International journal of applied information systems最新文献

筛选
英文 中文
Throughput Analysis in an Infrastructure-based Mesh Network using BeeHive Algorithm 基于基础结构的网状网络的BeeHive算法吞吐量分析
International journal of applied information systems Pub Date : 2017-03-08 DOI: 10.5120/IJAIS2017451659
K. Kiran, K. Vaishnavi, P. D. Shenoy, K. Venugopal
{"title":"Throughput Analysis in an Infrastructure-based Mesh Network using BeeHive Algorithm","authors":"K. Kiran, K. Vaishnavi, P. D. Shenoy, K. Venugopal","doi":"10.5120/IJAIS2017451659","DOIUrl":"https://doi.org/10.5120/IJAIS2017451659","url":null,"abstract":"WiMAX and WiFi are among the major wireless technologies escalating today. Both these technologies provide last mile connectivity and differ in their Media Access Control (MAC) layer and physical (PHY) layers. Since most of the devices are equipped with WiFi, and WiMAX is prevailing in today’s devices, an efficient way of routing the data is by making use of both these technologies simultaneously. This work presents such a technique based on the Bee-hive routing algorithm for an infrastructure-based mesh network, which promotes interoperability between the WiMAX and WiFi technologies. The network consists of two types of nodes 1)coordinator node 2)subscriber node, and divides the entire network into regions called foraging regions/zones based on the hop count from the coordinator node. A detailed implementation of this algorithm is presented in this work. The algorithm is tested for various mobile and static topologies by varying the parameters such as the speed of motion of the mobile nodes and the hop limit.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"581 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76259750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cross-Layer Congestion Control in Wireless Ad Hoc Network 无线自组织网络中的跨层拥塞控制
International journal of applied information systems Pub Date : 2017-03-08 DOI: 10.5120/IJAIS2017451661
A. Alomari
{"title":"Cross-Layer Congestion Control in Wireless Ad Hoc Network","authors":"A. Alomari","doi":"10.5120/IJAIS2017451661","DOIUrl":"https://doi.org/10.5120/IJAIS2017451661","url":null,"abstract":"Congestion control is a critical issue in mobile ad-hoc networks. This paper reflects a cooperatively ideal strategy of cross-layer congestion control, routing and setting up ad hoc wireless networks. We first calculate the degree check and scheduling check using multi-commodity flowing variables and calculate reserve sharing in networks with secure wireless channels as a service expansion issue with these controls. By dual corrosion, the reserve sharing problem naturally decomposes into three sub-issues: congestion control, routing, and scheduling that interact through congestion price. The overall junction property of this procedure is demonstrated. We next prolong the dual system to handle networks with time-varying channels and adaptive multi-proportion devices. The constancy of this resultant system is traditional, and its performance is characterized by an ideal position system which has the best feasible proportion state at the link layer. We then take a broad view the results mentioned above of an overall model of queueing network served by a set of interdependent parallel servers with time-varying service abilities, which models many design issues in communication networks. We show that for a curved optimization issue where a subset of variables lies in a polytope and the rest in a curved set, the dual-based procedure remains stable and optimum when the check set is modulated by an irreducible finite-state Markov series. This paper so offering a step toward a systematic way to carry out the cross-layer design by “Layering as optimization corrosion” for time-varying channel models.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"49 1","pages":"56-58"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74444278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Detection of Legitimate and Malicious URLs using ID3 Algorithm 使用ID3算法有效检测合法和恶意url
International journal of applied information systems Pub Date : 2017-03-08 DOI: 10.5120/IJAIS2017451660
Yogesh Dubey, Pranil Chaudhari, Shaldon Chaphya, T. D’abreo
{"title":"Efficient Detection of Legitimate and Malicious URLs using ID3 Algorithm","authors":"Yogesh Dubey, Pranil Chaudhari, Shaldon Chaphya, T. D’abreo","doi":"10.5120/IJAIS2017451660","DOIUrl":"https://doi.org/10.5120/IJAIS2017451660","url":null,"abstract":"Malicious websites are one of the serious threat over the internet. Ever since the inception of the internet, there has been a rise in malicious content over the web such has terrorism, financial fraud, phishing and hacking that targets user’s personal information. Till date, the various systems have been used for the detection of a malicious website based on text and content of the websites. This method has some disadvantages and the numbers of victims have therefore continued to increase. Here we developed a system which helps the user to identify whether the website is malicious or not. Our system identifies whether the site is malicious or not through URL. The proposed system is fast and more accurate compared to current system. The classifier is trained with datasets of 1000 malicious sites and 1000 legitimate site URLs. Trained classifier is used for detection of malicious URLs.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"6 1","pages":"53-55"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81498953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adoption of Computer-Aided Technology (CAx) in Textile and Apparel Industries 计算机辅助技术在纺织和服装工业中的应用
