首页 > 最新文献

International Journal of Advanced Computer Research最新文献

英文 中文
Non-preemptive chaotic cat swarm optimization scheme for task scheduling on cloud computing environment 云计算环境下任务调度的非抢占混沌猫群优化方案
Pub Date : 2019-07-24 DOI: 10.19101/IJACR.PID29
Danlami Gabi, Nasiru Muhammad Dankolo, A. Ismail, A. Zainal, Z. Zakaria
With exponential growth in the number of customers accessing the cloud services, scheduling tasks at cloud datacenter poses the greatest challenge in meeting end-user’s quality of service (QoS) expectations in terms of time and cost. Recent research makes use of metaheuristic task scheduling techniques in addressing this concern. However, metaheuristic techniques are attributed with certain limitation such as premature convergence, global and local imbalance which causes insufficient task allocation across cloud virtual machines. Thus, resulting in inefficient QoS expectation. To address these concerns while meeting end-users QoS expectation, this paper puts forward a non-preemptive chaotic cat swarm optimization (NCCSO) scheme as an ideal solution. In the developed scheme, chaotic process is introduced to reduce entrapment at local optima and overcome premature convergence and Pareto dominant strategy is used to address optimality problem. The developed scheme is implemented in the CloudSim simulator tool and simulation results show the developed NCCSO scheme compared to the benchmarked schemes adopted in this paper can achieve 42.87%, 35.47% and 25.49% reduction in term of execution time, and also 38.62%, 35.32%, 25.56% in term of execution cost. Finally, we also unveiled that a statistical significance on 95% confidential interval has shown that our developed NCCSO scheme can provide a remarkable performance that can meet end-user QoS expectations.
随着访问云服务的客户数量呈指数级增长,在云数据中心调度任务在时间和成本方面对满足最终用户的服务质量(QoS)期望提出了最大的挑战。最近的研究利用元启发式任务调度技术来解决这个问题。然而,元启发式技术存在一定的局限性,如过早收敛,全局和局部不平衡,导致云虚拟机之间的任务分配不足。因此,导致了低效率的QoS期望。为了在满足终端用户QoS期望的同时解决这些问题,本文提出了一种非抢占式混沌猫群优化(NCCSO)方案作为理想的解决方案。在该方案中,引入混沌过程以减少局部最优处的陷入和克服过早收敛,并采用Pareto优势策略解决最优性问题。在CloudSim模拟器工具中实现了所开发的方案,仿真结果表明,与本文采用的基准方案相比,所开发的NCCSO方案的执行时间分别减少了42.87%、35.47%和25.49%,执行成本分别减少了38.62%、35.32%和25.56%。最后,我们还揭示了95%保密区间的统计显著性表明我们开发的NCCSO方案可以提供显着的性能,可以满足最终用户的QoS期望。
{"title":"Non-preemptive chaotic cat swarm optimization scheme for task scheduling on cloud computing environment","authors":"Danlami Gabi, Nasiru Muhammad Dankolo, A. Ismail, A. Zainal, Z. Zakaria","doi":"10.19101/IJACR.PID29","DOIUrl":"https://doi.org/10.19101/IJACR.PID29","url":null,"abstract":"With exponential growth in the number of customers accessing the cloud services, scheduling tasks at cloud datacenter poses the greatest challenge in meeting end-user’s quality of service (QoS) expectations in terms of time and cost. Recent research makes use of metaheuristic task scheduling techniques in addressing this concern. However, metaheuristic techniques are attributed with certain limitation such as premature convergence, global and local imbalance which causes insufficient task allocation across cloud virtual machines. Thus, resulting in inefficient QoS expectation. To address these concerns while meeting end-users QoS expectation, this paper puts forward a non-preemptive chaotic cat swarm optimization (NCCSO) scheme as an ideal solution. In the developed scheme, chaotic process is introduced to reduce entrapment at local optima and overcome premature convergence and Pareto dominant strategy is used to address optimality problem. The developed scheme is implemented in the CloudSim simulator tool and simulation results show the developed NCCSO scheme compared to the benchmarked schemes adopted in this paper can achieve 42.87%, 35.47% and 25.49% reduction in term of execution time, and also 38.62%, 35.32%, 25.56% in term of execution cost. Finally, we also unveiled that a statistical significance on 95% confidential interval has shown that our developed NCCSO scheme can provide a remarkable performance that can meet end-user QoS expectations.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new secure proxy-based distributed virtual machines management in mobile cloud computing 移动云计算中一种新的基于安全代理的分布式虚拟机管理方法
Pub Date : 2019-07-24 DOI: 10.19101/IJACR.PID10
Boubakeur Annane, O. Ghazali, A. Alti
The mobile cloud computing as an excellent paradigm offers on-demand services, whereas users can be confident once using them. Nevertheless, the existing cloud virtualization systems are not secure enough regarding the mediocre degree of data protection, which avoids individuals and organizations to engage with this technology. Therefore, the security of sensitive data may be affected when mobile users move it out to the cloud exactly during the processing in virtual machines (VMs). Many studies show that sensitive data of legitimate users’ VMs may be the target of malicious users, which lead to violating VMs’ confidentiality and privacy. The current approaches offer various solutions for this security issue. However, they are suffering from many inconveniences such as unauthorized distributed VM access behavior and robust strategies that ensure strong protection of communication of sensitive data among distributed VMs. The purpose of this paper is to present a new security proxy-based approach that contains three policies based on secured hashed DiffieHellman keys for user access control and VM deployment and communication control management in order to defend against three well-known attacks on the mobile cloud environment (co-resident attacks, hypervisor attacks and distributed attacks). The related attacks lead to unauthorized access to sensitive data between different distributed mobile applications while using the cloud as a third party for sharing resources. The proposed approach is illustrated using a healthcare case study. Including the experimental results that show interesting high-efficiency protection and accurate attacks identification.
