期刊文献+
共找到52篇文章
< 1 2 3 >
每页显示 20 50 100
Correlation Analysis of Turbidity and Total Phosphorus in Water Quality Monitoring Data
1
作者 Wenwu Tan Jianjun Zhang +7 位作者 Xing Liu Jiang Wu Yifu Sheng Ke Xiao Li Wang Haijun Lin Guang Sun Peng Guo 《Journal on Big Data》 2023年第1期85-97,共13页
At present,water pollution has become an important factor affecting and restricting national and regional economic development.Total phosphorus is one of the main sources of water pollution and eutrophication,so the p... At present,water pollution has become an important factor affecting and restricting national and regional economic development.Total phosphorus is one of the main sources of water pollution and eutrophication,so the prediction of total phosphorus in water quality has good research significance.This paper selects the total phosphorus and turbidity data for analysis by crawling the data of the water quality monitoring platform.By constructing the attribute object mapping relationship,the correlation between the two indicators was analyzed and used to predict the future data.Firstly,the monthly mean and daily mean concentrations of total phosphorus and turbidity outliers were calculated after cleaning,and the correlation between them was analyzed.Secondly,the correlation coefficients of different times and frequencies were used to predict the values for the next five days,and the data trend was predicted by python visualization.Finally,the real value was compared with the predicted value data,and the results showed that the correlation between total phosphorus and turbidity was useful in predicting the water quality. 展开更多
关键词 Correlation analysis CLUSTER water quality predict water quality monitoring data
下载PDF
Gly-LysPred: Identification of Lysine Glycation Sites in Protein Using Position Relative Features and Statistical Moments via Chou’s 5 Step Rule
2
作者 Shaheena Khanum Muhammad Adeel Ashraf +5 位作者 Asim Karim Bilal Shoaib Muhammad Adnan Khan Rizwan Ali Naqvi Kamran Siddique Mohammed Alswaitti 《Computers, Materials & Continua》 SCIE EI 2021年第2期2165-2181,共17页
Glycation is a non-enzymatic post-translational modification which assigns sugar molecule and residues to a peptide.It is a clinically important attribute to numerous age-related,metabolic,and chronic diseases such as... Glycation is a non-enzymatic post-translational modification which assigns sugar molecule and residues to a peptide.It is a clinically important attribute to numerous age-related,metabolic,and chronic diseases such as diabetes,Alzheimer’s,renal failure,etc.Identification of a non-enzymatic reaction are quite challenging in research.Manual identification in labs is a very costly and timeconsuming process.In this research,we developed an accurate,valid,and a robust model named as Gly-LysPred to differentiate the glycated sites from non-glycated sites.Comprehensive techniques using position relative features are used for feature extraction.An algorithm named as a random forest with some preprocessing techniques and feature engineering techniques was developed to train a computational model.Various types of testing techniques such as self-consistency testing,jackknife testing,and cross-validation testing are used to evaluate the model.The overall model’s accuracy was accomplished through self-consistency,jackknife,and cross-validation testing 100%,99.92%,and 99.88%with MCC 1.00,0.99,and 0.997 respectively.In this regard,a user-friendly webserver is also urbanized to accumulate the whole procedure.These features vectorization methods suggest that they can play a critical role in other web servers which are developed to classify lysine glycation. 展开更多
关键词 Gly-LysPred PseAAC post-translational modification lysine glycation Chou’s 5 step rule position relative features
下载PDF
What Stands in the Way of Bigger Internet with Virtually Unlimited IP Address in Cameroon: A Study of IPv6 Stakeholders in Cameroon
3
作者 Austin Oguejiofor Amaechi Kongnso Emmanuel Shinyuy 《Journal of Computer and Communications》 2021年第11期22-36,共15页
The purpose of this case study paper was to identify factors that Internet Protocol stakeholders consider as standing in the way of the transition to bigger, more secure and faster internet with virtually unlimited In... The purpose of this case study paper was to identify factors that Internet Protocol stakeholders consider as standing in the way of the transition to bigger, more secure and faster internet with virtually unlimited Internet Protocol address in Cameroon and was completed in two phases. Descriptive method was followed and two study instruments were designed and implemented, namely focus group interviews and questionnaire interviews. Both instruments were validated and implemented on a sample of (6) experts for the interviews and (115) for the questionnaire. The focus group data were analyzed using a thematic analysis technique, leading to the identification of six themes including lack of policies and incentives to promote IPv6 deployment at government level, many organizations are seeing IPv6 as an issue that will only affect them in the distant future and not looking at IPv6 technology as an innovation generation opportunity. Decisions on these issues need to change if IPv6 current status in Cameroon is to change. The findings were then validated in the final phase. This involved the deployment of a survey questionnaire to collect opinions of 115 IPv6 actors working in both public and private institutions in Cameroon. The results revealed that IPv6 was not sufficiently attended to by organizations in Cameroon. The study results may be of practical use for Government IT decision makers. A further and more comprehensive research into the topic is recommended. 展开更多
