Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1195

Minimax Estimation of the Parameter of Exponential Distribution based on Record Values

Minimax Estimation of the Parameter of Exponential Distribution based on Record Values

Lanping Li

Статья научная

Bayes estimators of the parameter of exponential distribution are obtained with non-informative quasi-prior distribution based on record values under three loss functions. These functions are weighted squared error loss, square log error loss and entropy loss functions. Finally the minimax estimators of the parameter are obtained by using Lehmann’s theorem. Comparisons in terms of risks with the estimators of parameter under three loss functions are also studied.

Бесплатно

Minimizing Power Consumption by Personal Computers: A Technical Survey

Minimizing Power Consumption by Personal Computers: A Technical Survey

P. K. Gupta, G. Singh

Статья научная

Recently, the demand of “Green Computing”, which represents an environmentally responsible way of reducing power consumption, and involves various environmental issues such as waste management and greenhouse gases is increasing explosively. We have laid great emphasis on the need to minimize power consumption and heat dissipation by computer systems, as well as the requirement for changing the current power scheme options in their operating systems (OS). In this paper, we have provided a comprehensive technical review of the existing, though challenging, work on minimizing power consumption by computer systems, by utilizing various approaches, and emphasized on the software approach by making use of dynamic power management as it is used by most of the OSs in their power scheme configurations, seeking a better understanding of the power management schemes and current issues, and future directions in this field. Herein, we review the various approaches and techniques, including hardware, software, the central processing unit (CPU) usage and algorithmic approaches for power economy. On the basis of analysis and observations, we found that this area still requires a lot of work, and needs to be focused towards some new intelligent approaches so that human inactivity periods for computer systems could be reduced intelligently.

Бесплатно

Minimizing Separability: A Comparative Analysis of Illumination Compensation Techniques in Face Recognition

Minimizing Separability: A Comparative Analysis of Illumination Compensation Techniques in Face Recognition

Chollette C. Olisah

Статья научная

Feature extraction task are primarily about making sense of the discriminative features/patterns of facial information and extracting them. However, most real world face images are almost always intertwined with imaging modality problems of which illumination is a strong factor. The compensation of the illumination factor using various illumination compensation techniques has been of interest in literatures with few emphasis on the adverse effect of the techniques to the task of extracting the actual discriminative features of a sample image for recognition. In this paper, comparative analyses of illumination compensation techniques for extraction of meaningful features for recognition using a single feature extraction method is presented. More also, enhancing red, green, blue gamma encoding (rgbGE) in the log domain so as to address the separability problem within a person class that most techniques incur is proposed. From experiments using plastic surgery sample faces, it is evident that the effect illumination compensation techniques have on face images after pre-processing is highly significant to recognition accuracy.

Бесплатно

Mining Frequent Itemsets with Weights over Data Stream Using Inverted Matrix

Mining Frequent Itemsets with Weights over Data Stream Using Inverted Matrix

Long Nguyen Hung, Thuy Nguyen Thi Thu

Статья научная

In recent years, the mining research over data stream has been prominent as they can be applied in many alternative areas in the real worlds. In this paper, we have proposed an algorithm called MFIWDSIM for mining frequent itemsets with weights over a data stream using Inverted Matrix [10]. The main idea is moving data stream to an inverted matrix saved in the computer disks so that the algorithms can mine on it many times with different support thresholds as well as alternative minimum weights. Moreover, this inverted matrix can be accessed to mine in different times for user's requirements without recalculation. By analyzing and evaluating, the MFIWDSIM can be seen as the better algorithm compared to WSWFP-stream [9] for mining frequent itemsets with weights over data stream.

Бесплатно

Mining Maximal Quasi Regular Patterns in Weighted Dynamic Networks

Mining Maximal Quasi Regular Patterns in Weighted Dynamic Networks

Hardeo Kumar Thakur, Anand Gupta, Bhavuk Jain, Ambika

Статья научная

Interactions appearing regularly in a network may be disturbed due to the presence of noise or random occurrence of events at some timestamps. Ignoring them may devoid us from having better understanding of the networks under consideration. Therefore, to solve this problem, researchers have attempted to find quasi/quasi-regular patterns in non-weighted dynamic networks. To the best of our knowledge, no work has been reported in mining such patterns in weighted dynamic networks. So, in this paper we present a novel method which mines maximal quasi regular patterns on structure (MQRPS) and maximal quasi regular patterns on weight (MQRPW) in weighted dynamic networks. Also, we have provided a relationship between MQRPW and MQRPS which facilitates in the running of the proposed method only once, even when both are required and thus leading to reduction in computation time. Further, the analysis of the patterns so obtained is done to gain a better insight into their nature using four parameters, viz. modularity, cliques, most commonly used centrality measures and intersection. Experiments on Enron-email and a synthetic dataset show that the proposed method with relationship and analysis is potentially useful to extract previously unknown vital information.

