{"title":"Identification of Anesthesia Stages from EEG Signals using Wavelet Entropy and Backpropagation Neural Network","authors":"A. Rasel","doi":"10.34257/GJCSTDVOL19IS1PG17","DOIUrl":"https://doi.org/10.34257/GJCSTDVOL19IS1PG17","url":null,"abstract":"This study focuses on entropy based analysis of EEG signals for extracting features for a neural network based solution for identifying anesthetic levels. The process involves an optimized back propagation neural network with a supervised learning method. We provided the extracted features from EEG signals as training data for the neural network. The target outputs provided are levels of anesthesia stages. Wavelet analysis provides more effective extraction of key features from EEG data than power spectral density analysis using Fourier transform. The key features are used to train the Back Propagation Neural Network (BPNN) for pattern classification network. The final result shows that entropy-based feature extraction is an effective procedure for classifying EEG data.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116821983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study and Optimized Simulation of OSPFv3 Routing Protocol in IPv6 Network","authors":"Md. Anwar Hossain, M. S. Akter","doi":"10.34257/GJCSTEVOL19IS2PG11","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG11","url":null,"abstract":"Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123137709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Mobile Sink Based Routing Model For Maximizing Lifetime of Wireless Sensor Network","authors":"Naveen Ghorpade, P. Vijayakarthik","doi":"10.34257/GJCSTEVOL19IS2PG1","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG1","url":null,"abstract":"","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129251433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Edge Computing","authors":"M. Sadiku, C. M. M. Kotteti, Sarhan M. Musa","doi":"10.34257/GJCSTEVOL19IS2PG29","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG29","url":null,"abstract":"Mobile applications are becoming increasingly computational intensive, while many mobile devices still have limited battery power and cannot support computational intensive tasks. Mobile edge computing (MEC) computing is an extension of edge computing, and it refers to computing at the edge of a network. In mobile edge computing, computing and storage nodes are placed at the Internet's edge near mobile devices. It places the edge clouds at the candidate locations. This paper presents a brief introduction to MEC.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Naher, Md. Omor Faruk, Md. Mahbubur Rahman, S. Ullah
{"title":"Performance Evaluation of Encrypted Text Message Transmission in 5G Compatible Frequency-domain Subband Superposed Scheme Implemented MIMO OFDM Wireless Communication System","authors":"M. A. Naher, Md. Omor Faruk, Md. Mahbubur Rahman, S. Ullah","doi":"10.34257/GJCSTEVOL19IS2PG17","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG17","url":null,"abstract":"In this paper, an investigative study has been made on the performance evaluation of encrypted text message transmission in 5G compatible multiuser frequency-domain subband superposed (FDSS) scheme implemented MIMO OFDM wireless communication system. The 2×2 multiantenna configured simulated system under consideration incorporates modern channel coding (LDPC and Repeat and Accumulate (RA)) and signal detection (Cholesky decomposition based ZF detection, Group Detection (GD) approach aided Efficient Zero-Forcing (ZF) and Lanczos method based efficient signal detection) techniques. In the scenario of transmitting encrypted text message over AWGN and Rayleigh fading channels, it is noticeable that implementation of Repeat and Accumulate channel coding and Group Detection (GD) approach aided Efficient Zero- Forcing (ZF) signal detection techniques is very much robust and effective in retrieving transmitted text messages for all users.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125213596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analytic Real-Time Framework for IoT based Home Automation System","authors":"Nazmul Hossain, Rafia Sultana, Farzana Akter Lima, Md. Arifur Rahman","doi":"10.34257/GJCSTBVOL19IS1PG13","DOIUrl":"https://doi.org/10.34257/GJCSTBVOL19IS1PG13","url":null,"abstract":"The Internet of Things or IoT means the ability to connect billions of physical devices around the world that are now linking to the internet for collecting and sharing data. Internet of Things (IoT) technologies is used to sense the real-time primordial manufacture data and included the energy alliance data and the provision circumstance data. The Internet of Things (IoT) will approve any contents to be sensed or monitored remotely wherever there any remaining network infrastructure, making amenities for the integration of the actual world into computer-based systems. Real-time narrates the path of flowing media is processing. In the real-time procedure, anyone can entrance information barring to narrate for it and save our time.