移动云计算作为一种优秀的范例,提供按需服务,而用户一旦使用它们就可以充满信心。然而,现有的云虚拟化系统在数据保护方面还不够安全,这就避免了个人和组织使用这种技术。因此,当移动用户在虚拟机中处理敏感数据时,将敏感数据迁移到云端,可能会影响敏感数据的安全性。许多研究表明,合法用户虚拟机的敏感数据可能成为恶意用户的攻击目标,从而导致虚拟机的机密性和隐私性受到侵犯。目前的方法为这个安全问题提供了各种解决方案。然而,它们也面临着许多不便,如未经授权的分布式虚拟机访问行为,以及确保分布式虚拟机之间敏感数据通信的强大保护的稳健策略。本文的目的是提出一种新的基于安全代理的方法,该方法包含三个基于安全散列DiffieHellman密钥的策略,用于用户访问控制和VM部署和通信控制管理,以防御移动云环境中的三种众所周知的攻击(共同驻留攻击,管理程序攻击和分布式攻击)。相关攻击导致不同分布式移动应用程序之间的敏感数据未经授权访问,同时使用云作为第三方共享资源。本文通过一个医疗保健案例研究说明了所提出的方法。实验结果表明,该算法具有有趣的高效防护和准确的攻击识别功能。
{"title":"A new secure proxy-based distributed virtual machines management in mobile cloud computing","authors":"Boubakeur Annane, O. Ghazali, A. Alti","doi":"10.19101/IJACR.PID10","DOIUrl":"https://doi.org/10.19101/IJACR.PID10","url":null,"abstract":"The mobile cloud computing as an excellent paradigm offers on-demand services, whereas users can be confident once using them. Nevertheless, the existing cloud virtualization systems are not secure enough regarding the mediocre degree \u0000of data protection, which avoids individuals and organizations to engage with this technology. Therefore, the security of sensitive data may be affected when mobile users move it out to the cloud exactly during the processing in virtual \u0000machines (VMs). Many studies show that sensitive data of legitimate users’ VMs may be the target of malicious users, which lead to violating VMs’ confidentiality and privacy. The current approaches offer various solutions for this security issue. However, they are suffering from many inconveniences such as unauthorized distributed VM access behavior and robust strategies that ensure strong protection of communication of sensitive data among distributed VMs. The purpose of this paper is to present a new security proxy-based approach that contains three policies based on secured hashed DiffieHellman keys for user access control and VM deployment and communication control management in order to defend against three well-known attacks on the mobile cloud environment (co-resident attacks, hypervisor attacks and distributed attacks). The related attacks lead to unauthorized access to sensitive data between different distributed mobile applications while using the cloud as a third party for sharing resources. The proposed approach is illustrated using a healthcare case study. Including the experimental results that show interesting high-efficiency protection and accurate attacks identification.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114253654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Implementation of feature extraction algorithms for image tampering detection 实现图像篡改检测的特征提取算法
Pub Date : 2019-07-24 DOI: 10.19101/IJACR.PID37
N. Yusoff, Loai Alamro
{"title":"Implementation of feature extraction algorithms for image tampering detection","authors":"N. Yusoff, Loai Alamro","doi":"10.19101/IJACR.PID37","DOIUrl":"https://doi.org/10.19101/IJACR.PID37","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"362 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132474436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security performance evaluation of biometric lightweight encryption for fingerprint template protection 用于指纹模板保护的生物特征轻量级加密安全性能评价
Pub Date : 2019-07-24 DOI: 10.19101/IJACR.PID49
Taqiyah Khadijah Ghazali, Nur Haryani Zakaria
{"title":"Security performance evaluation of biometric lightweight encryption for fingerprint template protection","authors":"Taqiyah Khadijah Ghazali, Nur Haryani Zakaria","doi":"10.19101/IJACR.PID49","DOIUrl":"https://doi.org/10.19101/IJACR.PID49","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131650096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emotional profiling through supervised machine learning of interrupted EEG interpolation 基于中断脑电图插值的监督式机器学习的情绪分析
Pub Date : 2019-07-24 DOI: 10.19101/IJACR.PID17