Бесплатно

Mining Sequential Patterns from mFUSP - Tree

Mining Sequential Patterns from mFUSP - Tree

Ashin Ara Bithi, Abu Ahmed Ferdaus

Статья научная

Mining sequential patterns from sequence database has consequential responsibility in the data mining region as it can find the association from the ordered list of events. Mining methods that predicated on the pattern growth approach, such as PrefixSpan, are well-organized enough to denude the sequential patterns, but engendering a projection database for each pattern regards as bottleneck of these methods. Lin (2008) first commenced the concept of tree structure to sequential pattern mining, which is acknowledged as Fast updated sequential pattern tree (FUSP - tree). However, link information stored in each node of FUSP - tree structure increases the complication of this method due to its link updating process. In this paper, at first, we have proposed a modified fast updated sequential pattern tree (called a mFUSP - tree) arrangement for storing the complete set of sequences with just frequent items, their frequencies and their relations among items in the given sequence into a compact data structure; excluding this tree structure avoids storing link information along to the next node of the following branch in the tree that carries the same item. Afterward, we have established by a mining method that our mFUSP - tree structure is proficient enough to ascertain out the perfect set of frequent sequential patterns from sequence databases without generating any intermediate projected tree and without calling for repeated scanning of the original database during mining. Our experimental result proves that, the performance of our proposed mFUSP - tree mining approach is a lot more trustworthy than other existing algorithms like GSP, PrefixSpan and FUSP - tree based mining.

Бесплатно

Mining for focus and priorities in Donald trump and Hillary Clinton’s daily tweets during the 2016 U.S. General Elections

Mining for focus and priorities in Donald trump and Hillary Clinton’s daily tweets during the 2016 U.S. General Elections

John N. Malala, Osabuohien P. Amienyi

Статья научная

This study presents the results of a content analysis of 2476 tweets posted by Hillary Clinton and Donald Trump during the 2016 presidential election following their official nomination by their respective political parties. The study sought to determine whether the candidates used a focused campaign strategy in their tweets, and whether the tweets revealed priorities based on their focus and the time of the day they were posted. The results show that Clinton posted more tweets, had a more focused campaign than Trump during the same time frame.

Бесплатно

Mining the Shirt Sizes for Indian Men by Clustered Classification

Mining the Shirt Sizes for Indian Men by Clustered Classification

M. Martin Jeyasingh, Kumaravel Appavoo

Статья научная

In garment production engineering, sizing system plays an important role for manufacturing of clothing. The standards for defining the size label are a critical issue. Locating the right garment size for a customer depends on the label as an interface. In this research work intend to approach that it could be used for developing sizing systems by data mining techniques applied to Indian anthropometric dataset. We propose a new approach of two-stage data mining procedure for labelling the shirt types exclusively for Indian men. In the first stage , clustering technique applied on the original dataset, to categorise the size labels. Then these clusters are used for supervised learning in the second stage for classification. A sizing system classifies a specific population into homogeneous subgroups based on some key body dimensions. The space with these dimensions gives raise to complexity for finding uniform standards. This enables us to have an interface as a communication tool among manufacturers, retailers and consumers. This sizing system is developed for the men’s age ranges between 25 and 66 years. Main attribute happens to be the chest size as clearly visible in the data set. We have obtained classifications for men’s shirt attributes based on clustering techniques.

