Global journal of computer science and technology最新文献

筛选
英文 中文
Identification of Anesthesia Stages from EEG Signals using Wavelet Entropy and Backpropagation Neural Network 基于小波熵和反向传播神经网络的脑电信号麻醉阶段识别
Global journal of computer science and technology Pub Date : 2019-03-26 DOI: 10.34257/GJCSTDVOL19IS1PG17
A. Rasel
{"title":"Identification of Anesthesia Stages from EEG Signals using Wavelet Entropy and Backpropagation Neural Network","authors":"A. Rasel","doi":"10.34257/GJCSTDVOL19IS1PG17","DOIUrl":"https://doi.org/10.34257/GJCSTDVOL19IS1PG17","url":null,"abstract":"This study focuses on entropy based analysis of EEG signals for extracting features for a neural network based solution for identifying anesthetic levels. The process involves an optimized back propagation neural network with a supervised learning method. We provided the extracted features from EEG signals as training data for the neural network. The target outputs provided are levels of anesthesia stages. Wavelet analysis provides more effective extraction of key features from EEG data than power spectral density analysis using Fourier transform. The key features are used to train the Back Propagation Neural Network (BPNN) for pattern classification network. The final result shows that entropy-based feature extraction is an effective procedure for classifying EEG data.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116821983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study and Optimized Simulation of OSPFv3 Routing Protocol in IPv6 Network IPv6网络中OSPFv3路由协议的研究与优化仿真
Global journal of computer science and technology Pub Date : 2019-03-23 DOI: 10.34257/GJCSTEVOL19IS2PG11
Md. Anwar Hossain, M. S. Akter
{"title":"Study and Optimized Simulation of OSPFv3 Routing Protocol in IPv6 Network","authors":"Md. Anwar Hossain, M. S. Akter","doi":"10.34257/GJCSTEVOL19IS2PG11","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG11","url":null,"abstract":"Routing is a design way to pass the data packet. User is assigns the path in a routing configuration. A significant role played by the router for providing the dynamic routing in the network. Structure and Configuration are different for each routing protocols. Next generation internet protocol IPv6 which provides large address space, simple header format. It is mainly effective and efficient routing. It is also ensure good quality of service and also provide security. Routing protocol (OSPFv3) in IPv6 network has been studied and implemented using ‘cisco packet tracer’. ‘Ping’ the ping command is used to check the results. The small virtual network created in Cisco platform .It is also used to test the OSPFv3 protocol in the IPv6 network. This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices. The receiving and sending the packet of data in a network is the responsibility of the internet protocol layer. It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6 environment.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123137709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy Efficient Mobile Sink Based Routing Model For Maximizing Lifetime of Wireless Sensor Network 基于节能移动汇聚的无线传感器网络寿命最大化路由模型
Global journal of computer science and technology Pub Date : 2019-03-23 DOI: 10.34257/GJCSTEVOL19IS2PG1
Naveen Ghorpade, P. Vijayakarthik
{"title":"Energy Efficient Mobile Sink Based Routing Model For Maximizing Lifetime of Wireless Sensor Network","authors":"Naveen Ghorpade, P. Vijayakarthik","doi":"10.34257/GJCSTEVOL19IS2PG1","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG1","url":null,"abstract":"","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129251433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Edge Computing 移动边缘计算
Global journal of computer science and technology Pub Date : 2019-03-23 DOI: 10.34257/GJCSTEVOL19IS2PG29
M. Sadiku, C. M. M. Kotteti, Sarhan M. Musa
{"title":"Mobile Edge Computing","authors":"M. Sadiku, C. M. M. Kotteti, Sarhan M. Musa","doi":"10.34257/GJCSTEVOL19IS2PG29","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG29","url":null,"abstract":"Mobile applications are becoming increasingly computational intensive, while many mobile devices still have limited battery power and cannot support computational intensive tasks. Mobile edge computing (MEC) computing is an extension of edge computing, and it refers to computing at the edge of a network. In mobile edge computing, computing and storage nodes are placed at the Internet's edge near mobile devices. It places the edge clouds at the candidate locations. This paper presents a brief introduction to MEC.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115545332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Encrypted Text Message Transmission in 5G Compatible Frequency-domain Subband Superposed Scheme Implemented MIMO OFDM Wireless Communication System 基于5G兼容频域子带叠加方案的MIMO OFDM无线通信系统加密短信传输性能评估