关键词 IPv4 IPV6 INTERNET Barriers FACILITATORS Technology Management Cameroon Thematic Analysis
下载PDF
A Comprehensive Analysis of Quality of Service (QoS) in ZigBee Network through Mobile and Fixed Node
4
作者 Nazrul Islam Md. Iqbal Hossain Anisur Rahman 《Journal of Computer and Communications》 2022年第3期86-99,共14页
The standard specification of IEEE 802.15.4 is called ZigBee Propocol. ZigBee protocol required security, low data transfer rate, power efficient network. In addition, the ZigBee mobility function makes the ZigBee net... The standard specification of IEEE 802.15.4 is called ZigBee Propocol. ZigBee protocol required security, low data transfer rate, power efficient network. In addition, the ZigBee mobility function makes the ZigBee network more interactive and multi-purpose. The ZigBee mobile node has a significant effect on network parameters, namely MAC delay, end-to-end delay, MAC throughput and network load. However, a particular significant ZigBee node affects network data traffic and reduces the strength of the Quality of Service (QoS). The key issues are to analyze the QoS in order to increase overall performance of the network. The study proposes a ZigBee network with the mobile node and fixed node based on a variety of MAC layer settings. The Riverbed Network Simulator (Academic Modeler Release 17.5) is used for configuring and simulating the ZigBee network in a variety of conditions. The simulation results show that ZigBee with a fixed node performs better than the ZigBee mobile node. The ZigBee network with fixed node produces a lower network load and a high ratio of successfully transmitted data. The analysis of this study allows the ZigBee network to be better designed. 展开更多
关键词 WAPNs ZIGBEE IOT QOS Mobile Node
下载PDF
Modeling and Performance Analysis of Spiral Fishbone Network Using NS-2
5
作者 Pronab Biswas Md Maruf Islam +2 位作者 Sayed Asaduzzaman Nazrul Islam M. Raihan 《Journal of Computer and Communications》 2022年第3期125-140,共16页
In this research, we have projected and carried out a novel fishbone network that shows better performance in the term of minimizing the packet delay with respect to sink speed. Previous study implies that sector angl... In this research, we have projected and carried out a novel fishbone network that shows better performance in the term of minimizing the packet delay with respect to sink speed. Previous study implies that sector angle affects greatly on designing fishbone network. Finite Set of nodes arranges to sense the physical condition of any system is called wireless sensor. Our designed fishbone network can be potentially applied for a wireless sensing system to formulate a whole network. The network is a novel design which has been finalized by comparing sector angle. Analysis takes place by varying packet delay according to sink speed. Future analysis takes place for Quality of Service (QoS) and Quality of Experience (QoE). Latency of Packet and its size is the measurement criteria of any network or service is called Quality of Service (QoS). On the other hand the user experience of using the designed network is called Quality of Experience (QoE). Our designed network has been analyzed in TCP Tracer to find out the latency or packet delay for different users. The user data has been shorted and equated among them for latency with different no of packets. Our proposed spiral fishbone network shows better QoS and QoE. In future more nodes can be added to design extended fishbone network for wireless. 展开更多
关键词 Fishbone Network Network Modelling Performance Analysis NS-2
下载PDF
Detection of Alzheimer’s Disease Progression Using Integrated Deep Learning Approaches
6
作者 Jayashree Shetty Nisha P.Shetty +3 位作者 Hrushikesh Kothikar Saleh Mowla Aiswarya Anand Veeraj Hegde 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1345-1362,共18页
