International Journal of Engineering and Computer Science最新文献

筛选
英文 中文
Artificial Immune Algorithm and Adamic Adar based Wireless Sensor Network Optimization 基于人工免疫算法和adam Adar的无线传感器网络优化
International Journal of Engineering and Computer Science Pub Date : 2022-06-09 DOI: 10.18535/ijecs/v11i06.4675
Shireen Shireen, Dr. Shaheen Ayyub
{"title":"Artificial Immune Algorithm and Adamic Adar based Wireless Sensor Network Optimization","authors":"Shireen Shireen, Dr. Shaheen Ayyub","doi":"10.18535/ijecs/v11i06.4675","DOIUrl":"https://doi.org/10.18535/ijecs/v11i06.4675","url":null,"abstract":"As different types of dynamic networks are developed by easy means of devices, people start using them for various means. Such vulnerable networks are easy places to attack and perform malicious activities. This work develops a model that can generate a path from source to destination in a dynamic node environment without prior information. Path generation artificial immune genetic algorithms will be used, as this algorithms find a good path in a short time. In order to detect the malicious activity, such nodes need to be identified. Hence identification of attackers nodes is done by trust model where Adamic Adar trust function finds the mutual trust value of node as epr past performance of nodes.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green Cloud Computing 绿色云计算
International Journal of Engineering and Computer Science Pub Date : 2022-05-29 DOI: 10.18535/ijecs/v11i05.4672
Neethu Jayaram
{"title":"Green Cloud Computing","authors":"Neethu Jayaram","doi":"10.18535/ijecs/v11i05.4672","DOIUrl":"https://doi.org/10.18535/ijecs/v11i05.4672","url":null,"abstract":"This paper discusses the carbon footprint caused by computer resources, cloud computing and the damage it causes to nature. The growing need of data centers and the resulting environmental problems like emission of harmful gases and production of heat are a relevant field of study. Efficient use of computing resources without harming the nature on pay-as-you-go basis is a concern. This paper discusses how to improve the above with green computing.\u0000Keywords – Cloud Computing, Green Cloud Computing, Carbon Emission, Sustainable Energy, Eco-Friendly;\u0000 \u0000 ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115924697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Intrusion Detection by Artificial Immune System and Neural Network 基于人工免疫系统和神经网络的网络入侵检测
International Journal of Engineering and Computer Science Pub Date : 2022-04-30 DOI: 10.18535/ijecs/v11i04.4670
Raj Kumar Yaduwanshi Raj, Prof. Manorama Malviya
{"title":"Network Intrusion Detection by Artificial Immune System and Neural Network","authors":"Raj Kumar Yaduwanshi Raj, Prof. Manorama Malviya","doi":"10.18535/ijecs/v11i04.4670","DOIUrl":"https://doi.org/10.18535/ijecs/v11i04.4670","url":null,"abstract":"Easy access, simulation of IOT network increases its application and demands in different area. As many of IOT networks are vulnerable in nature and attracts intruders to take advantage of weak security. This paper has developed a model that can detect the IOT network intrusion. In this work feature optimization was done by use of artificial immune  system algorithm. AIS reduces the dimension of the dataset by applying affinity check and cloning steps. Selected features were further use for the traiing of neural network. Trained neural network predict the class of IOT network session (Normal / Malicious). Experiment was done on real dataset of IOT session and result shows that rpopsoed model has improved the detection accuracy as compared o existing models.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Intelligence In Healthcare Industry 医疗保健行业的商业智能
International Journal of Engineering and Computer Science Pub Date : 2022-03-28 DOI: 10.18535/ijecs/v11i03.4663
Shubhi Jain, Anu Sharma, Rupal Gupta
{"title":"Business Intelligence In Healthcare Industry","authors":"Shubhi Jain, Anu Sharma, Rupal Gupta","doi":"10.18535/ijecs/v11i03.4663","DOIUrl":"https://doi.org/10.18535/ijecs/v11i03.4663","url":null,"abstract":"Nowadays Business Intelligence applications are trending in different fields such as Healthcare, LifeSciences, ERP, Marketing, Retail, food industry, travel and transport industry etc. This paper mainly focuses on how we can use different ETL functionalities in order to ease the daily routine task used in different healthcare industries.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"73 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120918086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling Of Sludge Drying Parameters in a Paved Drying Bed 铺砌干燥床中污泥干燥参数的建模
