Journal of Computational and Theoretical Nanoscience最新文献

筛选
英文 中文
Implementation of Wind Energy System Using Interleaved Boost Converter and Static Synchronous Compensator 利用交错Boost变换器和静态同步补偿器实现风能系统
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9422
L. Sarojini, R. Supraja, V. Hamsadhwani, M. Sathiskumar
{"title":"Implementation of Wind Energy System Using Interleaved Boost Converter and Static Synchronous Compensator","authors":"L. Sarojini, R. Supraja, V. Hamsadhwani, M. Sathiskumar","doi":"10.1166/JCTN.2020.9422","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9422","url":null,"abstract":"Limited fossil fuel resources and current environmental considerations have created wind energy as the best alternative for spotless renewable source of energy, to replace the conventional sources of energy. The Wind power production has quite a few drawbacks owing in the direction\u0000 of the methods used in harnessing wind energy. This paper focuses on the method that decreases the effect of the voltage variability within the grid initiated through uncontrollable imprudent power flow and the output power fluctuation within the grid. This paper gives solution to diminish\u0000 the fluctuation that creates unstable voltage across the line by installing such an energy storage device. Reactive power compensation has been mutually implemented to manage the distribution of the reactive power supply across wind farm based power networking through internal Static Synchronous\u0000 Compensator (STATCOM). Here, bidirectional interleaved DC/DC-converters and double layer electrical capacitors are used. Therefore the introduction of two different systems, the energy storage systems with interleaved boost unit along with the reactive power mitigation for giant wind farms\u0000 was implemented by integrating them into single system to check and review the wind power plant stability management.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5307-5314"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45315628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Grey Wolf Optimization with Levy Flights Based Energy Efficient Clustering Technique in Wireless Sensor Networks 基于Levy飞行的改进灰狼优化无线传感器网络节能聚类技术
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9436
R. Priya, K. Arutchelvan, C. Bhuvaneswari
{"title":"Modified Grey Wolf Optimization with Levy Flights Based Energy Efficient Clustering Technique in Wireless Sensor Networks","authors":"R. Priya, K. Arutchelvan, C. Bhuvaneswari","doi":"10.1166/JCTN.2020.9436","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9436","url":null,"abstract":"Wireless Sensor Network (WSN) comprises a set of inexpensive, compact and battery powered sensor nodes, deployed in the sensing region. WSN is highly useful for data gathering and tracking applications. Owing to the battery powered nature of sensor nodes, energy efficiency remains as\u0000 a crucial design issue. Earlier works reported that clustering is considered as an energy efficient technique and effective selection of cluster heads (CHs) remains a major issue in WSN. Since clustering process is considered as an NP hard problem, optimization algorithms are employed to resolve\u0000 it. This paper develops a new energy efficient clustering technique using Modified Grey Wolf Optimization with Levy Flights (MGWO-LF) for WSN. The proposed MGWO-LF algorithm incorporates the levy flight (LF) mechanism into the hunting phase of traditional GWO algorithm to avoid local optima\u0000 problem. The proposed model has the ability of proficiently selecting the cluster heads (CHs), achieves energy efficiency and maximum network lifetime. The detailed simulation analysis ensured that the MGWO-LF algorithm has prolonged the network lifetime in a considerable way.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5429-5437"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41743988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal Multilevel Link Extend Umpiring Routing Based Secure Routing Protocol for Improving Privacy Standard in Wireless Sensor Networks 改进无线传感器网络隐私标准的基于最优多级链路扩展Umpiring路由的安全路由协议
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9451
N. Sangeethapriya, L. Bharathi, S. Sanjay, N. Murthy, A. Harisha
{"title":"Optimal Multilevel Link Extend Umpiring Routing Based Secure Routing Protocol for Improving Privacy Standard in Wireless Sensor Networks","authors":"N. Sangeethapriya, L. Bharathi, S. Sanjay, N. Murthy, A. Harisha","doi":"10.1166/JCTN.2020.9451","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9451","url":null,"abstract":"Generally wireless sensor networks (WSN) are connected via a wireless medium to form a large amount of cooperative sensor nodes. Monitoring control is an important aspect of monitoring users in monitoring applications, such as wireless sensor networks, because of security. There are\u0000 countless applications to pay for themselves but at the same time, their special properties offer a number of challenges, such as security and surveillance, control, and operation and complex system maintenance. WSN has already seen it on the Internet, from face-to-face security attacks. To\u0000 propose an Optimal Multilevel Link extend umpiring routing (OML-EUR) based secure routing protocol for improving privacy standard in wireless sensor networks. Secure communication is also important in providing accurate and resource constraints at the sensor node at the moment. In this study,\u0000 there are three of our contributions. Initially it monitors the neighbor network layer attacks for browsing the WSN on the transmission medium. Followed subscription a link establishment to monitoring the request packets through key transmission of WSN with secure routing protocols. By finding\u0000 the secure communication as qualities of service verification among the modes to authenticate to transfer. The proposed system produce high secure performance by the result proves energy consumption and communication overhead as higher efficient than previous system.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5543-5549"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42037264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Resource Utilization Through Offloading of Jobs in Mobile Devices Using Modified LSTM Algorithm 使用改进的LSTM算法通过卸载移动设备中的作业来优化资源利用
