Rini Akmeliawati, T. Kang, S. Srigrarom, Agus Budiyono
{"title":"Editorial","authors":"Rini Akmeliawati, T. Kang, S. Srigrarom, Agus Budiyono","doi":"10.1108/ijius-07-2020-076","DOIUrl":"https://doi.org/10.1108/ijius-07-2020-076","url":null,"abstract":"","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2020-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/ijius-07-2020-076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45786931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance improvement of space diversity technique using space time block coding for time varying channels in wireless environment","authors":"V. Bagde, G. DetheC.","doi":"10.1108/IJIUS-04-2019-0026","DOIUrl":"https://doi.org/10.1108/IJIUS-04-2019-0026","url":null,"abstract":"PurposeA recent innovative technology used in wireless communication is recognized as multiple input multiple output (MIMO) communication system and became popular for quicker data transmission speed. This technology is being examined and implemented for the latest broadband wireless connectivity networks. Though high-capacity wireless channel is identified, there is still requirement of better techniques to get increased data transmission speed with acceptable reliability. There are two types of systems comprising of multi-antennas placed at transmitting and receiving sides, of which first is diversity technique and another is spatial multiplexing method. By making use of these diversity techniques, the reliability of transmitting signal can be improved. The fundamental method of the diversity is to transform wireless channel such as Rayleigh fading into steady additive white Gaussian noise (AWGN) channel which is devoid of any disastrous fading of the signal. The maximum transmission speed that can be achieved by spatial multiplexing methods is nearly equal to channel capacity of MIMO. Conversely, for diversity methods, the maximum speed of broadcasting is much lower than channel capacity of MIMO. With the advent of space–time block coding (STBC) antenna diversity technique, higher-speed data transmission is achievable for spatially multiplexed multiple input multiple output (SM-MIMO) system. At the receiving end, detection of the signal is a complex task for system which exhibits SM-MIMO. Additionally, a link modification method is implemented to decide appropriate coding and modulation scheme such as space diversity technique STBC to use two-way radio resources efficiently. The proposed work attempts to improve detection of signal at receiving end by employing STBC diversity technique for linear detection methods such as zero forcing (ZF), minimum mean square error (MMSE), ordered successive interference cancellation (OSIC) and maximum likelihood detection (MLD). The performance of MLD has been found to be better than other detection techniques.Design/methodology/approachAlamouti's STBC uses two transmit antennas regardless of the number of receiver antennas. The encoding and decoding operation of STBC is shown in the earlier cited diagram. In the following matrix, the rows of each coding scheme represent a different time instant, while the columns represent the transmitted symbols through each different antenna. In this case, the first and second rows represent the transmission at the first and second time instant, respectively. At a time t, the symbol s1 and symbol s2 are transmitted from antenna 1 and antenna 2, respectively. Assuming that each symbol has duration T, then at time t + T, the symbols –s2* and s1*, where (.)* denotes the complex conjugate, are transmitted from antenna 1 and antenna 2, respectively. Case of one receiver antenna: The reception and decoding of the signal depend on the number of receiver antennas available. For t","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2020-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41412874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Route classification scheme based on covering rough set approach in mobile ad hoc network (CRS-MANET)","authors":"T. Sudhakar, H. Inbarani, S. S. Kumar","doi":"10.1108/ijius-08-2019-0046","DOIUrl":"https://doi.org/10.1108/ijius-08-2019-0046","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to obtain correctly classified routes based on their parameters.\u0000\u0000\u0000Design/methodology/approach\u0000In this paper, a covering rough set (CRS) approach is proposed for route classification in wireless ad hoc networks. In a wireless network, mobile nodes are deployed randomly in a simulation region. This work addresses the problem of route classification.\u0000\u0000\u0000Findings\u0000The network parameters such as bandwidth, delay, packet byte rate and packet loss rate changes due to the frequent mobility of nodes lead to uncertainty in wireless networks. This type of uncertainty can be very well handled using a rough set concept. An ultimate aim of classification is to correctly predict the decision class for each instance in the data.\u0000\u0000\u0000Originality/value\u0000The traditional classification algorithms, named K-nearest neighbor, J48, general rough set theory, naive Bayes, JRIP and multilayer perceptron, are used in this work for comparison and for the proposed CRS based on route classification approach revealing better accuracy than traditional classification algorithms.\u0000","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/ijius-08-2019-0046","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46018280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic tracking and recommendation using fourfold similarity measure from large scale data using hadoop distributed framework in cloud","authors":"R. Priyadarshini, L. Tamilselvan, N. Rajendran","doi":"10.1108/ijius-07-2019-0030","DOIUrl":"https://doi.org/10.1108/ijius-07-2019-0030","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to propose a fourfold semantic similarity that results in more accuracy compared to the existing literature. The change detection in the URL and the recommendation of the source documents is facilitated by means of a framework in which the fourfold semantic similarity is implied. The latest trends in technology emerge with the continuous growth of resources on the collaborative web. This interactive and collaborative web pretense big challenges in recent technologies like cloud and big data.