H. Yaacob, H. Omar, D. Handayani, R. Hassan
It has been reported that the construction of emotion profiling models using supervised machine learning involves data acquisition, signal pre-processing, feature extraction and classification. However, almost all papers do not address the issue of profiling emotion using supervised machine learning on the interrupted encephalogram (EEG) signals. Based on a preliminary study, emotion profiling on interrupted EEG signals produces low classification accuracy, using multilayer perceptron (MLP). Furthermore, lower emotion classification accuracy is produced from interrupted EEG signals with higher number of segments. Thus, the objective of this paper is to propose a technique and present the outcomes of handling interrupted EEG signals for emotion profiling. This is done by the suppression and interpolation of originally interrupted EEG signals at pre-process stage. As a result, emotion classification using MLP on interpolated data improves
据报道,使用监督式机器学习构建情绪分析模型涉及数据采集、信号预处理、特征提取和分类。然而,几乎所有的论文都没有解决在中断脑电图(EEG)信号上使用监督机器学习来分析情绪的问题。基于初步研究,采用多层感知器(MLP)对中断的脑电信号进行情绪分析,分类准确率较低。此外,中断的脑电信号片段数越多,情绪分类准确率越低。因此,本文的目的是提出一种技术,并提出处理中断的脑电图信号进行情绪分析的结果。这是通过在预处理阶段对原始中断的脑电信号进行抑制和插值来实现的。因此,在插值数据上使用MLP进行情绪分类得到了改进
{"title":"Emotional profiling through supervised machine learning of interrupted EEG interpolation","authors":"H. Yaacob, H. Omar, D. Handayani, R. Hassan","doi":"10.19101/IJACR.PID17","DOIUrl":"https://doi.org/10.19101/IJACR.PID17","url":null,"abstract":"It has been reported that the construction of emotion profiling models using supervised machine learning involves data acquisition, signal pre-processing, feature extraction and classification. However, almost all papers do not address the issue of profiling emotion using supervised machine learning on the interrupted encephalogram (EEG) signals. Based on a preliminary study, emotion profiling on interrupted EEG signals produces low classification accuracy, using multilayer perceptron (MLP). Furthermore, lower emotion classification accuracy is produced from interrupted EEG signals with higher number of segments. Thus, the objective of this paper is to propose a technique and present the outcomes of handling interrupted EEG signals for emotion profiling. This is done by the suppression and interpolation of originally interrupted EEG signals at pre-process stage. As a result, emotion classification using MLP on interpolated data improves","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131873922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A semantic event based framework for complex situations modeling and identification in smart environments 智能环境中基于语义事件的复杂情景建模与识别框架
Pub Date : 2019-07-24 DOI: 10.19101/IJACR.PID33
Abderrahim Lakehal, A. Alti, P. Roose
Integration of technologies and smart services is an essential need in most pervasive smart automation systems, especially those requiring agile situation management such as a smart home. Ontology reasoning is an efficient technique for identifying the situation of such systems by capturing the context and optimizing connected object lifecycle. It is based on common-sense knowledge for interpreting a huge number of events from different and heterogeneous connected objects. The ontology-driven approach may be used to solve the parallel incoming events using new combination operators in order to achieve high accuracy rates. This paper presents a flexible, modular and hierarchical loosely coupled framework based on open semantic services in order to identify highly complex events to hold the situations with high efficiency. The proposed approach is evaluated on smart domains use cases and compared with other existing methods. Results show interesting ratios of situation identification accuracy with low execution time.