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9414
I. Joe, Elizabeth Rosalind Rebecca, D. Arthi
{"title":"Optimizing Resource Utilization Through Offloading of Jobs in Mobile Devices Using Modified LSTM Algorithm","authors":"I. Joe, Elizabeth Rosalind Rebecca, D. Arthi","doi":"10.1166/JCTN.2020.9414","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9414","url":null,"abstract":"Portable cloud processing has picked up notoriety as of late in light of less force utilization and overhead of cell phones. Versatile cloud registering based wellbeing observing, gaming, learning, and business are picking up significance step by step. This part talks about the unrest\u0000 of portable cloud processing including its design, points of interest, and applications. Different issues of versatile cloud registering are concentrated with arrangements. Towards the examination of these huge volumes of information, huge information and information investigation have become\u0000 developing exploration fields, pulling in the consideration of the scholarly community, industry and governments. Scientists, business people, chiefs and issue solvers see ‘large information’ as the apparatus to reform different enterprises and areas, for example, business, medicinal\u0000 services, retail, research, instruction and open organization. Offloading alludes to a process where information stockpiling, calculations and computations are executed in a remote cloud rather than mobile device. Thusly, the energy consumed by the gadget is expanded just as the troubles of\u0000 capacity and asset constraints are expelled. Right now, have talked about on offloading with its applications toward vitality effectiveness.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5238-5242"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48617516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach to Reduce the Crosstalk in Graphene Based Interconnects Using Ternary Logic 利用三元逻辑减少石墨烯互连串扰的新方法
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9443
C. Kumar, E. S. Rao, P. Sekhar
{"title":"A Novel Approach to Reduce the Crosstalk in Graphene Based Interconnects Using Ternary Logic","authors":"C. Kumar, E. S. Rao, P. Sekhar","doi":"10.1166/JCTN.2020.9443","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9443","url":null,"abstract":"This paper presents a novel approach to reduce the impact of crosstalk in multi-layered GNR (MLGNR), single walled CNT (SWCNT), multiwalled CNT (MWCNT) and mixed CNT bundle (MCB) based three-line bus architecture system. The proposed system primarily comprises of active shielding, repeater\u0000 insertion and asymmetric triggering of the input signal. At the far end of the bus architecture, the crosstalk induced noise and propagation delay of MLGNR, SWCNT, MWCNT and MCB interconnects have been analyzed with and without the impact of shielding. A standard ternary inverter (STI) driver\u0000 model is used to obtain the ternary logic at the output. Using the specified output, a temperature dependent comparative analysis is also performed for MLGNR and bundled CNT interconnects with and without shielding. Using industry standard HSPICE circuit simulations, it can be observed that\u0000 the MLGNR offers a lower paracitic values even in higher temperature in comparison to the SWCNT, MWCNT and MCB interconnects. It primarily leads to a lesser delay and crosstalk using a bus interconnect system. The analysis has also extended for delay and crosstalk analysis for different interconnect\u0000 lengths and temperatures with an insertion of shielding, repeaters and asymmetric triggering of bus architecture system. Under these conditions, it is also proved that an MLGNR based bus architecture offers a lesser crosstalk induced delay and noise compared to CNT bundle interconnects.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5483-5494"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44844117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real and Accurate Fake Product Detection System and Generate Original Reviews Using Data Mining Mechanism 基于数据挖掘机制的真实、准确的假货检测系统及原创评论生成
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9440
Ch. V. Bhargavi, G. Mani, G. Jyothi, K. V. Rao, E. Lydia
{"title":"A Real and Accurate Fake Product Detection System and Generate Original Reviews Using Data Mining Mechanism","authors":"Ch. V. Bhargavi, G. Mani, G. Jyothi, K. V. Rao, E. Lydia","doi":"10.1166/JCTN.2020.9440","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9440","url":null,"abstract":"Most of the people requires genuine information about the online product. Before spending their economy on particular product can analyze the various reviews in the website. In this scenario, they did not identify whether the product may be fake or genuine. In general, some reports\u0000 in the websites are good, company technical people itself add these for making the product famous. These people belong to media and social organization teams, they give reviews with a good rating by their own firm. Online purchasers did not identify the fake product because of this falsification\u0000 in the reviews of the website. In this research,the SVM classification mechanism has been used for detect the fake reviews by using IP address. This implementation helpful for users find out the correct review of online product. In this accuracy is improved by 98.79%, F1-Score increases by\u0000 10%.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5464-5468"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44401128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Blockchain Approach for Improve the Performance of Network Security Using Polynomial Ephemeral Blockchain-Based Secure Routing in Wireless Sensor Network 基于多项式短暂区块链的无线传感器网络安全路由改进网络安全性能的区块链新方法
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9458
R. Bharanidharan
