<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Wi-Vi and Li-Fi based framework for Human Identification and Vital Signs Detection through Walls</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kunwardeep Singh</string-name>
          <email>kunwardeepgujral000@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Himanshu Setia</string-name>
          <email>himanshusetia17@gmail.com</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sudhakar Kumar</string-name>
          <email>sudhakar@ccet.ac.in</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wi-Fi</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vital Radio</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wi-Vi</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Li-Fi</string-name>
        </contrib>
      </contrib-group>
      <abstract>
        <p>Human motion detection and identification are becoming vital for building applications in smart homes. Traditional human activity recognition mechanisms use unique devices to track human motions having low resolution with less accuracy. The Wi-Fi signals in our homes can be extended to provide virtual human visualization through walls, as well as the ability to provide vital signs of persons behind walls. So in this paper, we have discussed the Wi-Vi and Li-Fi based framework that can identify moving humans behind opaque obstacles and in what ways does Vital Radio provide information about their physical health conditions and thus increasing the Wi-Vi detection accuracy using Li-Fi.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The normal Wi-Fi router is not only used as a data transmitter router, but it can be used in several
intelligent systems for smart health solutions. Wi-Fi can be upgraded to Wi-Vi which is cheaper and it
can act as X-rays that can track a person's movements by sending some reverse radio signals as pings.
Wi-Vi depends upon the Wi-fi signals which are based on MIMO (Multi Input Multi Output) antenna
to capture the motion of objects behind the obstacles. Wi-Vi works in two basic modes, as a gesture
detection framework, and as a moving object detection interface. Here, the main hurdle is to abolish
reflections coming back and concentrate on the reflections coming from behind the obstacles [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Analyzing the reflections from objects behind the obstacle/wall is tough as the strength of the
signal keeps on decreasing after getting reflected by objects. Because of this, small changes in signals
are hard to analyze. Only a little patch of the entire signal gets transmitted to the entire site and the
rest gets reflected by the obstacles [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Therefore, in order to resolve this issue, we are proposing a
new technology which is capable of doing multi-tasking at a single time i.e., providing vision through
the walls and also detecting vital signs of the person behind the wall.
      </p>
      <p>LiFi is a fully networked wireless system based on Visual Light Communication which includes
multiple access points and bi-directional multiuser communication. LiFi uses visible light, and visible
light has spectrum 10,000 times greater than radio spectrum thus it has a higher range of frequencies.
For LiFi, a transceiver for transmission which encompasses a modulation technique to carry data
using light and receiver to receive the data is needed.</p>
      <p>The important key ideas in this paper are is that how RF signals get cancelled when they get
reflected from a stationary object. The receiver antenna works on the mobile object creating a
discrepancy between the signals that can be refined to determine the motion of the target. This whole
process is called MIMO inference.</p>
      <p>2020 Copyright for this paper by its authors.</p>
      <p>
        Secondly, the Vital-Radio is a wireless device that keeps eye on the heart and breathing rate of a
human [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. It is capable to operate in the presence of multiple people in the room and can detect the
breathing and heart rate of each and every person.
      </p>
      <p>For the creation of smart cities, IoT has been originated as a key source. Many theft incidents have
been reported in big cities after which IoT came into the picture. IoT was the major advancement in
smart home systems with the help of which we can monitor our home from anywhere around the
globe. Using our designed framework, the efficacy of the IoT framework can be escalated
substantially.</p>
      <p>No doubt we have been surrounded by an enormous amount of data available but to use it in a
booming and useful manner so artificial intelligence is the domain which not only made us possible to
utilize the data but also to generate references, predictions, models, analysis, stats, probabilities and
speculations etc based on data access.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Previous Work 2.1.</title>
    </sec>
    <sec id="sec-3">
      <title>Ultra-Wideband Systems</title>
      <p>
        Earlier various attempts have been made in order to develop a system that can provide vision
through walls but they include heavy-weight radars and costly material. This system has only been
provided to the military for security operations. They are largely focused on simulations. The main
problem in these types of systems was the Flash effect which decreases the accuracy of the subject.
To eliminate this issue, very short pulses were used of the order of about 1 nanosecond. Also to
provide isolation for reflected signals, linear frequency chirp can be used. But all these processes
require ultra-wide bands (UWB) which are of the order of 2GHz [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Hence due to which its setup
becomes heavier and bulkier. Also, this wall sensing technique can be used separately for
1Dimensional or 2-Dimensional detection. Whereas in our proposed system, it is lighter and very much
affordable in price and hence can be used easily.