Бесплатно

Mixed QoS Controlled Wireless Streaming Media Transmission Strategy

Mixed QoS Controlled Wireless Streaming Media Transmission Strategy

Fu Xianping, Men Yugang

Статья научная

Streaming media applications is currently limited by high bandwidth requirements. It is a challenging problem to provide the required quality of service (QoS) for the efficient transmission of video data under the varying network conditions such as the time-varying packet loss and fluctuating bandwidth. On Internet the most important part for streaming media transmission application is QoS control mechanism which including two kinds of QoS control method, based on end to end and network. A wireless streaming media forward platform based on the mixed quality-of-service (QoS) control system is introduced in this paper. The theoretical knowledge related to the quality of service and mixed quality of service control of the feasibility and characteristics are analyzed, and introduced a comprehensive quality of service in theory. This system combines network control and end to end quality of service control. The network of the system is optimized to support quality of service, using the underlying network devices, network bandwidth optimization, network structure adapted to meet the both ends of the quality of service. At both ends, from the delay, jitter, etc. are adjusted, by the addition of the timestamp and other information on the dynamic adjustment of the speed of data transmission. Through improving the control of two ends QoS and media streaming forward server, the video streaming from ships on the sea is transferred to the Internet by microwave and then linked to common Internet and mobile phone users through carrier networks(wired and wireless), which realized the real time supervision.

Бесплатно

Mobile Computing Trends in Saudi Arabia: An Exploratory Study

Mobile Computing Trends in Saudi Arabia: An Exploratory Study

Mutlaq B. Alotaibi

Статья научная

The main purpose of this research was to gain an understanding of the adoption behavior of mobile computing in Saudi Arabia. In particular, it aimed to acquire new insight into mobile computing trends, specifically in Saudi Arabia, in order to develop hypotheses and formulate precise criteria for mobile computing evaluation. In order to achieve these aims, the researcher created a focus group by recruiting eight participants with solid background knowledge of usability engineering and mobile computing. The focus group proposed a four-phase process: determination, qualification, categorization and evaluation of the mobile computing applications developed by Saudi organizations. During the determination phase, two hundred and twenty seven (n=227) mobile applications were determined as having been developed by organizations in Saudi Arabia. During the qualification phase, one hundred and forty two (n=142) mobile applications were qualified. Within the categorization phase, the experts categorized only the qualified applications into a two-level categorization hierarchy. Finally, in the evaluation phase, the qualified applications were evaluated in terms of purpose, platform, visual appearance, content, organization and usability. The results herein revealed that 43% of the mobile applications in Saudi Arabia were M-Government applications, while 57% were M-Business applications. In addition, the study proposed a sample of thirty six (n=36) applications as having statistical significance from all of the mobile applications in Saudi Arabia.

Бесплатно

Mobile Phone Based RIMS for Traffic Control a Case Study of Tanzania

Mobile Phone Based RIMS for Traffic Control a Case Study of Tanzania

Angela-Aida Karugila Runyoro, Jesuk Ko

Статья научная

Vehicles saturation in transportation infrastructure causes traffic congestion, accidents, transportation delays and environment pollution. This problem can be resolved with proper management of traffic flow. Existing traffic management systems are challenged on capturing and processing real-time road data from wide area road networks. The main purpose of this study is to address the gap by implementing a mobile phone based Road Information Management System. The proposed system integrates three modules for data collection, storage and information dissemination. The modules works together to enable real-time traffic control. Disseminated information from the system, enables road users to adjust their travelling habit, also it allows the traffic lights to control the traffic in relation to the real-time situation occurring on the road. In this paper the system implementation and testing was performed. The results indicated that there is a possibility to track traffic data using Global Positioning System enabled mobile phones, and after processing the collected data, real-time traffic status was displayed on web interface. This enabled road users to know in advance the situation occurring on the roads and hence make proper travelling decision. Further research should consider adjusting the traffic lights control system to understand the disseminated real-time traffic information.

Бесплатно

Model Driven Approach for Test Data Optimization Using Activity Diagram Based On Cuckoo Search Algorithm

Model Driven Approach for Test Data Optimization Using Activity Diagram Based On Cuckoo Search Algorithm

Rajesh Ku. Sahoo, Durga Prasad Mohapatra, Manas Ranjan Patra

Статья научная

Model-driven testing is a method to verify the requirement specification of the system through UML models. Cuckoo search (CS) algorithm is based on the brooding characteristics of cuckoo birds. The test case generation process is used to identify the test cases with resources with critical domain requirements. This proposed paper emphasizing on the generation and optimization of test cases or test data using cuckoo search technique through a case study, i.e., the withdrawal operation in a Bank ATM and it also describes the generation of test cases from UML behavioral diagram like activity diagram, possible test paths are also generated through activity diagram graph.

