Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1195

Quantitative Analysis of RFID based Vehicle Toll Collection System using UML and SPN

Quantitative Analysis of RFID based Vehicle Toll Collection System using UML and SPN

Razib Hayat Khan

Статья научная

This paper focuses on the quantitative analysis of RFID based vehicle toll collection system. Since we conduct the quantitative analysis long before the implementation of the infrastructure, the approach is realized by the UML and SPN to capture the system dynamics and carry out multiple performance tests of the possible infrastructure. Thus, the performance tests ensure the installation of correct number of RFID vehicle toll collection booth in the entrance of a bridge or a highway so that the traffic congestion can be kept as minimal as possible as well as financial viability can be confirmed. We analyze the response time and throughput to know the maximum limit for the diverse number of arrival vehicles that is served by the different number of toll booths. This finally gives us a better understanding of the number of units necessary for toll collection to decrease the traffic congestion in a budget constraint manner.

Бесплатно

Quantum-dot Controlled Electronic Block Triggering a Quantum Computation Procedure

Quantum-dot Controlled Electronic Block Triggering a Quantum Computation Procedure

Vladimir К. Voronov

Статья научная

The works devoted to an issue of quantum computer design have been analyzed. The main problems related to creation of the quantum computer are discussed. A fundamentally new approach to solving the problem of creating a truly quantum computer based on the “up to bottom” strategy has been proposed and justified. The strategy can be implemented by preliminary visualization of the quantum states of qubits using nanotriggers formed from two-dimensional material, in particular, graphene. This refers to the visualization (materialization) of all, including entangled, states, which mainly determine the theoretically possible large mathematical resource of a quantum computer. A block-diagram of the electronic device based on “a priory” quantum states of q-bits is proposed. It is shown that for implementation of quantum computation procedure, each materialized (visualized) Shor's cell should correspond to an element of the electronic scheme. The device includes a block containing at least 1010 nanotriggers that perform a role of q-bits of quantum computation, which are created using graphene nanoribbons and controlled by a special element. The latter represents a self-organizing quantum dot having two essentially different states in terms of magnetic properties. This quantum dot is prepared on the basis of a compound, the molecules of which are characterized by the intramolular rearrangement. The nanotriggers are employed to form reversible logic blocks or gates. Each gate contains three triggers to perform logical operations. The offered device is an additional electronic unit that is embedded in a digital computer, which makes it possible to implement the computational process in accordance with the requirements of the provisions of quantum physics.

Бесплатно

Quantum-dot cellular automata based fragile watermarking method for tamper detection using chaos

Quantum-dot cellular automata based fragile watermarking method for tamper detection using chaos

Turker Tuncer, Sengul Dogan

Статья научная

Fragile watermarking techniques have been widely used in the literature for tampered areas localization and image authentication. In this study, a novel quantum-dot cellular automata based fragile watermarking method for tampered area localization using chaotic piecewise map is proposed. Watermark generation, embedding, extraction and tampered area localization phases are consisted of the proposed quantum dot cellular automata and chaos based fragile watermarking method. In the watermark generation phase, quantum dot cellular automata and piecewise map which is a chaotic map are utilized. A block based method is utilized as authentication values embedding and extraction phases. To detect tampered areas, generated watermark and extracted watermark are compared. Also, block counters are used to tamper detection. In order to evaluate this method, capacity, imperceptibility and image authentication ability were utilized as performance metrics and the results of these metrics clearly illustrated that the presented method is suitable for image authentication and tamper detection.

Бесплатно

Query Recommendation by Coupling Personalization with Clustering for Search Engine

Query Recommendation by Coupling Personalization with Clustering for Search Engine

Dhiliphanrajkumar.Thambidurai, Suruliandi. Aandavar, Selvaperumal.Prakasam

Статья научная

In the present world internet and web search engines have become an important part in one's day-to-day life. For a user query, more than few thousand web pages are retrieved but most of them are irrelevant. A major problem in search engine is that the user queries are usually short and ambiguous, and they are not sufficient to satisfy the precise user needs. Also listing more number of results according to user make them worry about searching the desired results and it takes large amount of time to search from the huge list of results. To overcome all the problems, an effective approach is developed by capturing the users' click through and bookmarking data to provide personalized query recommendation. For retrieving the results, Google API is used. Experimental results show that the proposed method is providing better query recommendation results than the existing query suggestion methods.