2.2.
      </p>
    </sec>
    <sec id="sec-4">
      <title>WISEE</title>
      <p>
        Presently there are many such devices that can detect human gestures such as commercially
available Xbox, or games, etc. Also by using sensors by placing them on the human body or
camerabased systems, we can detect human gestures. Some of the recent works operate in the range of
2.4GHz to identify human activities using the Micro-Dopler effect [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. However, our framework is
the most advanced device in this domain which even works in non-line of sight cases without using
any device attached to the subject and also effectively works behind the obstacles.
2.3.
      </p>
    </sec>
    <sec id="sec-5">
      <title>Infrared and Thermal Imaging</title>
      <p>
        Thermal imaging and infrared imaging have been developed to increase man's capability to see in
foggy or smoky areas. In order to detect obstructions in the visible range of their sensors, the system
captures thermal power-based signals. Due to the short frequency of this system, we cannot see
through opaque obstructions, while the system presented in this paper works at about 12.5 cm [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
2.4.
      </p>
      <p>Wi-Vi</p>
      <p>Wi-Vi is a low powered and low-cost device that is accessible to average users. It works with the
help of wifi router present in our home as it requires only a few MHz of bandwidth to operate. It
performs wall imaging without any other device needed from the other side of the wall and hence
extends the human vision beyond the electromagnetic range to allow us in identifying objects in the
dark or smoke. However, the displayed results are of low resolution and object detection cannot be
achieved if the wall is thicker than 8 inches. Whereas in our framework, providing better resolution
and detection of objects can even be done by walls thicker than 8 inches.
2.5.</p>
    </sec>
    <sec id="sec-6">
      <title>Deep learning models</title>
      <p>
        The deep learning models have been proven to be an efficient response in human-centred
computing in fog and mobile edge networks. Some algorithms like fuzzy c-means clustering have also
provided support in healthcare in tumor identification methods [
        <xref ref-type="bibr" rid="ref10 ref16">10,16</xref>
        ]. Also, there are some
crowdsourcing methods based on human-centric computing which uses mobile devices that can also
be used for the training and testing of these models to give highly accurate results [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
    </sec>
    <sec id="sec-7">
      <title>3. Proposed Framework</title>
      <p>The proposed framework in this paper is collectively a combination of wi-vi, vital radio and li-fi.
As the old wi-vi system has some drawbacks, using li-fi along with it can metamorphose it
completely. Higher display resolution can be accomplished easily with the data transmitting power of
li-fi signals.</p>
      <p>
        When a Wi-Fi signal is passed through opaque obstacles very few signals pass through the wall
and gets reflected by moving object [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. Also few signals spread evenly in the entire room and get
reflected by walls. Because of these reflections, it is difficult to detect minute human gestures. To
overcome this issue[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], Wi-Vi uses a MIMO antenna to get accurate results. The whole system
including antennas is very economical, effective and uses low bandwidth to operate. Based on the
Wi-Vi concept, a device has been developed called Vital-Radio which is used to track and analyze the
heartbeat and breathing rate of a human. This device does not need any additional equipment attached
to the human body and it even works with multiple persons inside a close room (having good
accuracy in 8 metres or less) [
        <xref ref-type="bibr" rid="ref12 ref13 ref3">3,12,13</xref>
        ].
      </p>
      <p>A room having the availability of LED lights or bulbs will act as a source for li-fi, and reflected
signals from the objects will provide highly accurate data to the system, which will sync the data
collected by wi-vi and vital radio. After analyzing and performing Eigen decomposition on the
vectors from data collected by the system, the results will be displayed which will be more accurate
than what the single wi-vi system could have provided.</p>
      <p>To have smooth functioning of every component of the system, it is necessary to remove the
possible shortfalls that might interrupt the whole process. Two important concepts which must be
focused on and should be taken care of are the flash effect and nulling.</p>
    </sec>
    <sec id="sec-8">
      <title>Removing Flash-Effect</title>
      <p>Due to continuous reflection from walls and objects, the reflected signal transmitted by the moving
object is much stronger than the signal received by the receiver antenna. To resolve this issue Wi-Vi
uses interference nulling to increase the sensitivity for the reflections. Also, Wi-Vi uses power
boosting the signal so that the reflected signal can provide accurate results.
