Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,061 Article Results

Ant Based Cross Layered Optimization Protocol for WMSN with Fuzzy Clustering

10.11591/ijeecs.v10.i1.pp295-301
DipaliParag Adhyapak , Sridharan Bhavani , Aparna Pradeep Laturkar
Wireless Multimedia Sensor Network (WMSN) is embedded with large number of Audio, Video and scalar sensor nodes which can able to retrieve the multimedia information from the environment. WMSN has several challenges such as life time of the network, Memory requirement, Coverage, Bandwidth and QoS metrics. Hence selection of routing algorithm is crucial in WMSN. Again interdependencies of the protocol layer cannot be neglected to improve the network performance. Clustering in WMSN is challenging task in order to increase network lifetime and to improve the communication. Hence Fuzzy clustered Ant based cross layer protocol (FCAXL) is proposed. In this paper performance analysis of ant based cross layer optimization protocol with fuzzy clustering based on number of nodes and packet size is done. Simulation results shows that Fuzzy clustered ant based cross layer optimization protocol performs best as compared to AntSenseNet routing protocol, Cross layer routing protocol and Ant based cross layer routing protocol in terms of QoS parameters such as Throughput, Packet delivery ratio and delay. Hence the life time of the network increases.
Volume: 10
Issue: 1
Page: 295-301
Publish at: 2018-04-01

An Optimum Approach for Preprocessing of Web User Query

10.11591/ijict.v7i1.pp8-12
Sunny Sharma , Sunita Sunita , Arjun Kumar , Vijay Rana
The emergence of the Web technology generated a massive amount of raw data by enabling Internet users to post their opinions, comments, and reviews on the web. To extract useful information from this raw data can be a very challenging task. Search engines play a critical role in these circumstances. User queries are becoming main issues for the search engines. Therefore a preprocessing operation is essential. In this paper, we present a framework for natural language preprocessing for efficient data retrieval and some of the required processing for effective retrieval such as elongated word handling, stop word removal, stemming, etc. This manuscript starts by building a manually annotated dataset and then takes the reader through the detailed steps of process. Experiments are conducted for special stages of this process to examine the accuracy of the system.
Volume: 7
Issue: 1
Page: 8-12
Publish at: 2018-04-01

Cluttered Traffic Distribution in LoRa LPWAN

10.11591/ijeecs.v10.i1.pp214-223
Nur Aishah Bt. Zainal , Mohamed Hadi Habaebi , Israth Chowdhury , Md Rafiqul Islam
Low Power WAN (LPWAN) is a wireless broad area network technology. It is interconnects using only low bandwidth, less power consumption at long range. This technology is operating in unauthorized spectrum which designed for wireless data communication. To have an insight of such long-range technology, this paper evaluates the performance of LoRa radio links under shadowing effect and realistic smart city utilities clutter grid distribution. Such environment is synonymous to residential, industrial and modern urban centers. The focus is to include the effect of shadowing on the radio links while attempting to study the optimum sink node numbers and their locations for maximum sensor node connectivity. Results indicate that the usual unrealistic random node distribution does not reflect actual real-life scenario where many of these sensing nodes follow the built infrastructure around the city of smart buildings. The system is evaluated in terms of connectivity and packet loss ratio.
Volume: 10
Issue: 1
Page: 214-223
Publish at: 2018-04-01

Notice of Retraction Digital Image Steganography Using Bit Flipping

10.11591/ijict.v7i1.pp1-7
Aditya Kumar Sahu , Gandharba Swain
Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting info@iaesjournal.com.-----------------------------------------------------------------------This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique
Volume: 7
Issue: 1
Page: 1-7
Publish at: 2018-04-01