在大多数普及的智能自动化系统中,技术和智能服务的集成是一个基本需求,特别是那些需要敏捷情况管理的系统,如智能家居。本体推理是一种通过捕获上下文和优化连接对象生命周期来识别此类系统情况的有效技术。它基于常识性知识,用于解释来自不同和异构连接对象的大量事件。本体驱动的方法可以利用新的组合算子来求解并行输入事件,以达到较高的准确率。本文提出了一种基于开放语义服务的灵活、模块化、分层的松耦合框架,以高效地识别高度复杂的事件。在智能域用例中对该方法进行了评估,并与其他现有方法进行了比较。结果表明,在较低的执行时间下,情境识别的准确率有显著的提高。
{"title":"A semantic event based framework for complex situations modeling and identification in smart environments","authors":"Abderrahim Lakehal, A. Alti, P. Roose","doi":"10.19101/IJACR.PID33","DOIUrl":"https://doi.org/10.19101/IJACR.PID33","url":null,"abstract":"Integration of technologies and smart services is an essential need in most pervasive smart automation systems, especially those requiring agile situation management such as a smart home. Ontology reasoning is an efficient technique for identifying the situation of such systems by capturing the context and optimizing connected object lifecycle. It is based on common-sense knowledge for interpreting a huge number of events from different and heterogeneous connected objects. The ontology-driven approach may be used to solve the parallel incoming events using new combination operators in order to achieve high accuracy rates. This paper presents a flexible, modular and hierarchical loosely coupled framework based on open semantic services in order to identify highly complex events to hold the situations with high efficiency. The proposed approach is evaluated on smart domains use cases and compared with other existing methods. Results show interesting ratios of situation identification accuracy with low execution time.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115453135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Immune PID controller based on differential evolution algorithm for heart rate regulation 基于差分进化算法的免疫PID控制器心率调节
Pub Date : 2019-05-18 DOI: 10.19101/IJACR.2019.940004
Tariq Tashan, Ekhlas H. Karam, Eman Falah Mohsin
This paper presents different structures of immune proportional-integral-derivative (PID) control system, to regulate the heart rate. It is based on Yanagihara, Noma, and Irisawa (YNI) model that represent the mathematical model of the heart. Three structure designs have been proposed to emphasize the optimality in the control process. In this work differential evolution (DE) algorithm is considered to optimize the controller parameters. The performance of the proposed three controllers has been compared to traditional PID methods. The comparison results show best improvement when using the proposed structure-III with 0% maximum overshoot, a reduction of 98.9%, 96.8% and 30.8% in rising time, settling time, and steady state error respectively.
本文提出了不同结构的免疫比例-积分-导数(PID)控制系统来调节心率。它是基于Yanagihara, Noma和Irisawa (YNI)模型,表示心脏的数学模型。为了强调控制过程的最优性,提出了三种结构设计。本文采用差分进化算法对控制器参数进行优化。将所提出的三种控制器的性能与传统PID方法进行了比较。对比结果表明,当最大超调量为0%时,上升时间、稳定时间和稳态误差分别降低了98.9%、96.8%和30.8%,改善效果最好。
{"title":"Immune PID controller based on differential evolution algorithm for heart rate regulation","authors":"Tariq Tashan, Ekhlas H. Karam, Eman Falah Mohsin","doi":"10.19101/IJACR.2019.940004","DOIUrl":"https://doi.org/10.19101/IJACR.2019.940004","url":null,"abstract":"This paper presents different structures of immune proportional-integral-derivative (PID) control system, to regulate the heart rate. It is based on Yanagihara, Noma, and Irisawa (YNI) model that represent the mathematical model of the heart. Three structure designs have been proposed to emphasize the optimality in the control process. In this work differential evolution (DE) algorithm is considered to optimize the controller parameters. The performance of the proposed three controllers has been compared to traditional PID methods. The comparison results show best improvement when using the proposed structure-III with 0% maximum overshoot, a reduction of 98.9%, 96.8% and 30.8% in rising time, settling time, and steady state error respectively.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115880659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel information retrieval method based on R-tree index for smart hospital information system 一种基于r树索引的智能医院信息检索方法
Pub Date : 2019-05-18 DOI: 10.19101/IJACR.2019.940030
Xinlu Wang, W. Meng, Mingchuan Zhang
{"title":"A novel information retrieval method based on R-tree index for smart hospital information system","authors":"Xinlu Wang, W. Meng, Mingchuan Zhang","doi":"10.19101/IJACR.2019.940030","DOIUrl":"https://doi.org/10.19101/IJACR.2019.940030","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A comprehensive study of process calculi with routing tables 带路由表的过程演算的综合研究
Pub Date : 2019-05-18 DOI: 10.19101/IJACR.2019.940029
Priyanka Gupta, M. Gaur