\u0000\u0000\u0000Design/methodology/approach\u0000The enormous growth of resources should be accessed in a more efficient manner, and this requires clustering and classification techniques. The resources on the web are described in a more meaningful manner.\u0000\u0000\u0000Findings\u0000It can be descripted in the form of metadata that is constituted by resource description framework (RDF). Fourfold similarity is proposed compared to three-fold similarity proposed in the existing literature. The fourfold similarity includes the semantic annotation based on the named entity recognition in the user interface, domain-based concept matching and improvised score-based classification of domain-based concept matching based on ontology, sequence-based word sensing algorithm and RDF-based updating of triples. The aggregation of all these similarity measures including the components such as semantic user interface, semantic clustering, and sequence-based classification and semantic recommendation system with RDF updating in change detection.\u0000\u0000\u0000Research limitations/implications\u0000The existing work suggests that linking resources semantically increases the retrieving and searching ability. Previous literature shows that keywords can be used to retrieve linked information from the article to determine the similarity between the documents using semantic analysis.\u0000\u0000\u0000Practical implications\u0000These traditional systems also lack in scalability and efficiency issues. The proposed study is to design a model that pulls and prioritizes knowledge-based content from the Hadoop distributed framework. This study also proposes the Hadoop-based pruning system and recommendation system.\u0000\u0000\u0000Social implications\u0000The pruning system gives an alert about the dynamic changes in the article (virtual document). The changes in the document are automatically updated in the RDF document. This helps in semantic matching and retrieval of the most relevant source with the virtual document.\u0000\u0000\u0000Originality/value\u0000The recommendation and detection of changes in the blogs are performed semantically using n-triples and automated data structures. User-focussed and choice-based crawling that is proposed in this system also assists the collaborative filtering. Consecutively collaborative filtering recommends the user focussed source documents. The entire clustering and retrieval system is deployed in multi-node Hadoop in the Amazon AWS environment and graphs are plotted and analyzed.\u0000","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/ijius-07-2019-0030","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45275481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Makespan of routing and security in Cross Centric Intrusion Detection System (CCIDS) over black hole attacks and rushing attacks in MANET","authors":"N. Rajendran, P. Jawahar, R. Priyadarshini","doi":"10.1108/ijius-03-2019-0021","DOIUrl":"https://doi.org/10.1108/ijius-03-2019-0021","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network.\u0000\u0000\u0000Design/methodology/approach\u0000It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node.\u0000\u0000\u0000Findings\u0000The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches.\u0000\u0000\u0000Research limitations/implications\u0000In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA).\u0000\u0000\u0000Practical implications\u0000It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time.\u0000\u0000\u0000Social implications\u0000When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput.\u0000\u0000\u0000Originality/value\u0000The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.\u0000","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/ijius-03-2019-0021","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42448187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ship detection and recognition for offshore and inshore applications: a survey","authors":"I. S, Sasikala J., Sujitha Juliet D.","doi":"10.1108/ijius-04-2019-0027","DOIUrl":"https://doi.org/10.1108/ijius-04-2019-0027","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to study various ship detection methodologies. The accuracy of ship detection using satellite images still suffers from disturbances due to cluttered scenes and varying ship sizes. The suitability of the techniques for various applications is explained in this survey.\u0000\u0000\u0000Design/methodology/approach\u0000A list of data on the subject was gathered and processed into tables. The test outcomes were then discussed to determine the most effective ship detection technique under various complex environments.\u0000\u0000\u0000Findings\u0000In this work, the advantages and disadvantages of different classification techniques of ship detection are highlighted. The suitability of the techniques for various applications is also explained in this survey. Several hybrid approaches can be developed in order to increase the accuracy of ship detection system. This survey also aids in highlighting the significant contributions of satellite images to effective ship detection system.\u0000\u0000\u0000Originality/value\u0000In this paper, studying various ship detection methodologies is given specific attention. A survey on ship detection and recognition is clarified with the detailed comparative analysis of various classifier techniques.\u0000","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/ijius-04-2019-0027","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49254922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shapoor Zarei, Hussain Marzban, A. Samadi, A. Javaheri