{"title":"A Novel Blockchain Approach for Improve the Performance of Network Security Using Polynomial Ephemeral Blockchain-Based Secure Routing in Wireless Sensor Network","authors":"R. Bharanidharan","doi":"10.1166/JCTN.2020.9458","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9458","url":null,"abstract":"Wireless sensor networks are networks that include hundreds to thousands of autonomous distributed devices. These sensors are used to monitor physical and environmental conditions. Reliable routing protocols are designed to build a reliable and secure network with power management and\u0000 control overhead and congestion. The wireless medium allows malicious user?s wireless sensor networks (WSN) to take part in actions to get a damaging attack on network control nodes. Due to the proprietary nature of such networks, they are more complex and lack tamper-resistant hardware. Security\u0000 mechanisms are more wit due to the wireless and transient computing or communication complexity of communication relationships between nodes in a network. The existing method doesn?t provide security in inconvenient network performance, and the attackers modify the data and damage it. The\u0000 proposed blockchain method is fixed at the same level of security, such as Polynomial Ephemeral Blockchain-based Secure Routing (PEBSR) encryption, to create a secure network. In this method, first, to authenticate the neighbor node validate using a Polynomial Ephemeral key-based Neighbor\u0000 node authentication method. It evaluates the node location trust node and distributes the Ephemeral key in this key established between the nodes to communicate securely. The second method provides a cryptography chain network, and it maintains each node information in the sink database in\u0000 this process if any attacker or anyone modifies the data is stored on each individual database. Finally, to find the route between each sink and participate nodes in the network. In this proposed PEBSR method, simulation results in providing efficient security, throughput, and less response\u0000 time; they are compared to the existing method.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5598-5604"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45527966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of High Accuracy Inexact 4-2 Compressors 高精度Inexact 4-2压缩机的设计
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9423
M. Rathi, S. Balamurugan, S. Senthilraja, R. Marimuthu
{"title":"Design of High Accuracy Inexact 4-2 Compressors","authors":"M. Rathi, S. Balamurugan, S. Senthilraja, R. Marimuthu","doi":"10.1166/JCTN.2020.9423","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9423","url":null,"abstract":"Approximate (Inexact) computing is best suitable for the applications where they can accept the results with acceptable loss. We have also introduced three new models of inaccurate 4-2 compressors in this paper, using the current inaccurate 4-2 compressors. All proposed work results\u0000 are measured in a standard CMOS technology of 90 nm and compared to previously published work. The proposed compressors provide the promised results in terms of error and electrical performance as compared with its counterpart. In order to validate our results, we have also performed image\u0000 sharpening and image smoothening by using our proposed multipliers. The Structural Similarity Index Matrix (SSIM) of proposed multipliers are measured and interesting results were found.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5315-5322"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49138400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotional Tweets Analysis on Social Media with Short Text Classification Using Various Machine Learning Techniques 使用各种机器学习技术进行短文本分类的社交媒体情感推文分析
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9442
S. R. Basha, M. Rao, P. K. Reddy, G. Kumar
{"title":"Emotional Tweets Analysis on Social Media with Short Text Classification Using Various Machine Learning Techniques","authors":"S. R. Basha, M. Rao, P. K. Reddy, G. Kumar","doi":"10.1166/JCTN.2020.9442","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9442","url":null,"abstract":"Online Social media are a huge source of regular communication since most people in the world today use these services to stay communicating with each other in their modern lives. Today’s research has been implemented on emotion recognition by message. The majority of the research\u0000 uses a method of machine learning. In order to extract information from the textual text written by human beings, natural language processing (NLP) techniques were used. The emotion of humans may be expressed when reading or writing a message. Human beings are willing, since human life is\u0000 filled with a variety of emotions, to feel various emotions. This analysis helps us to realize the use of text processing and text mining methods by social media researchers in order to classify key data themes. Our experiments presented that the two main social networks in the world are conducting\u0000 text-based mining on Facebook and Twitter. In this proposed study, we categorized the human feelings such as joy, fear, love, anger, surprise, sadness and thankfulness and compared our results using various methods of machine learning.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5477-5482"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42315670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quality of Third Generation Sequencing 第三代测序质量
Journal of Computational and Theoretical Nanoscience Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9630
A. Elbialy, M. El-Dosuky, I. El-Henawy
{"title":"Quality of Third Generation Sequencing","authors":"A. Elbialy, M. El-Dosuky, I. El-Henawy","doi":"10.1166/JCTN.2020.9630","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9630","url":null,"abstract":"Third generation sequencing (TGS) relates to long reads but with relatively high error rates. Quality of TGS is a hot topic, dealing with errors. This paper combines and investigates three quality related metrics. They are basecalling accuracy, Phred Quality Scores, and GC content.\u0000 For basecalling accuracy, a deep neural network is adopted. The measured loss does not exceed 5.42.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5205-5209"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42118207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信