Бесплатно

Modeling Truncated Loss Data of Operational Risk in E-banking

Modeling Truncated Loss Data of Operational Risk in E-banking

Maryam Pirouz, Maziar Salahi

Статья научная

Operational risk is an important risk component for financial institutions, especially in E-banking. Large amount of capital that are assigned to decrease this risk are evidence to this subject. One of the most important factors for modeling operational risk to estimate capital charge is loss data collections of banks. But sometimes for reasons like decreasing the costs, banks save only the losses above some determined thresholds at their database. For achieving accurate capital charge, this threshold should be considered in determining capital charge. This paper focuses on modeling truncated loss data above some given threshold. We discuss several statistical methods for modeling truncated data, and suggest the best one for modeling truncated loss data. We have tested our suggested model for some operational loss data samples. Our results indicate that our approach can be useful for increasing accuracy of estimating operational risk capital charge in E-banking.

Бесплатно

Modeling of seamless vertical handover mechanism using demanded resource identification & mapping

Modeling of seamless vertical handover mechanism using demanded resource identification & mapping

S. B. Kumbalavati, J. D. Mallapur

Статья научная

One of the prominent challenges for offering seamless communication system while performing vertical handover in heterogeneous network is to relay the communication without identifying the accurate demands of the resources as well as quality of services for the newly moved node. After reviewing the existing literatures, it was found that there is a potential research gap in addressing this problem of seamless vertical handover. Therefore, the proposed manuscript addresses this problem by introducing a novel analytical model which is capable of formulating a precise decision for controlling the selection /dropping of the data packets on the basis of dynamic state of the network condition. The proposed system contributes faster processing by arbitrarily selecting the packets to be forwarded with a very unique and simple resource management. The study outcome of proposed system highlights an increased throughput and reduced length of queue along with better fairness control to offer seamless vertical handover.

Бесплатно

Modelling and QoS implementation of wireless sensor networks based on the ant colony optimization approach

Modelling and QoS implementation of wireless sensor networks based on the ant colony optimization approach

Ademola P. Abidoye

Статья научная

A new form of wireless sensor networks is emerging as an important component of the Internet of Things (IoT) where camera devices are interconnected and endowed with an IP address to form visual sensor networks. The applications of these networks span from smart parking systems in smart cities, video surveillance for security systems to healthcare monitoring and many others which are emerging from niche areas. The management of such sensor networks will require meeting a higher quality of service (QoS) constraints than demanded from traditional sensor networks. While many works have focused only on energy efficiency as a way of providing QoS in sensor networks, we consider a novel modelling approach where local optimizations implemented on the sensor nodes are translated into pheromone distribution used in ant colony optimization for path computation. We propose a routing protocol called the multipath ant colony optimization (MACO) that finds QoS-aware routing paths for the sensor readings from source nodes to the sink by relying on four local parameters: the link cost, the remaining energy of neighboring nodes, sensor nodes location information and the amount of data a neighbor node is currently processing. Finally, we propose an architecture for integrating sensor data with the cloud computing. Simulation results reveal the relative efficiency of the newly proposed approach compared to selected related routing protocols in terms of several QoS metrics. These include the network energy efficiency, delay and throughput.

Бесплатно

Modern Platform for Parallel Algorithms Testing: Java on Intel Xeon Phi

Modern Platform for Parallel Algorithms Testing: Java on Intel Xeon Phi

Artur Malinowski

Статья научная

Parallel algorithms are popular method of increasing system performance. Apart from showing their properties using asymptotic analysis, proof-of-concept implementation and practical experiments are often required. In order to speed up the development and provide simple and easily accessible testing environment that enables execution of reliable experiments, the paper proposes a platform with multi-core computational accelerator: Intel Xeon Phi, and modern programming language: Java. The article includes the description of integration Java with Xeon Phi, as well as detailed information about all of the software components. Finally, the set of tests proves, that proposed platform is able to prepare reliable experiments of parallel algorithms implemented in modern programming language.