{"title":"A comprehensive study of process calculi with routing tables","authors":"Priyanka Gupta, M. Gaur","doi":"10.19101/IJACR.2019.940029","DOIUrl":"https://doi.org/10.19101/IJACR.2019.940029","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116390787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of adaptive neuro sliding mode controller for anesthesia drug delivery based on biogeography based optimization 基于生物地理优化的麻醉给药自适应神经滑模控制器设计
Pub Date : 2019-05-18 DOI: 10.19101/IJACR.2018.839037
Layla H. Abood, Ekhlas H. Karam, Abbas H. Issa
Monitoring depth of anesthesia (DOA) is a significant point in general anesthesia (GA). It can be obtained from the assessment of the drug dose carefully and preciously. As a benefit of drug delivery automation, closed-loop method will present several advantages. It may prevent excessive dose amount or less needed dose and the controlled feedback system can decrease the cost of the healthcare by reducing the patient recovery period. This paper addresses the use of adaptive sliding mode controllers (ASMC) for calculating the depth of anesthesia by administrating a dose of propofol drug and measure patient state according to the monitoring device the bispectral index (BIS). In this study, we suggest a simple nonlinear control strategy consists of an ASMC combined with single neuron self-tune neural controller. It is used for maintaining DOA and reducing the effect of the nonlinear element. The adaptive controller uses the BIS value measured as a reference tracking value and propofol dose rate as a control signal. The parameters of the controller are tuned using a procedure based on the biogeography-based optimization (BBO) algorithm. The results indicate that including adaptive parts of the controller and tune its gains needed by BBO algorithm may enable optimal and stable performance for controller for all patients. It also provides fast reach to the induction phase and stay in a stable value in maintenance phase, which reflects the efficient response of the suggested controller if it compared to other nonlinear controllers. It is also justified by the results obtained that the suggested controller gives a very good response.
麻醉深度(DOA)监测是全麻(GA)的一个重要环节。它可以从药物剂量的评估中仔细而宝贵地获得。作为给药自动化的优势,闭环方法将呈现出几个优点。它可以防止过量剂量或所需剂量不足,并且控制反馈系统可以通过缩短患者恢复期来降低医疗保健成本。本文讨论了使用自适应滑模控制器(ASMC)通过给药异丙酚来计算麻醉深度,并根据监测装置的双谱指数(BIS)来测量患者的状态。在这项研究中,我们提出了一种简单的非线性控制策略,由ASMC结合单神经元自调谐神经控制器组成。它是用来保持DOA和减少非线性元素的影响。自适应控制器以测量的BIS值作为参考跟踪值,以异丙酚剂量率作为控制信号。控制器的参数采用基于生物地理优化(BBO)算法的程序进行调整。结果表明,加入控制器的自适应部分并调整BBO算法所需的增益可以使控制器对所有患者都具有最优和稳定的性能。该方法可以快速到达感应阶段,并在维持阶段保持稳定值,与其他非线性控制器相比,反映了该控制器的高效响应。得到的结果也证明了所建议的控制器给出了很好的响应。
{"title":"Design of adaptive neuro sliding mode controller for anesthesia drug delivery based on biogeography based optimization","authors":"Layla H. Abood, Ekhlas H. Karam, Abbas H. Issa","doi":"10.19101/IJACR.2018.839037","DOIUrl":"https://doi.org/10.19101/IJACR.2018.839037","url":null,"abstract":"Monitoring depth of anesthesia (DOA) is a significant point in general anesthesia (GA). It can be obtained from the assessment of the drug dose carefully and preciously. As a benefit of drug delivery automation, closed-loop method will present several advantages. It may prevent excessive dose amount or less needed dose and the controlled feedback system can decrease the cost of the healthcare by reducing the patient recovery period. This paper addresses the use of adaptive sliding mode controllers (ASMC) for calculating the depth of anesthesia by administrating a dose of propofol drug and measure patient state according to the monitoring device the bispectral index (BIS). In this study, we suggest a simple nonlinear control strategy consists of an ASMC combined with single neuron self-tune neural controller. It is used for maintaining DOA and reducing the effect of the nonlinear element. The adaptive controller uses the BIS value measured as a reference tracking value and propofol dose rate as a control signal. The parameters of the controller are tuned using a procedure based on the biogeography-based optimization (BBO) algorithm. The results indicate that including adaptive parts of the controller and tune its gains needed by BBO algorithm may enable optimal and stable performance for controller for all patients. It also provides fast reach to the induction phase and stay in a stable value in maintenance phase, which reflects the efficient response of the suggested controller if it compared to other nonlinear controllers. It is also justified by the results obtained that the suggested controller gives a very good response.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133156951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
International Journal of Advanced Computer Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1