
显示样式: 排序: IF: - GO 导出
-
Enhanced computerised diagnosis of Alzheimer’s disease from brain MRI images using a classifier merger strategy Int. J. Inf. Technol. Pub Date : 2021-01-25 Tawseef Ayoub Shaikh, Rashid Ali
This paper targets a novel classifier merging methodology for automated and precise judgement of Alzheimer's disease. The six diverse joining rules (mean, median, product, maximum, minimum, and voting) are presented with their significance in the consolidating of classifiers with that of the individual classifiers. The approval of the proposed combination procedure is performed on benchmark ADNI dataset
-
Design and computational analysis of photonic crystal sensor to detect acoustic signals for underwater applications using finite difference time domain algorithm Int. J. Inf. Technol. Pub Date : 2021-01-24 Hareesh Kumar, B. K. Nikhil, M. N. Sreerangaraju
In this paper we have designed the photonic crystal sensor for the detection of underwater pressure using finite difference time domain method. By using the photonic crystal with rods in air configuration, this photonic sensor is designed. Designed sensor is investigated for different pressure values and different values of wavelength are obtained. Two structures are designed, but design 2 photonic
-
Project execution obstacles: a case of King Abdulaziz Airport in Saudi Arabia Int. J. Inf. Technol. Pub Date : 2021-01-20 Abdullah Al Hudhaif
The purpose of this research is to examine the causes of delay in airport projects in general and the King Abdulaziz International Airport (KAIA) of Saudi Arabia in particular. The KAIA is the most strategic and busiest airport of Saudi Arabia, which transports millions of pilgrims from two hundred countries to perform Hajj and Umrah in Makkah. In general, more than 50% of construction projects fail
-
Energy optimized hybrid PSO and wolf search based LEACH Int. J. Inf. Technol. Pub Date : 2021-01-19 G. Devika, D. Ramesh, Asha Gowda Karegowda
In wireless sensor networks (WSN), computational challenges exist in determining a global energy optimized communication routing in large spaced network. WSN challenges can be handled by applying heuristic bio-inspired computational intelligence optimization methods. In WSN, Low Energy Adaptive Clustering Hierarchy (LEACH) algorithm is most frequently used hierarchical routing algorithm in spite of
-
A hybrid technique for evaluating the trust of cloud services Int. J. Inf. Technol. Pub Date : 2021-01-19 Doaa Trabay, Azezza Asem, Ibrahim El-Henawy, Wajeb Gharibi
Cloud computing has become a common desire as an alternative for investing in new IT systems. Every day, more agencies benefit from the services reachable in the cloud. Due to the large storage of information and data in the cloud, concerns about customer confidence or trust in the cloud increase as cloud services have been increased. Given the diversity of cloud service providers, identifying the
-
Robbery pattern analysis (RPA) using the concept of multipolarity and examining the influencing factors Int. J. Inf. Technol. Pub Date : 2021-01-16 Prerna Kapoor, Prem Kumar Singh
This paper introduces a method to find out the most robbery-prone time-slot of a place from the past records so as to provide alertness to the public and police. It cannot be predicted who all may be the victims of robbery but can predict the place and time that has high probability of its occurrence. Apart from finding the time-slot where robbery occurrence is more, visualization has been done to
-
Framework for agricultural e-trading platform adoption using neural networks Int. J. Inf. Technol. Pub Date : 2021-01-12 Sanjay Chaudhary, P. K. Suri
The digital e-trading platform is an ambitious and priority intervention in the agricultural sector. The research study is among the very few that identifies and prioritizes the predictors of wholesale electronic trading platform adoption in agricultural marketing. The research has been conducted in two phases—identification of predictors based on a scholarly articles’ review and generating the predictive
-
CMBA-SVM: a clinical approach for Parkinson disease diagnosis Int. J. Inf. Technol. Pub Date : 2021-01-11 Bibhuprasad Sahu, Sachi Nandan Mohanty
Different intelligence models are used by researchers for an easy and successful diagnosis of neurodegenerative diseases like Parkinson’s disease (PD) but none of the adopted methods is efficient. Early-stage identification of disease and diagnosis based upon vocal measurements is important to enhance the productive lives of the patient. An innovative intelligence model with a combination of a chaos-mapped
-
Enhancing cloud performance using task scheduling strategy based on resource ranking and resource partitioning Int. J. Inf. Technol. Pub Date : 2021-01-11 Ismail Zahraddeen Yakubu, Muhammad Aliyu, Zainab Aliyu Musa, Zakari Idris Matinja, I. M. Adamu
