure the effectiveness of key frame extraction. Compared with the previous methods, the proposed method has advantage in computation complexity and robustness on several video formats, video resolution, and so on. Yunyu Shi, Haisheng Yang, Ming Gong, Xiang Liu, and Yongxiang Xia Copyright © 2017 Yunyu Shi et al. All rights reserved. Self-Tuning Control Scheme Based on the Robustness σ-Modification Approach Wed, 08 Mar 2017 00:00:00 +0000 This paper deals with the self-tuning control problem of linear systems described by autoregressive exogenous (ARX) mathematical models in the presence of unmodelled dynamics. An explicit scheme of control is described, which we use a recursive algorithm on the basis of the robustness σ-modification approach to estimate the parameters of the system, to solve the problem of regulation tracking of the system. This approach was designed with the assumptions that the norm of the vector of the parameters is well-known. A new quadratic criterion is proposed to develop a modified recursive least squares (M-RLS) algorithm with σ-modification. The stability condition of the proposed estimation scheme is proved using the concepts of the small gain theorem. The effectiveness and reliability of the proposed M-RLS algorithm are shown by an illustrative simulation example. The effectiveness of the described explicit self-tuning control scheme is demonstrated by simulation results of the cruise control system for a vehicle. Nabiha Touijer, Samira Kamoun, Najib Essounbouli, and Abdelaziz Hamzaoui Copyright © 2017 Nabiha Touijer et al. All rights reserved. Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection Tue, 07 Mar 2017 07:12:24 +0000 With the rapid growth of aged population in China, it is urgent to design a safe and effective monitoring system for the nursing homes. An optimized scheme and high performance security and privacy protection for monitoring system have already become the focus studied especially. So this paper proposed a health monitoring system with lightweight security and privacy protection for nursing homes. Dual-band RFID, virtual routing location algorithm, and diet and exercise data collection based on RFID were adopted to obtain the location and health information. And that fused a mobile authentication protocol based on Hash function to realize security access and privacy protection, which can improve security and reduce the complexity of calculation and the implementation cost compared with the typical authentication protocols. The experiment results show that the ratio of relative network delay is below 35%. The system has strong real-time, high security, more comprehensive data, and lower cost of computation and communication. It can satisfy the requirements of health monitoring for nursing homes. Yu’e Jiang and Jiaxiang Liu Copyright © 2017 Yu’e Jiang and Jiaxiang Liu. All rights reserved. Dynamically Predicting the Quality of Service: Batch, Online, and Hybrid Algorithms Mon, 06 Mar 2017 00:00:00 +0000 This paper studies the problem of dynamically modeling the quality of web service. The philosophy of designing practical web service recommender systems is delivered in this paper. A general system architecture for such systems continuously collects the user-service invocation records and includes both an online training module and an offline training module for quality prediction. In addition, we introduce matrix factorization-based online and offline training algorithms based on the gradient descent algorithms and demonstrate the fitness of this online/offline algorithm framework to the proposed architecture. The superiority of the proposed model is confirmed by empirical studies on a real-life quality of web service data set and comparisons with existing web service recommendation algorithms. Ya Chen and Zhong-an Jiang Copyright © 2017 Ya Chen and Zhong-an Jiang. All rights reserved. Critical Gates Identification for Fault-Tolerant Design in Math Circuits Thu, 02 Mar 2017 09:42:19 +0000 Hardware redundancy at different levels of design is a common fault mitigation technique, which is well known for its efficiency to the detriment of area overhead. In order to reduce this drawback, several fault-tolerant techniques have been proposed in literature to find a good trade-off. In this paper, critical constituent gates in math circuits are detected and graded based on the impact of an error in the output of a circuit. These critical gates should be hardened first under the area constraint of design criteria. Indeed, output bits considered crucial to a system receive higher priorities to be protected, reducing the occurrence of critical errors. The 74283 fast adder is used as an example to illustrate the feasibility and efficiency of the proposed approach. Tian Ban and Gutemberg G. S. Junior Copyright © 2017 Tian Ban and Gutemberg G. S. Junior. All rights reserved. Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis Thu, 23 Feb 2017 11:14:14 +0000 The zero-dimensional Gröbner basis construction is a crucial step in Gröbner basis cryptanalysis on AES-256. In this paper, after performing an in-depth study on the linear transformation and the system of multivariate polynomial equations of AES-256, the zero-dimensional Gröbner basis construction method is proposed by choosing suitable term order and variable order. After giving a detailed construction process of the zero-dimensional Gröbner basis, the necessary theoretical proof is presented. Based on this, an algebraic cryptanalysis scheme of AES-256 using Gröbner basis is proposed. Analysis shows that the complexity of our scheme is lower than that of the exhaustive attack. Kaixin Zhao, Jie Cui, and Zhiqiang Xie Copyright © 2017 Kaixin Zhao et al. All rights reserved. Autofocus on Depth of Interest for 3D Image Coding Wed, 22 Feb 2017 00:00:00 +0000 For some 3D applications, one may want to focus on a specific depth zone representing a region of interest in the scene. In this context, we introduce a new functionality called “autofocus” for 3D image coding, exploiting the depth map as an additional semantic information provided by the 3D sequence. The method is based on a joint “Depth of Interest” (DoI) extraction and coding scheme. First, the DoI extraction scheme consists of a precise extraction of objects located within a DoI zone, given by the viewer or deduced from an analysis process. Then, the DoI coding scheme provides a higher quality for the objects in the DoI at the expense of other depth zones. The local quality enhancement supports both higher SNR and finer resolution. The proposed scheme embeds the Locally Adaptive Resolution (LAR) codec, initially designed for 2D images. The proposed DoI scheme is developed without modifying the global coder framework, and the DoI mask is not transmitted, but it is deduced at the decoder. Results showed that our proposed joint DoI extraction and coding scheme provide a high correlation between texture objects and depth. This consistency avoids the distortion along objects contours in depth maps and those of texture images and synthesized views. Khouloud Samrouth, Olivier Deforges, Yi Liu, Mohamad Khalil, and Wassim EL Falou Copyright © 2017 Khouloud Samrouth et al. All rights reserved. Acoustic Log Prediction on the Basis of Kernel Extreme Learning Machine for Wells in GJH Survey, Erdos Basin Wed, 22 Feb 2017 00:00:00 +0000 In petroleum exploration, the acoustic log (DT) is popularly used as an estimator to calculate formation porosity, to carry out petrophysical studies, or to participate in geological analysis and research (e.g., to map abnormal pore-fluid pressure). But sometime it does not exist in those old wells drilled 20 years ago, either because of data loss or because of just being not recorded at that time. Thus synthesizing the DT log becomes the necessary task for the researchers. In this paper we propose using kernel extreme learning machine (KELM) to predict missing sonic (DT) logs when only common logs (e.g., natural gamma ray: GR, deep resistivity: REID, and bulk density: DEN) are available. The common logs are set as predictors and the DT log is the target. By using KELM, a prediction model is firstly created based on the experimental data and then confirmed and validated by blind-testing the results in wells containing both the predictors and the target (DT) values used in the supervised training. Finally the optimal model is set up as a predictor. A case study for wells in GJH survey from the Erdos Basin, about velocity inversion using the KELM-estimated DT values, is presented. The results are promising and encouraging. Jianhua Cao, Yancui Shi, Dan Wang, and Xiankun Zhang Copyright © 2017 Jianhua Cao et al. All rights reserved. Chattering-Free Sliding-Mode Control for Electromechanical Actuator with Backlash Nonlinearity Mon, 13 Feb 2017 13:08:57 +0000 Considering the backlash nonlinearity and parameter time-varying characteristics in electromechanical actuators, a chattering-free sliding-mode control strategy is proposed in this paper to regulate the rudder angle and suppress unknown external disturbances. Different from most existing backlash compensation methods, a special continuous function is addressed to approximate the backlash nonlinear dead-zone model. Regarding the approximation error, unmodeled dynamics, and unknown external disturbances as a disturbance-like term, a strict feedback nonlinear model is established. Based on this nonlinear model, a chattering-free nonsingular terminal sliding-mode controller is proposed to achieve the rudder angle tracking with a chattering elimination and tracking dynamic performance improvement. A Lyapunov-based proof ensures the asymptotic stability and finite-time convergence of the closed-loop system. Experimental results have verified the effectiveness of the proposed method. Dongqi Ma, Hui Lin, and Bingqiang Li Copyright © 2017 Dongqi Ma et al. All rights reserved. 