Global journal of computer science and technology Pub Date : 2019-03-23 DOI: 10.34257/GJCSTEVOL19IS2PG17
M. A. Naher, Md. Omor Faruk, Md. Mahbubur Rahman, S. Ullah
{"title":"Performance Evaluation of Encrypted Text Message Transmission in 5G Compatible Frequency-domain Subband Superposed Scheme Implemented MIMO OFDM Wireless Communication System","authors":"M. A. Naher, Md. Omor Faruk, Md. Mahbubur Rahman, S. Ullah","doi":"10.34257/GJCSTEVOL19IS2PG17","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS2PG17","url":null,"abstract":"In this paper, an investigative study has been made on the performance evaluation of encrypted text message transmission in 5G compatible multiuser frequency-domain subband superposed (FDSS) scheme implemented MIMO OFDM wireless communication system. The 2×2 multiantenna configured simulated system under consideration incorporates modern channel coding (LDPC and Repeat and Accumulate (RA)) and signal detection (Cholesky decomposition based ZF detection, Group Detection (GD) approach aided Efficient Zero-Forcing (ZF) and Lanczos method based efficient signal detection) techniques. In the scenario of transmitting encrypted text message over AWGN and Rayleigh fading channels, it is noticeable that implementation of Repeat and Accumulate channel coding and Group Detection (GD) approach aided Efficient Zero- Forcing (ZF) signal detection techniques is very much robust and effective in retrieving transmitted text messages for all users.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125213596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Analytic Real-Time Framework for IoT based Home Automation System 基于物联网的家庭自动化系统实时分析框架
Global journal of computer science and technology Pub Date : 2019-03-14 DOI: 10.34257/GJCSTBVOL19IS1PG13
Nazmul Hossain, Rafia Sultana, Farzana Akter Lima, Md. Arifur Rahman
{"title":"An Analytic Real-Time Framework for IoT based Home Automation System","authors":"Nazmul Hossain, Rafia Sultana, Farzana Akter Lima, Md. Arifur Rahman","doi":"10.34257/GJCSTBVOL19IS1PG13","DOIUrl":"https://doi.org/10.34257/GJCSTBVOL19IS1PG13","url":null,"abstract":"The Internet of Things or IoT means the ability to connect billions of physical devices around the world that are now linking to the internet for collecting and sharing data. Internet of Things (IoT) technologies is used to sense the real-time primordial manufacture data and included the energy alliance data and the provision circumstance data. The Internet of Things (IoT) will approve any contents to be sensed or monitored remotely wherever there any remaining network infrastructure, making amenities for the integration of the actual world into computer-based systems. Real-time narrates the path of flowing media is processing. In the real-time procedure, anyone can entrance information barring to narrate for it and save our time.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114821703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Taxonomy of Schedulers – Operating Systems, Clusters and Big Data Frameworks 调度器的分类——操作系统、集群和大数据框架
Global journal of computer science and technology Pub Date : 2019-03-14 DOI: 10.34257/GJCSTBVOL19IS1PG25
L. Sliwko
{"title":"A Taxonomy of Schedulers – Operating Systems, Clusters and Big Data Frameworks","authors":"L. Sliwko","doi":"10.34257/GJCSTBVOL19IS1PG25","DOIUrl":"https://doi.org/10.34257/GJCSTBVOL19IS1PG25","url":null,"abstract":"This review analyzes deployed and actively used workload schedulers’ solutions and presents a taxonomy in which those systems are divided into several hierarchical groups based on their architecture and design. While other taxonomies do exist, this review has focused on the key design factors that affect the throughput and scalability of a given solution, as well as the incremental improvements which bettered such an architecture. This review gives special attention to Google’s Borg, which is one of the most advanced and published systems of this kind.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measuring the Performance on Load Balancing Algorithms 测量负载均衡算法的性能
Global journal of computer science and technology Pub Date : 2019-03-14 DOI: 10.34257/GJCSTBVOL19IS1PG41
Saumendu Deb Roy, Md. Alam Hossain, Su Sen, Nazmul Hossain, Md. Rashid Al Asif