Cloud computing is one of the emerging models adopted in business organizations, IT Companies and mobile computing applications. Resources provisioned by cloud can be leased and utilized by clients remotely rather than purchasing it. An efficient allocation of resources is the key issue in the dynamic cloud environment due to the rapid increase in resource demand. Researchers in the literature have
-
Enhanced textural analysis for endometrial tuberculosis identification from ultrasound images Int. J. Inf. Technol. Pub Date : 2021-01-11 Varsha Garg, Anita Sahoo, Vikas Saxena
Endometrial Tuberculosis (ETB) is a major observation in Infertility due to Female Genital Tuberculosis (FGTB). Transvaginal ultrasound (TVUS) images are used to initiate the diagnostic procedure. An effective computational method to identify and classify ETB from TVUS images is presented in this paper. The images from female patients have been collected from medical centers in India. A composite co-occurrence
-
Hard link-switching scheme using pre-scanning for indoor VLC networks Int. J. Inf. Technol. Pub Date : 2021-01-10 Sumita Mishra, Sachin Kumar, Shivani Singh, Pallavi Asthana, Nidhi Mathur
VLC has been accepted as a potential technology for deployment in indoor wireless networks in 5G. Use of efficient link switching scheme among VLC access points is critical in indoor environment to provide seamless connectivity to mobile users. This paper proposes a User Device (UD) based intermittent link switching based on hard link switching. This method is highly suitable for the indoor scenario
-
Spatial role labelling in Arabic using probabilistic classifiers Int. J. Inf. Technol. Pub Date : 2021-01-09 Salha M. Alzahrani
Many applications in natural language processing require information about objects and their topological and geometric properties known as spatial relations. Arabic spatial role labelling addresses the challenge of extracting spatial relations between objects from Arabic texts. This paper extends spatial role labelling achieved on English texts to Arabic as a demanding computational linguistic track
-
Designing conceptual model and statistical validation for Government-citizen participation model in Indian context Int. J. Inf. Technol. Pub Date : 2021-01-06 Jyoti Yadav, A. K. Saini, Amit Kumar Yadav
In developing countries eGovernment projects sustainability is being considered as new parameter for development across the world. Though strategic guidance is available from various agencies to overcome its associated challenges and have its smooth implementation, however developing countries doesn’t reflect much progress. The study conducted in this paper has made an attempt in collating pivotal
-
The Survey of MPPT under non-uniform atmospheric conditions for the Photovoltaic Generation Systems Int. J. Inf. Technol. Pub Date : 2021-01-05 Manisha, Prerna Gaur
Among the undeletable sources, the PV Generation System is the most suitable resource. The main challenge for the PV generation system is changing climatic conditions and grid integration. The ongoing research is focusing on the tracking point of peak power, increasing the efficiency with reduced operating costs, and explores the challenges associated with the solar PV array under non-uniform atmospheric
-
Framework for web service composition based on QoS in the multi cloud environment Int. J. Inf. Technol. Pub Date : 2021-01-05 Abdelbasset Barkat, Okba Kazar, Imane Seddiki
Recently, the term cloud computing is widely used in the searching community, which shows the importance given by the scientists to this research area; cloud computing is a new computing model provides shared resources and data based on service delivery model, where everything from infrastructures, platforms, and software are given to the user like a set of services. The users of cloud platforms deal
-
Load aware multipath data forwarding for enhanced lifetime of WSN Int. J. Inf. Technol. Pub Date : 2021-01-04 Yogesh Tripathi, Arun Prakash, Rajeev Tripathi
Modern Wireless sensor network (WSN) requires strict constraints on delay and energy consumption. These networks are internet of things (IoT), multimedia sensor network, and body area network. It requires huge amount of bandwidth to deliver the data. Since, time critical data must be reached at sink node without loss because sensor network has energy limitations and hardware constraints. In this paper
-
GSCNN: a composition of CNN and Gibb Sampling computational strategy for predicting promoter in bacterial genomes Int. J. Inf. Technol. Pub Date : 2021-01-04 S. Sasikala, T. Ratha Jeyalakshmi
This paper is about a new computational strategy to find the promoter sequence which is a transcription starting factor in DNA without which the gene sequence cannot be activated for further protein synthesis process. Genes are the hereditary source of organisms’ functionality of living things. Sequence of activities is carried out to reveal the protein production process hidden in the genes. In this