Бесплатно

RBNS Encoded Energy Efficient Routing Protocol for Wireless Sensor Network

RBNS Encoded Energy Efficient Routing Protocol for Wireless Sensor Network

Indrajit Bhattcharya, Prasun Sarkar, Priyasha Basu

Статья научная

Self Organizing Wireless Sensor Networks (WSN) is an emergent and challenging technology that is applicable to various real life scenarios. Different routing protocols in the WSN have been proposed over the years. In this type of network the major concern is the energy constraint sensor nodes that operate on limited battery power. Hence energy efficient routing algorithm in WSN need to be developed in order to address the battery power constraint of the sensor nodes. Minimizing the communication overhead during the data transmission and reception can considerably reduce the energy requirement of the sensor nodes. Redundant Binary Number System (RBNS) is one of the energy efficient techniques that can reduce the communication overhead by reducing the number of 1’s required to communicate in a data packet. In our proposed work the RBNS communication technique is applied with an existing popular routing protocol in WSN to achieve an energy efficient routing protocol. The algorithm has been successfully implemented in a simulated environment and the result that has obtained demonstrates the significant enhancement of network lifetime of the sensor network.

Бесплатно

RDF link generation by exploring related links on the web of data

RDF link generation by exploring related links on the web of data

Kumar Sharma, Ujjal Marjit, Utpal Biswas

Статья научная

Interlinking RDF resources is a vital aspect of the Semantic Web technology. It is the basis of Linked Data that provides interlinked datasets on the web. One of the principles of Linked Data is interlinking resources from different data sources on the web. Data interlinking is a critical and challenging problem that every Linked Data generation applications face. Various approaches have been evolved for resolving this problem, but, for more massive datasets, it becomes almost indefinite time while linking similar or related resources. Linking RDF resources is like the problem of entity matching, record matching or duplicate resource detection. More or less they attempt to point to the same problem, but the RDF link generation is the task of finding related resources on the web. In this article, we present an approach for generating RDF links using the similarity measure between two RDF resources and by exploring associated relationships of the matched resources. The idea is to find related resources and link them with an RDF resource that is being generated.

Бесплатно

RFID Based Toll Deduction System

RFID Based Toll Deduction System

Asif Ali Laghari, M. Sulleman Memon, Agha Sheraz Pathan

Статья научная

In this research paper we examine RFID based toll deduction system and how to make more efficient and perfect. The vehicle will be equipped with a radio frequency (RF) tag which will detect RF Reader located in on toll plaza. The amount will then automatically deduct from the bank account. This research paper can be considered scalable to implement in motor vehicles used today.

Бесплатно

RLS Wiener Smoother for Colored Observation Noise with Relation to Innovation Theory in Linear Discrete-Time Stochastic Systems

RLS Wiener Smoother for Colored Observation Noise with Relation to Innovation Theory in Linear Discrete-Time Stochastic Systems

Seiichi Nakamori

Статья научная

Almost estimators are designed for the white observation noise. In the estimation problems, rather than the white observation noise, there might be actual cases where the observation noise is colored. This paper, from the viewpoint of the innovation theory, based on the recursive least-squares (RLS) Wiener fixed-point smoother and filter for the colored observation noise, newly proposes the RLS Wiener fixed-interval smoothing algorithm in linear discrete-time wide-sense stationary stochastic systems. The observation y(k) is given as the sum of the signal z(k)=Hx(k) and the colored observation noise (v_c)(k). The RLS Wiener fixed-interval smoother uses the following information: (a) the system matrix for the state vector x(k); (b) the observation matrix H; (c) the variance of the state vector; (d) the system matrix for the colored observation noise (v_c)(k); (e) the variance of the colored observation noise; (f) the input noise variance in the state equation for the colored observation noise.