{"title":"Measuring the Performance on Load Balancing Algorithms","authors":"Saumendu Deb Roy, Md. Alam Hossain, Su Sen, Nazmul Hossain, Md. Rashid Al Asif","doi":"10.34257/GJCSTBVOL19IS1PG41","DOIUrl":"https://doi.org/10.34257/GJCSTBVOL19IS1PG41","url":null,"abstract":"Load balancing is an integrated aspect of the environment in cloud computing. Cloud computing has lately outgoing technology. It has getting exoteric day by day residence widespread chance in close to posterior. Cloud computing is defined as a massively distributed computing example that is moved by an economic scale in which a repertory of abstracted virtualized energetically. The number of clients in cloud computing is increasing exponentially. The huge amount of user requests attempt to entitle the collection for numerous applications. Which alongside with heavy load not far afield off from cloud server. Whenever particular (Virtual Machine) VMs are overloaded then there are no more duties should be addressed to overloaded VM if under loaded VMs are receivable. For optimizing accomplishment and better response or reaction time the load has to be balanced between overloaded VMs (virtual machines). This Paper describes briefly about the load balancing accession and identifies which is better than others (load balancing\u0000algorithm).","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117275162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SDN-Based Approach to Evaluate the Best Controller: Internal Controller NOX and External Controllers POX, ONOS, RYU 基于sdn的最佳控制器评估方法:内部控制器NOX和外部控制器POX, ONOS, RYU
Global journal of computer science and technology Pub Date : 2019-02-07 DOI: 10.34257/GJCSTEVOL19IS1PG21
Mohammad A. Sheikh, Monishanker Halder, Sk. Shalauddin Kabir, Md. Wasim Miah, Sawrnali Khatun
{"title":"SDN-Based Approach to Evaluate the Best Controller: Internal Controller NOX and External Controllers POX, ONOS, RYU","authors":"Mohammad A. Sheikh, Monishanker Halder, Sk. Shalauddin Kabir, Md. Wasim Miah, Sawrnali Khatun","doi":"10.34257/GJCSTEVOL19IS1PG21","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS1PG21","url":null,"abstract":"Software Defined Networking (SDN) is a rising technique to deal with replace patrimony network (coupled hardware and software program) control and administration by separating the control plane (software program) from the information plane (hardware). It gives adaptability to the engineers by influencing the focal control to plane straightforwardly programmable. Some new difficulties, for example, single purpose of disappointment, may be experienced because of the original control plane. SDN concentrated on flexibility where the security of the system was not essentially considered. It promises to give a potential method to present Quality of Service (QoS) ideas in the present correspondence networks. SDN automatically changes the behavior and functionality of system devices utilizing a single state program. Its immediate OpenFlow is planned by these properties. The affirmation of Quality of Service (QoS) thoughts winds up possible in a versatile and dynamic path with SDN. It gives a couple of favorable circumstances including, organization and framework versatility, improved exercises and tip-top performances.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123260593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Systematic Review of Security in Electronic Commerce- Threats and Frameworks 电子商务安全的系统回顾——威胁与框架
Global journal of computer science and technology Pub Date : 2019-02-07 DOI: 10.34257/GJCSTEVOL19IS1PG33
N. Kuruwitaarachchi, P. Abeygunawardena, L. Rupasingha, S. Udara
{"title":"A Systematic Review of Security in Electronic Commerce- Threats and Frameworks","authors":"N. Kuruwitaarachchi, P. Abeygunawardena, L. Rupasingha, S. Udara","doi":"10.34257/GJCSTEVOL19IS1PG33","DOIUrl":"https://doi.org/10.34257/GJCSTEVOL19IS1PG33","url":null,"abstract":"There is a remarkable scope for more streamlined living through an increase of e-platforms specially ecommerce, but this coincides with an increase in security concerns since the global market place is virtual and anonymous. Therefore, users have to blindly trust the online providers. In order to overcome this physiological barrier the eplatforms should ensure utmost security. If not the ecommerce industry is unableto perform in the market effectively. Thereby arises the need to perform a systematic review of security issues in the e-commerce industry and to discover how different frameworks address these problems. This paper aims to identifythe main security problems faced by both customers and vendors when interacting with ecommerce platforms and to evaluate general security management frameworks based on the main security areas identified.","PeriodicalId":340110,"journal":{"name":"Global journal of computer science and technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117114140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信