3.2.</p>
    </sec>
    <sec id="sec-9">
      <title>Nulling</title>
      <p>In earlier systems, to nullify the reflected signal, multiple antenna arrays were used. But in Wi-Vi,
antenna arrays are avoided to get a sharper and improved resolution, as a large antenna array with
bulkier elements would require MIMO nulling at each of the antenna using the nulling algorithm. So
to overcome this, Wi-Vi uses Inverse Synthetic Aperture Radar (ISAR) which has only a single
receiving antenna. Using this single antenna, ISAR makes only one movement at a time. When the
subject starts moving, ISAR filters the consecutive signals from adjoining positions in the space and
hence it calculates the exact location of the person at that present time.</p>
    </sec>
    <sec id="sec-10">
      <title>Detecting Human Movement and Vital Signs</title>
      <p>
        Using Wi-Vi, several moving objects /humans can be tracked. To detect human movement, a
series of antennas can be tracked, just as with individual humans. However, each human emulates its
antenna array. Because Wi-Vi has only one antenna, the received signal can be accessed via the
antenna array of the moving person. Furthermore, multiple people increase the noise notably. Wi-Vi
uses Smoothed Music Algorithm to avoid this problem. This algorithm calculates a correlation matrix
(w x w) on R[n]. The noise is removed and the strongest eigenvectors are maintained by performing
eigen-decomposition on R[n] [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In this case, this corresponds to some moving eigen-vectors and DC
values. In the case of vital radio, it uses Wi-Vi to access the physical health of every person in the
room and has the capability to record the vital signs of multiple users at a time. Also, the recent
advancements in vital radio make use of air pressure around the subject to get more accurate data of
his/her health.
3.4.
      </p>
      <p>Li-Fi (VLC)</p>
      <p>
        Light Fidelity is a modern-day technology that encompasses a surplus amount of power. Major
incentives it offers are reliability which enables interference-free communication, more efficiency,
and cheaper. In terms of localization, it is far easier for setting up. Less latency is a key benefit of LiFi
thus it can help in AR and VR technologies [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. It is free from any form of interference thus it is
ecofriendly. In the case of security, it provides an approach for monitoring and authentication, there are
invisible artefacts that block illumination which makes it safe to use [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. In the viewpoint of
demonstration, a small scale LiFi prototype is explained below –
      </p>
    </sec>
    <sec id="sec-11">
      <title>3.4.1. Transmitter</title>
      <p>For data transmission from one end one audio jack of 3.5mm, one DC battery of 9V, one resistor
of 100-220ohm, and white coloured Led of 2 watts. An input source will send the audio signal
through LED at photodiodes in the solar panel located at the receiver end in the form of an electrical
signal.</p>
    </sec>
    <sec id="sec-12">
      <title>3.4.2. Receiver</title>
      <p>At the receiving end one solar panel, one audio jack of 3.5mm and a speaker or one device for
storing the data transmitted. The next solar panel will detect those electrical signals received from the
transmitter and will send signals into the output source (storing device/speaker/amplifier). Thus the
data transmission takes place.</p>
    </sec>
    <sec id="sec-13">
      <title>4. Applications</title>
    </sec>
    <sec id="sec-14">
      <title>4.1. Healthcare</title>
      <p>Assume a case if someone wants to check the heart rate of another person in a different room.
Then Wi-Vi and Vital Radio both perform combinational. As explained above, it will analyze two
consecutive signals. After this process continues a heart rate pattern can be derived and used for
checking health quality.</p>
      <p>In the case of Hospitals, nowadays LEDs are used thus using Li-Fi simultaneously with a visual
image received from our system, it can give more clarified results to enhance the accuracy of the
whole structure.
4.2.</p>
    </sec>
    <sec id="sec-15">
      <title>Defence</title>
      <p>
        In the case of Military operations, no doubt Wi-Vi is and will be a mega asset but by using
described framework operations can easily be accomplished. Some SSL protocols can also be
involved in this framework [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
4.3.
      </p>
    </sec>
    <sec id="sec-16">
      <title>Smart Traffic Management</title>
      <p>For road traffic in tunnels, the proposed framework will give drivers an image of both rear and
front view which results in less noise pollution in crowded and over jammed places.