Бесплатно

RS-CBAODV: An Enhanced Reactive Routing Algorithm for VANET to Reduce Connection Breakage using Remote Storage Concepts

RS-CBAODV: An Enhanced Reactive Routing Algorithm for VANET to Reduce Connection Breakage using Remote Storage Concepts

N. Arul Kumar, E. George Dharma Prakash Raj

Статья научная

Vehicular Ad hoc Network (VANET) is formed to share information on a temporary basis between the vehicular nodes in a wireless medium. The routing information is used to discover the vehicles and the route has to be maintained to transfer the data. It may lead to link failure or breakage in the communication, if there is high network mobility and constrained topology arrangement. In case of failure, it may cause loss of data and delay in the network. So, to avoid breakage, the routing information is stored in traditional protocols like CBAODV and CS-CBAODV. Instead of storing routing information in client side, the idea of storing data in the remote side is taken into consideration to backup permanently. This remote server manages the data in client server which is to be delivered to vehicular node. After analyzing related protocols and simulators, a new reactive based routing protocol is designed in this research work and it is named as RS-CBAODV is used to handle routing information between vehicular node, Client side node (RST i.e. Road Side Terminals) and also in Remote side storage node. To analysis the performance of the proposed protocol, MOVE and NS2 simulator is used to compare both CS-CBAODV and RS-CBAODV protocols.

Бесплатно

Rainfall Events Evaluation Using Adaptive Neural-Fuzzy Inference System

Rainfall Events Evaluation Using Adaptive Neural-Fuzzy Inference System

Pejman Niksaz, Ali mohammad Latif

Статья научная

We are interested in rainfall events evaluation by applying adaptive neural-fuzzy inference System. Four parameters: Temperature, relative humidity, total cloud cover and due point are the input variables for our model, each has 121 membership functions. The data is six years METAR data for Mashhad city [2007-2012]. Different models for Mashhad city stations were constructed depending on the available data sets. Among the overall 25 possibilities one model with one hundred twenty one fuzzy IF-THEN rules has chosen. The output variable is 0 (no rainfall event) or 1 (rainfall event). With comparing trained data with actual data, we could evaluate rainfall events about 90.5 percent. The results are in high agreement with the recorded data for the station with increasing in values towards the real time rain events. All implementation are done with MATLAB.

Бесплатно

Random Connection Based Scale-free Networks

Random Connection Based Scale-free Networks

Shun-Li Lou, Xu-Hua Yang

Статья научная

Scale-free phenomenon has opened up a new network model as a special form of degree distribution. Preferential connection and growth constitutive are generally considered as the tow key factors in the formation of scale-free network. However, some network model with completely random connections instead of preferential connection can also generate scale-free networks, such as the protein interaction network in a cell. The article constructed such a random connection way: select an arbitrary neighbor vertex of a random vertex to add side. Through our simulation shows this model absolutely has the characteristics of scale-free networks. And the power-law distribution index [1+β^(-1)] of the new model is related to m which is the number of add edges every time. When m is sufficiently large, [1+β^(-1)] tends to quickly stable and the final size is 3. Then we use the Mean field theory analyzed theoretically, and get an analytic solution of degree distribution. Our study reveals that random connections without preferential strategy can also generate scale-free network.

Бесплатно

Random Handwritten CAPTCHA: Web Security with a Difference

Random Handwritten CAPTCHA: Web Security with a Difference

Mukta Rao, Nipur Singh

Статья научная

It is hard to believe a web form without a CAPTCHA. The web survival in this cut-throat competition is impossible without the mechanisms for blocking spam-boats. The spam-boats have now been made intelligent enough to break through machine printed CAPTCHAs. Handwritten CAPTCHA image can be one solution. In this paper handwritten CAPTCHA images have been used to enhance the web security. Introduction of randomness at various stages is proven to increase the recognition complexity for the spam boats, whereas the ease of recognition of handwritten words by human beings eventually increases the usefulness of such CAPTCHA. The technique used to produce colored image of handwritten letters also has randomness associated with it. The proposed CAPTCHA images contain alphanumeric content, one word with letters and a number with handwritten numerals. CAPTCHA images developed using proposed technique have been tested across various OCRs and online available resources as well.

