International Journal of Computing, Communications and Networking最新文献

筛选
英文 中文
Cumulative Hazard Intensity Based on Sequential Preventive Maintenance Strategy for Ensuring Minimum Reliability 基于最小可靠性顺序预防性维护策略的累积危害强度研究
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/01722018
Juhyun Lee, Jihyun Park, Suneung Ahn
{"title":"Cumulative Hazard Intensity Based on Sequential Preventive Maintenance Strategy for Ensuring Minimum Reliability","authors":"Juhyun Lee, Jihyun Park, Suneung Ahn","doi":"10.30534/ijccn/2018/01722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/01722018","url":null,"abstract":"— In designing a preventive maintenance policy, considering only either system reliability or cost may not ensure sustainable system operation because the biased design of a PM policy can result in high maintenance cost and short system life. A PM policy should thus be designed considering a trade-off between system reliability and maintenance costs. PM actions in condition-based maintenance policies are commonly performed at a fixed reliability threshold, which is set high to prevent severe breakdowns. However, it may be difficult to establish cost-effectiveness of a model when the reliability threshold is constrained to be fixed. In this study, a cost-effective PM policy based on a reliability threshold that decreases as the frequency of PM actions increases, is developed, which considers a fixed cumulative hazard threshold while keeping the reliability above an acceptable level. The developed policy was analyzed in two cases; one where the cumulative hazard threshold and one where the predetermined minimum reliability were given as the condition variable, respectively. The results were compared to the model of the fixed reliability threshold, which showed that the proposed PM model led to a lower expected maintenance cost and longer system lifespan. Finally, sensitivity analyses of the condition variables and the maintenance costs were conducted.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Wireless Early Prediction System of Cardiac Arrest through fog enabled IoT 通过雾启用物联网的心脏骤停无线早期预测系统
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/08722018
Ewit
{"title":"A Wireless Early Prediction System of Cardiac Arrest through fog enabled IoT","authors":"Ewit","doi":"10.30534/ijccn/2018/08722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/08722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Types of Leukemia Influenced Cells and it's Classification 白血病影响细胞类型的鉴定及分类
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/12722018
Ewit
{"title":"Identification of Types of Leukemia Influenced Cells and it's Classification","authors":"Ewit","doi":"10.30534/ijccn/2018/12722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/12722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115980962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TWO CLOUD SECURE DATABASE FOR NUMERIC RANGE SQL QUERIES WITH PRIVACY PRESERVING 两个云安全数据库的数字范围SQL查询与隐私保护
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/IJCCN/2018/39722018
Ewit
{"title":"TWO CLOUD SECURE DATABASE FOR NUMERIC RANGE SQL QUERIES WITH PRIVACY PRESERVING","authors":"Ewit","doi":"10.30534/IJCCN/2018/39722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/39722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOFTWARE PREDICTIVE CLASSIFICATION USING RELATIONAL ASSOCIATION RULES AND NAIVE BAYES APPROACH 基于关系关联规则和朴素贝叶斯方法的软件预测分类
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/51722018
Ewit
{"title":"SOFTWARE PREDICTIVE CLASSIFICATION USING RELATIONAL ASSOCIATION RULES AND NAIVE BAYES APPROACH","authors":"Ewit","doi":"10.30534/ijccn/2018/51722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/51722018","url":null,"abstract":"1. ABSTRACT Software quality is taken into account to be of nice importance within the space of software system engineering and development. so as to extend the potency and also the quality of software system modules, software system defect prediction is employed to spot defect prone modules and this helps in achieving high software system responsibility. Software fault prediction is usually a posh space of analysis and software system practitioners and researchers have applied various ways that to predict wherever the fault is probably going to occur within the software system module and their variable degrees of success. These prediction studies ends up in fault prediction models and it permits software system personnel to target the defect free software system code, thereby leading to software system quality improvement and using the higher utility of the resources. During this Paper style Approach for software system Defect Prediction is adopted.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125878735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach to Optimized Genetic based Clustering Algorithm in Mobile Ad hoc Network 移动Ad hoc网络中一种优化的遗传聚类算法
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/53722018
Ewit
{"title":"An Approach to Optimized Genetic based Clustering Algorithm in Mobile Ad hoc Network","authors":"Ewit","doi":"10.30534/ijccn/2018/53722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/53722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133786602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ALIVE HUMAN DETECTION USING PIR SENSORS 利用pir传感器进行活体检测
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/IJCCN/2018/54722018
Ewit
{"title":"ALIVE HUMAN DETECTION USING PIR SENSORS","authors":"Ewit","doi":"10.30534/IJCCN/2018/54722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/54722018","url":null,"abstract":"This project is to find out the human being survival in War field and during natural disaster like earthquake. The project consists of a robot with an IR based human radiation sensor, which picks up signals from human radiations and gives a signal output. Whenever any human being comes in the vicinity of the system the IR system gives a signal. The movement of the robot can be controlled through an RF transmitter. The Robot can be controlled through mobile withWiFi.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Web Security Mechanisms Using Vulnerabilities and Attack Injection 基于漏洞和攻击注入的Web安全机制评估
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/40722018
Syeda Sheeba Tabassum, Dr. Arun Biradar
{"title":"Evaluation of Web Security Mechanisms Using Vulnerabilities and Attack Injection","authors":"Syeda Sheeba Tabassum, Dr. Arun Biradar","doi":"10.30534/ijccn/2018/40722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/40722018","url":null,"abstract":"The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SMART SHOPPING USING QR CODE AND RFID SYSTEM 使用二维码和rfid系统的智能购物
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/IJCCN/2018/50722018
Ewit
{"title":"SMART SHOPPING USING QR CODE AND RFID SYSTEM","authors":"Ewit","doi":"10.30534/IJCCN/2018/50722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/50722018","url":null,"abstract":"RFID generally encompasses any wireless (or partially wireless) communication that allows for remote retrieval of information associated with a particular commodity, product, component, or other item. In RFID environments, each suitable item is tagged with an RFID tag that includes and (actively or passively) transmits one or more pieces of information including, for example, a unique identifier and such. These pieces of information are requested or retrieved by an RFID reader. Moreover, the RFID often must be manually docked or interfaced with a port such that the collected RFID information can be processed. In many circumstances, RFID technology allows the two devices (the tag and reader) to communicate with one another while not maintaining a line-of-sight in various weather conditions. Extensive research has been carried out on vision based automatic identification technology that recognizes images codes using smart phones to provide various services that can recognize the authenticity of any product We are using Multiplexing and De multiplexing algorithm for recognizing QR code image using smart phones to provide various services that can recognize the authenticity of any product.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"33 Pt 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124631935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Palm vein recognition scheme based on an adaptive Gabor filter 基于自适应Gabor滤波器的手掌静脉识别方案
International Journal of Computing, Communications and Networking Pub Date : 2018-06-15 DOI: 10.30534/ijccn/2018/13722018
Ewit
{"title":"Palm vein recognition scheme based on an adaptive Gabor filter","authors":"Ewit","doi":"10.30534/ijccn/2018/13722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/13722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125383190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信