Grid & Force Based Sensor Deployment Methods in WSN using PSO

10.11591/ijeecs.v10.i1.pp271-279
Aparna Pradeep Laturkar , Sridharan Bhavani , DeepaliParag Adhyapak
Wireless Sensor Network (WSN) is emergingtechnology and has wide range of applications, such as environment monitoring, industrial automation and numerous military applications. Hence, WSN is popular among researchers. WSN has several constraints such as restricted sensing range, communication range and limited battery capacity. These limitations bring issues such as coverage, connectivity, network lifetime and scheduling & data aggregation. There are mainly three strategies for solving coverage problems namely; force, grid and computational geometry based. PSO is a multidimensional optimization method inspired from the social behavior of birds called flocking. Basic version of PSO has the drawback of sometimes getting trapped in local optima as particles learn from each other and past solutions. This issue is solved by discrete version of PSO known as Modified Discrete Binary PSO (MDBPSO) as it uses probabilistic approach. This paper discusses performance analysis of random; grid based MDBPSO (Modified Discrete Binary Particle Swarm Optimization), Force Based VFCPSO and Combination of Grid & Force Based sensor deployment algorithms based on interval and packet size. From the results of Combination of Grid & Force Based sensor deployment algorithm, it can be concluded that its performance is best for all parameters as compared to rest of the three methods when interval and packet size is varied.
Volume: 10
Issue: 1
Page: 271-279
Publish at: 2018-04-01

Multi-objective IT Project Selection Model for Improving SME Strategy Deployment

10.11591/ijece.v8i2.pp1102-1111
Abir El Yamami , Khalifa Mansouri , Mohammed Qbadou , El Hossein Illousamen
Due to the limited financial resources of small and Medium-sized enterprises (SMEs), the proven approaches for selecting IT project portfolio for large enterprises may fail to perform in SMEs; SME top management want to make sure that the corporate strategy is carried out effectively by IT project portfolio before investing in such projects. In order to provide automated support to the selection of IT projects, it seems inevitable that a multi-objective approach is required in order to balance possible competing and conflicting objectives. Under such an approach, individual projects would be evaluated not just on their own performance but on the basis of their contribution to balance the overall portfolio. In this paper, we extend and explore the concept of IT project selection to improve SME strategy deployment. In particular, we present a model that assesses an individual project in terms of its contribution to the overall strategic objectives of the portfolio. A simulation using the model illustrates how SME can rapidly achieve maximal business goals by deploying the multi-objective algorithm when selecting IT projects.
Volume: 8
Issue: 2
Page: 1102-1111
Publish at: 2018-04-01

Avoidance of Over Speed Through Intelligent Speed Breaking System

10.11591/ijict.v7i1.pp13-15
M S Satyanarayana , Aruna T M , Divya G N
Accidents have become major issue in Developing countries like India now a day. As per the Surveys 60% of the accidents are happening due to over speed. Though the government has taken so many initiatives like Traffic Awareness & Driving Awareness Week etc.., but still the percentage of accidents are not getting reduced. In this paper a new technique has been introduced in order to reduce the percentage of accidents. The new technique is implemented using the concept of Intelligent Speed Braking System. The Intelligent Speed Braking systems can be implemented any where essential in order to avoid the accidents. The main objective of this system is to calculate the speed of the vehicle at three different locations based on the place where the vehicle speed has to be controlled and if the speed is greater than the designated speed in that road then it will automatically open up the speed breaker to control the speed of the vehicle. If the speed is less or equal to the designated speed in that road then the vehicle will be passed without any disturbance. This system though it won’t avoid 100% accidents at least it will reduce the percentage of accidents. This is system is not only to avoid accidents it will also intelligently controls the speed of the vehicles and creates awareness amongst the drivers.
Volume: 7
Issue: 1
Page: 13-15
Publish at: 2018-04-01

Task Scheduling in Heterogeneous Multiprocessor Environments – An Efficient ACO-Based Approach