Бесплатно

Rapid earthquake alarm system and real-time automated action: application of multi-agent hardware

Rapid earthquake alarm system and real-time automated action: application of multi-agent hardware

Ahmad Ghodselahi, Mostafa Ghodselahi, Farid Tondnevis

Статья научная

Earthquake is the most dangerous natural disaster in the whole era of human being life. Scientist efforts for predicting earthquake have no prolific result, so far. The earth complexity and geology structures are the main obstacles of these efforts. The importance of time at the occurrence of the earthquake has resulted in using powerful systems for real-time alarming and therefore lessening the casualties of the earthquake. In this paper we have designed a rapid earthquake alarm system and we have implemented it in parallel processing and continuous processing. We have tried to apply hardware intelligent agents for real-time and parallel processing of data and data fusion of sensors. By applying this technology, the performance of rapid earthquake alarm system will be improved. Through this improvement, the rapid and automated action of rapid earthquake alarm system can lead to reducing the effect of earthquake.

Бесплатно

Real Time Accident Detection from Closed Circuit Television and Suggestion of Nearest Medical Amenities

Real Time Accident Detection from Closed Circuit Television and Suggestion of Nearest Medical Amenities

Akanksha A. Pai, Harini K. S., Deeptha Giridhar, Shanta Rangaswamy

Статья научная

The prevalence of automobile accidents as a major cause of violent deaths around the world has prompted researchers to develop an automated method for detecting them. The effectiveness of medical response to accident scenes and the chances of survival are influenced by the human element, underscoring the need for an automated system. With the widespread use of video surveillance and advanced traffic systems, researchers have proposed a model to automatically detect traffic accidents on video. The proposed approach assumes that visual elements occurring in a temporal sequence correspond to traffic accidents. The model architecture consists of two phases: visual feature extraction and temporal pattern detection. Convolution and recurrent layers are employed during training to learn visual and temporal features from scratch as well as from publicly available datasets. The proposed accident detection and alerting system using Convolution Neural Network models with Rectified Linear Unit and Softmax activation functions is an effective tool for detecting different types of accidents in real-time. The system of accident detection, integrated with the alerting mechanism for prompt medical assistance achieved high accuracy and recall rates.

Бесплатно

Real Time Efficient Scheduling Algorithm for Load Balancing in Fog Computing Environment

Real Time Efficient Scheduling Algorithm for Load Balancing in Fog Computing Environment

Manisha Verma, Neelam Bhardwaj, Arun Kumar Yadav

Статья научная

Cloud computing is the new era technology, which is entirely dependent on the internet to maintain large applications, where data is shared over one platform to provide better services to clients belonging to a different organization. It ensures maximum utilization of computational resources by making availability of data, software and infrastructure with lower cost in a secure, reliable and flexible manner. Though cloud computing offers many advantages, but it suffers from certain limitation too, that during load balancing of data in cloud data centers the internet faces problems of network congestion, less bandwidth utilization, fault tolerance and security etc. To get rid out of this issue new computing model called Fog Computing is introduced which easily transfer sensitive data without delaying to distributed devices. Fog is similar to the cloud only difference lies in the fact that it is located more close to end users to process and give response to the client in less time. Secondly, it is beneficial to the real time streaming applications, sensor networks, Internet of things which need high speed and reliable internet connectivity. Our proposed architecture introduced a new scheduling policy for load balancing in Fog Computing environment, which complete real tasks within deadline, increase throughput and network utilization, maintaining data consistency with less complexity to meet the present day demand of end users.

Бесплатно

Real Time Handwritten Marathi Numerals Recognition Using Neural Network

Real Time Handwritten Marathi Numerals Recognition Using Neural Network

Sandeep B. Patil, G.R. Sinha

Статья научная

Character recognition is an important task in biometrics. This paper uses neural network for real time handwritten Marathi numerals recognition. We have taken 150 online Marathi numerals written in different styles by 10 different persons. Out of these, 50 numerals were used for training purpose and another 100 numerals were used for recognition purpose. The numerals undergo the preprocessing steps using image processing techniques and after character digitization it is further subjected to the multilayer backward propagation neural network for recognition purpose. The proposed research work gives recognition accuracy from 97% and to 100% for the different resolution of input vector.