3D Curvelet-Based Segmentation and Quantification of Drusen in Optical Coherence Tomography Images Tue, 31 Jan 2017 14:44:23 +0000 Spectral-Domain Optical Coherence Tomography (SD-OCT) is a widely used interferometric diagnostic technique in ophthalmology that provides novel in vivo information of depth-resolved inner and outer retinal structures. This imaging modality can assist clinicians in monitoring the progression of Age-related Macular Degeneration (AMD) by providing high-resolution visualization of drusen. Quantitative tools for assessing drusen volume that are indicative of AMD progression may lead to appropriate metrics for selecting treatment protocols. To address this need, a fully automated algorithm was developed to segment drusen area and volume from SD-OCT images. The proposed algorithm consists of three parts: (1) preprocessing, which includes creating binary mask and removing possible highly reflective posterior hyaloid that is used in accurate detection of inner segment/outer segment (IS/OS) junction layer and Bruch’s membrane (BM) retinal layers; (2) coarse segmentation, in which 3D curvelet transform and graph theory are employed to get the possible candidate drusenoid regions; (3) fine segmentation, in which morphological operators are used to remove falsely extracted elongated structures and get the refined segmentation results. The proposed method was evaluated in 20 publically available volumetric scans acquired by using Bioptigen spectral-domain ophthalmic imaging system. The average true positive and false positive volume fractions (TPVF and FPVF) for the segmentation of drusenoid regions were found to be 89.15% ± 3.76 and 0.17% ± .18%, respectively. M. Esmaeili, A. M. Dehnavi, and H. Rabbani Copyright © 2017 M. Esmaeili et al. All rights reserved. Internet of Things: Architectures, Protocols, and Applications Thu, 26 Jan 2017 06:11:48 +0000 The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly. As compared to similar survey papers in the area, this paper is far more comprehensive in its coverage and exhaustively covers most major technologies spanning from sensors to applications. Pallavi Sethi and Smruti R. Sarangi Copyright © 2017 Pallavi Sethi and Smruti R. Sarangi. All rights reserved. Medical Image Fusion Algorithm Based on Nonlinear Approximation of Contourlet Transform and Regional Features Tue, 24 Jan 2017 00:00:00 +0000 According to the pros and cons of contourlet transform and multimodality medical imaging, here we propose a novel image fusion algorithm that combines nonlinear approximation of contourlet transform with image regional features. The most important coefficient bands of the contourlet sparse matrix are retained by nonlinear approximation. Low-frequency and high-frequency regional features are also elaborated to fuse medical images. The results strongly suggested that the proposed algorithm could improve the visual effects of medical image fusion and image quality, image denoising, and enhancement. Hui Huang, Xi’an Feng, and Jionghui Jiang Copyright © 2017 Hui Huang et al. All rights reserved. A Comparative Study of Symmetrical Cockcroft-Walton Voltage Multipliers Mon, 16 Jan 2017 00:00:00 +0000 Decades after invention of the Cockcroft-Walton voltage multiplier, it is still being used in broad range of high voltage and ac to dc applications. High voltage ratio, low voltage stress on components, compactness, and high efficiency are its main features. Due to the problems of original circuit, reduction of output ripple and increase of accessible voltage level were the motivations for scientist to propose new topologies. In this article a comparative study on these voltage multipliers was presented. By simulations and experimental prototypes, characteristics of the topologies have been compared. In addition to the performances, components count, voltage stress on the components, and the difficulty and cost of construction are other factors which have been considered in this comparison. An easy to use table which summarized the characteristics of VMs was developed, which can be used as a decision mean for selecting of a topology based on the requirements. It is shown that, due to the application, sometimes a simple and not very famous topology is more effective than a famous one. Mohsen Ruzbehani Copyright © 2017 Mohsen Ruzbehani. All rights reserved. Modified Tang and Pun’s Current Comparator and Its Application to Full Flash and Two-Step Flash Current Mode ADCs Wed, 11 Jan 2017 06:16:55 +0000 A modification to an existing current comparator proposed by Tang and Pun has been presented. The circuit introduces a flipped voltage follower (FVF) which replaces the source follower input stage of the existing current comparator of Tang and Pun. This modification culminates into higher speed especially at lower currents and lower power dissipation. The application of the proposed current comparator has also been put forth by implementing a 3-bit current mode (CM) ADC and a two-step 3-bit CM ADC. The theoretical propositions are verified through spice simulation using 0.18 μm TSMC CMOS technology at a power supply of 1.8 V. Propagation delay, power dissipation, and power delay product (PDP) have been calculated for the proposed current comparator and process parameter variation has been studied. For both the implementations of ADCs, performance parameters, namely, DNL, INL, missing codes, monotonicity, offset, and gain errors, have been evaluated. Veepsa Bhatia and Neeta Pandey Copyright © 2017 Veepsa Bhatia and Neeta Pandey. All rights reserved.