International Journal of Engineering and Computer Science Pub Date : 2022-03-17 DOI: 10.18535/ijecs/v11i03.4664
N. V. Anyakora, C. Ajinomoh, A. S. Ahmed, I. Mohammed-Dabo, S. Ejeh, H. Abba, J. Okoro
{"title":"Modelling Of Sludge Drying Parameters in a Paved Drying Bed","authors":"N. V. Anyakora, C. Ajinomoh, A. S. Ahmed, I. Mohammed-Dabo, S. Ejeh, H. Abba, J. Okoro","doi":"10.18535/ijecs/v11i03.4664","DOIUrl":"https://doi.org/10.18535/ijecs/v11i03.4664","url":null,"abstract":"Contemporary studies on the use of paved drying bed (PDB) indicate a decline in knowledge and technology-gap on the performance of this infrastructure. In consequence therefore, environmental pollution arising from untreated sludge is on the increase, especially in developing countries.  In this work, model equation was developed with the existing data from field experiment using Polymath 5.1 software. The process parameters considered were temperature, relative humidity, wind speed, sun intensity and drying rate. The multiple linear regression results showed that wind speed optimised the response with the highest factor coefficient of 0.12. The developed model was well validated with a correlation coefficient of 0.97, thus could serve as a useful tool for sludge treatment plant operators in evaluation and assessment of the performance of PDB.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115991726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strong Representation Learning for Weakly Supervised Object Detection 弱监督目标检测的强表示学习
International Journal of Engineering and Computer Science Pub Date : 2022-02-01 DOI: 10.18535/ijecs/v11i02.4650
Song Yu, Li Min, Duan Weidong, He Yujie, Gou Yao, Wu Zhaoqing, Lv Yilong
{"title":"Strong Representation Learning for Weakly Supervised Object Detection","authors":"Song Yu, Li Min, Duan Weidong, He Yujie, Gou Yao, Wu Zhaoqing, Lv Yilong","doi":"10.18535/ijecs/v11i02.4650","DOIUrl":"https://doi.org/10.18535/ijecs/v11i02.4650","url":null,"abstract":"To solve the problem that the feature maps generated by feature extraction network of traditional weakly supervised learning object detection algorithm is not strong in feature, and the mapping relationship between feature space and classification results is not strong, which restricts the performance of object detection, a weakly supervised object detection algorithm based on strong representation learning is proposed in this paper. Due to enhance the representation ability of feature maps, the algorithm weighted the channels of feature maps according to the importance of each channel, to strengthen the weight of crucial feature maps and ignore the significance of secondary feature maps. Meanwhile, a Gaussian Mixture distribution model with better classification performance was used to design the object instance classifier to enhance further the representation of the mapping between feature space and classification results, and a large-margin Gaussian Mixture (L-GM) loss was designed to increase the distance between sample categories and improve the generalization of the classifier. For verifying the effectiveness and advancement of the proposed algorithm, the performance of the proposed algorithm is compared with six classical weakly supervised target detection algorithms on VOC datasets. Experiments show that the weakly supervised target detection algorithm based on strong representation learning has outperformed other classical algorithms in average accuracy (AP) and correct location (CorLoc), with increases of 1.1%~14.6% and 2.8%~19.4%, respectively.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"1545 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128062159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model Based Intrusion Detection using Data Mining Techniques with Feature Reduction 基于模型的特征约简数据挖掘入侵检测
International Journal of Engineering and Computer Science Pub Date : 2022-01-20 DOI: 10.36227/techrxiv.18461786.v1
J. Goyal
{"title":"Model Based Intrusion Detection using Data Mining Techniques with Feature Reduction","authors":"J. Goyal","doi":"10.36227/techrxiv.18461786.v1","DOIUrl":"https://doi.org/10.36227/techrxiv.18461786.v1","url":null,"abstract":"The research paper involves model based Intrusion detection through data mining techniques using the NSL-KDD dataset. The approach involves building of classification model and hybrid model which are created using classification techniques and, combining both classification and clustering techniques respectively. Classification model can detect known attacks effectively whereas hybrid models can detect unknown or new attacks also. The comparison of the results of different models is done over different performance evaluation parameters.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Predictable Probe of Optical Burst Switched For Wireless Feeler Bond 用于无线探针键合的光突发开关的高效可预测探头