Бесплатно

Real Time Implementation of Audio Source Localization on Blackfin ADSP-BF527 EZ-KIT

Real Time Implementation of Audio Source Localization on Blackfin ADSP-BF527 EZ-KIT

Mustapha Djeddou, Anis Redjimi, Abdesslam Bouyeda

Статья научная

The present paper discusses the implementation of direction of arrival estimation using Incoherent Wideband Music algorithm. The direction of arrival of an audio source is estimated using two microphones plugged in “Line-in” input of a DSP development board. A solution to the problem of fluctuating estimation of the angle of arrival has been proposed. The solution consists on adding an audio activity detector before going on processing. Only voiced sound frames are considered as they fulfill the theoretical constraint of the used estimation technique. Furthermore, the latter operation is followed by integration over few frames. Only two sensors are used. For such a reduced number of sensors, the obtained results are promising.

Бесплатно

Real Time Object Tracking using FPGA Development Kit

Real Time Object Tracking using FPGA Development Kit

Muhammad Tayyab, Muhammad Tahir Qadri, Raheel Ahmed, Maryam Ahmad Dhool

Статья научная

The main idea of this work is object tracking using real time video processing. For this purpose we designed an embedded system that performs the object tracking algorithm for accurate tracking of defined object. The theme may be implemented for the security companies, sports and the armed forces to make them more equipped and advanced. The heart of the system is a Field Programmable Gate Arrays development kit. It controls the whole system by receiving the video signal from camera, processes it and sends the video signal to the Liquid Crystal Display or monitor. After receiving video of intended object, target selection is performed to select the target to track and then the tracking algorithm is implemented using image processing algorithms implemented using Field Programmable Gate Arrays development kit. We also interfaced the DC gear motor to control the movement of the camera in order to track the selected object. In order to design the standalone application we transformed our algorithm in Field Programmable Gate Array kit.

Бесплатно

Real Time Scheduling for CPU and Hard Disk Requirements-Based Periodic Task with the Aim of Minimizing Energy Consumption

Real Time Scheduling for CPU and Hard Disk Requirements-Based Periodic Task with the Aim of Minimizing Energy Consumption

Vahdaneh Kiani, Zeynab Mohseni, Amir Masoud Rahmani

Статья научная

In recent years, with an increasing number of requests, energy, power and temperature have been important keys in embedded systems, which decrease the lifetime of both CPUs and hard disks. The energy consumption is an important issue in computer systems, particularly real-time embedded systems. The frequency and the Revolutions Per Minute are major factors in the reduction of energy consumption in both processors and hard disk drives. Therefore, the main goal of this paper is to present a scheduling mechanism for a real time periodic task that can save more energy. This mechanism is based on increasing, as much as possible, the execution time of the CPU and/or the Read/Write time of the hard disk without passing the task deadline. This will be done by dynamically changing the CPU frequency and/or the RPM of hard disk. Our experimental results demonstrate that the proposed algorithm manages to lower energy consumption by an average of 25% and to reduce the number of missed tasks by 80%.

Бесплатно

Real-Time Air Pollutants Rendering based on Image Processing

Real-Time Air Pollutants Rendering based on Image Processing

Demin Wang, Yan Huang, Weitao Li

Статья научная

This paper presents a new method for realistic real-time rendering of air pollutants based on image processing. The air pollutants’ variable density can create many shapes of mist what can add a realistic environment to virtual scene. In order to achieve a realistic effect, we further enhance thus obtained air pollution data getting from monitor in spatial domain. In the proposed method we map the densities of air pollutants to different gray levels, and visualize them by blending those gray levels with background images. The proposed method can also visualize large-scale air pollution data from different viewpoints in real-time and provide the resulting image with any resolution theoretically, which is very important and favorable for the Internet transmission.

Бесплатно

Журнал