4.4.</p>
    </sec>
    <sec id="sec-17">
      <title>Smart Homes</title>
      <p>
        Many theft incidents have been reported in big cities after which IoT came into the picture.
Consider a scenario in which a person from his office can have an eye on his residency by viewing
visual representation generated by our framework further helpful in thief detection. Therefore
elevating the efficiency of IoT [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] based smart home systems.
4.5.
      </p>
    </sec>
    <sec id="sec-18">
      <title>Autonomous Cars</title>
      <p>
        In the case of smart vehicles, our framework will be useful as its data can be collected for training
and testing using different algorithms of machine learning resulting in a model which can be used
with artificial intelligence for predicting the dense traffic area resulting in to increase in accuracy of
autonomous cars [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
    </sec>
    <sec id="sec-19">
      <title>5. Conclusion</title>
      <p>Wi-vi, vital radio and li-fi used separately have many drawbacks like resolution, accuracy, etc., but
combining them all in one framework can metamorphose their shortfalls. In a room having the
availability of an LED light/bulb, the amalgamation of Li-Fi with the other two technologies will
boost the precision power of detection and identification of Wi-Vi and Li-Fi based framework’s. The
framework is very effective in Human-based identification and in the detection of its vital signs
having a much higher resolution than each of them when used solitary. Hence this low-cost
framework can be used in the public sector and also by the general public for private use.</p>
    </sec>
    <sec id="sec-20">
      <title>6. Acknowledgements</title>
      <p>We wish to acknowledge the help provided by the technical and support staff of the CCET ACM
Student Chapter and the Department of Computer Science &amp; Engineering, CCET(Degree Wing),
Chandigarh. We would also like to show our deep appreciation to our supervisors who helped us in
the finalization of our research paper.</p>
    </sec>
    <sec id="sec-21">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Vidyasagar</surname>
            <given-names>S D</given-names>
          </string-name>
          , Seema, “
          <article-title>A Study on Applications of Wi-Vi Technology</article-title>
          ,”
          <source>International Journal of Computer Sciences and Engineering</source>
          , Vol.
          <volume>7</volume>
          ,
          <issue>Issue</issue>
          .4, pp.
          <fpage>829</fpage>
          -
          <lpage>834</lpage>
          ,
          <year>2019</year>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Adib</surname>
            ,
            <given-names>Fadel</given-names>
          </string-name>
          &amp; Katabi,
          <string-name>
            <surname>Dina.</surname>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>See through walls with WiFi!</article-title>
          .
          <source>ACM SIGCOMM Computer Communication Review</source>
          .
          <volume>43</volume>
          .
          <fpage>75</fpage>
          -
          <lpage>86</lpage>
          .
          <fpage>10</fpage>
          .1145/2534169.2486039.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H. N.</given-names>
            <surname>Saha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nandi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Biswas</surname>
          </string-name>
          and
          <string-name>
            <surname>T. Das</surname>
          </string-name>
          ,
          <article-title>"Heart-rate detection and tracking human body movements through walls at home,"</article-title>
          <source>2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/IEMCON.
          <year>2016</year>
          .
          <volume>7746291</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>SK</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <surname>K Kaur</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Aggarawal</surname>
          </string-name>
          , “
          <article-title>Emerging Trends and Limitations in Technology and System of Ubiquitous Computing”</article-title>
          ,
          <source>International Journal of Advanced Research in Computer Science (IJARCS)</source>
          ,
          <volume>5</volume>
          (
          <issue>7</issue>
          ), pp
          <fpage>174</fpage>
          -
          <lpage>178</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>Char vat</surname>
          </string-name>
          , L.
          <string-name>
            <surname>Keppel</surname>
            ,
            <given-names>E. Rothwell C.</given-names>
          </string-name>
          <string-name>
            <surname>Coleman</surname>
            , and
            <given-names>E. Mohole.</given-names>
          </string-name>
          <article-title>An ultra-wideband (UWB) switched-antenna-array radar imaging system</article-title>
          in
          <source>IEEE ARRAY</source>
          ,
          <year>2010</year>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R</given-names>
            <surname>Madan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>SK</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <surname>N Jain</surname>
          </string-name>
          ,
          <article-title>Signal filtering using discrete wavelet transform</article-title>
          ,
          <source>International journal of recent trends in engineering 2</source>
          (
          <issue>3</issue>
          ),
          <fpage>96</fpage>
          ,
          <year>2009</year>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Goswami</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Shukla</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>Design of a Li-Fi Transceiver</article-title>
          .