Бесплатно

Modified Binary Exponential Backoff Algorithm to Minimize Mobiles Communication Time

Modified Binary Exponential Backoff Algorithm to Minimize Mobiles Communication Time

Ibrahim Sayed Ahmad, Ali Kalakech, Seifedine Kadry

Статья научная

The field of Wireless Local Area Networks (LANs) is expanding rapidly as a result of advances in digital communications, portable computers, and semiconductor technology. The early adopters of this technology have primarily been vertical application that places a premium on the mobility offered by such systems. Binary Exponential Backoff (BEB) refers to a collision resolution mechanism used in random access MAC protocols. This algorithm is used in Ethernet (IEEE 802.3) wired LANs. In Ethernet networks, this algorithm is commonly used to schedule retransmissions after collisions. The paper’s goal is to minimize the time transmission cycle of the information between mobiles moving in a Wi-Fi by changing the BEB algorithm. The Protocol CSMA / CA manage access to the radio channel by performing an arbitration based on time. This causes many problems in relation to time transmission between mobiles moving in a cell 802.11. what we have done show that the protocol using CSMA / CA access time believed rapidly when the number of stations and / or the network load increases or other circumstances affects the network..

Бесплатно

Morphotactics of Manipuri Adjectives: A Finite-State Approach

Morphotactics of Manipuri Adjectives: A Finite-State Approach

Ksh. Krishna B. Singha, Kh. Raju Singha, Bipul Syam Purkayastha

Статья научная

This paper presents a constrained finite-state model to represent the morphotactic rule of Manipuri adjective word forms. There is no adjective word category in Manipuri language. By rule this category is derived from verb roots with the help of some selected affixes applicable only to verb roots. The affixes meant for the purpose and the different rules for adjective word category formation are identified. Rules are composed for describing the simple agglutinative morphology of this category. These rules are combined to describe the more complex morphotactic structures. Finite-state machine is used to describe the concatenation rules and corresponding non-deterministic and deterministic automaton are developed for ease of computerization. A root lexicon of verb category words is used along with an affix dictionary in a database. The system is capable to analyze and recognize a certain word as adjective by observing the morpheme concatenation rule defined with the help of finite-state networks.

Бесплатно

Multi Objective Optimization Model using Preemptive Goal Programming for Software Component Selection

Multi Objective Optimization Model using Preemptive Goal Programming for Software Component Selection

Jagdeep Kaur, Pradeep Tomar

Статья научная

To achieve successful reusability of components a disciplined development approach is required which is the component based software engineering(CBSE).The software component selection is a vital part of this approach. It consists of defining an evaluation criteria based on user requirements and depending on this the repository is searched and shortlisted components are presented to the user. Due to availability of large number of components offering same type of functionality it is difficult to select a particular component based on available description. This paper presents a multiobjective optimization model for component selection purpose and solves it using preemptive goal programming approach by using an optimization tool LINDO. Subsequently, an illustrative case study is given where the components are taken from an online repository and goal programming is applied for getting the most optimal component. However, this model is applicable when the repository is small but for larger set of components it needs to be validated.

Бесплатно

Multi Objective Test Suite Reduction for GUI Based Software Using NSGA-II

Multi Objective Test Suite Reduction for GUI Based Software Using NSGA-II

Neha Chaudhary, O.P. Sangwan

Статья научная

Regression Testing is a performed to ensure modified code does not have any unintended side effect on the software. If regression testing is performed with retest-all method it will be very time consuming as testing activity. Therefore test suite reduction methods are used to reduce the size of original test suite. Objective of test suite reduction is to reduce those test cases which are redundant or less important in their fault revealing capability. Test suite reduction can only be used when time is critical to run all test cases and selective testing can only be done. Various methods exist in the literature related to test suite reduction of traditional software. Most of the methods are based of single objective optimization. In case of multi objective optimization of test suite, usually researchers assign different weight values to different objectives and combine them as single objective. However in test suite reduction multiple Pareto-optimal solutions are present, it is difficult to select one test case over other. Since GUI based software is our concern there exist very few reduction techniques and none of them consider multiple objective based reduction. In this work we propose a new test suite reduction technique based on two objectives, event weight and number of faults identified by test case. We evaluated our results for 2 different applications and we achieved 20% reduction in test suite size for both applications. In Terp Paint 3.0 application compromise 15.6% fault revealing capability and for Notepad 11.1% fault revealing capability is reduced.

Бесплатно

Журнал