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114821703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Taxonomy of Schedulers – Operating Systems, Clusters and Big Data Frameworks","authors":"L. Sliwko","doi":"10.34257/GJCSTBVOL19IS1PG25","DOIUrl":"https://doi.org/10.34257/GJCSTBVOL19IS1PG25","url":null,"abstract":"This review analyzes deployed and actively used workload schedulers’ solutions and presents a taxonomy in which those systems are divided into several hierarchical groups based on their architecture and design. While other taxonomies do exist, this review has focused on the key design factors that affect the throughput and scalability of a given solution, as well as the incremental improvements which bettered such an architecture. This review gives special attention to Google’s Borg, which is one of the most advanced and published systems of this kind.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saumendu Deb Roy, Md. Alam Hossain, Su Sen, Nazmul Hossain, Md. Rashid Al Asif
{"title":"Measuring the Performance on Load Balancing Algorithms","authors":"Saumendu Deb Roy, Md. Alam Hossain, Su Sen, Nazmul Hossain, Md. Rashid Al Asif","doi":"10.34257/GJCSTBVOL19IS1PG41","DOIUrl":"https://doi.org/10.34257/GJCSTBVOL19IS1PG41","url":null,"abstract":"Load balancing is an integrated aspect of the environment in cloud computing. Cloud computing has lately outgoing technology. It has getting exoteric day by day residence widespread chance in close to posterior. Cloud computing is defined as a massively distributed computing example that is moved by an economic scale in which a repertory of abstracted virtualized energetically. The number of clients in cloud computing is increasing exponentially. The huge amount of user requests attempt to entitle the collection for numerous applications. Which alongside with heavy load not far afield off from cloud server. Whenever particular (Virtual Machine) VMs are overloaded then there are no more duties should be addressed to overloaded VM if under loaded VMs are receivable. For optimizing accomplishment and better response or reaction time the load has to be balanced between overloaded VMs (virtual machines). This Paper describes briefly about the load balancing accession and identifies which is better than others (load balancing\u0000algorithm).","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117275162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad A. Sheikh, Monishanker Halder, Sk. Shalauddin Kabir, Md. Wasim Miah, Sawrnali Khatun
{"title":"SDN-Based Approach to Evaluate the Best Controller: Internal Controller NOX and External Controllers POX, ONOS, RYU","authors":"Mohammad A. Sheikh, Monishanker Halder, Sk. Shalauddin Kabir, Md. Wasim Miah, Sawrnali Khatun","doi":"10.34257/GJCSTEVOL19IS1PG21","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS1PG21","url":null,"abstract":"Software Defined Networking (SDN) is a rising technique to deal with replace patrimony network (coupled hardware and software program) control and administration by separating the control plane (software program) from the information plane (hardware). It gives adaptability to the engineers by influencing the focal control to plane straightforwardly programmable. Some new difficulties, for example, single purpose of disappointment, may be experienced because of the original control plane. SDN concentrated on flexibility where the security of the system was not essentially considered. It promises to give a potential method to present Quality of Service (QoS) ideas in the present correspondence networks. SDN automatically changes the behavior and functionality of system devices utilizing a single state program. Its immediate OpenFlow is planned by these properties. The affirmation of Quality of Service (QoS) thoughts winds up possible in a versatile and dynamic path with SDN. It gives a couple of favorable circumstances including, organization and framework versatility, improved exercises and tip-top performances.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Kuruwitaarachchi, P. Abeygunawardena, L. Rupasingha, S. Udara
{"title":"A Systematic Review of Security in Electronic Commerce- Threats and Frameworks","authors":"N. Kuruwitaarachchi, P. Abeygunawardena, L. Rupasingha, S. Udara","doi":"10.34257/GJCSTEVOL19IS1PG33","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS1PG33","url":null,"abstract":"There is a remarkable scope for more streamlined living through an increase of e-platforms specially ecommerce, but this coincides with an increase in security concerns since the global market place is virtual and anonymous. Therefore, users have to blindly trust the online providers. In order to overcome this physiological barrier the eplatforms should ensure utmost security. If not the ecommerce industry is unableto perform in the market effectively. Thereby arises the need to perform a systematic review of security issues in the e-commerce industry and to discover how different frameworks address these problems. This paper aims to identifythe main security problems faced by both customers and vendors when interacting with ecommerce platforms and to evaluate general security management frameworks based on the main security areas identified.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117114140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}