-
Deep-LSTM ensemble framework to forecast Covid-19: an insight to the global pandemic Int. J. Inf. Technol. Pub Date : 2021-01-03 Sourabh Shastri, Kuljeet Singh, Sachin Kumar, Paramjit Kour, Vibhakar Mansotra
The pandemic of Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV-2) is spreading all over the world. Medical health care systems are in urgent need to diagnose this pandemic with the support of new emerging technologies like artificial intelligence (AI), internet of things (IoT) and Big Data System. In this dichotomy study, we divide our research in two ways—firstly, the review of literature
-
Drug resistant tuberculosis classification using logistic regression Int. J. Inf. Technol. Pub Date : 2021-01-03 Odu Nkiruka Bridget, Rajesh Prasad, Clement Onime, Adamu Abubakar Ali
Tuberculosis (TB) is a communicable disease that poses a serious threat to the lives of people in the world. TB may be classified as drug-sensitive (DS-TB) or drug resistant (DR-TB). Clinical methods for diagnosing DR-TB require costly infrastructure as well as highly skilled expertise and also have major limitations due to the large amount of time taken to provide results. Researchers in the past
-
Fog and edge computing: concepts, tools and focus areas Int. J. Inf. Technol. Pub Date : 2021-01-03 V. Hurbungs, V. Bassoo, T. P. Fowdur
Big data coupled with Internet of Things (IoT) have changed the way organisations perform business. With its panoply of sensors and smart devices, IoT generates large volumes of data that can provide meaningful insights. Cloud platforms are being widely used to perform analytics on data. With the emerging trends in fog and edge computing, data can now be processed and analysed at different layers on
-
A novel protocol for stable period and lifetime enhancement in WSN Int. J. Inf. Technol. Pub Date : 2021-01-03 Ashutosh Rastogi, Shailie Rai
Energy optimization is one of the open issues in wireless sensor networks. Most of the work focuses on clustering techniques to reduce the energy consumption and enhancement of stability period. In this paper we have proposed a novel region based routing protocol for the rise in stability duration and lifetime improvement. The whole sensing area is divided among nine regions and dedicated to different
-
An improved trust-based security framework for internet of things Int. J. Inf. Technol. Pub Date : 2021-01-03 P. N. Renjith, K. Ramesh, S. Sasikumar
The Internet plays a vital role in the massive growth of the emerging Internet of Things (IoT). IoT helps all electronic devices to communicate with other devices and with the human with the help of the Internet. IoT enables the devices to sense environmental changes or mission-critical data. These critical data that are sensed by the IoT devices are forwarded to the public cloud storage with the help
-
Multimodal trust based recommender system with machine learning approaches for movie recommendation Int. J. Inf. Technol. Pub Date : 2021-01-03 Sasmita Subhadarsinee Choudhury, Sachi Nandan Mohanty, Alok Kumar Jagadev
Recommender system (RS) are a type of suggestion to the information overload problem suffered by user of websites that allow the rating of particular item. The movie RS are one of the most efficient, useful, and widespread applications for individual to watch movie with minimum decision time. Many attempts made by the researchers to solve these issues like watching movie, purchasing book etc., through
-
IoT-Blockchain driven traceability techniques for improved safety measures in food supply chain Int. J. Inf. Technol. Pub Date : 2021-01-03 S. Balamurugan, A. Ayyasamy, K. Suresh Joseph
This paper disputes describing a solution to solve safety, quality and traceability problems in food products by providing healthy electronic food networks based on Blockchain technology and internet of things (IoT). The delivery and use of fake food reaches thousands every year, and the system of fake foodstuffs and stakeholders in the food supply chain (FSC) system are not subject to appropriate
-
Students’ knowledge assessment using the ensemble methods Int. J. Inf. Technol. Pub Date : 2021-01-03 Maksud Ahamad, Nesar Ahmad
Modeling students’ learning behavior for knowledge assessment is crucial for predicting the academic performance of students. This becomes a challenge in case of online teaching and learning scenarios since the students and teachers may not be physically present at the same geographical location in contrast to physical classroom teaching. Modeling of students’ learning patterns can lead to the proper
-
GBoost: A novel Grading-AdaBoost ensemble approach for automatic identification of erythemato-squamous disease Int. J. Inf. Technol. Pub Date : 2021-01-03 Sourabh Shastri, Paramjit Kour, Sachin Kumar, Kuljeet Singh, Vibhakar Mansotra