International Journal of Engineering and Computer Science Pub Date : 2021-12-16 DOI: 10.18535/ijecs/v10i12.4640
D. Senduraja, Mr.Pradeep Kumar.A
{"title":"Efficient Predictable Probe of Optical Burst Switched For Wireless Feeler Bond","authors":"D. Senduraja, Mr.Pradeep Kumar.A","doi":"10.18535/ijecs/v10i12.4640","DOIUrl":"https://doi.org/10.18535/ijecs/v10i12.4640","url":null,"abstract":"Optical Burst Switching (OBS) is a promising paradigm for high speed transmission of data. In OBS, a key problem is to schedule bursts with minimum loss. Single method is not sufficient to improve performance. So, our performance model includes some feasible methods to improve OBS performance without significantly increasing the implementation complexity. The methods are addition of simple fiber delay lines (FDLs), increasing random extra offset time, window based channel scheduling (WBS) and Burst Delay Feedback scheduling (BDFS). Additional FDLs can only eliminate the negative impact caused by the variation of the offset time between control packets and data bursts. The random extra offset time approach does not require any additional hardware in the nodes. WBS provides better throughput improvement when FDLs are used in the nodes to compensate the processing time. Finally Burst Delay Feedback Scheduling in addition with these methods can significantly improve OBS throughput and reduce transmission delay.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach MAC批评了无线设备格开销方法的动态效率
International Journal of Engineering and Computer Science Pub Date : 2021-12-15 DOI: 10.18535/ijecs/v10i12.4641
Mr. Dinesh Prabhu. M, D. Senduraja
{"title":"MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach","authors":"Mr. Dinesh Prabhu. M, D. Senduraja","doi":"10.18535/ijecs/v10i12.4641","DOIUrl":"https://doi.org/10.18535/ijecs/v10i12.4641","url":null,"abstract":"In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control.  Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless sensor networks. Those techniques reduces the energy consumption but with several disadvantages like lack of QoS, inefficient transmission, etc., To overcome those problems, modified QoS enhanced base station controlled in Mistrial Approach (flooding Technique) for wireless sensor networks is proposed in this work.  Here we reduce the number of retransmission and detect the overlay packets in networks using proposed approach. Simulation results show the better energy consumption, Maximum Life time & Efficient Bandwidth is achieved by flooding management when compared to the conventional techniques","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122888107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grid Lifespan Enlargement for Assessment in Multihop Wireless Detector Facilities 多跳无线探测设备中网格寿命扩展评估
International Journal of Engineering and Computer Science Pub Date : 2021-12-15 DOI: 10.18535/ijecs/v10i12.4642
M. S, D. Senduraja
{"title":"Grid Lifespan Enlargement for Assessment in Multihop Wireless Detector Facilities","authors":"M. S, D. Senduraja","doi":"10.18535/ijecs/v10i12.4642","DOIUrl":"https://doi.org/10.18535/ijecs/v10i12.4642","url":null,"abstract":"In energy limited wireless sensor networks, both local quantization andmultihop transmission are essential to save transmission energy and thus prolong the network lifetime. The goal is to maximize the network lifetime, defined as the estimation task cycles accomplished before the network becomes nonfunctional.The network lifetime optimization problem includes three components: Optimizing source coding at each sensor node, optimizing source throughput at each sensor node.Optimizing multihop routing path. Source coding optimization can be decoupled from source throughput and multihop routing path optimization and is solved by introducing a concept of equivalent 1-bit Mean Square Error (MSE) function. Based on optimal source coding, multihop routing path optimization is formulated as a linear programming problem, which suggests a new notion of character based routing. It is also seen that optimal multihop routing improves the network lifetime bound significantly compared with single-hop routing for heterogeneous networks. Furthermore, the gain is more significant when the network is denser since there are more opportunities for multihop routing. Also the gain is more significant when the observation noise variances are more diverse.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信