          <source>Wireless Engineering and Technology</source>
          ,
          <volume>8</volume>
          ,
          <fpage>71</fpage>
          -
          <lpage>86</lpage>
          . doi:
          <volume>10</volume>
          .4236/wet.
          <year>2017</year>
          .
          <volume>84006</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>L. I.</given-names>
            <surname>Albraheem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. H.</given-names>
            <surname>Alhudaithy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Aljaser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. R.</given-names>
            <surname>Aldhafian</surname>
          </string-name>
          and
          <string-name>
            <given-names>G. M.</given-names>
            <surname>Bahliwah</surname>
          </string-name>
          ,
          <article-title>"Toward Designing a Li-Fi-Based Hierarchical IoT Architecture,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>6</volume>
          , pp.
          <fpage>40811</fpage>
          -
          <lpage>40825</lpage>
          ,
          <year>2018</year>
          , doi: 10.1109/ACCESS.
          <year>2018</year>
          .
          <volume>2857627</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Sunil</given-names>
            <surname>Kr</surname>
          </string-name>
          . Singh,
          <string-name>
            <surname>Ajay Kumar</surname>
          </string-name>
          , Siddharth Gupta, Ratnakar Madan, “
          <article-title>Architectural Performance of WiMAX over WiFi with Reliable QoS over Wireless Communication</article-title>
          ” in
          <source>International Journal Advanced Networking and Applications</source>
          (IJANA) [EISSN:
          <fpage>0975</fpage>
          -
          <lpage>0282</lpage>
          ],
          <source>Page 1016-1023</source>
          , Vol.
          <volume>03</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>01</given-names>
          </string-name>
          ,
          <string-name>
            <surname>July</surname>
            <given-names>2011</given-names>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B B</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Agrawal</surname>
            , Dharma &amp; Yamaguchi,
            <given-names>Shingo.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Deep learning models for human centered computing in fog and mobile edge networks</article-title>
          .
          <source>Journal of Ambient Intelligence and Humanized Computing. 10. 10.1007/s12652-018-0919-8.</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jing</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          et al.
          <article-title>A crowdsourcing method for online social networks security assessment based on human-centric computing</article-title>
          .
          <source>Hum. Cent. Comput. Inf. Sci</source>
          .
          <volume>10</volume>
          ,
          <issue>23</issue>
          (
          <year>2020</year>
          ). https://doi.org/10.1186/s13673-020-00230-0
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Al-Ayyoub</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , AlZu'bi,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Jararweh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Shehab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            , &amp;
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <surname>B. B.</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Accelerating 3D medical volume segmentation using GPUs</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>77</volume>
          (
          <issue>4</issue>
          ),
          <fpage>4939</fpage>
          -
          <lpage>4958</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>AlZu'bi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shehab</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al-Ayyoub</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jararweh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>Parallel implementation for 3d medical volume fuzzy segmentation</article-title>
          .
          <source>Pattern Recognition Letters</source>
          ,
          <volume>130</volume>
          ,
          <fpage>312</fpage>
          -
          <lpage>318</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B. B.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Multi-layer defense against malware attacks on smartphone wi-fi access channel</article-title>
          .
          <source>Procedia Computer Science</source>
          ,
          <volume>78</volume>
          ,
          <fpage>19</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>AlZu'bi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hawashin</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mujahed</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jararweh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B. B.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>An efficient employment of internet of multimedia things in smart and future agriculture</article-title>
          .
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>78</volume>
          (
          <issue>20</issue>
          ),
          <fpage>29581</fpage>
          -
          <lpage>29605</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Ahmed</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chatzimisios</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jararweh</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Song</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Recent advances in fog and mobile edge computing</article-title>
          .
          <source>Transactions on Emerging Telecommunications Technologies</source>
          ,
          <volume>29</volume>
          (
          <issue>4</issue>
          ),
          <year>e3307</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>B. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tewari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cvitić</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peraković</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Artificial intelligence empowered emails classifier for Internet of Things based systems in industry 4.0</article-title>
          .
          <string-name>
            <given-names>Wireless</given-names>
            <surname>Networks</surname>
          </string-name>
          ,
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>