Ensemble learning is one of the powerful machine learning approaches that is generally used to strengthen models by combining the performances of several weak learners. It holds a great potential for solving umpteen problems in healthcare domain by enabling health systems to use data analytically for identifying best practices that improves healthcare and additionally reduces the cost too. The main
-
Text steganography in webometrics Int. J. Inf. Technol. Pub Date : 2021-01-03 Shabnam Rahber Yaghobi, Hedieh Sajedi
In the age of technology and science advancement, even powerful governments are not immune from hackers and spies’ influence. Their most important and sensitive information is always being heard and subject to disclosure. Steganography is one of the main ways to improve security and data protection when transferring data over the Web. Steganography’s primary purpose is to convey messages in communication
-
Energy efficient emergency rescue scheme in wireless sensor networks Int. J. Inf. Technol. Pub Date : 2021-01-03 Vinay Rishiwal, Omkar Singh
Internet of Things (IoT) plays an important role in various applications such as industrial control system, environmental monitoring, fire detection, smart home and much more. In today’s scenarios data transmission in emergency rescue is a challenging issue with respect of energy efficient. In this paper, an Energy Efficient Emergency Rescue Scheme (EEERS) is proposed and evaluated which transfers
-
Image retrieval system based on multi feature extraction and its performance assessment Int. J. Inf. Technol. Pub Date : 2021-01-03 Tamilkodi R, G. Rosline Nesakumari
The main problem in the Content based image retrieval is “semantic gap”. A human match two images related to its semantics, while a retrieval system do the same process based on comparison of feature vectors corresponding to visual image features. The problem in retieval of images is identifying its unique features. This article proposes three different methods to retrieve images based on the unique
-
Securing textual and image data on cloud using searchable encryption Int. J. Inf. Technol. Pub Date : 2021-01-03 B. Sushmitha Baliga, Ratnakar Medepalli, S. N. Muralikrishna
The number of people storing their data on the cloud has increased significantly in the past decade due to the advancement in technology. Thus, with an increase in the amount of data on their servers, cloud service providers have begun outsourcing their data to remote service providers in order to save costs. However, data security becomes an important issue in such cases. It is, therefore, necessary
-
Design an optimal digital phase lock loop with current-starved ring VCO using CMOS technology Int. J. Inf. Technol. Pub Date : 2021-01-03 Rekha Yadav, Usha Kumari
This paper describes the design of an optimal and low power Digital Phase Lock Loop (DPLL). It consumes the 485 mV power using 45 nm CMOS technology on CADENCE Virtuoso software. DPLL used for fast speed, less noise or jitter and large bandwidth with very fast acquisition time in wireless or wire line communication for modulator or demodulator. Clock recover, clock synchronization are the important
-
Improved localization with RSSI and DTN algorithms in wireless sensor networks Int. J. Inf. Technol. Pub Date : 2021-01-02 Venkata Reddy Adama, G. M. Asutkar
We introduce a Triangulation (DTN) algorithm that uses a WSN along with GP algorithm to enhance the accuracy of different location algorithms. The GP is used for the prediction of direction of the RSSI. The experimental results show that GP can able to predict the RSSI tendency and reduces variations of RSSI signal as the mobile user is in motion. The proposed triangulation algorithm cooperates with
-
An application layer technique to overcome TCP incast in data center network using delayed server response Int. J. Inf. Technol. Pub Date : 2021-01-02 Mahendra Suryavanshi, Ajay Kumar, Jyoti Yadav
Applications running in data center networks exhibits barrier-synchronized many-to-one communication pattern. Under this pattern, multiple workers synchronously transmit data to single aggregator. Synchronized transmission from multiple workers overload small-sized buffer of switch connected to aggregator. This causes severe packet drops and leads to overall application goodput degradation. This is
-
An efficient approach to find reliable topology of stochastic flow networks under cost constraint Int. J. Inf. Technol. Pub Date : 2021-01-02 Esha Datta, Neeraj Kumar Goyal
Computer and communication networks are often stochastic capacitated networks due to partial or complete failure of network components such as links and nodes. Therefore, in practice, network components have different associated costs based on their bandwidth and failure probabilities. Different topologies which are composed of different components of the network may provide various reliability values