{"title":"News shocks modeling on monetary policies using dynamic stochastic general equilibrium (DSGE) model","authors":"Shapoor Zarei, Hussain Marzban, A. Samadi, A. Javaheri","doi":"10.1108/ijius-04-2019-0025","DOIUrl":"https://doi.org/10.1108/ijius-04-2019-0025","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to investigate the effects of news shocks on monetary policies using the dynamic stochastic general equilibrium (DSGE) model. To this end, two kinds of news shocks (known as technology and consumer preferences) are defined according to Khan and Tsoukalas’ (2012) approach.\u0000\u0000\u0000Design/methodology/approach\u0000In order to construct and simulate the DSGE model to approaching the real conditions in a case study, consumption habits in the utility function were concerned based on the assumption of the zero-value obtained from multiplying the inflation by the real interest rate in the Fisher’s equation, whereas the real interest rates in the long run were appointed as negative remark in simulating the monetary policy models. The estimation and simulation results for the research models indicated that monetary policies using the interest rate instrument identified the news shocks less frequently than monetary policies using the monetary base instrument.\u0000\u0000\u0000Findings\u0000The approximate value of the social loss function in the optimal commitment and discretionary monetary policies suggests that the optimal commitment policy is estimated to be lower in both cases. Due to value of the social loss function in optimal monetary policies with nominal interest rate instrument in the presence of news shocks, this could be claimed that monetary policy with interest rate instrument is more appropriate than the monetary policy with a monetary base instrument.\u0000\u0000\u0000Originality/value\u0000The approximate value of the social loss function in the optimal commitment and discretionary monetary policies suggests that the optimal commitment policy is estimated to be lower in both cases.\u0000","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/ijius-04-2019-0025","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47247754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental analysis of Medicare data using hierarchical grouping mechanism","authors":"P. Jyothi, D. Lakshmi, Rama Rao Kvsn","doi":"10.1108/ijius-03-2019-0019","DOIUrl":"https://doi.org/10.1108/ijius-03-2019-0019","url":null,"abstract":"\u0000Purpose\u0000Analyzing medicare data is a role undertaken by the government and commercial companies for accepting the appeals and sanctioning the claims of those insured under Medicare. As the data of medicare is robust and made up of heterogeneous typed columns, traditional approaches consist of a laborious and time-consuming process. The understanding and processing of such data sets and finding the role of each attribute for data analysis are tricky tasks which this research will attempt to ease. The paper aims to discuss these issues.\u0000\u0000\u0000Design/methodology/approach\u0000This paper proposes a Hierarchical Grouping (HG) with an experimental model to handle the complex data and analysis of the categorical data which consist of heterogeneous typed columns. The HG methodology starts with feature subset selection. HG forms a structure by quantitatively estimating the similarities and forms groups of the features for data. This is carried by applying metrics like decomposition; it splits the dataset and helps to analyze thoroughly under different labels with different selected attributes of Medicare data. The method of fixed regression includes metrics of re-indexing and grouping which works well for multiple keys (multi-index) of categorical data. The final stage of structure is applying multiple aggregation function on each attribute for quantitative computation.\u0000\u0000\u0000Findings\u0000The data are analyzed quantitatively with the HG mechanism. The results shown in this paper took less computation cost and speed, which are usually incurred on the publicly available data sets.\u0000\u0000\u0000Practical implications\u0000The motive of this paper is to provide a supportive work for the tasks like outlier detection, prediction, decision making and prescriptive tasks for multi-dimensional data.\u0000\u0000\u0000Originality/value\u0000It provides a new efficient approach to analyze medicare data sets.\u0000","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/ijius-03-2019-0019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45622570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing and analysing FAR and FRR for face and voice recognition (multimodal) using KNN classifier","authors":"D. Kumar, P. Rao","doi":"10.1108/ijius-02-2019-0015","DOIUrl":"https://doi.org/10.1108/ijius-02-2019-0015","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to incorporate a multimodal biometric system, which plays a major role in improving the accuracy and reducing FAR and FRR performance metrics. Biometrics plays a major role in several areas including military applications because of robustness of the system. Speech and face data are considered as key elements that are commonly used for multimodal biometric applications, as they are simultaneously acquired from camera and microphone.\u0000\u0000\u0000Design/methodology/approach\u0000In this proposed work, Viola‒Jones algorithm is used for face detection, and Local Binary Pattern consists of texture operators that perform thresholding operation to extract the features of face. Mel-frequency cepstral coefficients exploit the performances of voice data, and median filter is used for removing noise. KNN classifier is used for fusion of both face and voice. The proposed method produces better results in noisy environment with better accuracy. In this proposed method, from the database, 120 face and voice samples are trained and tested with simulation results using MATLAB tool that improves performance in better recognition and accuracy.\u0000\u0000\u0000Findings\u0000The algorithms perform better for both face and voice recognition. The outcome of this work provides better accuracy up to 98 per cent with reduced FAR of 0.5 per cent and FRR of 0.75 per cent.\u0000\u0000\u0000Originality/value\u0000The algorithms perform better for both face and voice recognition. The outcome of this work provides better accuracy up to 98 per cent with reduced FAR of 0.5 per cent and FRR of 0.75 per cent.\u0000","PeriodicalId":42876,"journal":{"name":"International Journal of Intelligent Unmanned Systems","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1108/ijius-02-2019-0015","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42967963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}