International journal of applied information systems Pub Date : 2017-03-08 DOI: 10.5120/IJAIS2017451655
Mekonnen Wagaw
{"title":"Adoption of Computer-Aided Technology (CAx) in Textile and Apparel Industries","authors":"Mekonnen Wagaw","doi":"10.5120/IJAIS2017451655","DOIUrl":"https://doi.org/10.5120/IJAIS2017451655","url":null,"abstract":"The extended nature of industrial operations demanded the integration of information and communication technologies (ICT) and computer aided technology (CAx) in industrial processes. Although there are 130 textile and apparel industries in Ethiopia, the adoption of such technology is limited. Hence, this research studied factors affecting CAx adoption through the extension of the technology acceptance model of Davis (1989) by adding perceived competitive advantage, cost effectiveness, and perceived security. The finding revealed that perceived ease of use, perceived service, perceived competitive advantage, cost effectiveness, perceived security and perceived usefulness are significant predictors of intention to use CAx in textile and apparel industries. General Terms Information Systems, ICT Adoption, Technology Acceptance, Computer-Aided Technology.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"252 1","pages":"35-42"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76289749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study of Intelligent Control System Tuning Methods for an Evaporator based on Genetic Algorithm 基于遗传算法的蒸发器智能控制系统整定方法比较研究
International journal of applied information systems Pub Date : 2017-02-08 DOI: 10.5120/IJAIS2017451646
Hala A. Abdel Halim, E. Othman, A. Sakr, A. Zaki, A. Abouelsoud
{"title":"A Comparative Study of Intelligent Control System Tuning Methods for an Evaporator based on Genetic Algorithm","authors":"Hala A. Abdel Halim, E. Othman, A. Sakr, A. Zaki, A. Abouelsoud","doi":"10.5120/IJAIS2017451646","DOIUrl":"https://doi.org/10.5120/IJAIS2017451646","url":null,"abstract":"This paper employs Genetic Algorithm to obtain the optimum parameters of an evaporator control system by using different tuning methods. Tuning methods consists of two main groups; first group consists of minimizing the performance indices factors separately such as; Integral of Absolute Error (IAE), Integral of Square Error (ISE), Integral of Time Absolute Error (ITAE) and Integral of Time multiplied with Square Error (ITSE).Second group consists of minimizing the performance indices factors separately plus the step response parameters such as; the rise Time (Tr), Settling Time (Ts), The Maximum Overshoot (Mp) and Steady state Error(Ess). Simulation Results prove that the second group of tuning methods give best performance, robust stability and improve the system robustness. General Terms Process Control, Intelligent Control, Optimal Control, Genetic Algorithm.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"69 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2017-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87460218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment 验证消息交换在异构动态环境下为云计算提供安全保障
International journal of applied information systems Pub Date : 2017-02-08 DOI: 10.5120/IJAIS2017451648
A. Verma, G. K. Shankhdhar, M. Darbari
{"title":"Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment","authors":"A. Verma, G. K. Shankhdhar, M. Darbari","doi":"10.5120/IJAIS2017451648","DOIUrl":"https://doi.org/10.5120/IJAIS2017451648","url":null,"abstract":"Providers to cloud computing including Amazon, Google, Microsoft, Rachspace and Terremark have all contributed at a high end for this bulk storage technology. As goes with all the software packages including CRMs and ERPs the need for security has to be redefined, restructured and its domain adjusted because as the development progresses the vulnerabilities are exposed. To deal with the security issues in cloud computing this paper discusses some concepts like ontology, web semantics, and message passing within or between cloud components. This paper introduces a Context Sensitivity Policy approach for the Cloud Security Paradigm.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"30 1","pages":"15-18"},"PeriodicalIF":0.0,"publicationDate":"2017-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87474818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measuring the severity of fungi caused disease on leaf using triangular thresholding method 用三角阈值法测定叶片真菌病害严重程度