Alzheimer’s disease(AD)is an intensifying disorder that causes brain cells to degenerate early and destruct.Mild cognitive impairment(MCI)is one of the early signs of AD that interferes with people’s regular functio... Alzheimer’s disease(AD)is an intensifying disorder that causes brain cells to degenerate early and destruct.Mild cognitive impairment(MCI)is one of the early signs of AD that interferes with people’s regular functioning and daily activities.The proposed work includes a deep learning approach with a multimodal recurrent neural network(RNN)to predict whether MCI leads to Alzheimer’s or not.The gated recurrent unit(GRU)RNN classifier is trained using individual and correlated features.Feature vectors are concate-nated based on their correlation strength to improve prediction results.The feature vectors generated are given as the input to multiple different classifiers,whose decision function is used to predict the final output,which determines whether MCI progresses onto AD or not.Our findings demonstrated that,compared to individual modalities,which provided an average accuracy of 75%,our prediction model for MCI conversion to AD yielded an improve-ment in accuracy up to 96%when used with multiple concatenated modalities.Comparing the accuracy of different decision functions,such as Support Vec-tor Machine(SVM),Decision tree,Random Forest,and Ensemble techniques,it was found that that the Ensemble approach provided the highest accuracy(96%)and Decision tree provided the lowest accuracy(86%). 展开更多
关键词 ALZHEIMER recurrent neural network gated recurrent unit support vector machine random forest ENSEMBLE correlation hyper-parameter tuning decision tree
下载PDF
Network Learning-Enabled Sensor Association for Massive Internet of Things
7
作者 Alaa Omran Almagrabi Rashid Ali +2 位作者 Daniyal Alghazzawi Bander A.Alzahrani Fahad M.Alotaibi 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期843-853,共11页
The massive Internet of Things(IoT)comprises different gateways(GW)covering a given region of a massive number of connected devices with sensors.In IoT networks,transmission interference is observed when different sen... The massive Internet of Things(IoT)comprises different gateways(GW)covering a given region of a massive number of connected devices with sensors.In IoT networks,transmission interference is observed when different sensor devices(SD)try to send information to a single GW.This is mitigated by allotting various channels to adjoining GWs.Furthermore,SDs are permitted to associate with anyGWin a network,naturally choosing the one with a higher received signal strength indicator(RSSI),regardless of whether it is the ideal choice for network execution.Finding an appropriate GW to optimize the performance of IoT systems is a difficult task given the complicated conditions among GWs and SDs.Recently,in remote IoT networks,the utilization of machine learning(ML)strategies has arisen as a viable answer to determine the effect of various models in the system,and reinforcement learning(RL)is one of these ML techniques.Therefore,this paper proposes the use of an RL algorithm for GW determination and association in IoT networks.For this purpose,this study allows GWs and SDs with intelligence,through executing the multi-armed bandit(MAB)calculation,to investigate and determine the optimal GW with which to associate.In this paper,rigorous mathematical calculations are performed for this purpose and evaluate our proposed mechanism over randomly generated situations,which include different IoT network topologies.The evaluation results indicate that our intelligentMAB-based mechanism enhances the association as compared to state-of-the-art(RSSI-based)and related research approaches. 展开更多
关键词 Reinforcement learning ASSOCIATION internet of things massive IoT sensors network
下载PDF
Cache in fog computing design,concepts,contributions,and security issues in machine learning prospective
8
作者 Muhammad Ali Naeem Yousaf Bin Zikria +3 位作者 Rashid Ali Usman Tariq Yahui Meng Ali Kashif Bashir 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1033-1052,共20页
The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promisi... The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promising technologies that can improve overall communication performance.It brings on-demand services proximate to the end devices and delivers the requested data in a short time.Fog computing faces several issues such as latency,bandwidth,and link utilization due to limited resources and the high processing demands of end devices.To this end,fog caching plays an imperative role in addressing data dissemination issues.This study provides a comprehensive discussion of fog computing,Internet of Things(IoTs)and the critical issues related to data security and dissemination in fog computing.Moreover,we determine the fog-based caching schemes and contribute to deal with the existing issues of fog computing.Besides,this paper presents a number of caching schemes with their contributions,benefits,and challenges to overcome the problems and limitations of fog computing.We also identify machine learning-based approaches for cache security and management in fog computing,as well as several prospective future research directions in caching,fog computing,and machine learning. 展开更多
关键词 Internet of things Cloud computing Fog computing CACHING LATENCY
下载PDF
Multivariate Aggregated NOMA for Resource Aware Wireless Network Communication Security