-
Attack and intrusion detection in cloud computing using an ensemble learning approach Int. J. Inf. Technol. Pub Date : 2021-01-02 Parul Singh, Virender Ranga
The distributed and decentralized nature of cloud computing facilitates its adoption and expansion in different sectors of society such as education, government, information technology, business, and entertainment, etc. Cloud Computing provides a wide information technology landscape. Its existence in every section of society makes this computing paradigm prone to intrusions and attacks. A huge volume
-
Newer post-COVID perspective: Teledental encryption by de-multiplexed perceptrons Int. J. Inf. Technol. Pub Date : 2021-01-02 Joydeep Dey, Arindam Sarkar, Sunil Karforma
This paper presents an efficient mechanism for secured encryption of intraoral information in the emerging field of Teledental. Due to global rapid surge in the (Coronavirus Disease) COVID patients, the services of Teledental are best suited in the newer post-COVID era. A devised perceptron has been intelligently embedded with de-multiplexing ability to transmit data to the dentists has been proposed
-
Comparison of various controller design for the speed control of DC motors used in two wheeled mobile robots Int. J. Inf. Technol. Pub Date : 2021-01-02 Huma Khan, Shahida Khatoon, Prerna Gaur
This work describes the study of modeling and controller on wheeled mobile robots designed the motors which is driving the wheels. According to the structure and design of wheeled mobile robot, DC motors are the best suited for the motion control. The kinematical model is required for the designing process of the wheels in the WMR. The analysis of the mathematical model is divided into angle and velocity
-
A computational study of B-cell epitopes of wheat allergens and identification of its IgE binding residues Int. J. Inf. Technol. Pub Date : 2021-01-02 Amogh Johri, Neelabh, Meenakshi Srivastava
In the contemporary research, biological computational tools have emerged to play a pivotal role in facilitating both cost and time efficient research in several domains of biology. One such domain is addressing the prevailing food allergy issues, where these computational tools have been proven of vital importance. Different tools use different mathematical modelling methods and computational algorithms
-
A hazard preparedness plan for a selected stretch of hill road between Kodaikkanal and Palani Int. J. Inf. Technol. Pub Date : 2021-01-01 Evangelin Ramani Sujatha
The hill road between Kodaikkanal and Palani which serves as major connecting link between the two places is affected by landslides every year during monsoons and intense summer showers. This causes a severe impediment to the growth and development of the hill town, leading to social and economic impacts on the community. Therefore, it is mandatory to formulate a preparedness plan to combat the impacts
-
Hindi speech recognition in noisy environment using hybrid technique Int. J. Inf. Technol. Pub Date : 2021-01-01 Ashok Kumar, Vikas Mittal
Automatic speech recognition is generally analyzed for two types of word utterances; isolated and continuous-words speech. Continuous-words speech is almost natural way of speaking but is difficult to be recognized through machines (speech recognizers). It is also highly sensitive to environmental variations. There are various parameters which are directly affecting the performance of automatic speech
-
Real-time monitoring as a supplementary security component of vigilantism in modern network environments Int. J. Inf. Technol. Pub Date : 2020-12-05 Victor R. Kebande, Nickson M. Karie, Richard A. Ikuesan
The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events
-
Remodeling: improved privacy preserving data mining (PPDM) Int. J. Inf. Technol. Pub Date : 2020-10-20 Meghna D. Shastri, Anala A. Pandit
The data provided by individuals and various organizations while using internet applications and mobile devices are very useful to generate solutions and create new opportunities. The data which is shared needs to be precise to get the quality results. The data which may contain an individual’s sensitive information cannot be revealed to the world without applying some privacy preserving technique
-
Mechanism for securing cloud based data warehouse schema Int. J. Inf. Technol. Pub Date : 2020-10-19 Amar Arora, Anjana Gosain
Several studies have recommended encryption of data for securing Data Warehouse (DW) stored in hostile cloud networks. Most of the published work on encrypted DWs encrypts the DW data while DW Schema, i.e., Fact and Dimension table’s name and their attributes, remain unprotected. Unencrypted DW schema attributes may reveal critical information about the data contents to the cloud administrators or
-