International journal of applied information systems Pub Date : 2017-01-18 DOI: 10.5120/IJAIS2017451668
Richard Marfo
{"title":"Measuring the severity of fungi caused disease on leaf using triangular thresholding method","authors":"Richard Marfo","doi":"10.5120/IJAIS2017451668","DOIUrl":"https://doi.org/10.5120/IJAIS2017451668","url":null,"abstract":"A Thesis submitted to Department of Computer Science, Kwame Nkrumah University of Science and Technology in partial fulfillment of the requirement for the degree of Master of Science in Information Technology, 2016","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"1 1","pages":"24-32"},"PeriodicalIF":0.0,"publicationDate":"2017-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89581086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Many Approaches for Obtaining Least Noisy Signal using Kaiser Window and Genetic Algorithm 利用Kaiser窗和遗传算法获取最小噪声信号的多种方法
International journal of applied information systems Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451644
A. Alomari
{"title":"Many Approaches for Obtaining Least Noisy Signal using Kaiser Window and Genetic Algorithm","authors":"A. Alomari","doi":"10.5120/IJAIS2017451644","DOIUrl":"https://doi.org/10.5120/IJAIS2017451644","url":null,"abstract":"In a communication system in a signal is an information holding portion which is a route for the system. But this route may not be clean and plane route when data is transmitted from signal there will be some noise is added to the signal and signal turned into a noisy signal, so that is why we want to remove this noise from signal to get information from the signal. In this research, we find some approaches to remove this noise from the signal. These approaches are Wavelet filter based on Butterworth IIR filter and Kaiser Window FIR filter for the analysis of the signal. The newly designed Wavelet filter presents and idea for signal analysis and finding difficulties during any communication. The other techniques are FIR filter that mostly uses for videos. It is somehow valuable technique for filtering signal. This technique uses for complicated purposes like signal preconditioning and various communication application. Most of the FIR filters designing methods is based on Windows method, frequency sampling method and Optimal Sampling method these approaches has been proposed to obtain the clean signal from a noisy signal.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"17 1","pages":"22-26"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73211634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Different Versions of the Monty Hall Problem 蒙蒂·霍尔问题的不同版本
International journal of applied information systems Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451642
Mazen Alrahili
{"title":"Different Versions of the Monty Hall Problem","authors":"Mazen Alrahili","doi":"10.5120/IJAIS2017451642","DOIUrl":"https://doi.org/10.5120/IJAIS2017451642","url":null,"abstract":"The Monty Hall problem is a conditional probability example in which one of three doors has a big prize and other two doors conceive worthlessly. The game features are a rational decision between stay or switch given the constraints of the game. This paper aims to explain the different versions of the Monty Hall Problem in a many way to approve and solve the Monty Hall problem. General Terms Monty Hall Problem.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"9 1","pages":"12-17"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84291465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the Game Theory of the Prisoner’s Dilemma 理解囚徒困境的博弈论
International journal of applied information systems Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451640
M. Algarni
{"title":"Understanding the Game Theory of the Prisoner’s Dilemma","authors":"M. Algarni","doi":"10.5120/IJAIS2017451640","DOIUrl":"https://doi.org/10.5120/IJAIS2017451640","url":null,"abstract":"The prisoner dilemma (PD) is the best-known session of procedure in sociology. It helps us comprehend what oversees the harmony amongst collaboration and rivalry in business, in governmental issues, and in social settings. Diversion hypothesis is regularly presented in college classes with regards to a detainee's difficulty worldview, which shows the contention between motivating social forces to collaborate and private impetuses to abscond. This paper exhibits an extremely straightforward card amusement that effectively includes an extensive number of understudies in a Prisoner’s Dilemma. The degree of participation is influenced by the result impetuses and by way of rehashed connection.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"3 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80177491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信