9
作者 V.Sridhar K.V.Ranga Rao +4 位作者 Saddam Hussain Syed Sajid Ullah Roobaea Alroobaea Maha Abdelhaq Raed Alsaqour 《Computers, Materials & Continua》 SCIE EI 2023年第1期1693-1708,共16页
NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of servic... NonorthogonalMultiple Access(NOMA)is incorporated into the wireless network systems to achieve better connectivity,spectral and energy effectiveness,higher data transfer rate,and also obtain the high quality of services(QoS).In order to improve throughput and minimum latency,aMultivariate Renkonen Regressive Weighted Preference Bootstrap Aggregation based Nonorthogonal Multiple Access(MRRWPBA-NOMA)technique is introduced for network communication.In the downlink transmission,each mobile device’s resources and their characteristics like energy,bandwidth,and trust are measured.Followed by,the Weighted Preference Bootstrap Aggregation is applied to recognize the resource-efficient mobile devices for aware data transmission by constructing the different weak hypotheses i.e.,Multivariate Renkonen Regression functions.Based on the classification,resource and trust-aware devices are selected for transmission.Simulation of the proposed MRRWPBA-NOMA technique and existing methods are carried out with different metrics such as data delivery ratio,throughput,latency,packet loss rate,and energy efficiency,signaling overhead.The simulation results assessment indicates that the proposed MRRWPBA-NOMA outperforms well than the conventional methods. 展开更多
关键词 Mobile network multivariate renkonen regression weighted preference bootstrap aggregation resource-aware secure data communication NOMA
下载PDF
Considerations for a Planned Democratizing Data Framework for Valid and Trusted Data
10
作者 Tambe Mariam Takang Austin Oguejiofor Amaechi 《Journal of Data Analysis and Information Processing》 2023年第3期240-261,共22页
A key requirement of today’s fast changing business outcome and innovation environment is the ability of organizations to adapt dynamically in an effective and efficient manner. Becoming a data-driven decision-making... A key requirement of today’s fast changing business outcome and innovation environment is the ability of organizations to adapt dynamically in an effective and efficient manner. Becoming a data-driven decision-making organization plays a crucially important role in addressing such adaptation requirements. The notion of “data democratization” has emerged as a mechanism with which organizations can address data-driven decision-making process issues and cross-pollinate data in ways that uncover actionable insights. We define data democratization as an attitude focused on curiosity, learning, and experimentation for delivering trusted data for trusted insights to a broad range of authorized stakeholders. In this paper, we propose a general indicator framework for data democratization by highlighting success factors that should not be overlooked in today’s data driven economy. In this practice-based research, these enablers are grouped into six broad building blocks: 1) “ethical guidelines, business context and value”, 2) “data leadership and data culture”, 3) “data literacy and business knowledge”, 4) “data wrangling, trustworthy & standardization”, 5) “sustainable data platform, access, & analytical tool”, 6) “intelligent data governance and privacy”. As an attitude, once it is planned and built, data democratization will need to be maintained. The utility of the approach is demonstrated through a case study for a Cameroon based start-up company that has ongoing data analytics projects. Our findings advance the concepts of data democratization and contribute to data free flow with trust. 展开更多
关键词 Data Democratization Trusted Data Design Process Digital Innovation Literature Reviews
下载PDF
Frame Length Dependency for Fundamental Frequency Extraction in Noisy Speech
11
作者 Md. Saifur Rahman Any Chowdury +2 位作者 Nargis Parvin Arpita Saha Moinur Rahman 《Journal of Signal and Information Processing》 2024年第1期1-17,共17页
The fundamental frequency plays a significant part in understanding and perceiving the pitch of a sound. The pitch is a fundamental attribute employed in numerous speech-related works. For fundamental frequency extrac... The fundamental frequency plays a significant part in understanding and perceiving the pitch of a sound. The pitch is a fundamental attribute employed in numerous speech-related works. For fundamental frequency extraction, several algorithms have been developed which one to use relies on the signal’s characteristics and the surrounding noise. Thus, the algorithm’s noise resistance becomes more critical than ever for precise fundamental frequency estimation. Nonetheless, numerous state-of-the-art algorithms face struggles in achieving satisfying outcomes when confronted with speech recordings that are noisy with low signal-to-noise ratio (SNR) values. Also, most of the recent techniques utilize different frame lengths for pitch extraction. From this point of view, This research considers different frame lengths on male and female speech signals for fundamental frequency extraction. Also, analyze the frame length dependency on the speech signal analytically to understand which frame length is more suitable and effective for male and female speech signals specifically. For the validation of our idea, we have utilized the conventional autocorrelation function (ACF), and state-of-the-art method BaNa. This study puts out a potent idea that will work better for speech processing applications in noisy speech. From experimental results, the proposed idea represents which frame length is more appropriate for male and female speech signals in noisy environments. 展开更多
关键词 Pitch Estimation Fundamental Frequency BaNa ACF Frame Length
下载PDF
Development of a Best Answer Recommendation Model in a Community Question Answering (CQA) System 被引量:1
12
作者 Rotimi Olaosebikan Akintoba Emmanuel Akinwonmi +2 位作者 Bolanle Adefowoke Ojokoh Oladunni Abosede Daramola Oladele Stephen Adeola 《Intelligent Information Management》 2021年第3期180-198,共19页
In this work, a best answer recommendation model is proposed for a Question Answering (QA) system. A Community Question Answering System was subsequently developed based on the model. The system applies Brouwer Fixed ... In this work, a best answer recommendation model is proposed for a Question Answering (QA) system. A Community Question Answering System was subsequently developed based on the model. The system applies Brouwer Fixed Point Theorem to prove the existence of the desired voter scoring function and Normalized Google Distance (NGD) to show closeness between words before an answer is suggested to users. Answers are ranked according to their Fixed-Point Score (FPS) for each question. Thereafter, the highest scored answer is chosen as the FPS Best Answer (BA). For each question asked by user, the system applies NGD to check if similar or related questions with the best answer had been asked and stored in the database. When similar or related questions with the best answer are not found in the database, Brouwer Fixed point is used to calculate the best answer from the pool of answers on a question then the best answer is stored in the NGD data-table for recommendation purpose. The system was implemented using PHP scripting language, MySQL for database management, JQuery, and Apache. The system was evaluated using standard metrics: Reciprocal Rank, Mean Reciprocal Rank (MRR) and Discounted Cumulative Gain (DCG). The system eliminated longer waiting time faced by askers in a community question answering system. The developed system can be used for research and learning purposes. 展开更多
关键词 QUESTION ANSWER RECOMMENDATION Fixed Point Theorem Classification Retrieval Fixed-Point Score Reciprocal Rank Discounted Cumulative Gain
下载PDF
Quality of Service Analysis of Ethernet Network Based on Packet Size 被引量:1
13
作者 Nazrul Islam Chayan Chandra Bawn +2 位作者 Jahid Hasan Asma Islam Swapna Md. Syfur Rahman 《Journal of Computer and Communications》 2016年第4期63-72,共10页
Ethernet network, standardized by IEEE 802.3, is vastly installed in Local Area Network (LAN) for cheaper cost and reliability. With the emergence of cost effective and enhanced user experience needs, the Quality of S... Ethernet network, standardized by IEEE 802.3, is vastly installed in Local Area Network (LAN) for cheaper cost and reliability. With the emergence of cost effective and enhanced user experience needs, the Quality of Service (QoS) of the underlying Ethernet network has become a major issue. A network must provide predictable, reliable and guaranteed services. The required QoS on the network is achieved through managing the end-to-end delay, throughput, jitter, transmission rate and many other network performance parameters. The paper investigates QoS parameters based on packet size to analyze the network performance. Segmentation in packet size larger than 1500 bytes, Maximum Transmission Unit (MTU) of Ethernet, is used to divide the large data into small packets. A simulation process under Riverbed modeler 17.5 initiates several scenarios of the Ethernet network to depict the QoS metrics in the Ethernet topology. For analyzing the result from the simulation process, varying sized packets are considered. Hence, the network performance results in distinct throughput, end-to-end delay, packet loss ratio, bit error rate etc. for varying packet sizes. 展开更多
关键词 QOS Ethernet Network Performance Analysis Packet Size SEGMENTATION
下载PDF
A Compromise Programming to Task Assignment Problem in Software Development Project
14
作者 Ngo Tung Son Jafreezal Jaafar +3 位作者 Izzatdin Abdul Aziz Bui Ngoc Anh Hoang Duc Binh Muhammad Umar Aftab 《Computers, Materials & Continua》 SCIE EI 2021年第12期3429-3444,共16页
The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This st... The scheduling process that aims to assign tasks to members is a difficult job in project management.It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process.This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically.The generated schedule directs the project to be completed with the shortest critical path,at the minimum cost,while maintaining its quality.There are several real-world business constraints related to human resources,the similarity of the tasks added to the optimization model,and the literature’s traditional rules.To support the decision-maker to evaluate different decision strategies,we use compromise programming to transform multiobjective optimization(MOP)into a single-objective problem.We designed a genetic algorithm scheme to solve the transformed problem.The proposed method allows the incorporation of the model as a navigator for search agents in the optimal solution search process by transferring the objective function to the agents’fitness function.The optimizer can effectively find compromise solutions even if the user may or may not assign a priority to particular objectives.These are achieved through a combination of nonpreference and preference approaches.The experimental results show that the proposed method worked well on the tested dataset. 展开更多
关键词 MAKESPAN RCPSP SCHEDULING MOP combinatorial optimization compromise programming genetic algorithm
下载PDF
Performance Analysis of DEBT Routing Protocols for Pocket Switch Networks
15
作者 Khairol Amali bin Ahmad Mohammad Nazmul Hasan +1 位作者 Md.Sharif Hossen Khaleel Ahmad 《Computers, Materials & Continua》 SCIE EI 2021年第3期3075-3087,共13页
Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where t... Pocket Switched Networks(PSN)represent a particular remittent network for direct communication between the handheld mobile devices.Compared to traditional networks,there is no stable topology structure for PSN where the nodes observe the mobility model of human society.It is a kind of Delay Tolerant Networks(DTNs)that gives a description to circulate information among the network nodes by the way of taking the benefit of transferring nodes from one area to another.Considering its inception,there are several schemes for message routing in the infrastructure-less environment in which human mobility is only the best manner to exchange information.For routing messages,PSN uses different techniques such asDistributed Expectation-Based Spatio-Temporal(DEBT)Epidemic(DEBTE),DEBT Cluster(DEBTC),and DEBT Tree(DEBTT).Understanding on how the network environment is affected for these routing strategies are the main motivation of this research.In this paper,we have investigated the impact of network nodes,the message copies per transmission,and the overall carrying out of these routing protocols.ONE simulator was used to analyze those techniques on the basis of delivery,overhead,and latency.The result of this task demonstrates that for a particular simulation setting,DEBTE is the best PSN routing technique among all,against DEBTC and DEBTT. 展开更多
关键词 Pocket switched networks routings distributed cluster detections delay tolerant networks mobility in network
下载PDF
Health Hazards of Electromagnetic Radiation
16
作者 Awn B. Rifai Majed A. Hakami 《Journal of Biosciences and Medicines》 2014年第8期1-12,共12页
Electrical energy enters into the operation of a myriad industrial, scientific, medical, community and house equipment and appliances. The accompanying electromagnetic fields (EMFs) are partially transformed into radi... Electrical energy enters into the operation of a myriad industrial, scientific, medical, community and house equipment and appliances. The accompanying electromagnetic fields (EMFs) are partially transformed into radiation that affects human health. This research investigates the potential health hazards of radiation emanating from electric power lines. The research is based on studies by research organizations and on practical field measurements. The study includes investigation of electromagnetic radiation from high-voltage electric lines in inhabited areas in an urban environment, and provides some measurements in test locations in a typical city. The results are benchmarked against recommended safety levels. 展开更多
关键词 KEYWORDS ELECTROMAGNETIC RADIATION ENVIRONMENT HEALTH
下载PDF
Analytical Computation of Acoustic Bidirectional Reflectance Distribution Functions
17
作者 Jaume Durany Toni Mateos Adan Garriga 《Open Journal of Acoustics》 2015年第4期207-217,共11页
The Room Acoustic Rendering Equation introduced in [1] formalizes a variety of room acoustics modeling algorithms. One key concept in the equation is the Acoustic Bidirectional Reflectance Distribution Function (A-BRD... The Room Acoustic Rendering Equation introduced in [1] formalizes a variety of room acoustics modeling algorithms. One key concept in the equation is the Acoustic Bidirectional Reflectance Distribution Function (A-BRDF) which is the term that models sound reflections. In this paper, we present a method to compute analytically the A-BRDF in cases with diffuse reflections parametrized by random variables. As an example, analytical A-BRDFs are obtained for the Vector Based Scattering Model, and are validated against numerical Monte Carlo experiments. The analytical computation of A-BRDFs can be added to a standard acoustic ray tracing engine to obtain valuable data from each ray collision thus reducing significantly the computational cost of generating impulse responses. 展开更多
关键词 ROOM ACOUSTICS ROOM ACOUSTIC RENDERING Equation Vector Based Scattering RAY TRACING Audio RENDERING
下载PDF
A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers
18
作者 Muhammad Ariful Islam Md. Ashraful Islam +1 位作者 Nazrul Islam Boishakhi Shabnam 《Journal of Computer and Communications》 2018年第3期78-90,共13页
Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It u... Cryptography is the study that provides security service. It concerns with confidentiality, integrity, and authentication. Public key cryptography provides an enormous revolution in the field of the cryptosystem. It uses two different keys where keys are related in such a way that, the public key can use to encrypt the message and private key can be used to decrypt the message. This paper proposed an enhanced and modified approach of RSA cryptosystem based on “n” distinct prime number. This existence of “n” prime number increases the difficulty of the factoring of the variable “N” which increases the complexity of the algorithm. In this approach, two different public key and private key generated from the large factor of the variable “N” and perform a double encryption-decryption operation which affords more security. Experiment on a set of a random number provided that the key generation time, analysis of variable “N”, encryption and decryption will take a long time compared to traditional RSA. Thus, this approach is more efficient, highly secured and not easily breakable. 展开更多
关键词 RSA Algorithm ENCRYPTION DECRYPTION CRYPTOSYSTEM Security PUBLIC KEY PRIVATE KEY
下载PDF
Optimizing Operating Cost of an Intrusion Detection System
19
作者 Usha Banerjee K. V. Arya 《International Journal of Communications, Network and System Sciences》 2013年第1期29-36,共8页
Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. ... Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. Thus, it becomes essential to reduce the operating cost of the IDS without compromising on the performance and reliability of the IDS. Apart from the initial cost of procuring the IDS, other costs include cost of accessories required and cost of administration etc. In this paper we calculate the cost benefit tradeoffs of an IDS. We propose a method to determine the optimum operating point of the IDS. In an effort to solve the problems of the previously proposed metrics, we propose a decision tree based approach to calculate the cost of operating an IDS in a mobile ad hoc network. Mathematically and programmatically we deduce the minimum operating point of operation of an IDS and generate the receiver operating characteristic curve of the IDS. To further ascertain this, we use available network packet capture data and calculate the minimum operating cost of an IDS. The main motive behind this paper is to show that the cost of operating an IDS in a MANET can be minimized and hence the effectiveness and performance of the IDS can be maximized. 展开更多
关键词 DECISION TREE INTRUSION Detection Metrics MEASUREMENTS RECEIVER Operating Characteristics
下载PDF
Improvised Technique for Analyzing Data and Detecting Terrorist Attack Using Machine Learning Approach Based on Twitter Data
20
作者 Aditi Sarker Partha Chakraborty +3 位作者 S. M. Shaheen Sha Mahmuda Khatun Md. Rakib Hasan Kawshik Banerjee 《Journal of Computer and Communications》 2020年第7期50-62,共13页
Social media are interactive computer mediated technology that facilitates the sharing of information via virtual communities and networks. And Twitter is one of the most popular social media for social interaction an... Social media are interactive computer mediated technology that facilitates the sharing of information via virtual communities and networks. And Twitter is one of the most popular social media for social interaction and microblogging. This paper introduces an improved system model to analyze twitter data and detect terrorist attack event. In this model, a ternary search is used to find the weights of predefined keywords and the Aho-Corasick algorithm is applied to perform pattern matching and assign the weight which is the main contribution of this paper. Weights are categorized into three categories: Terror attack, Severe Terror Attack and Normal Data and the weights are used as attributes for classification. K-Nearest Neighbor (KNN) and Support Vector Machine (SVM) are two machine learning algorithms used to predict whether a terror attack happened or not. We compare the accuracy with our actual data by using confusion matrix and measure whether our result is right or wrong and the achieved result shows that the proposed model performs better. 展开更多
关键词 TERRORIST Ternary Search Aho-Corasick Automata Confusion Matrix
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部