{"title":"Static Timing Analysis of Different SRAM Controllers","authors":"Jabin Sultana, S. Alam","doi":"10.5815/ijisa.2023.03.03","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.03","url":null,"abstract":"Timing-critical path analysis is one of the most significant terms for the VLSI designer. For the formal verification of any kinds of digital chip, static timing analysis (STA) plays a vital role to check the potentiality and viability of the design procedures. This indicates the timing status between setup and holding times required with respect to the active edge of the clock. STA can also be used to identify time sensitive paths, simulate path delays, and assess Register transfer level (RTL) dependability. Four types of Static Random Access Memory (SRAM) controllers in this paper are used to handle with the complexities of digital circuit timing analysis at the logic level. Different STA parameters such as slack, clock skew, data latency, and multiple clock frequencies are investigated here in their node-to-node path analysis for diverse SRAM controllers. Using phase lock loop (ALTPLL), single clock and dual clock are used to get the response of these controllers. For four SRAM controllers, the timing analysis shows that no data violation exists for single and dual clock with 50 MHz and 100 MHz frequencies. Result also shows that the slack for 100MHz is greater than that of 50MHz. Moreover, the clock skew value in our proposed design is lower than in the other three controllers because number of paths, number of states are reduced, and the slack value is higher than in 1st and 2nd controllers. In timing path analysis, slack time determines that the design is working at the desired frequency. Although 100MHz is faster than 50MHz, our proposed SRAM controller meets the timing requirements for 100MHz including the reduction of node to node data delay. Due to this reason, the proposed controller performs well compared to others in terms slack and clock skew.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85004096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. M. Uddin, Naimur Rahman, M. Rahman, Samrat Kumar Dey
{"title":"Artificial Intelligence Based Domotics Using Multimodal Security","authors":"K. M. Uddin, Naimur Rahman, M. Rahman, Samrat Kumar Dey","doi":"10.5815/ijisa.2023.03.04","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.04","url":null,"abstract":"All electronic devices in our cutting-edge technology world must be networked together via the Internet if users want to have remote access to them. As a result, it may raise a variety of serious security issues. This study suggests a remote access home automation security system that incorporates utilizing the Internet of Things (IoT), and Artificial Intelligence (AI) for ensuring the security of the house. For a highly efficient security system, Face recognition has been used to maneuver the door access. In case of power outage or for any technical issues, an alternative security PIN has been added which is only accessible by the owner. Moreover, individuals are able to monitor and control the door access along with other attributes of the house using an application. In this work, Face detection is performed using the Haar Cascade classifier, while face recognition is performed using the Local Binary Pattern Histogram (LBPH). 95.7% accuracy in recognizing faces has been achieved after evaluating the proposed system.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90206720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swapnil Biswas, Syed Nusrat, N. Sharmin, Mahbubur Rahman
{"title":"Graph Coloring in University Timetable Scheduling","authors":"Swapnil Biswas, Syed Nusrat, N. Sharmin, Mahbubur Rahman","doi":"10.5815/ijisa.2023.03.02","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.02","url":null,"abstract":"Addressing scheduling problems with the best graph coloring algorithm has always been very challenging. However, the university timetable scheduling problem can be formulated as a graph coloring problem where courses are represented as vertices and the presence of common students or teachers of the corresponding courses can be represented as edges. After that, the problem stands to color the vertices with lowest possible colors. In order to accomplish this task, the paper presents a comparative study of the use of graph coloring in university timetable scheduling, where five graph coloring algorithms were used: First Fit, Welsh Powell, Largest Degree Ordering, Incidence Degree Ordering, and DSATUR. We have taken the Military Institute of Science and Technology, Bangladesh as a test case. The results show that the Welsh-Powell algorithm and the DSATUR algorithm are the most effective in generating optimal schedules. The study also provides insights into the limitations and advantages of using graph coloring in timetable scheduling and suggests directions for future research with the use of these algorithms.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81365291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indeterminacy Handling of Adaptive Neuro-fuzzy Inference System Using Neutrosophic Set Theory: A Case Study for the Classification of Diabetes Mellitus","authors":"Rajan Prasad, P. Shukla","doi":"10.5815/ijisa.2023.03.01","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.01","url":null,"abstract":"Early diabetes diagnosis allows patients to begin treatment on time, reducing or eliminating the risk of serious consequences. In this paper, we propose the Neutrosophic-Adaptive Neuro-Fuzzy Inference System (N-ANFIS) for the classification of diabetes. It is an extension of the generic ANFIS model. Neutrosophic logic is capable of handling the uncertain and imprecise information of the traditional fuzzy set. The suggested method begins with the conversion of crisp values to neutrosophic sets using a trapezoidal and triangular neutrosophic membership function. These values are fed into an inferential system, which compares the most impacted value to a diagnosis. The result demonstrates that the suggested model has successfully dealt with vague information. For practical implementation, a single-value neutrosophic number has been used; it is a special case of the neutrosophic set. To highlight the promising potential of the suggested technique, an experimental investigation of the well-known Pima Indian diabetes dataset is presented. The results of our trials show that the proposed technique attained a high degree of accuracy and produced a generic model capable of effectively classifying previously unknown data. It can also surpass some of the most advanced classification algorithms based on machine learning and fuzzy systems.