10.11591/ijeecs.v10.i1.pp320-329
Nekiesha Edward , Jeffrey Elcock
In heterogeneous computing environments, finding optimized solutions continues to be one of the most important and yet, very challenging problems. Task scheduling in such environments is NP-hard, so efficient mapping of tasks to the processors remains one of the most critical issues to be tackled. For several types of applications, the task scheduling problem is crucial, and across the literature, a number of algorithms with several different approaches have been proposed. One such effective approach is known as Ant Colony Optimization (ACO). This popular optimization technique is inspired by the capabilities of ant colonies to find the shortest paths between their nests and food sources. Consequently, we propose an ACO-based algorithm, called rACS, as a solution to the task scheduling problem. Our algorithm utilizes pheromone and a priority-based heuristic, known as the upward rank value, as well as an insertion-based policy and a pheromone aging mechanism to guide the ants to high quality solutions. To evaluate the performance of our algorithm, we compared our algorithm with the ACS algorithm and the ACO-TMS algorithm using randomly generated directed acyclic graphs (DAGs). The simulation results indicated that our algorithm experienced comparable or even better performance, than the selected algorithms.
Volume: 10
Issue: 1
Page: 320-329
Publish at: 2018-04-01

Swarm Based Cross Layer Optimization Protocol for WMSN

10.11591/ijeecs.v10.i1.pp302-308
DeepaliParag Adhyapak , Sridharan Bhavani , Aparna Pradeep Laturkar
Wireless Multimedia Sensor Network (WMSN) is comprised of tiny, low cost multimedia devices such as video cameras and microphones. These networks can transfer scalar as well as multimedia data into real time as well as non-real time applications. However addition of such devices exposes additional challenges on both QoS assurance and energy efficiency for efficient use of resources.  This paper presents cross layer based AntSenseNet protocol to meet various QoS requirements such as throughput, jitter, lifetime and packet delivery ratio in order to improve network lifetime. Cross layer routing protocol utilizes scheduling algorithm and AntSenseNet protocol builds hierarchical structure and able to use multipath routing protocol.  Simulation results shows Cross layer based AntSenseNet protocol outperforms Ant Sense routing protocol and cross layer routing protocol in terms of throughput and packet delivery ratio
Volume: 10
Issue: 1
Page: 302-308
Publish at: 2018-04-01

The End User Requirement for Project Management Software Accuracy

10.11591/ijece.v8i2.pp1112-1121
Fachrurrazi Fachrurrazi
This research explains the relationship between the end user requirement and accuracy of PMS (Project Management Software). The research aims are to analyze the PMS accuracy and measuring the probability of PMS accuracy in achieving ±1% of the end user requirement. The bias statistical method will be used to prove the PMS accuracy that based on the hypothesis testing. The result indicates the PMS is still accurate to be implemented in Aceh-Indonesia area projects that using the SNI (National Indonesia Standard as current method) with the accuracy index of ±7.5%. The achievement probability of reaching the end user requirement is still low of ±21.77%. In case of the PMS, the low achievement of the end user requirement is not only caused by the low accuracy of the PMS but also caused by the amount of variability error, which is influenced by the amount of variation of the project activity. In this study, we confirm that it is necessary to reconcile both conditions between the PMS accuracy and the end user requirements.
Volume: 8
Issue: 2
Page: 1112-1121
Publish at: 2018-04-01

A Survey on Graph Database Management Techniques for Huge Unstructured Data

10.11591/ijece.v8i2.pp1140-1149
Patil N. S. , Kiran P , Kiran N. P. , Naresh Patel K. M.
Data analysis, data management, and big data play a major role in both social and business perspective, in the last decade. Nowadays, the graph database is the hottest and trending research topic. A graph database is preferred to deal with the dynamic and complex relationships in connected data and offer better results. Every data element is represented as a node. For example, in social media site, a person is represented as a node, and its properties name, age, likes, and dislikes, etc and the nodes are connected with the relationships via edges. Use of graph database is expected to be beneficial in business, and social networking sites that generate huge unstructured data as that Big Data requires proper and efficient computational techniques to handle with. This paper reviews the existing graph data computational techniques and the research work, to offer the future research line up in graph database management.
Volume: 8
Issue: 2
Page: 1140-1149
Publish at: 2018-04-01