Arabic sign language recognition using Ada-Boosting based on a leap motion controller Int. J. Inf. Technol. Pub Date : 2020-10-19 Basma Hisham, Alaa Hamouda
According to the World Health Organization (WHO), 466 million people are suffering from hearing loss, i.e., 5% of the world population, of which 432 million (93%) are adults and 34 million (17%) children. The main problem is how deaf and hearing-impaired communicate with people and each other, how they get education or do their daily activities. Sign language is the main communication method for them
-
Dynamically swarm shared mutation based bacterial foraging Int. J. Inf. Technol. Pub Date : 2020-10-16 Renu Nagpal, Parminder Singh, B. P. Garg
In this paper, dynamically swarm shared mutation based Bacterial Foraging (DSSBFO) is proposed to optimize multidimensional, unimodal and multimodal functions. In BFO, due to fixed step size it requires more computational cost to get optimum solution with better accuracy. Chemotaxis and reproduction step of BFO are not sufficient for an effective search. So in this paper, the authors propose dynamic
-
An intelligent assistive algorithm for bone tumor detection from human X-Ray images based on binary Blob analysis Int. J. Inf. Technol. Pub Date : 2020-10-14 Anil K. Bharodiya, Atul M. Gonsai
Image segmentation is an essential phase of medical image processing. Orthopaedics practitioners suggest X-Ray imaging to detect bone related diseases of the patient. Due to increase in the number of bone cancers, bone tumor detection and its segmentation from X-Ray image has become thirst area of research in the medical image analysis. In this research paper, an intelligent assistive algorithm has
-
Efficient Vehicular Ad Hoc Network routing protocol using weighted clustering technique Int. J. Inf. Technol. Pub Date : 2020-10-14 Sridevi Hosmani, Basavaraj Mathapati
The Vehicular Ad Hoc Network (VANET) technology is similar to the Mobile Ad Hoc Network (MANET) in operations. But due to high dynamics of vehicles as compare to mobile nodes in MANET, the routing protocols of MANET cannot be applicable for the VANET communications. The high mobility leads the challenges of frequent link breaks and hence poor Quality of Service (QOS) performance. The clustering based
-
A novel Hadith authentication mobile system in Arabic to Malay language translation for android and iOS Phones Int. J. Inf. Technol. Pub Date : 2020-10-14 Alaba Ayotunde Fadele, Amirrudin Kamsin, Khadher Ahmad, Rasheed Abubakar Rasheed
This paper critically analyses the key problem of Hadith authentication and scrutiny. The study looks into key aspects, such as the impression of critical scholars and the standard accepted by the main compilers of Hadith in giving rulings on the validity of Hadith. The paper uncovers an authoritative blend of facts, theory, and critical enquiry with an engaging insight. The system is designed using
-
Task allocation and coordination in distributed agile software development: a systematic review Int. J. Inf. Technol. Pub Date : 2020-10-13 Chitra Nundlall, Soulakshmee D. Nagowah
Large software companies are facing issues at project management level to allocate and manage tasks in distributed agile software development environment. Teams are located in different cities or countries with different profiles and expertise. When those teams are expanding, it is becoming more time consuming and difficult to coordinate. In order to do a proper assignment of tasks to an individual
-
Enhancing anomaly detection through restricted Boltzmann machine features projection Int. J. Inf. Technol. Pub Date : 2020-10-13 Gustavo H. de Rosa, Mateus Roder, Daniel F. S. Santos, Kelton A. P. Costa
Technology has been nurturing a wide range of applications in the past decades, assisting humans in automating some of their daily tasks. Nevertheless, more advanced technology systems also expose some potential flaws, which encourage malicious users to explore and break their security. Researchers attempted to overcome such problems by fostering intrusion detection systems, which are security layers
-
A novel peak signal feature segmentation process for epileptic seizure detection Int. J. Inf. Technol. Pub Date : 2020-10-12 T. Perumal Rani, G. Heren Chellam
Epilepsy is a brain disease in nerves which causes sudden seizure, sensations, and once in a while loss of mindfulness. This disorder is difficult to find manually because of its unpredictable nature since it is very hard to treat. The World Health Organization states that fifty million people having this type of disorder worldwide. Automatic detection assumes a significant role in the finding of epilepsy
-
Outdoor object detection for surveillance based on modified GMM and Adaptive Thresholding Int. J. Inf. Technol. Pub Date : 2020-10-12 Navneet S. Ghedia, C. H. Vithalani
This paper presents a modified Gaussian Mixture Model (GMM) and Adaptive Thresholding designed to improve object detection accuracy for the outdoor surveillance. Intrinsic and extrinsic improvements in traditional GMM will handle the outdoor dynamic scenes e.g. tree weaving, gradual illumination changes, partial occlusions and also handles certain amount of shadow. For foreground detection, Adaptive
-
QFGMOS and FGMOS based low-voltage high performance MI-OTA Int. J. Inf. Technol. Pub Date : 2020-10-12 Bhawna Aggarwal, Ashutosh Gupta
In this paper, two multiple-input operational transconductance amplifiers (MI-OTA) have been proposed. The proposed-I MI-OTA utilizes FGMOS technology to operate at low supply voltage. This proposed MI-OTA provides the flexibility of varying the transconductance of the device by changing the biasing voltage while closely maintaining the linear input voltage range of conventional MI-OTA. However, it
-
QRED: an enhancement approach for congestion control in network communications Int. J. Inf. Technol. Pub Date : 2020-10-12 Dharamdas Kumhar, Avanish kumar, Anil Kewat
This Nowadays, along with the rapid development of Internet technology, the user’s network functionality and need for internet performance are also growing very fast. Therefore network congestion being increasingly serious and congestion control is becoming a more important issue. To detect and control congestion many queue management techniques are accessible; the extremely fundamental of them is
-
Design and analysis of moems based displacement sensor for detection of muscle activity in human body Int. J. Inf. Technol. Pub Date : 2020-10-11 Preeta Sharan, K. V. Sandhya, Rakesh Barya, Mohit Bansal, Anup M. Upadhyaya
Proposed work consist of simple and micro size optical MEMS based displacement sensor for detection of muscle movement in human body. Optical MEMS based structure, analyzed with rods-in air and hole-in slab configuration of photonic crystal. Remarkable shift in wavelength is observed in RIA configuration with high quality factor of 3245 compare to holes in slab in the photonic sensing structure with
-
Protein class prediction based on Count Vectorizer and long short term memory Int. J. Inf. Technol. Pub Date : 2020-10-11 S. R. Mani Sekhar, G. M. Siddesh, Mithun Raj, Sunilkumar S. Manvi
Proteins class and function prediction is one of the most significant task in computational bioinformatics. The information about the protein functions and class plays a vital role in understanding biological cells and has a great impact on human life in factors such as personalized medicine. The technical advancement in the areas of biological aspects and understanding of biological processes results
-
Advantages of using fog in IoT applications Int. J. Inf. Technol. Pub Date : 2020-10-10 Adnan A. Abi Sen, Mohammad Yamin
Edge computing (EC) has emerged as an attractive and interesting topic for research. It is an extension of cloud computing, used for non-centralized computing with various new features and solutions. In particular, edge computing deals with Internet of Things (IoT) based applications and services. Fog, which sometimes is also referred as edge, is basically a type of EC model, and its features can support
-
An improved hybrid scheme for e-payment security using elliptic curve cryptography Int. J. Inf. Technol. Pub Date : 2020-10-10 O. M. Lawal, O. R. Vincent, A. A. A. Agboola, O. Folorunso
This paper presents an improved security scheme using a hybrid of elliptic curve integrated encryption and provably secure elliptic curve with cyclotomic points. The proposed scheme uses Weierstrass form of an elliptic curve and cyclotomic polynomial, by creating a relationship to uniquely generate a hash function to form a structure from a coordinate in the curve and variable in the polynomial. The
-
Minimize the routing overhead through 3D cone shaped location-aided routing protocol for FANETs Int. J. Inf. Technol. Pub Date : 2020-10-10 Sudesh Kumar, Ram Shringar Raw, Abhishek Bansal
Recently, designing an effective routing protocol is challenging for flying ad-hoc networks (FANETs) due to the versatile nature of unmanned aerial vehicles (UAVs). Position-based routing schemes are seen to be a remarkable preference for routing in FANETs due to the fact that the geographical information of UAVs is readily available. In this paper, we are interested in the modification of the location-aided
-
Efficient load balancing techniques for multi-datacenter cloud milieu Int. J. Inf. Technol. Pub Date : 2020-10-09 Sumanta Chandra Mishra Sharma, Amiya Kumar Rath, Bivasa Ranjan Parida
Load balancing is a challenge in the cloud network for proper resource utilization and improvement of makespan. To overcome the problem of load balancing various static and dynamic scheduling methods come into existence. In this paper, we have proposed two multi-datacenter two-phase load adjustment techniques for load balancing and apposite task scheduling. Our proposed methods allocate user jobs to