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80278027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Non-Functional Requirements Classification Using Machine Learning Algorithms","authors":"Abdur Rahman, A. Nayem, Saeed Siddik","doi":"10.5815/ijisa.2023.03.05","DOIUrl":"https://doi.org/10.5815/ijisa.2023.03.05","url":null,"abstract":"Non-functional requirements define the quality attribute of a software application, which are necessary to identify in the early stage of software development life cycle. Researchers proposed automatic software Non-functional requirement classification using several Machine Learning (ML) algorithms with a combination of various vectorization techniques. However, using the best combination in Non-functional requirement classification still needs to be clarified. In this paper, we examined whether different combinations of feature extraction techniques and ML algorithms varied in the non-functional requirements classification performance. We also reported the best approach for classifying Non-functional requirements. We conducted the comparative analysis on a publicly available PROMISE_exp dataset containing labelled functional and Non-functional requirements. Initially, we normalized the textual requirements from the dataset; then extracted features through Bag of Words (BoW), Term Frequency and Inverse Document Frequency (TF-IDF), Hashing and Chi-Squared vectorization methods. Finally, we executed the 15 most popular ML algorithms to classify the requirements. The novelty of this work is the empirical analysis to find out the best combination of ML classifier with appropriate vectorization technique, which helps developers to detect Non-functional requirements early and take precise steps. We found that the linear support vector classifier and TF-IDF combination outperform any combinations with an F1-score of 81.5%.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91195288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Feature Selection Algorithms Based on Crowding Distance and Pearson Correlation Coefficient","authors":"Abdesslem Layeb","doi":"10.5815/ijisa.2023.02.04","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.04","url":null,"abstract":"Feature Selection is an important phase in classification models. Feature Selection is an effective task used to decrease the dimensionality and eliminate redundant and unrelated features. In this paper, three novel algorithms for feature selection problem are proposed. The first one is a filter method, the second one is a wrapper method, and the last one is a hybrid filter method. Both the proposed algorithms use the crowding distance used in the multiobjective optimization as a new metric to assess the importance of the features. The idea behind the use of the crowding distance is that the less crowded features have great impacts on the target attribute (class), and the crowded features have generally the same impact on the class attribute. To enhance the crowded distance, a combination with other metrics will give good results. In this work, the hybrid method combines between the crowding distance and Pearson correlation coefficient to well order the importance of features. Experiments on well-known benchmark datasets including large microarray datasets have shown the effectiveness and the robustness of the proposed algorithms.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84212908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and Classification of Alzheimer’s Disease by Employing CNN","authors":"Smt. Swaroopa Shastri, Ambresh Bhadrashetty, Supriya Kulkarni","doi":"10.5815/ijisa.2023.02.02","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.02","url":null,"abstract":"Alzheimer’s illness is an ailment of mind which results in mental confusion, forgetfulness and many other mental problems. It effects physical health of a person too. When treating a patient with Alzheimer's disease, a proper diagnosis is crucial, especially into earlier phases of condition as when patients are informed of the risk of the disease, they can take preventative steps before irreparable brain damage occurs. The majority of machine detection techniques are constrained by congenital (present at birth) data, however numerous recent studies have used computers for Alzheimer's disease diagnosis. The first stages of Alzheimer's disease can be diagnosed, but illness itself cannot be predicted since prediction is only helpful before it really manifests. Alzheimer’s has high risk symptoms that effects both physical and mental health of a patient. Risks include confusion, concentration difficulties and much more, so with such symptoms it becomes important to detect this disease at its early stages. Significance of detecting this disease is the patient gets a better chance of treatment and medication. Hence our research helps to detect the disease at its early stages. Particularly when used with brain MRI scans, deep learning has emerged as a popular tool for the early identification of AD. Here we are using a 12- layer CNN that has the layers four convolutional, two pooling, two flatten, one dense and three activation functions. As CNN is well-known for pattern detection and image processing, here, accuracy of our model is 97.80%.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87601025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tofayet Sultan, Nusrat Jahan, Ritu Basak, Mohammed Shaheen Alam Jony, Rashidul Hasan Nabil
{"title":"Machine Learning in Cyberbullying Detection from Social-Media Image or Screenshot with Optical Character Recognition","authors":"Tofayet Sultan, Nusrat Jahan, Ritu Basak, Mohammed Shaheen Alam Jony, Rashidul Hasan Nabil","doi":"10.5815/ijisa.2023.02.01","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.01","url":null,"abstract":"Along with the growth of the Internet, social media usage has drastically expanded. As people share their opinions and ideas more frequently on the Internet and through various social media platforms, there has been a notable rise in the number of consumer phrases that contain sentiment data. According to reports, cyberbullying frequently leads to severe emotional and physical suffering, especially in women and young children. In certain instances, it has even been reported that sufferers attempt suicide. The bully may occasionally attempt to destroy any proof they believe to be on their side. Even if the victim gets the evidence, it will still be a long time before they get justice at that point. This work used OCR, NLP, and machine learning to detect cyberbullying in photos in order to design and execute a practical method to recognize cyberbullying from images. Eight classifier techniques are used to compare the accuracy of these algorithms against the BoW Model and the TF-IDF, two key features. These classifiers are used to understand and recognize bullying behaviors. Based on testing the suggested method on the cyberbullying dataset, it was shown that linear SVC after OCR and logistic regression perform better and achieve the best accuracy of 96 percent. This study aid in providing a good outline that shapes the methods for detecting online bullying from a screenshot with design and implementation details.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76789115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Momina Shaheen, Usman Saif, S. Awan, Faizan Ahmad, Aimen Anum
{"title":"Classification of Images of Skin Lesion Using Deep Learning","authors":"Momina Shaheen, Usman Saif, S. Awan, Faizan Ahmad, Aimen Anum","doi":"10.5815/ijisa.2023.02.03","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.03","url":null,"abstract":"Skin cancer is among common and rapidly increasing human malignancies, which can be diagnosed visually. The diagnosis begins with preliminary medical screening and by dermoscopic examination, histopathological examination, and proceeding to the biopsy. This screening and diagnosis can be automated using machine learning tools and techniques. Artificial neural networks are helping a lot in medical diagnosis applications. In this research, skin images are classified into 7 different classes of skin cancer using deep learning methodology, then analyzed the results w.r.t to their respective precision, recall, support, and accuracy to find its practical applicability. This model is efficient in comparison to the detection of skin cancer with human eyes. Human eyes detection can be 79% accurate at most. Thus, having a scientific method of diagnosis can help the doctors and practitioners to accurately identify the cancer and its type. The model provides 80% accuracy on average for all 7 types of skin diseases, thus being more reliable than human eye examination. It will help the doctors to diagnose the skin diseases more confidently. The model has only 2 misclassified predictions for Basal cell carcinoma and Vascular lesions. However, Actinic keratosis diagnosis is most accurately predicted.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"64 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80143209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Healthcare Vulnerability Mapping Using K-means ++ Algorithm and Entropy Method: A Case Study of Ratnanagar Municipality","authors":"Apurwa Singh, Roshan Koju","doi":"10.5815/ijisa.2023.02.05","DOIUrl":"https://doi.org/10.5815/ijisa.2023.02.05","url":null,"abstract":"Healthcare is a fundamental human right. Vulnerable populations in healthcare refer to those who are at greater risk of suffering from health hazards due to various socio-economic factors, geographical barriers, and medical conditions. Mapping of this vulnerable population is a vital part of healthcare planning for any region. Very few such research regarding the distribution of healthcare service providers was carried out in the Nepali context previously. Thus, the results of vulnerability mapping can help with meaningful interventions for healthcare demands. This study focused on combining geo-analytics, unsupervised machine learning algorithms, and entropy methods for performing vulnerability mapping. K-means++ clustering algorithm was applied to household data of Ratnanagar municipality for the purpose of creating multiple clusters of households. An open-source routing machine was used to compute the distance to the nearest health service provider from each household in Ratnanagar municipality. The entropy method was used to evaluate the vulnerability measure of each cluster. Later, based on the population of different clusters in each ward and their respective vulnerability measures, each ward’s vulnerability measure was quantified. It can be observed that wards that are farther away from the east-west highway have higher vulnerability indices. This study found that machine learning algorithms can be effectively used in combination with the weighting method for vulnerability mapping. Using an unsupervised machine learning algorithm made sure that dimensions of vulnerability are visible.","PeriodicalId":14067,"journal":{"name":"International Journal of Intelligent Systems and Applications in Engineering","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86854662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}