A Status Data Transmitting System for Vessel Monitoring

10.11591/ijece.v8i2.pp917-925
The Anh Nguyen Dinh , Huy Le Xuan , Tuan Anh Vu , Duong Bach Gia
This paper presents a status data transmitting system suitable for vessel monitoring. The system consists of four main parts, which are a status data module, a frequency synthesizer, a power amplifier and a horn antenna. The status data module packs information of the identification, longitude, latitude and state of the vessel into data frames. FSK/MSK/GMSK schemes were used to modulate the data. The frequency synthesizer was designed with very high stability over temperature and very low frequency tolerance. The power amplifier provides 130 W output power at S band. The impedance bandwidth of the horn antenna can be controlled using the beveling technique.
Volume: 8
Issue: 2
Page: 917-925
Publish at: 2018-04-01

Design and Implementation Multimedia Learning Success for Vocational Schools

10.11591/ijece.v8i2.pp1067-1073
Fitro Nur Hakim , Achmad Solechan
This research aims to design a web-based multimedia applications, interactive learning, in order to improve the learning outcomes of students, especially students of Vocational High School. Multimedia Learning has been designed with some additional content in the form of applications: decision support system for multimedia usage based on Model of Multimedia Learning Success. The population obtained from respondents vocational school in Central Java, which is already implementing multimedia learning. The method used is qualitative analysis in the form of: the development of multimedia learning integrated with decision support systems. Design and implementation of multimedia learning success system that is abbreviated "Sikemuning". Sikemuning can be used to measure or provide guidance for teachers in the use of multimedia. Interviews with several respondents teachers from vocational schools in Central Java showed that: the system success multimedia learning developed in this study can be used as feedback to assess the success and effectiveness of the implementation of learning activities, multimedia learning can improve the performance and intelligence of vocational school students.
Volume: 8
Issue: 2
Page: 1067-1073
Publish at: 2018-04-01

Face Recognition in the Scrambled Domain Using MK-RDA and ANN

10.11591/ijict.v7i1.pp16-23
Kavita Kadam , C.R Jadhav
Facial look identity is a vital mission by means of human-interacting structures that goal to be aware of versions within the human’s emotional state. the principle challenge or the crucial part in surveillance society is the privacy-shielding era. because the rapid improvement in the internet international it turns into very essential to scramble the pics in the video or files for the duration of transmission. in this the biometric identity of photographs or faces from scrambled pictures plays a completely tough mission. Numbers of various technology are carried out to provide privateness for the duration of surveillance or during transmission of video however they're lack of essential traits, like reversibility or visible fine maintenance. in lots of scrambling methods the faces are covered by a few animation which may additionally or may not cover all faces or it receives hard to recover pics from this technique. Many guide method also are us used by which we will unscramble an photo but they are no longer powerful that a good deal. to overcome all this matters we proposed a novel approach- Many-Kernel Random Discriminate analysis (MK-RDA) to find out discriminative patterns from chaotic indicators. structures get better accuracy bring about best photos. To PIE and ORL datasets has getting above ninety% accuracy.
Volume: 7
Issue: 1
Page: 16-23
Publish at: 2018-04-01

Slot Loaded Capacitive fed Suspended RMSA with Meandered Ground Plane

10.11591/ijict.v7i1.pp49-56
Ravi M. Yadahalli , Nandini M. Ammanagi
In this paper, variations in the Capacitive fed suspended RMSA configurations have been proposed. Initially, the reference antenna consists of rectangular patch of size of (35.5 X 45.6) mm2 and a small rectangular feed patch of size of (1.4 X 4) mm2 residing on the same substrate suspended above the ground plane. Coaxial probe is used to feed the small patch which in turn excites the radiator patch electromagnetically, yielding a large impedance bandwidth (BW) of 39%, with good gain and broadside radiation pattern.  By, meandering the ground plane of reference antenna with three rectangular slots, the prototype antenna is fabricated and measurement has been carried out to validate the result for compact broadband response. Later, by loading a pair of rectangular slots in the radiating patch of the reference antenna in addition to the rectangular slots in the ground plane, the prototype antenna is fabricated and measurement has been carried out to validate the result for compact dual band response.
Volume: 7
Issue: 1
Page: 49-56
Publish at: 2018-04-01
Show 1411 of 1938

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration