Displaying all 4 publications

Abstract:
Sort:
  1. Thangaraj S, Goh VT, Yap TTV
    F1000Res, 2022;11:246.
    PMID: 38152076 DOI: 10.12688/f1000research.73182.3
    BACKGROUND: Smart grid systems require high-quality Phasor Measurement Unit (PMU) data for proper operation, control, and decision-making. Missing PMU data may lead to improper actions or even blackouts. While the conventional cubic interpolation methods based on the solution of a set of linear equations to solve for the cubic spline coefficients have been applied by many researchers for interpolation of missing data, the computational complexity increases non-linearly with increasing data size.

    METHODS: In this work, a modified recurrent equation-based cubic spline interpolation procedure for recovering missing PMU data is proposed. The recurrent equation-based method makes the computations of spline constants simpler. Using PMU data from the State Load Despatch Center (SLDC) in Madhya Pradesh, India, a comparison of the root mean square error (RMSE) values and time of calculation (ToC) is calculated for both methods.

    RESULTS: The modified recurrent relation method could retrieve missing values 10 times faster when compared to the conventional cubic interpolation method based on the solution of a set of linear equations. The RMSE values have shown the proposed method is effective even for special cases of missing values (edges, continuous missing values).

    CONCLUSIONS: The proposed method can retrieve any number of missing values at any location using observed data with a minimal number of calculations.

  2. Hassan MM, Tan IKT, Yap TTV
    Data Brief, 2019 Dec;27:104736.
    PMID: 31788509 DOI: 10.1016/j.dib.2019.104736
    The Internet Engineering Task Force provides a network-based mobility management solution to execute handover in heterogeneous networks on network-side called Proxy Mobile IPv6 (PMIPv6). In this data article, data are presented during the horizontal and vertical handover on video communication in PMIPv6 mobility protocols. The handover data are gathered using several measurement factors, which are latency, jitter, cumulative measured, and peak signal noise ratio under network simulation software, for both horizontal and vertical handovers [8].
  3. Tahir Yinka O, Haw SC, Yap TTV, Subramaniam S
    F1000Res, 2021;10:901.
    PMID: 34858590 DOI: 10.12688/f1000research.72890.3
    Introduction: Unauthorized access to data is one of the most significant privacy issues that hinder most industries from adopting big data technologies. Even though specific processes and structures have been put in place to deal with access authorization and identity management for large databases nonetheless, the scalability criteria are far beyond the capabilities of traditional databases. Hence, most researchers are looking into other solutions, such as big data management. Methods: In this paper, we firstly study the strengths and weaknesses of implementing cryptography and blockchain for identity management and authorization control in big data, focusing on the healthcare domain. Subsequently, we propose a decentralized data access and sharing system that preserves privacy to ensure adequate data access management under the blockchain. In addition, we designed a blockchain framework to resolve the decentralized data access and sharing system privacy issues, by implementing a public key infrastructure model, which utilizes a signature cryptography algorithm (elliptic curve and signcryption). Lastly, we compared the proposed blockchain model to previous techniques to see how well it performed. Results: We evaluated the blockchain on four performance metrics which include throughput, latency, scalability, and security. The proposed blockchain model was tested using a sample of 5000 patients and 500,000 observations. The performance evaluation results further showed that the proposed model achieves higher throughput and lower latency compared to existing approaches when the workload varies up to 10,000 transactions. Discussion: This research reviews the importance of blockchains as they provide infinite possibilities to individuals, companies, and governments.
  4. Bin Jamal Mohd Lokman EH, Goh VT, Yap TTV, Ng H
    F1000Res, 2022;11:57.
    PMID: 37082303 DOI: 10.12688/f1000research.73134.1
    Background: The lack of real-time monitoring is one of the reasons for the lack of awareness among drivers of their dangerous driving behavior. This work aims to develop a driver profiling system where a smartphone's built-in sensors are used alongside machine learning algorithms to classify different driving behaviors. Methods: We attempt to determine the optimal combination of smartphone sensors such as accelerometer, gyroscope, and GPS in order to develop an accurate machine learning algorithm capable of identifying different driving events (e.g. turning, accelerating, or braking). Results: In our preliminary studies, we encountered some difficulties in obtaining consistent driving events, which had the potential to add "noise" to the observations, thus reducing the accuracy of the classification. However, after some pre-processing, which included manual elimination of extraneous and erroneous events, and with the use of the Convolutional Neural Networks (CNN), we have been able to distinguish different driving events with an accuracy of about 95%. Conclusions: Based on the results of preliminary studies, we have determined that proposed approach is effective in classifying different driving events, which in turn will allow us to determine driver's driving behavior.
Related Terms
Filters
Contact Us

Please provide feedback to Administrator ([email protected])

External Links